Despite stunning development and the considerable know science and technologies of modern, lost there are always flaws and loopholes often find it exploited, ordinary people, their motto nothing is perfect, and their goals often were personal interests.
well as the back of the term hacker (Hacker) to humiliate this the kind of people in the field of informatics and communication, in a post today recognize the list Boshahralhakrz since their backs, what were their crimes? And how was their future?
.jpg)
Kevin Mitnick
is Kochehr hacker through history and the U.S. Department of Justice considered as the most criminals computer applications in the history of the United States.
began adventures of Kevin Mitnick when he was twelve years old when he used the method of social engineering to bypass Ndham cards buses, and it was can ride any bus for free in Los Angeles, then became a social engineering his way home to get sensitive information as names of users and passwords.
in 1979 when he was 16 years old, could Kevin to penetrate the network Digital Equipment Corporation DEC One of the biggest U.S. companies and was able to get on their program sector, but nine years later was charged and remanded for a full year in addition to three years كإطلاق الصراح parole.
what that expired three years until the Kevin again broke the databases a lot of companies, including Pacific Bell, Fujitsu, Motorola , Nokia, Sun Microsystems and also the U.S. Pentagon. Then he spent another 5 years in jail to come out and become a consultant in information security, but now he runs his own protection.
caused Gary to the so-called far the largest electronic attack on a military constructors throughout history, has managed in a 13-month break 97 computers belonging to the armed forces and American space agency NASA.
having been accused of Gary claimed that he was only Aban for information about aliens in the belief that the United States was hiding superhero foreign technology may help solve the energy problems in the world.
were cut between 2002 and 2003, a group of high goals and then was Saluting it inserts its name in the list of the company's experts.
was nicknamed Balqrassan hobo because he was Atkhadd of abandoned buildings dwellings him and was used as points of contact sheet for acts of piracy, which was carried out.
later stopped by the police gave two years of public service, but now it operates as a journalist in the field of technology.
.jpg)
had its beginnings as the leader of the team piracy called ShadowCrew notorious بسرقتهم card bank and selling them online as they lose rigging a lot of passports, health insurance cards Khoaat use them to acts of theft of almost $ 4.3 million.
was then penetrates all the databases of TJX Companies and Heartland Payment Systems
was sentenced Albert Gonzalez, then 20 years spent in prison.
was nicknamed Captain Crunch and was considered the king of Phone Phreaking in the early seventies, that was fluent manipulation firms phones.
gained fame for the first time when it was discovered he and his friend to a simple game obtained a gift from a cans breakfast cereals were issued the same frequency tones used in AT & T to route calls, and then was able to John out bales homemade called b Blue Boxes to make calls for free to any country in the world.
then worked with Apple and Who wrote the first program of Word-Processing category called EasyWriter Now he runs in the programming protection programs.
.jpg)
in 2007 were linked Jonatn James many of the attacks that denied full to commit suicide in 2008 fearing him from prison.
Kevin Poulsen
known as Dark Dante and received its share of fame when he was able to penetrate the phone lines to the station Adaih
for programming same Kalmtsal winner in a competition to win a car Porsche new.
then has pursued by the FBI when he broke many systems الفديرالية, then was sentenced to 51 months in prison and pay a fine of U.S. $ 56,000.
immediately after his release from prison is Kevin from the track and became a journalist Gladiator addition to the legal authorities that helped to identify 744 sex offenders on MySpace.
in the end, this is a list of the most famous hackers in history and not the greatest of or the best in ? Why? Simply put, because the greatest hacker in history were not reaching the people's eyes or hands of the authorities.
well as the back of the term hacker (Hacker) to humiliate this the kind of people in the field of informatics and communication, in a post today recognize the list Boshahralhakrz since their backs, what were their crimes? And how was their future?
.jpg)
Kevin Mitnick
is Kochehr hacker through history and the U.S. Department of Justice considered as the most criminals computer applications in the history of the United States.
began adventures of Kevin Mitnick when he was twelve years old when he used the method of social engineering to bypass Ndham cards buses, and it was can ride any bus for free in Los Angeles, then became a social engineering his way home to get sensitive information as names of users and passwords.
in 1979 when he was 16 years old, could Kevin to penetrate the network Digital Equipment Corporation DEC One of the biggest U.S. companies and was able to get on their program sector, but nine years later was charged and remanded for a full year in addition to three years كإطلاق الصراح parole.
what that expired three years until the Kevin again broke the databases a lot of companies, including Pacific Bell, Fujitsu, Motorola , Nokia, Sun Microsystems and also the U.S. Pentagon. Then he spent another 5 years in jail to come out and become a consultant in information security, but now he runs his own protection.
Gary McKinnon
Was nicknamed himself Solo and piracy was for him a way to entertain only. Of assets Scottlndeh but British constructor.caused Gary to the so-called far the largest electronic attack on a military constructors throughout history, has managed in a 13-month break 97 computers belonging to the armed forces and American space agency NASA.
having been accused of Gary claimed that he was only Aban for information about aliens in the belief that the United States was hiding superhero foreign technology may help solve the energy problems in the world.
Adrian Lamo
We all know that large companies sometimes Todv the pirates so that they can test their systems but not the company never hired Adriano, not fear it, but because that's what he was doing all the time.were cut between 2002 and 2003, a group of high goals and then was Saluting it inserts its name in the list of the company's experts.
was nicknamed Balqrassan hobo because he was Atkhadd of abandoned buildings dwellings him and was used as points of contact sheet for acts of piracy, which was carried out.
later stopped by the police gave two years of public service, but now it operates as a journalist in the field of technology.
.jpg)
Albert "segvec" Gonzalez
Gained Albert fame when he was able to collect more than 170 million bank account in a period not exceeding two years or nearly half the population of the United States.had its beginnings as the leader of the team piracy called ShadowCrew notorious بسرقتهم card bank and selling them online as they lose rigging a lot of passports, health insurance cards Khoaat use them to acts of theft of almost $ 4.3 million.
was then penetrates all the databases of TJX Companies and Heartland Payment Systems
was sentenced Albert Gonzalez, then 20 years spent in prison.
John Draper
Considered by some as the father of spiritual hackers also is also considered legends programming.was nicknamed Captain Crunch and was considered the king of Phone Phreaking in the early seventies, that was fluent manipulation firms phones.
gained fame for the first time when it was discovered he and his friend to a simple game obtained a gift from a cans breakfast cereals were issued the same frequency tones used in AT & T to route calls, and then was able to John out bales homemade called b Blue Boxes to make calls for free to any country in the world.
then worked with Apple and Who wrote the first program of Word-Processing category called EasyWriter Now he runs in the programming protection programs.
.jpg)
Jonathan James
Was nicknamed c0mrade, earned his fame among hackers when they could and 15 years old only to penetrate a collection of networks known as Bell South, Miami-Dade, US Department of Defense and also Space Agency NASA saluting able to download the sources sufficient to understand the method of operation of the space station Global, was worth Downloads $ 1.7 million, forcing the space agency to close their network for three consecutive weeks.in 2007 were linked Jonatn James many of the attacks that denied full to commit suicide in 2008 fearing him from prison.
.jpg)
known as Dark Dante and received its share of fame when he was able to penetrate the phone lines to the station Adaih
for programming same Kalmtsal winner in a competition to win a car Porsche new.
then has pursued by the FBI when he broke many systems الفديرالية, then was sentenced to 51 months in prison and pay a fine of U.S. $ 56,000.
immediately after his release from prison is Kevin from the track and became a journalist Gladiator addition to the legal authorities that helped to identify 744 sex offenders on MySpace.
in the end, this is a list of the most famous hackers in history and not the greatest of or the best in ? Why? Simply put, because the greatest hacker in history were not reaching the people's eyes or hands of the authorities.
0 التعليقات:
Post a Comment