Friday, April 6, 2012
Biggest hackers of the world with their full information & record
Do you like this story?
Here are the list of Top hackers in the world that created thier name in history books.
info:
{Born in 1963, Kevin Mitnick was the most-wanted computer criminal in the US at the time of his arrest. Mitnick also known as ‘Condor’ was arrested in 1995 for countless acts of computer fraud. Quite apt in the art of social engineering, Condor, at the age of 12, bypassed the card system used in the L.A. transit system. Mitnick just for the sake of ‘intellectual curiosity’ hacked into Digital Equipment Corporation systems, Nokia, Motorola, Fujitsu Siemens, and many others.}
info:
{Born in 1965, Poulsen, also known as Dark Dante, is a former black hat hacker. He is best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. At the time, KIIS-FM was running a contest in which the 102nd caller would possibly win a Porsche 944 S2. With the intent of getting the Porsche, Poulsen clogged all of the lines and made himself the 102nd caller. He was arrested in June 1994 and charged with wire, mail, and computer fraud, as well as money laundering.}
info:
{Best known for breaking into The New York Times, Yahoo! News, and Microsoft, Lamo surrendered to the US Marshals on September 9, 2003. He went into hiding after realizing that he was being tracked. For 15 months Lamo was investigated by the F.B.I. on complaints of many cos. He plead guilty in court and was ordered to pay $65,000. He was also sentenced to home detention and probation afterwards. He is known as a grey hat hacker; he would find security flaws in computer networks of companies and report back to them, so that they could be fixed.}
info:
{In 1988, the Morris worm was created and Robert T. Morris, Jr was the one who created it. It was a first ever computer worm. He was a student at Cornell when he set off the worm from MIT, from MIT so as to hide his tracks. According to Morris, he just wanted to know the number of computers connected to the internet. The unintentional damages caused by the worm ranged in between $20,000 to $530,000. Morris did community service for the damages and was set free. Currently, he is a teacher in the field of computer science and electrical engineering at MIT.}
info:
{Better known by his pseudonym Emmanuel Goldstein, Eric Corley was a well-known hacker in the 80s and 90s. He faced trial in 1999 for sharing DeCSS codes and a method to download them. The codes allowed for decrypting of encrypted DVDs. His court case was the first to test the Digital Millennium Copyright Act. Today, he owns a non-profit organization called the 2600 Enterprises, Inc. and publishes a magazine called 2600: The Hacker Quarterly.}
Fred Cohen
info:
{Though not as malicious as most on this list, Fred Cohen is definitely well known in the computer world. Studying to be a computer scientist at University of Southern California’s School of Engineering in 1983, Cohen was able to create the first computer virus. The virus he created was able to completely overtake a computer and control each one of its functions. His virus allowed other computer scientists to see that not all viruses can be solved by just one commonly used algorithm.
However, Cohen was also able to create good viruses. As silly as it sounds, he was able to create a virus that did nothing malicious to a computer. After putting the virus on a computer, it went into each executable file (.exe) and made them smaller. He named it the compression virus. Cohen was never jailed because his efforts were done for educational purposes. Today he runs a company that provides information security.}
Kevin Mitnick
info:
{Born in 1963, Kevin Mitnick was the most-wanted computer criminal in the US at the time of his arrest. Mitnick also known as ‘Condor’ was arrested in 1995 for countless acts of computer fraud. Quite apt in the art of social engineering, Condor, at the age of 12, bypassed the card system used in the L.A. transit system. Mitnick just for the sake of ‘intellectual curiosity’ hacked into Digital Equipment Corporation systems, Nokia, Motorola, Fujitsu Siemens, and many others.}
Kevin Poulsen
info:
{Born in 1965, Poulsen, also known as Dark Dante, is a former black hat hacker. He is best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. At the time, KIIS-FM was running a contest in which the 102nd caller would possibly win a Porsche 944 S2. With the intent of getting the Porsche, Poulsen clogged all of the lines and made himself the 102nd caller. He was arrested in June 1994 and charged with wire, mail, and computer fraud, as well as money laundering.}
Adrian Lamo
info:
{Best known for breaking into The New York Times, Yahoo! News, and Microsoft, Lamo surrendered to the US Marshals on September 9, 2003. He went into hiding after realizing that he was being tracked. For 15 months Lamo was investigated by the F.B.I. on complaints of many cos. He plead guilty in court and was ordered to pay $65,000. He was also sentenced to home detention and probation afterwards. He is known as a grey hat hacker; he would find security flaws in computer networks of companies and report back to them, so that they could be fixed.}
Robert T. Morris, Jr
info:
{In 1988, the Morris worm was created and Robert T. Morris, Jr was the one who created it. It was a first ever computer worm. He was a student at Cornell when he set off the worm from MIT, from MIT so as to hide his tracks. According to Morris, he just wanted to know the number of computers connected to the internet. The unintentional damages caused by the worm ranged in between $20,000 to $530,000. Morris did community service for the damages and was set free. Currently, he is a teacher in the field of computer science and electrical engineering at MIT.}
Eric Corley
info:
{Better known by his pseudonym Emmanuel Goldstein, Eric Corley was a well-known hacker in the 80s and 90s. He faced trial in 1999 for sharing DeCSS codes and a method to download them. The codes allowed for decrypting of encrypted DVDs. His court case was the first to test the Digital Millennium Copyright Act. Today, he owns a non-profit organization called the 2600 Enterprises, Inc. and publishes a magazine called 2600: The Hacker Quarterly.}
Fred Cohen
info:
{Though not as malicious as most on this list, Fred Cohen is definitely well known in the computer world. Studying to be a computer scientist at University of Southern California’s School of Engineering in 1983, Cohen was able to create the first computer virus. The virus he created was able to completely overtake a computer and control each one of its functions. His virus allowed other computer scientists to see that not all viruses can be solved by just one commonly used algorithm.
However, Cohen was also able to create good viruses. As silly as it sounds, he was able to create a virus that did nothing malicious to a computer. After putting the virus on a computer, it went into each executable file (.exe) and made them smaller. He named it the compression virus. Cohen was never jailed because his efforts were done for educational purposes. Today he runs a company that provides information security.}
Blog Warning:
HEY VISITORS THIS IS A NOTE FROM ADMIN:
THIS WEBSITE IS BUILD BY ME ONLY FOR EDUCATIONAL PURPOSE I JUST WANT TO PROVIDE CYBER TIPS SO IF U USE THESE INFORMATION TO HARM ANY SUBSTANCE,COMMUNITY OR PERSON AND GOT CAUGHT THEN I AM NOT RESPONSIBLE FOR IT SO MIND MY WORDS HACKING IS A CYBER CRIME DON'T CHEAT OTHERS WITH YOUR POWERS
KNOWLEDGE IS FOR SHARING ASK-SHARE
THIS WEBSITE IS BUILD BY ME ONLY FOR EDUCATIONAL PURPOSE I JUST WANT TO PROVIDE CYBER TIPS SO IF U USE THESE INFORMATION TO HARM ANY SUBSTANCE,COMMUNITY OR PERSON AND GOT CAUGHT THEN I AM NOT RESPONSIBLE FOR IT SO MIND MY WORDS HACKING IS A CYBER CRIME DON'T CHEAT OTHERS WITH YOUR POWERS
KNOWLEDGE IS FOR SHARING ASK-SHARE
FOR MORE INFORMATION MAIL ME:
STSHREYASH50@GMAIL.COM