The most famous horny names in history
Whether black hats or white hats, hackers have had a great influence in the development of information technology all the time. Here are the names of the best stunt hackers in history.
Kevin Mitnick
Kevin Mitnick was once considered the most wanted cybercrime in the United States and also the first to be jailed for security harassment in the United States. Kevin has controlled the earliest social engineering format to break into computers and modify the telephone switching system. After two years of being hunted, he was arrested and imprisoned.
When completely returned, Mitnick Kevin established Mitnick Security Consultancy Company (Mitnick Security Consulting, LLC), helping clients from government to business protect important information. In parallel with the business, he traveled around the world to participate in forums and conferences to help people raise awareness about cyber security.
Thanks to computer knowledge and online vulnerabilities and numerous relationships in this field, founder Kevin Mitnick has a unique vision of network security, and can quickly point to losses. security gaps.
Robert Tappan Morris
On November 2, 1988, Robert Morris launched a computer worm that infested the 1/10 Internet. This is the first computer worm to be distributed over the Internet. Morris made the mistake of rambling about this computer worm for months before spreading it on the Internet. So it didn't take long for the police to find out he was the culprit spreading this worm.
Morris said it was a dangerous joke and he really regretted causing $ 15 million in damage because of this computer worm. The Morris worm is sometimes called the "Great Worm" due to the heavy consequences it caused on the Internet at the time, both in terms of the total amount of time the system was unusable, and about the psychological impact. with Internet security and reliability.
Vladimir Levin
In 1994, Vladimir Levin used a laptop in Russia to transfer $ 10 million from Citibank (US) customers to his accounts around the world. However, like other black hat hackers, Levin was also discovered and extradited to the US with a 3-year prison sentence.
Yan Romanowski
Yan Romanowski is also known as MafiaBoy is a famous teenage computer hacker, a high-tech industry when launching a denial-of-service attack that cripples the largest web site. on the Internet, including Amazon, eBay and Yahoo. After this, MafiaBoy was arrested in February 2000. Yan's lawyer said: ' If MafiaBoy uses all skills, he can cause unimaginable damage' .
Kevin Poulsen
Kevin Poulsen is also called Dark Dante in the hacker community, specializing in breaking into telephone systems, specifically radio stations. Poulsen is really famous after a spectacular trick with Los Angeles KIIS radio. At that time the luxury Porsche car brand along with KIIS radio was holding a lucky customer competition and the prize was a luxury Porsche sport for those with a 102th call.
Poulsen successfully broke into the city's telephone network, took control of the network, blocked all calls to the radio, and controlled the number that would eventually fall into his hands.
Poulsen was wanted by the FBI for breaking into a federal computer at the same time he won a Porsche and a $ 20,000 prize for another radio. Poulsen received a full 51 months in prison.
Steve Jobs and Steve Wozniak
Famous co-founders on the Apple company used part of their youth with the work of a hacker. Prior to founding Apple (circa 1971), they built Blue Box devices (a tool that allows users to make long distance calls without spending a cent) and selling them to students at University of California - Berkeley.
David Smith
Smith is famous for being the author of an email virus called Melissa. According to Smith, the Melissa virus has never caused damage, but their replication has overwhelmed computer systems and servers around the world. In fact, the Melissa virus has spread via e-mail and spread throughout the global computers, causing losses of about $ 65 million.
Jonathan James
James was really famous when he was the first teenager (16 years old) sentenced to prison for breaking into the government's high-end computer system. Jame specializes in breaking into high-end government systems such as the US Space Agency (NASA) and the defense ministry. James stole software worth more than 1.7 million.
George Hotz
George Hotz may be a famous unlocking artist, he is also famous for the crippling attack on the PlayStation gaming network in April 2011. As one of the first hackers to crack the PS 3 handheld game device, Hotz faced the legal battle that Sony sued because he publicly disclosed his unlocking method.
However, the following day, the hacker group clashed with Anonymous had taken this excuse to conduct large-scale attacks on Sony, causing the company to struggle for a long time. Hotz has denied any responsibility for this attack.
Gary McKinnon
In 2002, a strange message appeared on the US military computer with the content: ' The security system is too bad. I'm Solo, I will continue to sabotage to the highest level . ' This content was later discovered by a Scottish system administrator, Gary McKinnon. Gary was accused of breaking into a series of US government computer networks, including military, air force, navy and NASA systems. The court decided to extradite McKinnon to the United States and face illegal charges of 97 computers, causing $ 700,000 in damages.
You should read it
- 6 famous hackers from the beginning of the Internet
- Who is Kevin Mitnick?
- 10 hackers are welcomed by technology firms
- Kevin Mitnick shares tips and tricks that hackers often use
- Who is Steve Wozniak?
- Little is known about Steve Jobs' 'extraordinary' life
- Steve Jobs and eight words of 'thunder' have come true in the technology world
- Steve Jobs has a vision, but Bill Gates is the one to do it!
May be interested
- How to find names in Excelhow to find names in excel. you have a long list of hundreds and thousands of names, you are looking for ways to find names in excel to help save time when processing data. so invite you to learn how to find names in excel that tipsmake.com share below.
- How to arrange names in alphabetical order in Wordwhen working with name tables on word, users need to re-organize the names in accordance with the alphabet alphabet.
- Which online mapping service would you choose?currently on the market maps online directions, bing, google maps and mapquest are names 'horny' and each service has its own unique characteristics.
- 1000 beautiful girls names for you to choose for your little princessthe following 1000 names are arranged in alphabetical order, you can consult, learn and choose for your baby the names including the best middle name.
- The most famous robots in animein the anime world, there are many famous characters who are robots. let's review these familiar names with mgn!
- Top 10 Ranking of the most famous mobile phone companies in the world 2020in today's mobile phone market, we are seeing the rise of a host of novel brands from neighboring china. the new names have changed the famous phone rankings in the world thanks to competitive prices and technologies that are not inferior to anyone.
- Why are there such strange names as Dead Sea, Black Sea, Red Sea?black sea, red sea, dead sea are famous seas in the world but not everyone knows why they have such names?
- Listed the 10 most notorious pirates in historyin the history of the world, there are notorious pirates, scattering horrifying obsession for seafarers. even many boats go to sea to raise the white flag when they see the pirate ship.
- The AI helps shed some light on the author of the famous 400-year-old playhenry viii is one of the most famous plays in the history of english literature, written by famous writers william shakespeare and john fletcher in 1623.
- Why do storms around the world often have women's names?storms in the northwest pacific and south china sea are named alternately from the list of countries proposed in the region, while around the world, storms often have women's names, sometimes men's names or even the names of flowers and animals.