White-haired 'monsters'
Hackers 'white hats' combine a passion for research, discovery and fighting against underground forces that always seek to destroy. In this article, we will return to the original hacker definition and explore the world of white-hat hackers.
Hackers are not always known as Internet ninjas and are different from the rest of the world. Initially, "hacker" is a word that means positively, to refer to those with extensive knowledge of computers and computer networks. It was not until the Hollywood movies about hackers came into being that the meaning of the word became negative with the default "computer crime expert".
- Fun facts behind 10 popular technology terms
The hacker world is currently divided into two halves: hacker "white hat" and "black hat" hacker. Just as the figurative implies, 'black hat' represents the 'bad' part - is a force of hackers that infiltrate and illegally attack computer systems to harm and profit. 'White hats' represent the rest - are system security experts, or independent 'honest' security researchers.
However, the boundary between the two concepts is quite fragile. Given the need for exploration, discovery, and attraction of money, the 'white hat' hacker will most likely change his life goals, and move from one front line to another. Saying that to see that nothing is clearly different, maybe good people will turn into bad people if they are not steadfast and do not win over themselves in temptation.
However, there are still "white hat" hackers whose work is enough to guarantee their reputation. They know how to combine the passion of research, discovery and fighting against the underground forces that always seek to destroy. In this article, we will return to the original hacker definition and explore the world of white-hat hackers.
Famous white hat hackers
- 1. Tim Berners-Lee
- 2. Steve Wozniak
- 3. Kevin Mitnick
- 4. Tsutomu Shimomura
- 5. Jeff Moss
- 6. Linus Torvalds
- 7. Richard Matthew Stallman
- 8. Robert Hansen
- 9. Greg Hoglund
- 10. Dan Kaminsky
- 11. Zane Lackey
- 12. Marc Maiffret
- 13. Charlie Miller
- 14. HD Moore
- 15. Joanna Rutkowska
- 16. Sherri Sparks
- 17. Joe Stewart
- 18. Dino Dai Zovi
1. Tim Berners-Lee
Born on June 8, 1955, also known as TimBL, Tim Berners-Lee is an English computer scientist.
Not only famous for inventing the World Wide Web, Berners-Lee is also known as one of the members of the "white hat" hacker group. As a student at Oxford University, Berners-Lee was banned from using computers at school after he and a friend were arrested for attacks and access to restricted areas.
After finishing college, Berners-Lee also carried out several other attacks, including HTML.
2. Steve Wozniak
Steve Wozniak was born on August 11, 1950, nicknamed Woz, a computer engineer and American programmer who co-founded Apple Inc.
Steve Wozniak is known as a white hat hacker because he created the amazing Blue Box device.
The story begins when Wozniak reads the article that says "The Secret of the Little Green Box", talking about Blue Box. It describes telecom-thieves who hack into the system and make free long-distance calling by using a simulated copy of the audio signal on AT&T network systems. Then they sold blue boxes to their college classmates and friends.
And of course the last part of the story is probably guessing. From that magic box Blue Box they discovered things that were more valuable than it
3. Kevin Mitnick
Mitnick was born on August 6, 1963, originally known as the most famous black hat hacker in the world. After ending a period of multiple attempts to infiltrate the US government's top-secret systems, attacking the world's 'largest' banks and companies, he abandoned the "black hat". "and switched to the work of a writer, a consultant.
In an article on TakeDown.com, it is said that Mitnick's ambition to become a 'hacker' was cultivated very early and he achieved great success.
In 1982, Mitnick was accused of breaking into a North American Air Defense Command computer in Colorado Springs, Colo. He has changed a call program to distract an employee trying to track his call.
4. Tsutomu Shimomura
As a black hat hacker, Mitnick used to hack the system of computer security expert Shimimura. To 'take revenge' on Mitnick's actions, Shimomura took advantage of his 'hacking' skills to help the FBI in tracking and locating Mitnick.
Thanks to Shimomura's help, the FBI succeeded in tracking and locating Mitnick. Mitnick was finally arrested. And now both of them are on the same line.
5. Jeff Moss
Although Moss is known as a white hat hacker, he is known more in the computer world of Dark Tangent.
Moss founded the Black Hat security conferences, and attracted thousands of computer security experts. In addition, he founded Defcon, the annual conference of hackers.
Although he is ICANN's business security and safety director and adviser to the US Department of Homeland Security, Moss continues to maintain Black Hat and Defcon security conferences.
6. Linus Torvalds
Linus Torvalds is known as the author of Linux. Currently Linux is at a time of strong growth and is widely used by many users, and it is also one of the useful solutions to replace the Windows and Mac operating systems.
Since he was a child, Torvalds has started to 'hack' important information on his computer. In 1991, inspired by the use of the Mimix operating system, Torvalds created the first Linux kernel version. And soon, Linux has become a popular operating system all over the world to this day.
Although Torvalds was not the first to suggest open-source software, the spread of Linux partly supported the development of open source software.
Torvalds is one of the most influential people in the computer world.
7. Richard Matthew Stallman
Stallman was the one who founded the GNU project. The GNU project includes both open source operating systems and a mass collaboration project.
According to Stallman, GNU includes programs that are not GNU software and these programs have been developed by many different people for their own purposes.
8. Robert Hansen
Hansen's nickname in the security world is ' Rsnake ', and it is not uncommon for people to hear the ' Rsnake found . ' because these hacker findings are frequent and very important. Among them is the ' Slowloris ' tool - used to attack low bandwidth service denial, and ' Fierce ' - lists DNS to find adjacent consecutive IP space to attack targets more easily.
9. Greg Hoglund
Over the past 10 years, Hoglund spends his time researching rootkits and buffer overflows, creating the Rootkit website and co-authoring books of " Rootkits, Subverting the Windows Kernel " and " Exploiting Software ". The most sophisticated 'white hat' hacker techniques are to exploit the World of Warcraft online game vulnerability, which is described by Hoglund in the book ' Exploiting online Games ' with co-creators. Privacy research Gary McGraw.
10. Dan Kaminsky
Kaminsky is known as a "warrior" silently in the "white hat" hacker world. It was he who worked with software companies and service providers to fix the vulnerability in the DNS system in 2008. Kaminsky discovered this vulnerability if it was exploited, or a bad person. somehow, the global Internet may collapse on a large scale. Although some people blame Kaminsky for announcing the flaw as soon as he finds out, most still appreciate his sense of responsibility and extraordinary work in correcting the problem before It is published to the outside.
11. Zane Lackey
The author of ' Hacking Exposed: Web 2.0 ' and the content editor of ' Hacking VoIP ' and ' Mobile Application Security ' have discovered vulnerabilities in mobile and VoIP systems. Lackey has been talking and demonstrating the method of exploiting VoIP systems in such a way that some information security managers of many large corporations claim that they will not invest in VoIP until the houses Service provider fixes the problem.
12. Marc Maiffret
As a member of 'Chameleon' in the ' Rhino9 ' group of hackers, Maiffret was fortunate to realize that his technique could help protect the Windows computer system. In 1997, at 17, Maiffret left the underworld to form security firm eEye Digital Security, and worked with security researchers Derek Soeder and Barnaby Jack. In addition to exploring Windows-related vulnerabilities, Maiffret also played an active role in preventing the spread of the ' Code Red ' worm in 2001 (specializing in attacking Windows computer systems).
13. Charlie Miller
As co-author of the ' Mac hacker's handbook ' book, Millter demonstrated the ability to attack the Safari browser at Pwn2Own during the past 3 years. He was the one who discovered the iPhone exploit error, and was the first to break into the iPhone in 2007 and Android in 2008. Millter was also the first person to write vulnerability tools in Second Life.
14. HD Moore
Moore's open source Metasploit Project penetration testing platform in 2003 has become one of the most important and influential security discoveries in the field of open source. The Metasploit Project is used to detect network weaknesses, which are focused on exploiting 'white', 'black' and 'amateur' hackers.
15. Joanna Rutkowska
This Polish security researcher has shown ways in which rootkit software can be hidden in legitimate software and hardware. This pink hacker ' Blue Pill ' tool used to attack the Vista operating system protection mechanism has attracted great attention at the 2006 Black Hat conference.
16. Sherri Sparks
Like Rutkowska, Sparks security researcher specializing in rootkits and stealthy software. At Black Hat conferences, Sparks demonstrated how independent rootkits can attack and infiltrate and access computer systems easily.
17. Joe Stewart
With expertise in tracking and tracking malware and botnets used by financial criminals, Stewart is often the first to discover new and dangerous code, such as Clampi Trojan and Clampi Trojan. Due to his peculiar work, Stewart has fairly complete information about cybercrime gangs in China and Eastern Europe.
18. Dino Dai Zovi
Co-author of ' Mac Hacker's Handbook ' and ' The Art of Software Security Testing ', Zovi discovered and exploited a multi-platform security vulnerability in QuickTime software in just one night. Zovi successfully infiltrated the MacBook Pro which was fully patched to win the Pwn2Own contest .
Refer to the number of articles below:
- 12 signs that your computer is hacked
- The most basic insights to becoming a Hacker - Part 3
- The most basic insights to becoming a Hacker - Part 2
- The most basic insights to becoming a Hacker - Part 1
Wish you all have fun moments!
You should read it
- 17 skills needed to become a hacker
- Appears a free game that allows you to practice being a hacker
- Story of the 'two-hacker' Sabu: Anonymous traitor, the hero of the FBI
- The leading site to learn hacking skills
- Do you know who white hat hackers are and how their lives are?
- Post-thanks corner: Google, Microsoft award millions of dollars to white-hat hackers, Toyota, NEC say 'thank you'
- America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God'
- Figured out how to take over iCloud, but Apple's behavior made this hacker depressed and gave up the whole 18,000 USD in bounty
- Hacker white hat shows offensive and defensive
- Teen hacker is believed to be behind the notorious hacker group Lapsus$
- Classify hackers and career opportunities for true hackers
- Test your understanding about hacking
Maybe you are interested
Microsoft's official .NET website just crashed worldwide Detecting a Skype security vulnerability that can leak user IP addresses 7 practical applications of Machine Learning PI (PI Function) in Excel - How to use PI numbers in Excel VPN vulnerabilities and how to check and prevent them How to stream games from Windows computer to iPhone