Recent Post

Thursday, January 5, 2012

10 Famous Hacker in History

The computer world is rich with the history of hackers who contributed to the advancement of computer science and sharpen the form of computing, Internet and network which we enjoy today. Even in some cases they do it alone. And while it is true there is the Black Hat hacker who was behind the internet, steal and cause chaos, there is also a white hat hackers who use their computer for good. There is also a very different types of hackers: the figure of a genius. They all play their respective roles, large and small, in bearing the computer world that exists today. Here are 10 among the largest:
konrad zuse 
Konrad Zuse
We begin with Konrad Zuse, who is considered as the first computer hackers. Not in the sense of the modern hacker term todays, but without him there is no current hackers. Zuse has created the world's first computer that can be programmed entirely (or in terms of them called Complete Turing), known as Z3. Starting from the Z1, which is done solely by Zuse in his parents apartment and was completed in 1938. Zuse eventually get support from the German government, which later gave evolution from Z1 to Z3 which was completed in 1941 and considered as the ancestor of modern computing.

john draperJohn "Captain Crunch" Draper
John Draper hacking long before the computer gets the place it is today. The days of hacking Draper began in early 1970, when the largest network that is accessible to the public telephone system. At that time, the telephone set with an automated system using analog frequencies that can be eksploited to make a long distance phone call or even international call. Known as "Phreaking", and one of the devices Phreaking is the famous toy whistle which was a gift from Cap'n Crunch cereal. With this whistle, Draper made ​​another Phreaking device known as bluebox, a device that can generate many other tones used by phone companies 

steve wozniakSteve Wozniak
Started by John Draper Wozniak was familiar with Phreaking. In fact after the Draper share details of the bluebox design made ​​at a meeting of the Homebrew Computer Club meeting, Wozniak made his own version. Steve Jobs saw the market potential of that device, and then both, Steve's company is building their first venture. The days of hacking, Wozniak spent it in projects that legality is questionable. With the results from the sale of blue boxes that he has made plus Wozniak calculator's and Steve Jobs Van, they make the Apple I. With Steve's marketing skills, their company is now become a leading player in the industry. 

robert morrisRobert Morris
When the graduate college at Cornell University, Robert Morris created his own way to gain fame. According to his explanation, he makes the worm as an attempt to measure the size of the internet today. Following its release on November 2, 1988, the Morris worm successfully infected 6000 systems (approximately 10 percent of computers connected to the internet at the time). The worm is designed to do no harm, but due to an error in replication algorithm, the worm can copy itself quickly, causing excessive load on the system and ultimately have an impact on Morris. In 1989, he became the first person charged with the Act of Computer Fraud and Abuse in 1986. 

mark abeneMark “Phiber Optik” Abene
Perhaps this name is not familiar to you. He never did hacking into DOD or steal millions of dollars from the Bank. All he did was piss off AT & T. As a member of the hacker group Masters of Destruction, Abene screw up AT & T system. When AT & T telephone system crash, making 60,000 customers can not use the phone for more than 9 hours, they were quick blame Abene. Secret agent then visited him, confiscated all its equipment, even then AT & T stated that the damage it was a mistake from their side, Abene has been indicted on charges of destruction of the first-level computer. He then obtain indictments and more severe punishment that brought him to undergo a year in federal prison, which makes it the first hacker who experience it. 

kevin poulsenKevin “Dark Dante” Poulsen
Poulsen is considered as the coolest hacking  actors of all time. A radio contest held by KIIS-FM promised that they would give a new Porsche 944 S2 to the caller 102. Rather than try his luck among the many listeners in Los Angeles, Poulsen instead take over the entire telephone network to ensure that he is going to be a caller 102. He then disappeared after being fugitive of FBI, which makes  him in the popular TV show "unsolved mysteries". The TV show then crashes when the episode aired. is it accidentally? In 1991, Poulsen was arrested and charged with a variety of computer fraud, money laundering and violations of law. the Interesting part, during his imprisonment, Poulsen makes 180 times the help solving many cyber crime cases and even able to catch a sexual predator on MySpace.




kevin mitnickKevin Mitnick
Kevin Mitnick is probably the most famous hacker in the history of computers, because he was the first hacker who get into the list of the most wanted person by FBI. As a master of social engineering, Mitnick was not just computer hacking, he also did a hack on minds of people. In 1979, when he was 16 years old, he made his way to hack into computer systems and copying paid software. He involves himself with the personnel administrator, such as through a phone call or an email message and deceive them to provide passwords and other security information. After two and a half years away, Mitnick was finally caught and jailed for five years. He now runs a computer security consultant, Mitnick Security Consulting LLC. 

tsutomu shimomuraTsutomu Shimomura
Not all hacker shelter under the umbrella of Black-Hat. Tsutomu Shimomura is a White-hat hacker who is respected for its success caught Kevin Mitnick. In 1994, Mitnick steal some Shimomuras personal files and distribute them online. Motivated by revenge, Shimomura then create a dial tracking techniques to locate Mitnick. Thanks to information from Shimomura, the FBI finally caught Mitnick.







richard stallman 
Richard Stallman
In his early years, Stallman is a graduate student and programmer at MIT's Artificial Intelligence Labs where he was involved with a rich culture of hacking at MIT. As a defender of all things about the Open System (Open Source), Stallman fight MIT when installing the password system on their Computer Science Majors. He then decrypt user passwords (it is not an easy task using the speed of 1970s computer) and password are sent to people in the form of plaintext, and advised them to empty the password to make other people can also use the system. 

linus torvaldsLinus Torvalds
Following Stallman, Linus Torvalds is the other white hat hacker. His days of hacking began with an old Commodore VIC-20 machine, then Sinclair QL, which both has been modified himself. On his QL machine he made his own Text Editor program, even he made Pac-Man clone called Cool man. In 1991, he has Intel 80 836 PCs and began to create Linux, the first has a limited license in its own name, and then joined the GNU Project under the GNU GPL. Torvalds did not originally intend to continue working to build the kernel, because he considered it as a hobby, but then said another history, and now Linux operating system became the most familiar with hackers and also the most secure ever available in the world.


Review http://www.computer-issue.blogspot.com on alexa.com

2 comments:

  1. allmost every one above is linux users.. I'm so inspirates..

    ReplyDelete
  2. yeah, I think it's because at their time Microsoft was not exist yet :D hehehehe

    ReplyDelete