Top Hacker Profiles And Movies

Share:
1. Stephen Wozniak (white hat)

 

Nicknamed Woz, he is often referred to as the other Steve of Apple. Wozniak and Steve Jobs, co-founded Apple Computer. Woz started his hacking making blue boxes, which are devices that bypass telephone switching mechanisms enabling users to make free long distance calls. Woz and Jobs sold these blue boxes to their classmates in college and even used a blue box to call the Pope while pretending to be Henry Kissinger.
Wozniak dropped out of college and invented the compute that made him famous. Jobs had the idea to sell the computer as a fully assembled PC board. The idea was conceived and developed in Jobs garage. Wozniak and Jobs sold the first 100 of the Apple I to a local dealer for $666.66 each.
Woz currently focuses on philanthropy and no longer works full time for Apple. "Wozniak 'adopted' the Los Gatos School District, providing students and teachers with hands-on teaching and donations of state-of-the-art technology equipment."


2. Tim Berners-Lee (white hat)





Berners-Lee is credited with being the inventor of the World Wide Web. Berners-Lee has been honored with numerous recognitions incuding the Millennium Technology Prize.
Berners-Lee was first caught hacking access codes with a friend while a student at Oxford University. He was then banned from the University computers.
Berners-Lee realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS ideas and – ta-da! – the World Wide Web."
Since his creation of the World Wide Web, Berners-Lee founded the World Wide Web Consortium at MIT. The W3C describes itself as "an international consortium where Member organizations, a full-time staff and the public work together to develop Web standards." Berners-Lee's World Wide Web idea, as well as standards from the W3C, is distributed freely with no patent or royalties due.



3. Linus Torvalds (white hat)



Torvalds fathered Linux, the very popular Unix-based operating system. He calls himself "an engineer," and has said that his aspirations are simple, "I just want to have fun making the best damn operating system I can."
Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. Wikipedia reports that he modified the Sinclair "extensively, especially its operating system." Specifically, Torvalds hacks included "an assembler and a text editor…as well as a few games."
Torvalds created the Linux kernel in 1991, using the Minix operating system as inspiration. He started with a task switcher in Intel 80386 assembly and a terminal driver. After that, he put out a call for others to contribute code, which they did. Currently, only about 2 percent of the current Linux kernel is written by Torvalds himself. The success of this public invitation to contribute code for Linux is touted as one of the most prominent examples of free/open source software.
Currently, Torvalds serves as the Linux ringleader, coordinating the code that volunteer programmers contribute to the kernel. He has had an asteroid named after him and received honorary doctorates from Stockholm University and University of Helsinki. He was also featured in Time Magazine's "60 Years of Heroes."


4. Richard Stallman (white hat)



Stallman's fame derives from the GNU Project, which he founded to develop a free operating system. For this, he's known as the father of free software. His "Serious Bio" asserts, "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom."
Stallman, who prefers to be called rms, got his start hacking at MIT. He worked as a "staff hacker" on the Emacs project and others. He was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.
Stallman's crusade for free software started with a printer. At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages. However, a new printer came along – one that they were not allowed to modify. It was located away from the lab and the absence of the alerts presented an inconvenience. It was at this point that he was "convinced…of the ethical need to require free software."
With this inspiration, he began work on GNU. Stallman wrote an essay, "The GNU Project," in which he recalls choosing to work on an operating system because it's a foundation, "the crucial software to use a computer." At this time, the GNU/Linux version of the operating system uses the Linux kernel started by Torvalds. GNU is distributed under "copyleft," a method that employs copyright law to allow users to use, modify, copy and distribute the software.
Stallman's life continues to revolve around the promotion of free software. He works against movements like Digital Rights Management (or as he prefers, Digital Restrictions Management) through organizations like Free Software Foundation and League for Programming Freedom. He has received extensive recognition for his work, including awards, fellowships and four honorary doctorates.



5. Tsutomu Shimomura (white hat)



Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him.
Shimomura's work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: "He pulls out this AT&T cellphone, pulls it out of the shrinkwrap, finger-hacks it, and starts monitoring phone calls going up and down Capitol Hill while an FBI agent is standing at his shoulder, listening to him."
Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie.



1. Kevin Mitnick.(black hat)



Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.
Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.



2. Adrian Lamo (black hat)



Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.



3. Jonathan James (black hat)



At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.




4. Robert Tappan Morris (black hat)



Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.




5. Kevin Poulsen (black hat)



Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles




British teenagers criminal hackers

Two British teenagers have been arrested for stealing the details of more than 65,000 bank accounts from computers infected with malware and selling them on an underground carding forum. According to UK authorities more than £8 million ($12 million) have been stolen from the compromised accounts.
                                                  

 


-----------NICK


Nick Webber, 18, of Southsea, Hants, and Ryan Thomas, 17, of Seer Green, Bucks, have met on a social networking website around two years ago. After they became good friends, the two computer enthusiasts came up with a plan to steal banking details by infecting others with information stealing trojans.

The authorities tracked them down after reading the ads they posted on a carding forum that was being monitored as part of an ongoing investigation. The Sun reports that US bank account details were being sold for $3 a piece, European Union ones for $5, while UK accounts were the most expensive and cost $7.
In addition to selling stolen bank account details, the two hackers were advising their customers on how to abuse them to buy good, wire money or pay for other services. From the money made, the teenagers were also living it high. In a photos posted on his Facebook page, Webber is seen showing off his designer clothes and expensive accessories.


----------RAYAN THOMAS


Maintaining information stealing botnets is a very lucrative business for cybercrooks. According toprevious research into the underground economy from Kaspersky Lab, the details for a stolen bank account can rack anything between $1 and $1,500, depending on its balance and freshness. Complete personal information, that can be used for identity theft costs between $5 and $8 for an American and two or three times more for Europeans.
The fact that the two UK fraudsters were very young when they started their illegal activities is not as shocking if we consider the wide availability of crimeware toolkits like ZeuS. This type of applications allow generating customized banking trojans at the push of a button, making it much more easier for inexperienced individuals to engage in cybercrime.





TOP HACKERS MOVIES


1.CYPHER: 


Cypher , is a 2002 science fiction thriller starring Jeremy Northam and Lucy Liu. The film was written by Brian King and directed by Vincenzo Natali. The film was shown in limited release in theaters in USA and then on DVD on 2 August 2005.



2.TRON: 


Tron is a 1982 American cult classic computer-animated/live action science fiction film written and directed by Steven Lisberger, produced by Walt Disney Productions and Lisberger Studios and released by Buena Vista Distribution Company.




3.THE MATRIX


The Matrix series primarily consists of a trilogy of science-fiction-action films written and directed by the Wachowski brothers and produced by Joel Silver. The first film The Matrix was released in March 1999; after its success, two sequels, The Matrix Reloaded and The Matrix Revolutions, were released in 2003. The characters and settings of the Matrix fictional universe are further explored in other media, including animation, comic books, and video games.

The series depicts a cyberpunk story incorporating numerous references to philosophical and religious ideas. Other influences include mythology, anime, and Hong Kong action films (particularly "heroic bloodshed" and martial arts movies) The fight choreographer for the trilogy was Yuen Wo-ping.





4.HACKERS: 


Hackers is a 1995 American thriller film directed by Iain Softley and starring Angelina Jolie, Jonny Lee Miller, Renoly Santiago and Matthew Lillard. The film follows the exploits of a group of gifted high school hackers and their involvement in a corporate extortion conspiracy.




5.UNTRACEABLE:



Untraceable is a 2008 American thriller film starring Diane Lane, Colin Hanks, Billy Burke, and Joseph Cross. It was directed by Gregory Hoblit and distributed by Screen Gems. The film is a social commentaryInternet schadenfreude. on

Set in Portland, Oregon, the film involves a serial killer who rigs contraptions that kill his victims based on the number of hits received by a website ("www.killwithme.com") that features a live streaming video of the victim. Millions of people log on, hastening the victims' deaths. Lane plays the protagonist, a cybercop named Jennifer Marsh, who pieces the mystery together at great risk to herself and her family.





6.DIE HARD 4.0 



(ONE OF MY FAV MOVIES) Live Free or Die Hard (released as Die Hard 4.0 outside North America), is a 2007 American action film, and the fourth installment in the Die Hard series. The film was directed by Len Wiseman and stars Bruce Willis as John McClane. The main plot finds McClane fighting a gang of cyber terrorists who plan to hack FBI computers. The film was based on the 1997 article "A Farewell to Arms" written for Wired magazine by John Carlin.The film's North American release date was June 27, 2007.





7.FIREWALL 


Firewall is a 2006 thriller film directed by Richard Loncraine and written by Joe Forte. Harrison Ford stars as Jack Stanfield, a security expert at a bank faced with a corporate merger and the offer of a new job. The film was primarily shot in Vancouver, B.C., as well as Ashcroft, B.C. which doubled as Africa.





8.EAGLE EYE 


Eagle Eye is a 2008 science fiction-crime-thriller film directed by D. J. Caruso and starring Shia LaBeoufMichelle Monaghan. The two portray a young man and a single mother who are brought together and coerced by an anonymous caller into carrying out a plan by a possible terrorist organization. The film was released in regular 35mm theaters and IMAX theaters.


9.SNEAKERS


Sneakers is a 1992 caper film directed by Phil Alden Robinson, written by Robinson, Walter F. Parkes and Lawrence Lasker and starring Robert Redford, Dan Aykroyd, Ben Kingsley, Mary McDonnell, River Phoenix, Sidney Poitier and David Strathairn. It was filmed in late 1991 and released in 1992.



10.SWORDFISH 


Swordfish is a 2001 crime-thriller film, directed by Dominic Sena and starring John Travolta, Hugh Jackman, Halle Berry, Don Cheadle and Vinnie Jones.



11.TRACK DOWN



Track Down, also known as Takedown (outside the USA) or Hackers 2, is a 2000 film about computer hacker Kevin Mitnick, based on the book Takedown by John Markoff and Tsutomu Shimomura. The film was directed by Joe Chappelle and stars Skeet Ulrich and Russell Wong.



12.ANTITRUST 


Antitrust (also titled Conspiracy.com and Startup.) is a 2001 thriller film written by Howard Franklin and directed by Peter Howitt.

Antitrust portrays young idealistic programmers and a large corporation (NURV) that offers significant money, a low-keyed working environment, and creative opportunities for those talented programmers willing to work for them. The charismatic CEO of NURV (Robbins) seems to be good natured, but recent employee and protagonist Milo Hoffman (Phillippe) begins to unravel the terrible hidden truth of NURV's operation.



13.ENEMY OF THE STATE 




Enemy of the State is a 1998 spy-thriller film directed by Tony Scott about a group of rogue NSA agents who kill a Congressman in a politically-motivated murder, and then try to cover up the murder by destroying evidence and intimidating witnesses. It was written by David Marconi and produced by Jerry Bruckheimer. The film stars Will Smith, Gene Hackman, Jon Voight, Lisa Bonet and Regina King. It grossed over US$250,000,000 worldwide ($111,549,836 domestically).











Grab This Widget

Subscribe to EthicalSpot.Tk


Like this article?
Subscribe to EthicalSpot.tk and get daily updates in your email for free

0 comments:

Post a Comment

Please feel free to comment !!!!!!!!!!!!!

 
© Copyright 2010-2011 Learn How To Hack! Learn Ethical Hacking & Download Free Hacking Softwares All Rights Reserved.
Template Design by Free Hacking | Published by Daily News | Powered by Free Hacking.