Monday, October 03, 2011

World's Top 10 Most Famous Hackers

Top 10 Famous Hackers

1. Kevin David Mitnick
At the age of 16, Kevin Mitnick hacked the computer systems of Digital Equipment Corporation (DEC) and copied the software, which they had developed for their computer's operating system and also hacked the Pacific Bell voice mail computers. Kevin used social engineering to get the confidential information of the people by manipulating them. He used cloned cell phone to hide his location from the police. He even copied the valuable software by hacking into the computer systems of Motorola, NEC Corporation, Nokia, Sun Microsystems and Fujitsu Siemens.

2. Gary McKinnon
His nick name is Solo. He is famous for hacking military and NASA computers. Gary hacked the military computers and deleted very important files from the operating systems of the computer network, which caused automatic shut down of 2000 computers for 24 hours. He also hacked 16 NASA computers. In a BBC interview, Gary McKinnon said that "he was not a malicious hacker bent on bringing down US military systems, but rather more of a bumbling computer nerd". The government officials claim that he caused a $700,000 loss for the government.

3. Jonathan James
Jonathan James, a.k.a., c0mrade, intruded into the Defense Threat Reduction Agency (DTRA) servers and hacked the emails and passwords of the employees by installing a back door in the server. He also stole a software from NASA, which was worth $1.7 million.

4. Adrian Lamo
He hacked the computer network systems of The New York Times, Yahoo!, and Microsoft. He worked on the WikiLeaks scandal case and reported to the federal authorities that Bradley Manning, an army officer, leaked confidential information from the government documents.

5. Stephen Gary Wozniak
Stephen Wozniak (Woz) is the founder of Apple computers, who is basically a computer engineer and a programmer. He invented machines which significantly contributed to the 1970s computer revolution. He is a white hat hacker and he assembled a computer by designing his own hardware and software. He and his best buddy, Steve Jobs (co-founder and CEO of Apple), researched on frequencies and created an electronic device called 'blue box', to make distance calls, free of cost. Woz, once called The Pope, using his blue box and made Pope believe him to be Henry Kissinger. He received the National Medal of Technology (1985) and Doctor of Engineering degree (1989) from the University of Colorado at Boulder.

6. Kevin Poulsen
He is a former black hat hacker who crashed thousands of telephone lines connecting to a radio station in Los Angeles, named KIIS-FM, to get a prize to be the 102nd caller. He is also famous for lock-picking, money-laundering and cyber-crime, etc. He even hacked the computer systems of FBI and was sentenced to 51 months imprisonment. He is currently working as a journalist in Wired News.

7. Robert Tappan Morris
Robert Tappan Morris is an American scientist who created the world's first computer worm which was called Morris Worm. While doing his graduation in Cornell University, Robert created this worm, which affected many computer systems. He was also accused under Computer Fraud and Abuse Act and was sentenced to three years of imprisonment, 400 hours of community service and a huge fine of $10,050.

8. Vladimir Levin
He used dial-up wire transfer service to hack the username and password of the Citibank account holders and stole $10.7 million. He was sent to jail for three years, and later Citibank upgraded their systems.

9. Richard Stallman
He is also called the 'Father of free software'. He claims that software should not have restricted access and so he created codes to break it. He also nullified the password settings of the users in computer labs.

10. Tsutomu Shimomura
Tsutomu Shimomura is a computer security expert and a scientist from Japan. He became instantly famous for helping the FBI to arrest the famous hacker, Kevin Mitnick. He employed a cellular frequency antenna and connected it to his laptop and traced Kevin Mitnick.

Other Famous Hackers

  • Linus Torvalds
  • Timothy Lloyd
  • David Smith
  • MafiaBoy
  • Loyd Blankenship
  • Sven Jaschan
Intruding the computer system and various other networks cannot be done by anyone. It involves high-tech stunts and several lines of codes of programming for computer hacking. The above listed people, no matter white hat hackers or black hat hackers, have immense technical knowledge and that made them to challenge the government.



What are the Effects of Computer Hacking


Computer hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data on a computer or to simply steal confidential information. Computer hackers often target home and office computers that are connected to the Internet. The Internet is a gateway for a computer to connect to the world, which also makes it vulnerable to attacks from hackers from across the globe. What are the consequences of computer hacking? Let us find out.


Effects of Computer Hacking

Computer hacking is a breach of computer security. It can expose sensitive user data and risk user privacy. Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data and personal photographs. User information, in the hands of computer hackers, makes it vulnerable to illegitimate use and manipulation.

Hackers may even delete sensitive information on gaining access to it. Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking.

Identity theft is another important consequence of computer hacking. Identity theft is a fraud that involves pretension to be someone else, with intent to gain unauthorized access to information or property. It refers to an illegal use of someone else's identity for personal interest or gain.

The advances in technology have led to the evolution of key-logging software, which is capable of tracking and recording every key stroke by the user, thereby stealing passwords and account details. Another serious effect of computer hacking is the denial of service attack. The DOS attack, as it is called, refers to the attempt of making computer resources unavailable to authorized users. Often, websites fall prey to denial-of-service attacks, whereby they are made unavailable for long periods of time, causing inconvenience to users while also hampering website business.

Computer hacking can lead to theft of critical business information. Important information about business clients and customers can be lost or manipulated through computer hacking. Hacking can expose email addresses to hackers, which they might use for spamming and hampering email privacy.

Information critical to national security, confidential government data, information related to national defense, security and crime, if exposed by means of hacking, can have grave consequences on the welfare of the nation. Hacking of highly sensitive data can potentially risk the national security and stake the overall well-being of the country's citizens.

Hacking can be used to convert computers into zombies i.e. Internet-enabled computers that are compromised by hackers or computer viruses. Zombie computers are used for fraudulent activities like spamming and phishing.

How can you find out whether your computer has been hacked? An unexplained decline in computer performance, an unexpected increase in file size, unexplained modifications to files, sudden changes in network settings of the computer and frequent disk crashes are some of the warning signs of a hacked computer. Installing reliable antivirus software, enabling a firewall before connecting to the Internet and installing operating system updates on a regular basis, can help you combat hackers.

What could happen to you in case you hack a computer? Well, computer users have a right to secure personal information under the data protection act. Not abiding by this act can have serious consequences like heavy fines or imprisonment. The degree of punishment depends on the severity of the damage resulting from computer hacking. Hacking is a computer crime.














No comments:

Post a Comment