Like the flowers that have thorns, as well as the existence of the Internet by hackers, In today's world where technology has a lot to offer, we are fortunate to be part of such a life cantik.mulai of entertainment to enhance productivity and make our job easier, while This technology has gone to extreme levels to amaze us with many choices. Even if you just want the technology to make your life more comfortable, but there are some disadvantages as well. Hacking is one of the greatest threats not just to attack individuals but also makes large companies wary.
Hacking simply indicate the "breaking into a computer system". Some call it "talent" but whatever it is definitely illegal, because it is used to break into a person's privacy. We all use the Internet for our comfort, and we do not want when the information was stolen, the computer will not work, passwords or hacked web page was taken over by others. Here is a list of 7 World Famous Hacker whole period
Hacking simply indicate the "breaking into a computer system". Some call it "talent" but whatever it is definitely illegal, because it is used to break into a person's privacy. We all use the Internet for our comfort, and we do not want when the information was stolen, the computer will not work, passwords or hacked web page was taken over by others. Here is a list of 7 World Famous Hacker whole period
1. Konrad Zuse
We begin by Konrad Zuse, who is considered as the first computer hacker. Not in the sense of the term hacker in today's modern, but without him there is no hacker now. Zuse made the first computer in the world that is fully programmable, known as Z3. Starting from Z1, which is done by the Zuse in his parents' apartment building and was completed in 1938. Zuse eventually received support from the German government, which gave birth to the evolution from Z1 to Z3 which was completed in 1941 and is considered the ancestor of modern computing.
2. John “Captain Crunch” Draper
John Draper hacking long before the computer get a place such as this. The days of hacking Draper began in early 1970, when the largest network of public access is a phone system. At that time, the phone is set to an automated system using analog frequencies specific to dieksploit to make telephone long distance or even international. Known as the "Phreaking", and one of the famous Phreaking is peluin toy was a gift Cap'n Crunch cereal. With this whistle, Draper made another Phreaking device known as bluebox, a device that can generate many other tones used by the phone company.
3. Steve Wozniak
Started by John Draper, Wozniak is no stranger to Phreaking. In fact after Draper share details of the design bluebox made at a meeting of the Homebrew Computer Club meeting, Wozniak made his own version. Steve Jobs saw the potential market for the device and then the two Steve's build their first venture. The days spent in hacking Wozniak projects questionable legality. With the proceeds from the sale of blue boxes he made plus calculator belonging Wozniak and Steve van Job, they are making the Apple I. With Steve marketing skills, their company is now a leading player in the industry.
4. Robert Morris
When a post-graduate course at Cornell University, Robert Morris created his own way to gain fame. According to him, he made a worm in an attempt to measure the size of the internet today. Once released on 2 November 1988, Worm 6000 Morris managed to infect the system (about 10 percent of the computers connected to the Internet at that time). This worm is to do no harm, but due to an error in replication algorithm, the worm can copy itself rapidly, causing the load berlebihanpada system and ultimately have an impact on Morris. In 1989, he became the first person charged with the Act Computer Fraud and Abuse in 1986.
5. Mark “Phiber Optik” Abene
Maybe the name is not familiar to you. He never did hacking into DOD or steal millions of dollars from the bank. All he did was piss off AT and T. As a member of the hacker group Masters of Destruction, Abene "mengobok meddle" system AT and T. When the AT and T telephone system crashes, making 60,000 customers can not use the phone for more than 9 hours, they quickly blamed Abene. Secret agent then mengujunginya, confiscated all the equipment, even then AT & T stated that the damage was the fault from their side, Abene was charged with first-degree charges of destruction of computers. He then get more and charges that brought him to undergo severe punishment 1 year in federal prison, making it the first hacker who experience it.
6. Kevin “Dark Dante” Poulsen
Poulsen considered hacking coolest actors of all time. A radio contest held by KIIS-FM promised that they would give a Porsche 944 S2 new to the callers to 102. Instead of trying his luck among the many listeners in Los Angeles, instead Poulsen took over all telephone networks to make sure that she was going to be a caller to 102. He then disappeared after a fugitive FBI, which made it into the popular TV show "Mystery Not Solved". Hotline program crashes when the episode aired. Kebetulankah? In 1991, Poulsen was arrested and charged with a variety of computer fraud, money laundering and violations of the law. Interestingly, during his detention, Poulsen made 180 times help solving cyber crime cases and was even able to catch a sexual predator on MySpace.
7. Kevin Mitnick
Hacker Kevin Mitnick is probably the most famous in the history of the computer, because he was the first hacker who entered into the list of the most wanted by the FBI. As a master of social engineering, Mitnick did not just hack the computer, it also does the hack on the minds of people. In 1979, when he was 16 years old, he made his way to hack into computer systems and software copying fee. He was involved with the admin personnel, such as through phone calls or email messages and deceive them to provide passwords and other security information. After two and a half years to escape, Mitnick was finally caught and jailed for five years. He now runs a computer security consultant, Mitnick Security Consulting LLC.