Jumat, 14 Oktober 2011

Top 5 People Hacker fear in the World


Computer World is a Tools that can not be categorized as a strange but true thing, which everyone in the world can connect with each other, even World Computers are now used as a tool that must be owned by a company even almost all the work now can be dealt with using computers, and almost all systems controlled by computer technology ..Issues related systems in the wake of the computer, every person who has always wanted to try to understand the computer find the weaknesses of the system that created .. or commonly known as hacking ...Here are some hacker will respect him the most in the World ...1.yunus attsaouly aka irhaby 007
 
Who Irhabi 007? What has he done so his name became a legend? Why did he do all the things that can be said is full of risk? Since when identity is known in general?At first, the name Irhabi 007 is only known in cyberspace. Irhaby means the terrorists and the 007 is well-known figure for the British royal secret agent (the movie) named James Bond. But Irhabi 007 which is not defending the Queen (UK) but rather fight it. Irhabi 007 is known as one who is very active in cyberspace, especially in the cyber jihad. Irhabi 007 can be said to be always in the condition on line, 24 hours straight. Irhabi 007 is known as a sympathizer of Al Qaeda who is also a computer expert and the cyber world. Every day Irhabi 007 with Internet activities, such as to convert videos, including videos of jihad that can be displayed on the site. It was obvious that the Irhabi 007 is a lot of mastering information technology issues. One of the most prominent activity is to create a site with a name and became an administrator Forum youbomit Al Ansar Al Islami is very prestigious because it involves approximately 4500 members who are mostly Mujahideen.No one knows exactly when the name Irhabi 007 poor across the universe began Cyber ​​Jihad. The appearance of his name was not immediately able to confirm where its existence. It is also one of skill Irhabi 007. Only, the activity could be detected Irhabi 007 began in 2001. 007 Irhabi activity increased along with the start of the American invasion of Iraq, in 2003. At that time, Irhabi 007 began actively uploading pictures of Iraq war on the internet. In the same year he began to publish the materials, including how to hack computers. In fact he has also written his method into a book. Activists and the Mujahideen are active in Islamic forums began to know and be amazed at the skill and courage Irhabi 007. The enemy, America and its allies had begun to realize the existence of Irhabi 007, which from the name alone is enough aggravates them. So the hunt began to Irhabi 007!2. Kevin Mitnick (born August 6, 1963)
 
Kevin is known for a pretty horrendous action hackernya America, and is "the most wanted computer criminal in United States history". Her story had been filmed as much as 2 times in Hollywood, with the title 'Takedown' and 'Freedom Downtime'.Kevin started hackernya first action against the transportation system in Los Angeles. After breaking into the system 'punchcard' (readings subscription card bus), she can wear a bus anywhere for free. Kevin's next action is to break the telephone system, in which he can use long distance phone service for free.After identifying a computer, Kevin was hacking at:- DEC (Digital Equipment Corporation) system- IBM Mini Computer in 'Computer Learning Center of Los Angeles'- System Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens- Fool the FBIKevin finally got caught and serving a prison sentence of 5 years. He was only released in 2000. Once free, he was not allowed to use telecommunication devices and phones until 2003. After Kevin's right to sue in court, he finally allowed to use the communication tools and computers. Kevin is currently working as a computer security consultant.3. Adrian Lamo (born 1981)
 
Adrian is a journalist and a hacker predicated 'gray' (can be good, be evil), is mainly known in the hacking of computer networks that have a series of high security.Himself has become a popular man after breaking into computer systems 'The New York Times' in 2002 and 'Microsoft'. He is also known to be able to identify security flaws in computer networks of companies included in the list of 'Fortune 500 companies' and then tell them the weaknesses and gaps that he found.This case was investigated by the FBI for 15 months, after the New York Times reported the existence of their systems are hacked. It was found in 2003 that the cause is Adrian. Adrian was hiding a few days, and finally surrendered to the FBI in 2004.Adrian finally had to undergo punishment 'house arrest' by her parents, and 2 years of probation with fines of about $ 65,000. Adrian is also believed to be trying to break through Yahoo! 's computer systems, Sun Microsystems, Bank of America and CitiGroup, by leveraging existing security gaps.4.Jonathan James (born December 12, 1983)
 
James is the youngest Americans convicted of cyber crime. Barely 16 years old, he was sent to prison for hacking U.S. defense department website.He confessed to hacking is a challenge and is one of pleasure. NASA also got fruit sap of keisengannya, James managed to steal (download) software that NASA estimated to be worth $ 1.7 million U.S. dollars in 1999. NASA should be forced to shut down the server and the system as a result of the actions of the James for three weeks. And after that NASA should mengelaurkan sekiatar cost $ 41,000 to fix the system is uprooted.6 months after James hacking NASA, he was arrested at his home by local police at 6 am. He is serving a prison sentence of 6 months because it is still a minor, and probation 'house arrest' until its age reaches 21 years. James was not allowed to interact with the computer that long.James died on May 18, 2008, no information what caused his death.







Christopher Martin (born 10 March 1993)
 
Martin Christopher is the citizenship of Indonesia, known since he managed to steal data and managed to break the software system for Apollo (U.S.) he was arrested at his residence when he was remiss in fact the American secret police (FBI) has been investigated 24 months, crime in do include-Managed to steal the software system for Apollo (U.S.) is estimated at $ 2.8 million dollars by his actions because the APOLLO accept losses so large that the APOLLO should turn off the server.-Break data facebook, twiter, friendster, myspace and e-mail rule-DEC (Digital Equipment Corporation) system- IBM Computer Hard on 'Computer Learning Center of Los Angeles'- Do system hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens, Sony Ericson, Blackberry, Blueberry, Alcatel, Acer Programs, Toshiba aplications, Yahoo!, Bank of America and CitiGroup, microsoft aplications, Poker Games and Point Blank- Fool the FBI, The Indonesian government-America-Europe-AfricaDue pebuatannya he brought the FBI into America for the law accordingly, successive intervals of time he got out of jail the FBI and now works as a professional programming in the largest embassy in the U.S.Even dizaman increasingly sophisticated as it may be expected there are millions of people who are always wrestling in the World Hacking, even they are now working in groups or incorporated in a community that is always trying to find the weaknesses of a system that in the Create, with different goals depending on their wishes ....

Tidak ada komentar:

Posting Komentar