Natural selection is happening in the world of hackers has set aside a few who are unable to adapt. Some of them changed their profession or start doing something different from the philosophy of hacking. They are able to survive scrawled his name as a Demigod, an elite who serve the hacker culture. It is not feasible to compare the ability of a hacker - and all individuals. Was not ethical to judge something universal, each substance has its own uniqueness. And uranium is glowing when dark. But there is always a prima causa, and gold will be shining like gold, although in the mud. In this case there is no absolute comparison to the greatness of a hacker. Hall of fame is just a collection of hackers who have served and are known by the hacker community in general.
1. Richard Stallman
Handle: None (nothing to hide) One of his 'Old School Hackers'.
working at the MIT Artificial Intelligence Lab. Feeling disturbed by commercial software and copyright and personal. Finally founded GNU (read: guhNew) which stands for GNU NOT UNIX. Using the very first computer in 1969 at IBM in New York Scintific Center at the age of 16 years.
2. Dennis Ritchie dan Ken Thomson
Handle: DMR and Dennis Ritchie ken.C language is a writer, along with Ken Thompson wrote the UNIX operating system that elegant.
3. John Draper
Handle: Cap'n Crunch.
Herz 2600 Inventor single note using a plastic whistle that was a gift from a cereal box. Is the pioneer of the use of 2600 Hz tone and is known as Phone Phreaker (Phreaker, read: frieker) 2600 Hz tone used as a tool to make free phone calls. In its development, the tone of 2600 Hz is no longer made with a plastic whistle, but uses a tool called 'Blue Box'.
4. Mark Abene
Handle: Phiber Optics.
As one of the 'Master of Deception' phiber optic inspired thousands of young people to learn the phone's internal system state. Optical Phiber also named as one of 100 people a genius by New York Magazine. Using an Apple] [, Timex Sinclair and Commodore 64. His first computer was the Radio Shack TRS-80 (trash-80).
5. Robert Morris
Handle: RTMA child of the scientists the National Computer Security Center is part of the National Security Agencies (NSA) -. First of all write an Internet worm that so momental in 1988.Meng-infection of thousands of computers connected in a network.
6. Kevin Mitnick
Handle: Condor Kevin.was the first hacker whose face was plastered in posters 'FBI Most Wanted'. Kevin is also a 'Master of Deception' and has written a book called 'The Art of Deception'. This book explains various social engineering techniques to gain access into the system.
7. Kevin Poulsen
Handle: Dark Dante.
Digital fraud against the radio station KIIS-FM, ensuring that he is a caller to 102 and won a Porsche 944 S2.
8. Johan Helsingius
Handle: julf.
Operating the world's most popular anonymous remailer.
9. Vladimir Levin
Handle: unknown.Graduates St. Tekhnologichesky Petersburg University.
CitiBank computer cheat and reap a profit of 10 million dollars. Interpol arrested at Heathrow Airport in 1995
10. Steve Wozniak
Handle:?
Build an Apple computer and use the 'blue box' for their own interests.
11. Tsutomu Shimomura
Handle:?
Managed to capture traces of Kevin Mitnick.
12. Linus Torvalds
Handle:?
A true hacker, to develop the Linux operating system which is a combination of "Linus's MINIX '. Linux operating system has become the operating systems 'standard' hacker. Together with Richard Stallman with GNU-Linux version of its initial build and collaborate with the programmer, developper and hackers around the world to develop the Linux kernel.
13. Eric Steven Raymond
Handle: Mr hackers.
A pioneer hacktivist and opensource movement. Writing a lot of manual hacking, one of which is: 'How To Become A Hacker' and 'The new hacker's Dictionary'. As soon as phenomenal and is known by the whole community hacking world. According to Eric, "the world has a lot of interesting issues and waiting to be solved."
14. Ian Murphy
Handle: Captain ZapIan Muphy with 3 colleagues.
hacking into the computer and compose an AT & T setting its internal clock. This resulted in people getting a discount telephone users' middle night during the afternoon, and had to wait until midnight to pay the high bills.
5. Robert Morris
Handle: RTMA child of the scientists the National Computer Security Center is part of the National Security Agencies (NSA) -. First of all write an Internet worm that so momental in 1988.Meng-infection of thousands of computers connected in a network.
6. Kevin Mitnick
Handle: Condor Kevin.was the first hacker whose face was plastered in posters 'FBI Most Wanted'. Kevin is also a 'Master of Deception' and has written a book called 'The Art of Deception'. This book explains various social engineering techniques to gain access into the system.
7. Kevin Poulsen
Handle: Dark Dante.
Digital fraud against the radio station KIIS-FM, ensuring that he is a caller to 102 and won a Porsche 944 S2.
8. Johan Helsingius
Handle: julf.
Operating the world's most popular anonymous remailer.
9. Vladimir Levin
Handle: unknown.Graduates St. Tekhnologichesky Petersburg University.
CitiBank computer cheat and reap a profit of 10 million dollars. Interpol arrested at Heathrow Airport in 1995
10. Steve Wozniak
Handle:?
Build an Apple computer and use the 'blue box' for their own interests.
11. Tsutomu Shimomura
Handle:?
Managed to capture traces of Kevin Mitnick.
12. Linus Torvalds
Handle:?
A true hacker, to develop the Linux operating system which is a combination of "Linus's MINIX '. Linux operating system has become the operating systems 'standard' hacker. Together with Richard Stallman with GNU-Linux version of its initial build and collaborate with the programmer, developper and hackers around the world to develop the Linux kernel.
13. Eric Steven Raymond
Handle: Mr hackers.
A pioneer hacktivist and opensource movement. Writing a lot of manual hacking, one of which is: 'How To Become A Hacker' and 'The new hacker's Dictionary'. As soon as phenomenal and is known by the whole community hacking world. According to Eric, "the world has a lot of interesting issues and waiting to be solved."
14. Ian Murphy
Handle: Captain ZapIan Muphy with 3 colleagues.
hacking into the computer and compose an AT & T setting its internal clock. This resulted in people getting a discount telephone users' middle night during the afternoon, and had to wait until midnight to pay the high bills.
No comments:
Post a Comment
thank you for commenting on our blogs