Computer World is an equipment that can not be categorized as a strange but true thing, where everyone in the world can connect with each other, even World Computers is now used as a tool that must be owned by a company in fact almost all the work now can be dealt with using a computer, and almost all systems controlled by computer technology ..
Related Problems in the wake of the Computer, any person who has understood the computer always wanted to try to find weaknesses in the system that make .. or commonly known as hacking ...
Hacker world has known since the computer, and they began to be more like a king-Jaunty since the internet.
Here are some of the best hackers in the World ...
1. Yunus Attsaouly Aka Irhaby 007
The short career of Irhabi 007 offers a case study in the evolving nature of the threat that we at the SITE Institute track every day by monitoring and then joining the password-protected forums and communicating with the online jihadi community. Celebrated for his computer expertise, Irhabi 007 had propelled the jihadists into a 21st-century offensive through his ability to covertly and securely disseminate manuals of weaponry, videos of insurgent feats such as beheadings and other inflammatory material. It is by analyzing the trail of information left by such postings that we are able to distinguish the patterns of communication used by individual terrorists.
Irhabi's success stemmed from a combination of skill and timing. In early 2004, he joined the password-protected message forum known as Muntada al-Ansar al-Islami (Islam Supporters Forum) and, soon after, al-Ekhlas (Sincerity) -- two of the password-protected forums with thousands of members that al-Qaeda had been using for military instructions, propaganda and recruitment. (These two forums have since been taken down.) This was around the time that Zarqawi began using the Internet as his primary means of disseminating propaganda for his insurgency in Iraq. Zarqawi needed computer-savvy associates, and Irhabi proved to be a standout among the volunteers, many of whom were based in Europe.
Irhabi's central role became apparent to outsiders in April of that year, when Zarqawi's group, later renamed al-Qaeda in Iraq, began releasing its communiqués through its official spokesman, Abu Maysara al-Iraqi, on the Ansar forum. In his first posting, al-Iraqi wrote in Arabic about "the good news" that "a group of proud and brave men" intended to "strike the economic interests of the countries of blasphemy and atheism, that came to raise the banner of the Cross in the country of the Muslims."
At the time, some doubted that posting's authenticity, but Irhabi, who was the first to post a response, offered words of support. Before long, al-Iraqi answered in like fashion, establishing their relationship -- and Irhabi's central role.
Over the following year and a half, Irhabi established himself as the top jihadi expert on all things Internet-related. He became a very active member of many jihadi forums in Arabic and English. He worked on both defeating and enhancing online security, linking to multimedia and providing online seminars on the use of the Internet. He seemed to be online night and day, ready to answer questions about how to post a video, for example -- and often willing to take over and do the posting himself. Irhabi focused on hacking into Web sites as well as educating Internet surfers in the secrets to anonymous browsing.
In one instance, Irhabi posted a 20-page message titled "Seminar on Hacking Websites," to the Ekhlas forum. It provided detailed information on the art of hacking, listing dozens of vulnerable Web sites to which one could upload shared media. Irhabi used this strategy himself, uploading data to a Web site run by the state of Arkansas, and then to another run by George Washington University. This stunt led many experts to believe -- erroneously -- that Irhabi was based in the United States.
Irhabi used countless other Web sites as free hosts for material that the jihadists needed to upload and share. In addition to these sites, Irhabi provided techniques for discovering server vulnerabilities, in the event that his suggested sites became secure. In this way, jihadists could use third-party hosts to disseminate propaganda so that they did not have to risk using their own web space and, more importantly, their own money.
As he provided seemingly limitless space captured from vulnerable servers throughout the Internet, Irhabi was celebrated by his online followers. A mark of that appreciation was the following memorandum of praise offered by a member of Ansar in August 2004:
2. Kevin Mitnick ( was born in August 6,1963)
The world has known hacker Kevin is known for the action quite horrendous hackernya America, and represents "the most wanted computer criminal in United States history." His life story had been filmed as much as two times in Hollywood, with the title 'Takedown' and 'Freedom Downtime'.
Kevin first started hackernya action against the transportation system in Los Angeles. After successfully hacking into the system 'punchcard' (reading of the subscription card bus), he could use a bus anywhere for free. The next action is to break down Kevin telephone system, in which he can use long-distance telephone service for free.
Once familiar with computers, Kevin had to do hacking on:
- DEC (Digital Equipment Corporation) system
- IBM Computer Mini in 'Computer Learning Center of Los Angeles'
- Hacking system, Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens
- Fool the FBI
Kevin finally got caught and serving a prison sentence of 5 years. He was only released in 2000. After freedom, he may not use telecommunication devices and phones until 2003. After Kevin's right to sue in court, he finally allowed to use communication devices and computers. Kevin is currently working as a computer security consultant. computers, and they began to be more like a king-Jaunty since the internet.
3. Adrian Lamo (1981)
Adrian is a journalist and a hacker predicate 'gray' (can be good, be evil :-), is primarily known in hacking a computer network having a series of high security.
Himself has become a popular man after successfully hacking into computer systems 'The New York Times' in 2002 and 'Microsoft'. He is also known to be able to identify deficiencies in computer network security from a company that is included in the list of 'Fortune 500 companies' and then tell them the weaknesses and gaps that he found.
This case had been examined by the FBI for 15 months, after the New York Times reported that the hack their system. Finally, note in 2003 that the cause is Adrian. Adrian could hide a few days, and finally surrendered to the FBI on the year 2004.
Adrian eventually have to undergo punishment 'house arrest' by his parents, and two years probation with fines of about $ 65,000. Adrian is also believed to be trying to penetrate computer systems Yahoo!, Sun Microsystems, Bank of America, and Citigroup, by exploiting existing vulnerabilities.
4.Jonathan James ( was born in December 12, 1983
James is the youngest American man who was sentenced for crimes of cyber world. When a new age of 16 years he was sent to prison for hacking into U.S. defense department website.
Himself admitted to hacking is a challenge and is one of the pleasures of its own. NASA is also subject to the sap of fruit from keisengannya, James managed to steal (download) software that NASA estimated at $ 1.7 million U.S. dollars in 1999. NASA should be forced to shut down the server and the system resulting from the act of James for three weeks. And after that NASA should mengelaurkan sekiatar costs $ 41,000 to fix a broken system.
6 months after hacking into NASA's James, he picked up at his home by local police at 6am. He underwent six-month jail sentence for underage, and probation 'house arrest' to reach 21 years old. James was not allowed to interact with the computer that long.
James died on May 18, 2008, there was no information on what caused his death.
Even an age of increasingly sophisticated as it is now estimated there could be millions of people who are always wrestling in the World Hacking, even they now work in groups or be merged into one community that is always trying to find the weaknesses of a system that in the definition, with different goals depending on their wishes.
5. Owen Thorn Walker
Hacker activity that endangers computer users around the world re-discovered. This time, a hacker youth aged 18-year-old was later arrested by New Zealand. The hacker creates malicious programs to infect millions of computers in various parts of the earth.
18 year old hacker named Owen Thorn Walker was successfully confined to the international police cooperation. According to police, Owen is the leader of an international gang of hackers, which has infected 1.3 million computers.
As quoted from detikINET JardiknasCilacap, Tuesday (03/04/2008), hacker activity goal is to steal credit card numbers and manipulate the stock activity on the victim's computer.
New Zealand Police in cooperation with Dutch police and spy agencies of the United States, the FBI (Federal Bureau of Investigation), in an effort to uncover the case. After going through various investigations, Walker had been arrested.
Owen led hacker gang activity was allegedly caused losses up to U.S. $ 20 million worldwide, mostly because breaking your bank account. Owen, who operate under the name 'AKILL' is now facing litigation to ten years in prison in New Zealand courts.
The hackjack say :
This is our world now... the world of the electron and the switch, the beauty of the baud.PC Mild, 2005 edition
We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals.
We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
The Hecker's most feared in the World
4/
5
Oleh
Sepeda ��