Advanced Cyber Security

Resources / IT Security Technical Part2 /

Top 10 Hackers

Figure out how to secure yours framework to abstain from being hacked.

Programmers in Hollywood have a tendency to be depicted in extremes:

They're either cutting edge counterparts of James Bond or hostile to social yet tech-canny young people searching for approaches to interest themselves to the detriment of other PC clients.

The fact of the matter is, programmers are a grouping of IT-educated people who are both in charge of billions of dollars of misfortunes yearly and the relentless development of the overall web.

Thusly, this article will handle the great, the terrible.

The nerdy programmers of advanced processing

1. Shawn Fanning

This programmer has helped a ton in upsetting (that is, establishing real, certain change) the music business, especially in the area of music conveyance.

Together with the assistance of Shaun Parker and Jordan Ritter, the three visionaries set out to dispatch Napster—a P2P application that eventually promoted the free trade of music documents by means of the Internet.

2. Robert Morris

He is the innovator of first Internet-based worm ever constructed.

His namesake abused both fingerd and sendmail vulnerabilities with a specific end goal to instigate cradle flood.

Subsequent to serving time for his assumed digital law violations, he made a beneficial startup that was purchased by Yahoo for an impressive entirety and turned into the fellow benefactor of ViaWeb alongside Paul Graham.

3. VallaH

This programmer was the one in charge of the first brilliant DOS assault, ping-of-death, and jolt.c, which empowered him to enthrall script kiddies crosswise over the internet and cut whole multinational organizations down on their knees.

4. Gordon Lyon

More eminent for the nom de net of "Fyodor", Lyon is credited as the maker of Nmap (the programmer's first-ever instrument that has had a sufficiently major effect in popular society to be incorporated in films like "The Bourne Ultimatum" and "The Matrix"), the originator of, and the pioneer of administration fingerprinting.

5. Kevin Mitnick

He's ostensibly the most renowned genuine dark cap programmer due to all the media and press consideration he has gotten in the course of the most recent decade.

For a considerable length of time, he had been detained without charge by the legislature before he was sentenced to three years and ten months with thought of the time he'd officially spent in prison.

He now runs his own IT security organization at present.

6. The Mentor

This mysterious, obsessive programmer pioneer was the creator of the Phrack-magazine-distributed Hacker Manifesto.

He served as a motivation to an era of youngsters overall who needed to turn into a programmer simply like him.

7. Karl Koch

This German programmer from the 1980s was significantly all the more surely understood for his questionable tricks (i.e., his distrustfulness over the Illuminati, his fixation on the number 23, and his cocaine dependence) than his contribution in a PC surveillance occurrence amid the Cold War.

8. Richard Jones

A youthful Australian programmer (likewise known by the code name of Electron) who spread issue over the Internet with simply a modem and his specialized expertise.

Subsequent to being captured by Australian Federal Police in 1990 and serving time in prison, he inevitably turned into a security advisor and analyst.

9. Kevin Poulsen

He's a previous dark cap programmer who's presently the senior proofreader of Wired News.

He once utilized his hacking abilities to "phreak" his way into winning a LA radio challenge and getting a shiny new Porsche, yet he was at last got and captured for his activities.

10. Adrian Lamo

This dark cap programmer showed to everybody over the globe that its conceivable to bring down extensive sites by simply controlling URLs. He is presently a grant winning writer.

Continuously stay up with the latest.

Do customary weakness filtering.

Secure your framework


Vulnerability Scanner - Vulnerability Management 


➤ Related pages
Anti Denial of Service Tips & Tricks
Anti Phishing Tips & Trick
Anti Social Engineering Tips & Tricks
Anti Spam Tips & Tricks
Anti Spyware Tips and Tricks
Anti Virus Tips & Trick
Better WiFi Range
Protect Against Client Wireless
Risks of Cyber Crime
SecPoint Free Security Scan
Security Mailinglist Rss Feeds
Top 10 Hacker Attacks
Top 10 Hackers
Top 10 IT Security Tips
Top 10 IT Security Tools
Top 10 Myths in IT Security
Top 10 Phishing Scams
Top 10 Secure Operating Systems
Top 10 Social Engineering Tactics
Top 10 Spam Attacks
Top 10 Spyware
Top 10 Viruses
Top 10 Ways to Protect
Top 10 Website Security Myths
Top 10 Worms