Top 10 Super Old Hackers of the World:Linus
The epic that is Linux started in Helsinki. It seems that every hacker in the world is creating source programs for his life, and Linus is no exception. His home is not far from the city center, on Kalevagatan (very similar to Kalevala) street. It is a place where 19th century architecture meets modern bungalows. Linus lives here with his wife. His home is much like a group home for university students, with bicycles always lined up under the stairs.
In person, Linus looks like a student, not a Taoist priest. He is of medium build, with light brown hair, blue eyes, and a gaze that shoots straight through his lenses, with only his bushy eyebrows black against a childlike face. His room is lined around with many books, it is covered with paintings and various decorations, rather inexpensive curtains, dried crocodile skins hanging between two armchairs, two sightless cats and a few computers in the room: three PCs, a Power Mac, and three microcomputers based on the Alpha chip borrowed from DEC. They are inconspicuously placed in the corners of the room. Another interesting thing is not easy to notice: it is a cable that connects the computers to the Velcro. The computer was connected to the Velvet Trent. It was installed and paid for by a local ISP as a symbolic reward for the Linux man.
Major accomplishments:It's like talking about a dream, or an episode of The X-Files. A 21-year-old Finnish university student writes Linux, the kernel of an operating system, in his student dormitory, and then publishes it, attracting thousands of programmers to add to it, modify it, and disseminate it, making it the fastest-growing piece of software on the planet, with more than 10 million users in just a few years. Linus Tovoz. Linus Torvalds, the world's most famous computer programmer and hacker, inventor of the Linux kernel and collaborator on the program. Torvalds used his personal time and equipment to create one of the most popular operating system kernels in the world today. Free software has evolved from an industrial ideological movement to a commercial market movement, and has since changed the face of the software industry, and even the IT industry.
Ten of the oldest hackers: Wozniak
In Silicon Valley, a person to win a good reputation is far more difficult than winning a lot of money. That's because wealth is essential to fame. And to win wealth, you have to hook up and go for profit. Therefore, whether it is Apple's Steve Jobs, Oracle's Ellison or Intel's Grove, can only get a mixed reputation in the local. However, if there is only one in Silicon Valley recognized "good guy", then this person is certainly not Woz.
This year's technical genius, indifferent to fame and fortune, simple character, early left the center of the bustle. It is also destined that he is bound to be with the computer industry along different routes, writing their own history. Now, his former comrade Steve Jobs is again reigning supreme, while he is living his own quiet life.
Top 10 super old hackers:Dennis. Leach and Ken. Thompson
It's incredible that the operating system was created not to bring it to market, or even to be used by more people, but simply for the author to make it easier to use for himself, and initially to make it easier for himself to play games. Even the awkward name Unix was a joking reference to an earlier operating system called Multics. In a later acknowledgement of the award, one of the authors, Dennis Ritchie, confessed. Ritchie said candidly, "Our goal was to create a good working environment for computers for ourselves, and of course, to make sure that everyone liked it".
However, in the midst of this inadvertence, a miracle was born, proving once again that innovation in IT is often the result of interest, not big money. After 10 years of in-house use, starting in the mid-1970s. the first time Unix was released to the public, it slowly worked its way to success, shaking the entire computer industry. when they started work in 1969, Ritchie and Thompson had no intention of starting an industry frenzy, and until 1974, they had not even published any news about the project. And when Unix showed up, they were surprised that it would generate so much interest. They didn't market it aggressively; it was free for universities and research organizations to use, and the source code was available.
Major achievement:The propellant of creativity in Bell Labs' famous Computer Science Working Group. Ritchie and Thompson created UNIX in 1969, a first-class open operating system for small machines that helped users with general computing, word processing, and networking, and soon became a standardized language.
Little-known fact: Created by Thompson and his Bell Labs colleague Rob Pike, UNIX is the world's first open operating system for small machines. Plan 9, created by Thompson and his Bell Labs colleague Rob Pike, is the next-generation operating system derived from UNIX
Top 10 Veteran Hackers:Stallman
Key Achievements:Veteran hacker. 1971, Stallman found a job down the street at MIT's Artificial Intelligence Laboratory. At the time, he was an undergraduate student at Harvard University. Later, Stallman founded the Free Software Foundation, which shattered the notion that software was private property.
First exposure to computers:At the IBM New York Science Center in 1969, at the age of 16. His own unique hacking tools: In the 1980s, Stallman stopped taking a salary from MIT but continued to work in one of its offices. There he created a new operating system called GNU - GNU stands for "GNU's Not Unix". Little known fact:Winner of a $240,000 genius award from the MacArthur Foundation.
Top Ten Oldest Hackers of All Time:John. Major Achievement:Discovered that free (long-distance) phone calls could be made by using a whistle (blowing into a telephone microphone) that was a prize in a cereal box ("Cap'n Crunch").Cap'n Crunch introduced generations of hackers to the concept of "stealing phone lines. Cap'n Crunch introduced generations of hackers to the brilliant idea of "stealing phone lines" to make long distance calls.
First exposure to computers: As a teenager, trying to convince a coin-operated payphone to get his coins and connect his call.
His own unique tool: the Captain Crunch brand of toy whistles in cereal boxes, capable of generating a 2600 Hz tone, which was (to allow the phone system) to open a (phone) outgoing blue box (to hack into the phone system with such a device), so that the user could also make (long-distance) calls for free. (Subsequently, Oscar Meyer weiner Oscar Meyer weiner whistles have also once gained the favor of telephone flyers)
Ten super old hacker of: Mitnick
Main achievements: He is the first in the U.S. Federal Bureau of Investigation "bounty on the arrest of" poster hacker appearance. He has been called the "Lost Boy of the Internet" because he was only a teenager but was constantly committing cybercrimes.
Mitnick's Christmas present came from the Federal Communications Commission (FCC), which decided to reinstate Mitnick's amateur radio license. Radio has been one of Mitnick's hobbies since he was 13 years old. Today, he still uses a homemade radio to talk to his friends. He credits this hobby with sparking his interest in computer hacking. The license wasn't an easy one to reinstate, however, and he had to pay a whopping $16,000 in fines. "It was one of the most expensive amateur radio licenses in the world, Mitnick said, 'but I'm still happy.'"
Top 10 Super Old Hackers:Raymond
Any revolution or movement needs a theorist, a programmatic document that really puts the finishing touches on it. In addition to the structure of the theoretical system with great power of thought and logic, it is more necessary to stimulate people's aspirations for a better ideal, and pass a very incendiary flame for the morale of peers. The current free software movement, which is disrupting the traditional business model of the software industry, is no exception. The spiritual leader of free software is, of course, Richard Stallman. Richard Stallman (Richard Stallman), but he is too extraordinary, and, in addition to the core concept, Stallman lacks the ability to write books. These limitations have led Eric S. Eric S. Raymond to take on the role. Today, he is the unassailable number one theorist of the open source movement (born out of the free software movement) and hacker culture.
Ramon's strategy has been a big success. It is generally recognized that the launch of Mozilla in 1998 is largely attributed to him. Most hackers and mainstream observers also agree that it was Raymond who successfully brought the idea of open source to Wall Street. But there are also critics of him: some hackers believe that he used these opportunities to advertise for himself, and that he has been critical of Richard Stallman and the Free Software Foundation's ideals. His criticism of the idealism of Richard Stallman and the Free Software Foundation, as well as his adoption of a more pragmatic, market-focused line, has also stirred up a good deal of political antagonism in the hacker community.
Top Ten Super Old Hackers of:Kapoor
Kapoor graduated from Yale University in 1971. During his time there, he specialized in psychology, linguistics, and computer science. That's when he became interested in computers. He went on to graduate school.In the 1960s, dropping out of school was an option for many. You could get by with just the skin of your teeth. During those years, Kapoor could make $12,000 a year. He wandered aimlessly, becoming, as he later described his life during this period, an "intellectual gypsy".
Major achievements:In the mid-80s, Kapoor and Gates were the twin stars of the U.S. software industry.
In 1982, Kapoor founded Lotus, Inc. and served as CEO.
The company launched Lotus 1-2-3, the "killer application" software for personal computers.
In 1985, Lotus had a staff of 1,000 people, and was the largest independent software company. The largest independent software company. It was not until April 1988 that Microsoft surpassed Lotus and became the number one software company. Kapoor initiated the Electronic Frontier Foundation (EFF), which defended the interests of hackers and was known as the American Civil Liberties Union (ACLU) of the computer industry. As a result, Kapoor became one of the most influential computer figures and one of the most influential figures in the hacker community in the 1980s and 1990s.
Kapoor is the true embodiment of the Silicon Valley hacker philosophy: against corporations, not framing? He was a true embodiment of the Silicon Valley hacker philosophy: anti-corporate, non-corporate. He was also a member of the Polytechnic Council, a group of companies that were organized to promote the use of polycarbonate in their businesses, and to promote the use of polycarbonate as a means of protecting the environment. What do you think about this? Policies? What are the most popular photographic images of Polycarbonates? How to get the best out of your favorite products? What are you looking for? What's not used up? What's your name? What are you doing? What's the best way to get rid of them? What are you doing? What is the name of the sunglasses? ⒈ sungung by a sunglasses Sunglasses Sunglasses How do you like your sunglasses? What's going on? The first time I've seen a lot of them, I've seen a lot of them in the past, and I've seen a lot of them in the past, and I've seen a lot of them in the past. /P>
Top Ten Super Old School Hackers:Morris
Major Achievements:The son of the chief scientist at the National Computer Security Center (part of the National Security Agency NSA) and a Cornell senior, the word "hacker" began to be used after a network worm was dramatically spread during his first job in 1988. The word "hacker" began to take on a specific meaning in the English language. Thousands of computers were affected in this incident, which caused some to crash.
First exposure to computers: at home. Morris's father had brought home a primitive and mysterious cryptographic machine from the NSA. It became the talk of the family.
In the winter of 1988, Morris, who was studying at Cornell University, sent a computer virus called a "worm" into the largest computer network in the United States - the Internet.
At 5:00 p.m. on November 2, 1988, Internet administrators first discovered that there were unknown intruders on the network. They seem to be a network of super spies, cunningly and constantly intercept user passwords and other network "confidential documents", the use of these passwords to deceive the network "sentinel", the long drive into the Internet in the user's computer. The first thing you need to do is to get a good look at what you're doing, and you'll be able to see what you're doing, and you'll be able to see what you're doing.
When the police had solved the case and identified Morris as the "author" of the disaster, the New York State courts were slow to convict him. At the time, criminalizing the creation of computer viruses was a worldwide problem. In the Soviet Union, in 1987, there was an incident in which the computer staff of an automobile factory used a virus to sabotage a production line, and the court could only use "hooliganism" to settle the case hastily.
On May 5, 1990, a New York district court found Robert Morris guilty of designing a virus program that caused the deaths of many people, including the police. Morris designed the virus program, including the National Aeronautics and Space Administration, military bases and major universities, the major incident caused by the computer stopped functioning, sentenced Morris three years of probation, a fine of 10,000 U.S. dollars, the obligation to serve 400 hours for the new district. The Morris incident shocked American society and the world at large. And than the incident has a greater and more far-reaching impact is: hackers from now on really become black, hacking ethics lost constraints, hacking tradition began to interrupt. The public's impression of hackers can never be restored. Moreover, computer viruses have since moved into the mainstream.
Note: Stash would like to be called #11