The "world's best" hacker dies, who are the famous hackers?

"World's best" hacker dies

Barnabas Jack (pictured), 35, became the world's best "star hacker" when he used his original hacking technique to make an ATM spit out money at the 2010 Black Hat hacker conference. He has become the world's biggest "star hacker". And he was going to show an even more amazing hacking stunt - remote control killing - at the 2013 Black Hat hacker conference, which opened on July 31st. However, in a strange way, on July 25, just before the exposure of this "hacking stunt", Jack suddenly died mysteriously in San Francisco, USA!

Banabai Jack was reportedly a New Zealand-born hacker, programmer and computer security expert. He had spent 2 years researching how to crack ATMs, and on July 28, 2010, at the annual "Black Hat" hacker conference in Las Vegas, Jack moved 2 ATMs to the "Black Hat" venue, and as soon as he executed the cracking program, the ATMs kept spitting out money. program, the ATM will continue to spit out money on the ground piled up into a small mountain! This "ATM crack show" can be called the 2010 "Black Hat" hacker conference on the most sensational wonderful play.

After a full three years, Jack, a "star hacker," is back in the game, and intends to show off an even more amazing "hacking stunt" at the Black Hat hacking conference, which opens July 31st. "- 9 meters away from the invasion of implantable pacemakers and other wireless medical devices, and then send a series of high-voltage electric shock 830V, so that" remote-controlled killing "to become a reality! Jack claims to have discovered security flaws in pacemakers made by a number of manufacturers.

With the US police refusing to disclose details of his death, Jack's death has sparked all sorts of crazy conspiracy theories -- some of them pointing out that Jack's latest "remote-controlled killing" technique for medical devices will not only pose a threat to the public's safety, but will also make the production of these flawed devices more vulnerable. The newest technology, which is known as "remote-control killing," will not only threaten the safety of the public, but will also damage the reputation and financial interests of the manufacturers of these flawed medical devices, and it is not possible to rule out the possibility that Jack will be killed for this reason.

? Hacker is originally from the English hacker, early in the U.S. computer community is with a positive meaning. But in media reports, the term hacker often refers to those who "software cracker" (software cracker).

? The term "hacker" was originally used to refer to a computer expert, especially a programmer, who was passionate about computer technology and had a high level of proficiency. Today, however, the term hacker is used to refer in general to those who specialize in using computer networks to cause havoc or mischief. The correct English name for these people is Cracker, which some people translate as "hacker", and in China, many netizens distinguish hackers and hackers as one category, which is actually a wrong distinction.

What are the world's most famous hackers?

1, Kevin Mitnick:

Mitnick may be synonymous with hacking. The U.S. Department of Justice still accuses him of being "the most wanted computer criminal in U.S. history". His actions have been documented in two Hollywood movies: Takedown and Freedom Downtime.

Mitnick's "career" began when he successfully hacked the Los Angeles bus farecard system, which allowed him to ride for free. Then, like Apple's Steve Wozniak, Mitnick started trying to steal phones, and was first convicted of accessing the computer networks of digital equipment companies and stealing software.

Mitnick later embarked on a two-and-a-half-year hacking spree in which he claimed to have hacked into computers, traveled through phone networks, stolen company secrets and accessed Defense Department early warning systems. His fall from grace stemmed from his hacking into the home computer of computer expert and hacker Tsutomu Shimomura.

After five years and eight months in prison, Mitnick now works as a computer security expert, consultant.

2. Adrian Lamo

Lamo specializes in finding big organizations to prey on, such as cracking his way into Microsoft and The New York Times.Lamo likes to use the networks of coffee shops, kinko parlors, or libraries to carry out his hacks, earning him the gag, the Hacker Who Doesn't Go Home.Lamo often finds security holes and exploits them. Usually he informs businesses of the vulnerabilities.

The list of companies Lamo has attacked includes Yahoo, Citibank, Bank of America, and Cingular, among others. While white-hat hackers are legally allowed to do this because they are employed by the company, Lamo is breaking the law.

Because he broke into the New York Times' internal network, Lamo became one of the top digital criminals. It was also for this offense that Lamo was fined $65,000 and sentenced to six months of home confinement and two years of probation.

3. Jonathan James

At the age of 16 James was already infamous, as he became the first minor to be arrested and jailed for hacking. He admitted a little later that he liked to joke around, hang around and rise to challenges.

Highly classified organizations James has attacked include the Defense Threat Reduction Agency, an agency of the Department of Defense. His intrusion gave it access to usernames and passwords that allowed it to view highly classified e-mail.

James is also credited with hacking into NASA computers and stealing more than $1.7 million worth of software. The U.S. Department of Justice described the software James stole as supporting the physical environment of the ISS, including temperature and humidity control. After discovering the intrusion, NASA had to shut down the entire computer system immediately, causing $41,000 in damages. Now James aspires to start a computer security company.

4, Robert Tappan Morrisgeek Morris

.

Morris' father is a former NSA scientist named Robert Morris, the creator of the Morris worm, which is believed to be the first worm to spread over the Internet. That's why he became the first person to be prosecuted under the Computer Fraud and Abuse Act of 1986.

Morris created the worm while attending Cornell University to explore just how big the Internet was at the time. However, the virus replicated in an uncontrollable way, causing many computers to die. Experts claimed 6,000 computers were destroyed.Morris was eventually sentenced to three years probation, 400 hours of community service and a $10,500 fine.

Morris now serves as a professor at MIT's Computer Science and Artificial Intelligence Laboratory, where his research focuses on the architecture of computer networks.

5. Kevin Poulsen Geek

Another of his oft-mentioned names is Dark Dante, and Poulsen got a lot of attention because of his hacking tactics to gain access to Los Angeles radio station KIIS-FM's phone lines, a move that earned him a Porsche.

The FBI has since gone after Poulson for breaking into FBI databases and federal computer systems used for sensitive wiretaps.Poulsen's specialty was breaking into phone lines, and he would often take over the entire phone line of a base station.Poulson would also reactivate phone numbers in the Yellow Pages and offer them for sale to his own associates.Poulson left behind many unsolved mysteries. many unanswered questions and was eventually arrested at a supermarket and sentenced to five years in prison.

In prison, Poulson took up journalism and was promoted to senior editor at Wired News. In his most famous article, he detailed the identification of 744 sex offenders by comparing their Myspace profiles.

6. Linus Torvalds

?Linux, the epic, started in Helsinki. It seemed like every hacker under the sun was creating source programs for their lives. Linus is no exception, and his home is

? on Kalevagatan (very similar to Kalevala) Street, not far from the city center. It's a place where 19th century architecture meets modern bungalows. Linus lives here with his wife. His home is much like a group home for university students, with bicycles always lined up under the stairs.

Linas himself looks like a student, not a Taoist priest. He was of medium build, with light brown hair and blue eyes, his gaze shot straight through his lenses, only his thick eyebrows were black against a childish face. His room is lined with many books around it, covered with paintings and various decorations, fairly inexpensive curtains, dried crocodile skins hanging between two armchairs, two sightless cats and a few computers in the room: three PCs, a Power Mac, and three microcomputers based on the Alpha chip, borrowed from DEC. They are inconspicuously arranged in the corners of the room. Another interesting item is not easily noticed: a dedicated line to which the computers are connected, installed and paid for by a local ISP as a symbolic reward for the Linux dowser.

7. Nyack? Steve Gary Wozniak

? In Silicon Valley, it's far more difficult for a person to earn a good reputation than it is to win big bucks. That's because wealth is essential to a reputation. And to win

? wealth, one has to hook up and go for profit. So whether it's Apple's Steve Jobs, Oracle's Ellison or Intel's Grove, they're all just going to get a ruined reputation locally. However, if there is only one recognized "good guy" in Silicon Valley, then this person is certainly not Woz.

? This year's technical genius, indifferent to fame and fortune, simple character, early left the center of the bustle. It is also destined that he is bound to be with the computer industry along different routes, writing their own history. Former comrade Steve Jobs is again reigning supreme, while he is living his own quiet life.

8. Thompson

? Incredibly, the operating system was not created in the first place to bring it to market, or even to get more people to use it, but simply for the authors to make it easier for themselves to use, and with the original intention of making it easier for them to play games. Even the awkward name Unix was a joking reference to an earlier operating system called Multics. In a later acceptance speech for the award, one of the authors, Dennis Ritchie, said matter-of-factly, "Our aim was to establish a good working environment for computers for ourselves, and of course we hope that everyone will enjoy it."

However, in the midst of this inadvertence, a miracle was born, verifying once again that innovation in IT is often the result of interest, not big bucks.

? After 10 years of in-house use, starting in the mid-1970s. the first time Unix was made public, it slowly worked its way to success, shaking the entire computer industry. when they started work in 1969, Ritchie and Thompson had no intention of starting an industry frenzy, and before 1974, they had not even published anything about the project. And when Unix showed up, they were surprised that it would generate so much interest. They didn't market it aggressively; it was free for universities and research organizations to use, and the source code was available.

Major achievement: the propellant of creativity in Bell Labs' famous Computer Science Working Group. Ritchie and Thompson created UNⅨ in 1969, a first-class open operating system for small machines that helped users with general computing, word processing, and networking, and soon became a standard language.

Little known fact: Plan 9, created by Thompson and his Bell Labs colleague Rob Pike, is the next generation of operating systems derived from UNIX

9, Richard Richard Matthew Stallman

Major achievement: veteran hacker.In 1971, Stallman found a job off the street at MIT's Artificial Intelligence Lab job. At the time, he was an undergraduate student at Harvard. Later, Stallman founded the Free Software Foundation, which shattered the notion that software was private property. Richard Matthew Stallman

First exposure to computers: at the IBM New York Science Center in 1969, at the age of 16. His own unique hacking tools: in the 1980s, Stallman did not take a salary from MIT but continued to work in one of its offices. There he created a new operating system called GNU - GNU stands for "GNU's Not Unix".

10. Draper? John Draper

Major achievement, discovering that free (long-distance) phone calls could be made using a whistle (blown into a telephone microphone) that was a prize in a cereal box ("Cap'n Crunch") Cap'n Crunch introduced generations of hackers to the idea of "stealing phone lines". Cap'n Crunch introduced generations of hackers to the brilliant idea of "stealing phone lines" to make (long-distance) calls. John Draper

? First exposure to computers: as a teenager, trying to convince a coin-operated payphone to get his coins and connect his call.

Our own unique tool: the crunch

11, Raymond ? Eric. Raymond

Any revolution or movement needs a theorist, a programmatic document that plays the role of the real Eric Raymond. Raymond's "eye-catching" effect. In addition to the structure of a very discursive and logical theoretical system, it is necessary to stimulate people's aspirations for a better ideal, for the morale of peers to pass a very incendiary flame. The free software movement, which is disrupting the traditional business model of the software industry, is no exception. The spiritual leader of free software is, of course, Richard Stallman, but he's too far out there, and Stallman lacks the ability to write a book on anything other than his core ideas. These limitations made Eric S Raymond stand out and take on the role. Today, he is unassailable as the number one theorist of the open source movement (stripped down to the free software movement) and hacker culture.

Raymond's strategy has been highly successful. It is generally recognized that the launch of Mozilla in 1998 is largely attributed to him. Most hackers and mainstream observers also agree that it was Raymond who successfully brought the idea of open source to Wall Street. But there are critics of him: there are some hackers who think he used these opportunities to advertise for himself, and his criticisms of the idealism of Richard Stallman and the Free Software Foundation, and the more pragmatic, market-favorable line he took, once stirred up no small amount of political antagonism in the hacker community.

12. Julian Assange

Known as the "Robin Hood of hacking," Julian Assange, the founder of WikiLeaks, believes that revealing secret documents and information about public ****governing bodies is a good thing for the public. It's a good thing to do.

The leak of more than 90,000 secret documents on U.S. troops in Afghanistan made him enough of a history-maker. 39-year-old (2010) Assange, who was wanted for the rape and sexual assault of two women in Sweden, turned himself in to the London police on December 7, 2010, and was immediately escorted to Westminster Magistrates' Court to appear at an extradition hearing, where his application for bail was rejected.

? On August 16, 2012, Assange was granted political asylum in Ecuador.

13. Kapoor

In 1971, Kapoor graduated from Yale University. During his time at the school, he specialized in psychology and linguistics, as well as computer science. It was at this point that he began

to develop an interest in computers. He went on to graduate school, and in the 1960s, dropping out was an option for many. You could get by with just the skin of your teeth. During those years, Kapoor could make $12,000 a year. He wandered aimlessly, becoming, as he later described his life during this period, a "knowledgeable gypsy."

Reference address&Recommended reading:

China Daily/hqgj/jryw/2013-07-29/content_9699170.html

ChinaMoment.com/news/world/201307/2996218429.shtml

This is the first time that China's economy has been in a state of flux. Huaxun Finance/article/2013-07-29/0000724443s.shtml

Baidu Encyclopedia/view/945392.htm