-
Great!!
Are you Certified Ethical Hacker?
-CB
Are you sure? This action cannot be undone.
-
Cool thread
Rated this thread
Are you sure? This action cannot be undone.
-
Good one , i want to be a hacker a good hacker ofcourse 😀
Are you sure? This action cannot be undone.
-
Great read.. Amazing info..
Keep 'em coming.
Are you sure? This action cannot be undone.
-
Any famous white or gray hackers? 😀
Are you sure? This action cannot be undone.
-
ash
Any famous white or gray hackers? 😀
White Hat Hackers
Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff.
Stephen Wozniak: "Woz" is famous for being the "other Steve" of Apple. Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.
Tim Berners-Lee: Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize. He started thinking in this direction when a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers.
Soon few more to come...
-CB
Are you sure? This action cannot be undone.
-
Wow ! Awesome information man. I wonder how few people get so much brains. When will I get brains like them ? 😔
PS: That third guy looks so innnocent in the pic, was he really a criminal? 😕
Are you sure? This action cannot be undone.
-
Nice information...
Are you sure? This action cannot be undone.
-
Thanks Guys.......😉
@CB nope i am not certified still, I am doing a course on Ethical hacking (will soon be a cyber cop ........ i guess 😒)
@ash yes I will post in info about white hackers too ..................😉
Are you sure? This action cannot be undone.
-
hey
I have question here
I thought hackers are ones who actually know systems by nook and corner of the computers and networks and how they work where are crackers are once who actually ' meddle'
Are you sure? This action cannot be undone.
-
durga
hey
I have question here
I thought hackers are ones who actually know systems by nook and corner of the computers and networks and how they work where are crackers are once who actually ' meddle'
oh! durga long time see ..
i thought you went sick after taking my KYCean 😉
Are you sure? This action cannot be undone.
-
Hi Durga,
I guess your asking the difference between the Hackers and crackers.
Lot of them out there doesn't know the difference between a Hacker and a cracker ? so here is the answer,
- A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data. There are two types of Hackers,
-> White hat hackers or grey hackers
-> Black hackers
White hat hackers or grey hackers are the hero or good guy 😁, especially in computing slang, they are also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers". Groups of these people are often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.
Black hackers are those who use his skills for legal or illegal acts, but not for personal gains. Black hackers use their skills in order to prove themselves that they can accomplish a determined feat, for money they become black hackers.
- A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.
-Arvind(slashfear)😉
Are you sure? This action cannot be undone.
-
ah!!
nice SF !! thanks that for info!
so these personalities are all black hackers eh?
ES:I go no-where! 😁
Are you sure? This action cannot be undone.
-
SlashFear, awesome thread.. made for an interesting read. Thank you rated ***** <3
Are you sure? This action cannot be undone.
-
Hi Guys!!!
It's been a long time...... So I am digging my own old threads and trying to update them 😀 ...... So here we go... with the continuation of master mind
Kevin Poulsen
Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 *** offenders with MySpace profiles.
Robert Tappan Morris
Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.
Vladimir Levin
Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).
David Smith
David Smith, the author of the e-mail virus known as Melissa, which swamped computers around the world, spreading like a malicious chain letter. He was facing nearly 40 years in jail . About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.
Mark Abene
Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.
Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled Cyberspace.
NOTE: ALL THE INFORMATION ABOVE ARE FROM VARIOUS SOURCES FROM INTERNET AND I DO NOT CLAIM THE WRITINGS ARE MY OWN!!
-ARVIND
Are you sure? This action cannot be undone.
-
Pensu
Member •
Feb 14, 2011
Good one....😀
Are you sure? This action cannot be undone.
-
Hi guys!
allow me to place this here... (newbie!)
Does anyone know about software that hides the mac, imac and all other adresses in email in order to be able to sent untracebles emails? (Not for hacking purpose, for safety purpose!!) Note: this is a very serious request, !!
Are you sure? This action cannot be undone.
-
Wow!!! Aravind!!! Awesome set of Information... 😁
Are you sure? This action cannot be undone.