print story

The Best Hackers of all time

Jonathan James : The first juvenile to be sent to prison for hacking.

At the age of 16, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.

James also cracked into NASA computers
, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. He was arrested for the crime and he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. Today James aspires to start a computer security

Kevin Mitnick

Kevin Mitnick, often incorrectly called by many as “God of hackers”, broke into the computer systems of the world's top technology and telecommunications companies. He was a world-famous controversial computer hacker in the late 20th century. . The Department of Justice describes him as "the most wanted computer criminal in United States history .
On Christmas Day, 1994, a hacker launched a sophisticated "IP spoofing" attack against Tsutomu Shimomura's computers in San Diego. The attack was launched from in San Francisco, the Toad Hall computer owned by John Gilmore, a founding employee of Sun Microsystems. Shimomura spent the day at Toad Hall with his friend Julia Menapace. Shimomura's pursuit of the hacker led to computers in Marin County where Shimomura's stolen files were found on The Well, Denver, San Jose and finally to Kevin Mitnick, the fugitive hacker, in Raleigh, North Carolina.

He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.

He served five years, about 8 months of it in solitary confinement, and is now working as a computer security consultant, author and speaker.

Need more?Visit:

Article Source:


Post a Comment