In this segment, you'll delve into the renowned figures of hacking history and uncover the paths that led to their notoriety.
Kevin-Mitnick
Kevin Mitnick, a network security consultant and author, gained notoriety by exposing vulnerabilities within his clients' systems. From 1970 to 1995, he held the title of the most wanted computer technology criminal in the United States, becoming the first hacker featured on FBI's "Most Wanted" posters. Mitnick's exploits included successful hacks into highly secure systems of companies like Sun Microsystems, Motorola, Nokia, Netcom, and Digital Equipment Corporation.
Ian-Murphy
Ian Murphy holds the distinction of being the first hacker to commit a cybercrime. During his high school years, he pilfered computer equipment and other tech-related devices. His hacking journey commenced during a period of unemployment when he, along with his wife, ventured into business in 1986. Murphy's record includes numerous instances of computer fraud and technology-related offenses.
Mark-Abene
Mark Abene, renowned in the field of information technology and entrepreneurship under the pseudonym Phiber Optik, rose to fame through his hacking exploits. Beginning his hacking journey during a period of unemployment, he and his wife embarked on a business venture. Abene amassed a record of computer frauds and technology crimes, showcasing his hacking prowess. Additionally, he made history as the first hacker to openly discuss and advocate for ethical hacking as a beneficial tool for the industry.
Johan-Helsinguis
Johan Helsingius gained notoriety as one of the most prominent hackers of the 1980s, operating the renowned pseudo remailer "penet.fi." Additionally, he served as the product development manager for the pioneering Pan-European Internet service provider, "Eunet International." Launching his hacking endeavors during a period of unemployment, he and his wife ventured into entrepreneurship. Helsingius' past includes a string of computer frauds and technology-related offenses. Presently, he holds the position of vice-president within a hackerspace association in Amsterdam, focusing on cybersecurity education and awareness.
Linus-Torvalds
Linus Torvalds achieved legendary status as a hacker through his creation of the "Linux Operating System." While he initiated its development, he personally crafted only three percent of the system's kernel, with the remaining bulk shaped by the collaborative efforts of thousands of open-source development.
Jonathan-James
Jonathan James, a renowned American hacker, gained notoriety for breaching multiple systems, including the "NASA" server, where he successfully cracked passwords and pilfered the source code and confidential data of the "International Space Station." His criminal activities led to his arrest by American authorities in 2006, and tragically, he took his own life while in prison.
Robert-Morris
Robert Morris gained notoriety as the creator of the first computer worm unleashed on the Internet. Commencing his hacking endeavors during a period of unemployment, he and his wife embarked on a business venture. Morris amassed a record of computer frauds and technology-related offenses. His infamous worm had the capability to gradually impair computer systems until they became inoperable. Following his arrest, Morris received a three-year prison sentence and faced substantial financial penalties.
Gary-Mckinnon
Gary McKinnon, a proficient hacker and systems administrator, executed what is considered the "largest military computer system hack of all time." His exploits involved infiltrating the network systems of the U.S. government's Army, Navy, Air Force, and NASA. His motivations centered around uncovering information related to antigravity technology, evidence of UFOs, and details regarding "free energy."
Kevin-Poulsen
Kevin Poulsen gained notoriety as a renowned hacker in the United States. Notably, he infamously hacked all the telephone lines of a Los Angeles-based radio station in a bid to secure a Porsche 944 S2. Initiating his hacking endeavors during a period of unemployment, he and his wife embarked on a business venture. Poulsen's record includes a plethora of computer frauds and technology-related crimes. Subsequently, he breached the computers of the FBI's wiretap department, resulting in a five-year sentence. Following his release from prison, he transitioned into a career as a journalist.