Press "Enter" to skip to content

The world’s five most powerful hackers, one computer controls the world, and the last one has become legendary

Now is the Internet age, so it is a very important issue to ensure the security of network information. Compared with the security of network information, many people hear the word is creepy, because they feel that they are the same existence of God, relying on a computer, you can steal other people’s information. In fact, the word hacker was a derogatory term at first, but it gradually became a synonym for information intruders. So what are the more well-known hackers?

The world’s five most powerful hackers

Fifth place, George Hotz

Holtz is a 22-year-old hacker. He became famous for jailbreaking Apple iPhone and cracking the Sony PlayStation 3, and the crack on PlayStation 3 eventually made Hotz and Sony abhorrent. Sony filed a lawsuit against Hottz, and the two sides finally reached a settlement. Sony banned Hotz from cracking its products. The hacker organization Anonymous inherited the career of Hotz and launched a retaliatory attack against Sony. Holtz was later recruited by social networking site Facebook.

Fourth place, Kapoor

In the mid-1980s, Kapoor and Gates were the twin stars of the US software industry. Founded Lotus in 1982 and served as CEO. Launched the personal computer “killer application” software Lotus1-2-3. In 1985, Lotus employees had reached 1,000 people and was the largest independent software company at that time. It was not until April 1988 that Microsoft surpassed Lotus to become the number one software company. Kapoor initiated the Electronic Frontier Foundation (EFF) to protect the interests of hackers, known as the American Civil Liberties Association of the computer industry. Kapoor thus became one of the most influential figures in the 1980s and 1990s, the most influential computer characters and hackers.

Third place, Richard Matthew Stallman

In 1971, Stallman found a job at the MIT Artificial Intelligence Laboratory on the street. He was an undergraduate at Harvard University. Later, Stallman founded the Free Software Fund, breaking the concept that software is a private property. First contact with the computer: at the IBM New York Science Center in 1969, at the age of 16. My own unique hacking tool: In the 1980s, Stallman did not take MIT’s salary but continued to work in one of the offices. There he created the GNU organization – GNU is an abbreviation for “GNU’s Not Unix”.

Second place, Gary McKinnon

The British Gary McKinnon once carriedout “the largest military computer invasion in the history of the United States.” During the 13-month period from February 2001 to March 2002, he blackened 97 computer network systems including the US Pentagon, NASA, Johnson Space Center, and the US, Navy, Air, and Air Forces to bring to the US government. A huge threat. He claims to be searching only for top secret information about aliens and UFOs, but according to US authorities, he deleted some key documents, making more than 300 computers unusable, causing more than $700,000 in damage, even at “9 The “extraordinary period” after the 11″ terrorist attacks used hacking techniques to paralyze the vital defense system of the United States.

First place, Kevin Mitnick

In fact, his technology may not be the best in hackers, but the legendary hacker experience is enough to shock the world and make all network security personnel lose face. He was the first hacker to appear on the FBI’s “Reward and Capture” poster. The 15-year-old Mitnick broke into the computer host of the North American Air Defense Command System. He and other friends rummaged through the data of all the nuclear warheads pointed out by the United States to the former Soviet Union and its allies, and then slipped silently. Come out. Afterwards, the famous US military intelligence expert Kreton once said: “If Mitnick sold the information to the KGB, he would get at least $500,000 in compensation. The United States would need to spend billions of dollars to redeploy. “”

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *