hahahah amol hacked ur ip address

Sign by Danasoft - For Backgrounds and Layouts

Author

Amol Bhure (ultra l33t) was born in Maharashtra, Seventh July Of Nineteen Hundred Nineteen Ninety A.D. He's currently pursuing his B.E in Bangalore. A cyber Security Professional, Hacker, Designer, Programmer. Keen interest in hacking and network security and he developed several techniques of defending and defacing websites. He's of the opinion that people should learn this art to prevent any cyber attacks. Currently Amol works as a member of 'Null International', Bangalore chapter as a network security guy. Apart from this, he has done internships at YAHOO! India, AMAZON India, etc. He has also attended various International conferences like NullCon GOA, c0c0n, ClubHack, Defcon , SecurityByte, ICFoCS, OWASP, etc.. He is certified with RHCE, LPT, CEH v7, SCJP, AFCEH. In programming he knows stuffs on C, C++, C# , JAVA (SCJP), .NET , and PHP. Additionally he knows few hardware languages like HDL, VHDL, Verilog, Embedded Micro controller Programming. He has been featured on google hall of fame. Amol was named a "India's top 10 hacker" by google. "World's top 50 hacking blog" by google.

Daily Page Views

Saturday, December 11, 2010

Even today are they Top 5 Hackers in the World?



Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term have several related meanings in the technology and computer science fields, wherein a “hack” may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a “kludge”.  The terms “hack” and “hacking” are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending. It is from this usage that the term “hacking” is often used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime.Here are the list of  Top 5 hackers in the world that created thier name in history books.
Kevin Mitnick
Born in 1963, Kevin Mitnick was the most-wanted computer criminal in the US at the time of his arrest. Mitnick also known as ‘Condor’ was arrested in 1995 for countless acts of computer fraud. Quite apt in the art of social engineering, Condor, at the age of 12, bypassed the card system used in the L.A. transit system. Mitnick just for the sake of ‘intellectual curiosity’ hacked into Digital Equipment Corporation systems, Nokia, Motorola, Fujitsu Siemens, and many others.
Kevin Poulsen
Born in 1965, Poulsen, also known as Dark Dante, is a former black hat hacker. He is best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. At the time, KIIS-FM was running a contest in which the 102nd caller would possibly win a Porsche 944 S2. With the intent of getting the Porsche, Poulsen clogged all of the lines and made himself the 102nd caller. He was arrested in June 1994 and charged with wire, mail, and computer fraud, as well as money laundering.
Adrian Lamo
Best known for breaking into The New York Times, Yahoo! News, and Microsoft, Lamo surrendered to the US Marshals on September 9, 2003. He went into hiding after realizing that he was being tracked. For 15 months Lamo was investigated by the F.B.I. on complaints of many cos. He plead guilty in court and was ordered to pay $65,000. He was also sentenced to home detention and probation afterwards. He is known as a grey hat hacker; he would find security flaws in computer networks of companies and report back to them, so that they could be fixed.
Robert T. Morris, Jr
In 1988, the Morris worm was created and Robert T. Morris, Jr was the one who created it. It was a first ever computer worm. He was a student at Cornell when he set off the worm from MIT, from MIT so as to hide his tracks. According to Morris, he just wanted to know the number of computers connected to the internet. The unintentional damages caused by the worm ranged in between $20,000 to $530,000. Morris did community service for the damages and was set free. Currently, he is a teacher in the field of computer science and electrical engineering at MIT.
Eric Corley
Better known by his pseudonym Emmanuel Goldstein, Eric Corley was a well-known hacker in the 80s and 90s. He faced trial in 1999 for sharing DeCSS codes and a method to download them. The codes allowed for decrypting of encrypted DVDs. His court case was the first to test the Digital Millennium Copyright Act. Today, he owns a non-profit organization called the 2600 Enterprises, Inc. and publishes a magazine called 2600: The Hacker Quarterly.

No comments: