Skip to main content

TOP 3 FAMOUS HACKERS IN THE WORLD !

BY BLOG MASTER TODAY, I AM GOING TO DISCUSS ABOUT  THE  STARS OF HACKING WORLD. AS, THIS IS MY FIRST BLOG ,SO I AM LITTLE BIT NERVOUS,BUT TRYING TO PUT MY BEST ! HOPE YOU WOULD LIKE...

HACKING :   Hacking may refer to:
Computer hacking, including the following types of activity:


  • Hacker (programmer subculture), activity within the computer programmer subculture
  • Hacker (computer security), to access computer networks, legally or otherwise
  • Computer crime
  • Phone hacking, the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner
The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker, DO you know why is that so? Answer is these guys made term hacking popular worldwide. I know they were bad boys, but as an ethical hacker I salute their intelligence, their dedication, and everything they did.
THE FOOLOWING ARE THE LIST OF TOP 5 HACKERS :
1. Kevin Mitnick: Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, convicted criminal, and hacker. In the late 20th century, he was convicted of various computer and communications-related crimes.
he is also known as "the condor".
He grew up in "los angeles,america and attended  Los Angeles Pierce College and USC.

HACKING CAREER :  Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. Mitnick  also hacked into "Pacific Bell(telephone company in america)", voice mail computers.  HE WAS ALSO PRISONED ABOUT 2.5 YEARS OF JAIL.

2. ANKIT FADIA

talking about hacking ,then it is obvious that an indian should be their.
Ankit Fadia (born 1985) is an Indian independent computer security consultant and author. Fadia describes himself as an ethical hacker, and has written several books on the topic of computer security.
acctually, he came into limelight when 
he wrote Unofficial Guide to Ethical Hacking at the age of 15, and made several hacking claims, including working with intelligence agencies against terrorists. Subsequently, he started offering computer security consulting services, wrote more books, and became a sought-after speaker in India. In the mid-2000s, he developed a certification program on computer security for corporations in alliance with Reliance World.

HACKING :

  • In 2002, Fadia claimed that at the age of 13, he had defaced the website of an Indian magazine
  • In a 2002 interview published on rediff.com, Ankit Fadia stated that at the age of 16, he foiled an attempt by the Kashmiri separatist hackers to deface an Indian website.
  • THERE ARE MANY MORE HACKING CLAIMS THAT FADIA DOES.

BOOKS : 

  •  Unofficial Guide to Ethical Hacking. Macmillan.-1st jan 2001
  •  An Ethical Hacking Guide To Corporate Security. Macmillan India. -2004
  •  An Ethical Guide To Hacking Mobile Phones. Macmillan Publishers India Ltd.-2005
  •  Network security: a hacker's perspective. Thompson Course Technology.-2006
  •  Google Hacking. Vikas Publishing House Pvt Limited.-2007 with Diwakar Goel .
  •  Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection. Thomson Course Technology PTR. -2007 with Manu Zacharia
  •  System Forensics, 1E. with  Boonlia Prince Komal,- Vikas Publishing House.-2009.
  •  Cracking Admissions In Colleges Abroad 2E. Vikas Publishing House -2009
  • . Encryption: Protecting Your Data. Vikas Publishing House.-2009
  • Windows Hacking. Vikas Publishing House.-2009
  •  Software Hacking, 1E. Vikas Publishing House. -2009 with  Nishant Das Patnaik
  • E-Mail Hacking, 1E. Vikas Publishing House.-2009
  •  How to Unblock Everything on the Internet. Vikas Publishing -2012

AWARDS:

  • One of eight people named MTV India's Youth Icon of the Year (2008).
  • Global Ambassador for Cyber Security (National Telecom Awards 2011, Government of India).
  • Global Shaper (World Economic Forum).
  • Fadia has himself sponsored Singapore Management University's Ankit Fadia Study Award, which consists of a $1,000 cash prize and certificate that is annually awarded to "an outstanding student" Information Security and Trust course under the Bachelor of Science (Information System Management) degree.

3Kristina Vladimirovna Svechinskaya :

  • Kristina Svechinskaya, a New York University student is one of the most common names in the hacker’s world. 
  • She is Russian money mule maker who was arrested on November 2010 and accused of breaking into millions of dollars from several banks in Britain and America and for usage of multiple fake passports. 
  • Svechinskaya was dubbed "the world's sexiest computer hacker" for her raunchy, but casual appearance.


HACKS :

  • Svechinskaya used "Zeus trojan horse" to attack thousands of bank accounts along with nine others and opened at least five accounts in Bank of America and Wachovia to disburse the theft money.
  •  For all her hacking activities and for using the passports fraudulently it is said that she may have to pay huge penalty of 40 years of imprisonment. It is estimated that with nine other people Svechinskaya had skimmed $3 million in total.
THANKS ALOT..HOPE THIS IS INTRESING...
            ...BLOGMASTER.....
DONT FORGET TO PUBLISH YOUR VALUABLE COMMENTS

Comments

Popular posts from this blog

INTERNET ERRORS CODES

MADE BY BLOG MASTER_MD HELLO,FRIENDS..TODAY I AM GOING TO DESCRIBE ABOUT ERROR CODES THAT WE SOMETIMES GET ON INTERNET WHILE USING IT. THIS SEEMS VERY IRRITATING WHEN IT SHOWS QUIT REGULARLY IN  OUR COMPUTER. SO WHAT IS  INTERNET ERROR CODES ??? " The first digit of the status code specifies one of five classes of response; the bare minimum for an HTTP client is that it recognises these five classes. The phrases used are the standard examples, but any human-readable alternative can be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard. CLASSES : 1. 1XX-INFORMATIONAL 2. 2XX-SUCESS 3. 3XX-REDIRECTION 4. 4XX-CLIENT ERROR 5. 5XX-SERVER ERROR ERRORS  :             T he 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server  should  include an entity containing an explanation of the error situation, and whether it is a

DEADLY VIRUS CODES !

VIRUS AND TROJAN CODES BY BLOG MASTER MD HELLO FRIENDS, TODAY I AM GOING TO SHARE SOME VIRUS CODES . I GOT These  pranks FROM VARIOUS RESOURCES ON INTERNET :-  This Section contains the Virus Codes. Some of these codes are already familiar with you, But still very much harmful and educational too. Below mentioned some of the Platforms in which these virus are coded. BATCH Programming. C/C++ Python Visual Basic. DISCLAIMER : The code here are used for Educational Purposes. Please don’t use them to harm others. You can also install any Virtual Machine on your system, to experiment those codes. 1.   sHuTDoWn  VirUs Many of you know this trick, but i can’t call this a virus. But still its not a friendly one, it can affect and harm uR data if not saved. Effect  –>  May Harm uR workings and unsaved data. Coding  Platform   –>  Batch Programming. Working   –>  On executing, it will shutdown your system immidiately. If your data is not saved, it can har