Now you all can invite me on skype for any kind of help required as my username is krackoworld


24 June 2012

Pin It

Top 10 Hackers of all Time in the World- 2012


Top 10 Hackers of all Time in the World- 2012To be a hacker its my duty to introduce you to the Top 10 Hackers in 2012. These hackers are being so strong as they can hack anything. They are certified as well as trained. Most of them are now working as on job of Security Experts from high companies due to their skills. So lets see who's on top and leading the race!

Top Ten Hackers of all Time:

1. Gary McKinnon

gary_mckinnon_2

Garry is considered as one of the best hackers of all time. USA declared him as the biggest military computer hacker ever. He whacked the security system of NASA and Pentagon. This made him one of the great black hat hacker celebrities and got his name into the hacker's community. The nerd is now facing 70 years of imprisonment and is deprived from accessing internet. He has illegally accessed 97 computers and has caused around $700,000 damage to the economy.

2. Robert Tappan Morris

robert-tappan-morris

He is the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500. Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory.

3. Jonathan James

jonathan-james

Jonathan James is better known as comrade and he was the first teenager to be held captive for computer hacking when he was only sixteen years old. When he was accused of hacking several websites he said that he was actually having a look and fooling around and that what he found really interesting was the challenge to see what he could do.

4. Kevin Mitnick

Kevin_Mitnick1

Kevin started with his minor cyber crimes when he was twelve years old. The first thing he did was hack the Los Angeles Bus system in order to get free bus tickets. After that he continued his hacking career by damaging the FBI, DEC, IBM, Motorola, Nokia, Sun Microsystems and Siemens. He was sent to prison for five years and eight months and when he was freed he decided to set up Mitnick Security, which is a safety consultancy company that offers its services for multinational firms.

5. Raphael Gray

raphael gray

He hacked the computer systems around the world in over six weeks. He was 19 years when he performed the hacking. His mission was to make a multi- million pound credit card. He published about 6,500 credit cards as an example of weak security in the consumer websites.

6. Mark Abene

MarkAbene1

Most people wouldn’t know who Mark Abene because he is more famous for his nickname Phiber Optik. He was the one who created the Master of Deception group. He had a passion for creating computer programs and he was always trying to learn new things, which made him access controversial sites. He is world famous because he is the ultimate computer hacking acts in the world.

7. Vladimir Levin

Vladimir-Levin

He was a high-profile cyberpunk back in the days. He graduated from St. Petersburg Teknologichesky University and was able to hack Citibank from New York and send more than ten million dollars to several of his accounts not only in the United States but also in Europe and in Israel. A real computer hacker.

8. Kevin Poulsen

Kevin-Poulsen

Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.His hacking specialty, however, revolved around
telephones. Poulsen’s most famous hack, In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.

9. Onel A. de Guzman

onel-de-guzman

He is one of the best international hacker of all time and a Filipino computer student as well.
During his time period, he creates a “Love Bug” virus that crippled computer e-mail systems worldwide.

10. Adrian Lamo

adrian-lamo

The threat analyst and grey hat hacker broke into various high profile computers like New York Times, yahoo and Microsoft that lead to his arrest in the year 2003. He used his internet connections at libraries and coffee shops. The black hat hacker was sentenced to six month home confinement and two years of probation and two years of probation which is expired on January 16, 2007. Now he a great public speaker and a award winning journalist.

All Over! Enjoy…

Also see this-  Find Ethical Hackers Jobs Online      and      Top 15 Hacking Movies Ever



Respected Readers :-
As a 18 years old student, running the top most blog in today's world is something quite difficult to do or handle as we bring the best things available related to ethical hacking and security tips to our readers every day. To keep us strong with this attitude, a small contribution from your side will highly be appreciated.

 

E njoyed this post very much – So why not you Subscribe to our regular Email Updates ! and stay connected with us forever .  

Kindly Bookmark and Share it with your friends :

9 comments :

  1. 1. how can i hack msn password
    2. how can i track or hack any laptop or computer
    3. if i want to become hacker then what i have to do .............etc.

    ReplyDelete
  2. Great Post. I have not been visiting the site recently. Took a visit again and there were some great comments on the site. Excellent post. Keep up the good work.
    DVD packaging

    ReplyDelete
  3. I am happy to found this Website. Show appreciation you for posting this. I just have to say Great information. I like how you have presented your information in outstanding detail. Thanks
    Training Seminars

    ReplyDelete
  4. The report unequivocally covers all the significant patterns and innovations assuming a noteworthy job in the man-made brainpower market's development over the estimate time frame. artificial intelligence training in pune

    ReplyDelete
  5. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. Best Ethical Hacking Service New York

    ReplyDelete
  6. To make sure that the competitor will not be the first in the market with a new product, corporate espionage is on the rise and the need of the hour is to have effective Competitive Intelligence structure in place.. artificial intelligence certification

    ReplyDelete
  7. I must say you are very much concise and experienced at persuasive writing. I just loved your flair of writing.
    SAP training in Kolkata
    SAP training Kolkata
    Best SAP training in Kolkata
    SAP course in Kolkata

    ReplyDelete
  8. Hello. It is a very nice topic. I have enjoyed it a lot also learn some new things. I hope you will carry on and give me a space to connect with you for a long. I want to know something more about phishing attack. Ethical hacking is a very important issue. On the other hand, some people should know some techniques to remain secure from hacking. Thank you very much. I will read it again . My site is www.hackerslist.co

    ReplyDelete
  9. Glad to chat your blog, I seem to be forward to more reliable articles and I think we all wish to thank so many good articles, blog to share with us.data science training in surat

    ReplyDelete

Your feedback is always Precious to us.
I will try to answer all the queries as soon as possible.

Regards
karan chauhan

 

Recent Posts

Review this blog on Bloggers.com

Recent Comments

| KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |