HOME
*





List Of Hackers
Here is a list of notable hackers who are known for their hacking acts. 0–9 A * Mark Abene (Phiber Optik) * Ryan Ackroyd (Kayla) * Mustafa Al-Bassam (Tflow) * Mitch Altman * Jacob Appelbaum (ioerror) * Julian Assange (Mendax) * Trishneet Arora * Andrew Auernheimer (weev) B * Loyd Blankenship (The Mentor) * Erik Bloodaxe * Barrett Brown * Max Butler C * Brad Carter (RBCP, Red box Chili Pepper) * maia arson crimew * Jean-Bernard Condat * Sam Curry * Cyber Anakin D * Kim Dotcom * John Draper (Captain Crunch) * Sir Dystic E * Alexandra Elbakyan * Mohamed Elnouby * Farid Essebar * Nahshon Even-Chaim (Phoenix) F * Ankit Fadia * Bruce Fancher (Dead Lord) G * Joe Grand (Kingpin) * Richard Greenblatt * Virgil Griffith (Romanpoet) * Rop Gonggrijp * Guccifer * Guccifer 2.0 H * Jeremy Hammond * Susan Headley (Susan Thunder) * Markus Hess ( hunter) * George Hotz (geohot) * Andrew Huang *Marcus Hutchins I J *The Jester (hacktivist) * Jonathan Jame ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (term)
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popular culture with a ''security hacker''someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. On the other hand, hacking and cyber-attacks are used extra- and illegally by law enforcement ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Erik Bloodaxe (hacker)
Chris Goggans, who used the name Erik Bloodaxe in honor of the Viking king Eric I of Norway, is an American hacker, founding member of the Legion of Doom group, and a former editor of ''Phrack'' magazine. Loyd Blankenship, aka The Mentor, described Goggans/Bloodaxe as "the best hacker I ever met". Career History Around 1990-1991 Goggans and some other Legion members set up a computer security firm, Comsec, which went out of business by 1992. He later became a senior network security engineer for WheelGroup, a network security group. In closing remarks at a 1995 conference, Goggans remarked that the global hacker community was disorganized and uncoordinated, suggesting that they should focus an attack on some foreign country, such as France. , Goggans is an recognized expert on information security. He has performed network security assessments for some of the world's largest corporations, including all facets of critical infrastructure, with work spanning 22 countries across fo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Alexandra Elbakyan
Alexandra Asanovna Elbakyan (russian: Алекса́ндра Аса́новна Элбакя́н, born 6 November 1988) is a Kazakhstani computer programmer and creator of the website Sci-Hub, which provides free access to research papers without regard for copyright. According to a study published in 2018, Sci-Hub provides access to nearly all scholarly literature. Elbakyan has been described as "Science's Pirate Queen". In 2016, ''Nature'' included her in their list of the top ten "people who mattered" in science. Since 2011, she has been living in Russia. Youth Elbakyan was born in Almaty, Kazakh Soviet Socialist Republic (then called Alma-Ata in the Soviet Union), on 6 November 1988. She identifies as " multiracial having ... Armenian, Slavic and Asian roots." Alexandra was raised by a single mother, who was an accomplished computer programmer. Alexandra started programming at the age of 12, making web pages in HTML and later writing in PHP, Delphi, and Assembly lan ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Sir Dystic
''Sir'' is a formal honorific address in English language, English for men, derived from Sire in the High Middle Ages. Both are derived from the old French "Sieur" (Lord), brought to England by the French-speaking Normans, and which now exist in French only as part of "Monsieur", with the equivalent "My Lord" in English. Traditionally, as governed by law and custom, Sir is used for men titled as knights, often as members of Order of chivalry, orders of chivalry, as well as later applied to baronets and other offices. As the female equivalent for knighthood is damehood, the female equivalent term is typically Dame. The wife of a knight or baronet tends to be addressed as Lady, although a few exceptions and interchanges of these uses exist. Additionally, since the late modern period, Sir has been used as a respectful way to address a man of superior social status or military rank. Equivalent terms of address for women are Madam (shortened to Ma'am), in addition to social honorifi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

John Draper
John Thomas Draper (born March 11, 1943), also known as Captain Crunch, Crunch, or Crunchman (after the Cap'n Crunch breakfast cereal mascot), is an American computer programmer and former phone phreak. He is a widely known figure within the computer programming world and the hacker and security community, and generally lives a nomadic lifestyle. Following the emergence of the Me Too movement in 2017, allegations against him dating back decades surfaced in media reports and in social media posts concerning claims of inappropriate sexual behavior. Draper denied any sexual intent but did not address all of the allegations directly. Early life Draper is the son of a United States Air Force engineer. As a child, he built a home radio station from discarded military components. He was frequently bullied in school and briefly received psychological treatment. After taking college courses, Draper enlisted in the U.S. Air Force in 1964. While stationed in Alaska, he helped his fel ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Kim Dotcom
Kim Dotcom (born Kim Schmitz; 21 January 1974), also known as Kimble and Kim Tim Jim Vestor, is a German-Finnish Internet entrepreneur and political activist who resides in Glenorchy, New Zealand. He first rose to fame in Germany in the 1990s as an Internet entrepreneur and was convicted on charges of computer fraud in 1994. Dotcom is the founder and former CEO of the now-defunct file hosting service Megaupload (2005–2012). p29. The company was financially successful, but in 2012, the United States Department of Justice seized its website and pressed charges against Dotcom, including criminal copyright infringement, money laundering, racketeering and wire fraud. Dotcom was residing in New Zealand at the time; at the request of US authorities, New Zealand police raided his home in 2012 and arrested him. Dotcom posted bail and has been going through legal proceedings ever since to avoid extradition to the United States. In 2017, a New Zealand court ruled that Dotcom, as we ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

News
News is information about current events. This may be provided through many different media: word of mouth, printing, postal systems, broadcasting, electronic communication, or through the testimony of observers and witnesses to events. News is sometimes called "hard news" to differentiate it from soft media. Common topics for news reports include war, government, politics, education, health, the environment, economy, business, fashion, entertainment, and sport, as well as quirky or unusual events. Government proclamations, concerning royal ceremonies, laws, taxes, public health, and criminals, have been dubbed news since ancient times. Technological and social developments, often driven by government communication and espionage networks, have increased the speed with which news can spread, as well as influenced its content. Throughout history, people have transported new information through oral means. Having developed in China over centuries, newspapers be ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cyber Anakin
Cyber Anakin (also known by the handle cyberanakinvader) is the pseudonym of a computer hacktivist. Career In 2016, in retaliation against Russia for the shooting-down of Malaysia Airlines Flight 17, Cyber Anakin, who was then a teen, started targeting Russian websites and databases, including the news site and email provider km.ru and gaming company Nival Networks. The information gained during the breaches included dates of birth, encrypted passwords, and geographic locations. There were 1.5 million victims. The km.ru and Nival data breaches were confirmed by computer security researcher Troy Hunt. Cyber Anakin subsequently used the content of the km.ru data breach to assist Latvian independent news website Meduza in establishing the identity of a man who had been sexually harassing female chess players by sending them letters containing used condoms and pages from pornographic magazines. In April 2018, Cyber Anakin took advantage of an error in a North Korean propaganda ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Sam Curry
Sam Curry (born October 17, 1999) is an American ethical hacker, bug bounty hunter, and founder. He is best known for his contributions to web application security through participation in bug bounty programs, most notablfinding critical vulnerabilities in 20 different auto manufacturersincluding Porsche, Mercedes-Benz, Ferrari, and Toyota. In 2018, Curry began working as a security consultant through his company Palisade where he disclosed vulnerability publications for security findings iAppleStarbucksJira
an
Tesla
In 2021, Palisade was acquired b

[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Jean-Bernard Condat
Jean-Bernard Condat (born 1963) is a French computer security expert and former hacker who became a consultant to the Directorate of Territorial Surveillance (DST). Using the name ''concombre'' (English: cucumber), he achieved status as one of the best-known French hackers in the 1990s. Biography Condat was born in 1963 in Béziers, Hérault. He completed the baccalauréat at age 16 before attending the University of Lyon to study musicology, earning his deug. Chaos Computer Club, France It was around 1982 that Condat joined the Directorate of Territorial Surveillance, an intelligence agency within the French National Police, who planted him in strategic positions, such as a sysop for CompuServe. In 1989, he, under instruction from the DST and agent Jean-Luc Delacour, created the Chaos Computer Club France, a fake hacker group posing as a national offshoot of the Chaos Computer Club, with the purpose of investigating and surveilling the French hacker community. The group ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Maia Arson Crimew
maia arson crimew (formerly known as Tillie Kottmann, and also known as deletescape and antiproprietary; born August 7, 1999) is a Swiss developer and computer hacker. crimew worked in information technology as a teenager, becoming the founding developer of Lawnchair Launcher, a popular application launcher for Android. She is known for leaking source code and other data from companies such as Intel and Nissan, and for discovering a 2019 copy of the United States government's No Fly List on an unsecured CommuteAir server. crimew was also part of a group that hacked into Verkada in March 2021 and accessed more than 150,000 cameras. crimew has cited anarchism, anti-capitalism, and her opposition to the concept of intellectual property as the motives for her hacking. In March 2021, crimew was indicted by a grand jury in the United States on criminal charges related to her alleged hacking activity between 2019 and 2021. The charges were unrelated to the hack of Verkada. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Red Box (phreaking)
A red box is a phreaking device that generates tones to simulate inserting coins in pay phones, thus fooling the system into completing free calls. In the United States, a nickel is represented by one tone, a dime by two, and a quarter by a set of five. Any device capable of playing back recorded sounds can potentially be used as a red box. Commonly used devices include modified Radio Shack tone dialers, personal MP3 players, and audio-recording greeting cards. History The term "red box" to refer to a phreaking box dates to 1973 or earlier. Red box use became more widespread in the 1990s following the publication in 2600 Magazine of instructions on how to make a red box by replacing a crystal oscillator in a tone dialer. Red boxes stopped being useful in the 2000s as phone systems in the US and other nations updated their signaling technology. Technical details United States The tones are made by playing back 1700 Hz and 2200 Hz tones together. One 66 ms tone represen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]