List of top hackers recognized in the United States

Source: Internet
Author: User
List of top hackers recognized in the United States
AM
Author: Unknown
From: a library of Linux knowledge

Name: Richard Stallman)
Personal Website:
Http://www.undergrad.math.uwaterloo.ca/agray/meme.html
Resume: after graduating from Harvard University in 1971, he worked at the AI lab at the Massachusetts Institute of Technology and later set up the Free Software Foundation ). In 1969, when he first came into contact with computers at IBM's New York technology center, he became very interested, 16 years old. Later, stoman resigned from work in Massachusetts and stayed in an independent research laboratory in Massachusetts for research, where he developed a brand new operating system named GNU, for this reason, the McArthur fund named after American legend McArthur won 0.24 million US dollars.
Network Name: phiber Optik
Real name: Mark abene)
Personal Website:
Http://www.levity.com/julian/phiber.html
Resume: As one of the founders of a radical organization, abeni inspires thousands of young people in the United States to "study" the internal working principles of the domestic telephone system, to this end, a federal ruling tried to "spread illegal information to other hackers" and sentenced him to a one-year detention in the federal state, but the ruling was final. On the day of returning home, many advocates flocked to the Manhattan club to attend the "Return party" to salute him ". Shortly after the gathering, a magazine in New York commended him as the most outstanding young man in New York in 100. He first came into contact with the computer because he was working in the Electronics Department of a company in New York. from his mother, he got in touch with Apple II, the first computer he had was the radio shack TRS-80 (Tosh-80), which he had spent nearly half a year on.

Network Name: RTM
Real name: Robert Morris)
Personal Website: http://www.eg.bucknell.edu/kapolka/cs240/morris/faq
Resume: He is the creator of the world-famous "Morris worm. The son of chief scientist at the National Computer Security Center (affiliated to the National Security Agency), a senior student at Cornell University, experienced a dramatic spread of Network Worms during his first work in 1988, the term "hacker" was initially given a specific meaning in English. In this accident, thousands of computers were affected and some computers crashed, this serious emergency also made everyone aware of the importance of preventing the spread of Network viruses.

Network Name: Condor
Real name: Kevin Mitnick)
Personal Website:
Http://www.260.com/kevin
(I don't want to talk more about this person. I think you know better than me. He is my only idol. I have all his details here)

Network Name: Dark Dante
Real name: Kevin Poulsen)
Personal Website:
Http://www.catalog.com/kevin
Resume: in 1990, Mr. smith put all the telephone lines in the local area into use to make himself a 102nd-bit incoming call from kiis-FM station in LA, he also earned the Porsche 944 S2 sports car because of his diligence and efforts. He admitted that he had broken into a computer system and illegally obtained the name of a commercial organization operated secretly by the FBI.

Network Name: julf
Real name: John hsonius (Johan helsingius)
Personal Website:
Http://www.cyberpass.net/securty/pe...essrelease.html
Resume: helsonius closed his small store in 1996 and developed the world's most popular anonymous email return program called "penet. fi". His troubles began to follow. Among them, the most miserable thing is that the scelogy Church complained that a penet. Fi user posted a secret to the Church on the Internet. After the Finnish police searched him on 1995, and then he sealed the return program.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.