Hi everybody,

¿What exactly is hacking?

Hacker is a term that has been used to mean a variety of different things in computing. Depending on the context, the term could refer to a person in any one of several distinct (but not completely disjointed) communities and subcultures.

Perfect now we  know what hacker means, maybe you have the same curiosity like me and know which is the top ten hackers all over the world…i´m sure that are russian.

1. Kevin Mitnick

At the age of 12, Mitnick learned the high importance of social engineering. Though this type of hacking doesn’t involve computers, it helps you to gain access to things such as emails, social networking sites, and others, by simply asking the right questions

2. Kevin Poulsen


Poulsen, a black hat hacker, meaning one who hacks for a malicious purpose, is well known for his skills. Also known as Dark Dante, Poulsen is probably best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station.

3. Adrian Lamo


Known as a grey hat hacker, meaning one who hacks sometimes for good reasons, Adrian Lamo is another hacker that found himself in trouble after the F.B.I was able to probe his illegal actions. Lamo is unique as he never stayed at one location to perform his hacking. He usually lived house to house, couch to couch, and often did a lot of his exploiting and investigating from internet cafes anduniversity libraries. He is well known for exploiting companies such as Microsoft, the New York Times, Lexis-Nexis, and Yahoo!.

4. John Schiefer

Schiefer is well known for defrauding companies, as well as installing malware to intercept vital information. The malware that Schiefer used was known as “spybots.” These pieces of malware acted as wiretaps and were able to access communications between the infected computer and bank accounts. He then was able to find out usernames, passwords, and other information. From there Schiefer would use the bank accounts to make fraudulent purchases, and would share the information with others. He utilized the same method to infected and gain information from computers with Microsoft operating systems

5. Vladimir Levin

Levin was well known in the 1990s for his hacking efforts which exposed the vulnerability of popular company websites, one of the most notable in this case being Citibank.  Levin, in 1994, was able to access Citibank accounts belonging to various corporate customers. He used the dial-up wire transfer service and was able to successfully transfer the money out of these accounts into accounts located in Israel, Germany, the U.S., Finland, and the Netherlands. Levin had an accomplice at each of these locations. However, 3 of his accomplices were watched as they attempted to withdraw money. They were arrested and all of them gave signs pointing to Levin. In 1995, Levin was arrested.

6. Fred Cohen


Though not as malicious as most on this list, Fred Cohen is definitely well known in the computer world. Studying to be a computer scientist at University of Southern California’s School of Engineering in 1983, Cohen was able to create the first computer virus. The virus  he created was able to completely overtake a computer and control each one of its functions. His virus allowed other computer scientists to see that not all viruses can be solved by just one commonly used algorithm.


7. Mark Abene

Online, you’d have known Mark Abene as “Phiber Optik.” Born in New York City, Abene was a well-known member of groups such as Masters of Deception and Legion of Doom. Both of these groups were known for their hacking skills and often times those who took part in the groups would be able to share hacking knowledge with others. Most of the members were eventually caught and investigated by the F.B.I.


8. Nahshon Even-Chaim

Nahshon Even-Chaim stands as the first person in Australia to be arrested and convicted of computer hacking. Even-Chaim, better known as Phoenix online, was part of a very popular hacking group based out of Australia known as The Realm. Though the internet wasn’t as widely known during the beginning of his hacking reign, Even-Chaim was able to utilize X.25 networks as well as “dialing-in” methods to hack and focused on penetrating networks of defense and nuclear agencies. Eventually the Australian Federal Police caught on and were able to get a warrant to wire-tap his phone and watch all signals coming in and out of his modem.

9. Robert T. Morris, Jr

Best known for a worm named after himself, the Morris worm, Robert T. Morris, Jr. is accredited with creating the first computer worm, not to be confused with the first computer virus. While a computer virus uses other files to replicate itself, a computer worm will utilize other networks in order to spread and infect others. In 1988, the Morris worm was created. To hide his tracks, Morris first set off the virus from MIT, even though he built and released it while a student at Cornell. According to Morris, the main purpose of his worm was to see how many computers were connected to the Internet. However, due to a configuration in the worm, it did a lot more damage than expected. Some of the totals ranged from $20,000 to $530,000. Despite this damage, Morris only had to do community service and was spared jail time.

10. Eric Corley

Better known as a pseudonym from George Orwell’s book 1984, Emmanuel Goldstein, Eric Corley was a well-known figure when it came to hacking, especially in the 1980 and 90s. In 1999 he went to court for sharing DeCSS codes and a method to download it, a program that was able to decrypt content on an encrypted DVD. His court case stands as the first to test the Digital Millennium Copyright Act. Corley was told to remove the program from his website. Though the main link was removed, almost 500 other websites had provided their own links to access and download the program. To continue this motion, Corley posted a banner stating that he encouraged mirroring of the link. And even today, you can still easily find the program.
So enjoy post and learn about these hackers…

Thanks for following my blog,

By Vlad Precup

Thanks for following

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s