数学建模社区-数学中国

标题: 全球最著名的16位黑客列传 [打印本页]

作者: 韩冰    时间: 2004-10-3 23:09
标题: 全球最著名的16位黑客列传
全球最著名的16位黑客列传
作者: 韩冰    时间: 2004-10-3 23:12
以下是引用韩冰在2004-10-3 23:09:35的发言:6 o4 ^7 j" f$ [ q 全球最著名的16位黑客列传
4 ?7 \9 {7 `$ w, T

全球著名的《Discovery》电视频道评出全球最著名的16位黑客,名单如下:) X+ I# b+ }4 I1 ^: h) E* B Richard Stallman 1 l/ f3 U! E4 P5 U% @; O: FDennis Ritchie and Ken Thompson8 W( b& y( \& Z$ ] J/ ^4 J$ b3 v John Draper 8 a! t+ X* V( E$ Y+ ]. uMark Abene, q2 | `- H4 B/ m L) Z Robert Morris$ W, L/ T" N+ ^- m Kevin Mitnick # x8 [. p R4 ~! E2 ~! P; v1 M' U/ JKevin Poulsen! [$ y" x/ n- H& ^ o+ ?. H Johan Helsingius6 g6 T8 I+ c/ U Vladimir Levin % R0 v( a* C. @8 e: X+ o5 xSteve Wozniak- W1 O& P( S5 p, G' h! r Tsutomu Shimomura. Y1 D; v) |- X3 J Linus Torvalds 9 S b3 b% B. i8 I6 yEric Steven Raymond3 t8 `2 ^3 n2 d* Y0 ] Ian Murphy4 b$ U7 b% C( N7 U0 d6 N5 D- y- o John Perry Barlow 3 |- P, G7 g A) v# Q " y1 }" G; U, D" b7 X

每一位黑客的圈内头衔(Handle)、主要成就(Claim to fame)、第一次接触计算机(First encountered a computer)、自己独特的工具(Unusual tools)、鲜为人知的事实(Little-known fact)、目前状况(Current status)等具体情况分别介绍如下:


作者: 韩冰    时间: 2004-10-3 23:34
以下是引用韩冰在2004-10-3 23:09:35的发言:8 x( ?. i+ ]) a0 i( P6 C% S 全球最著名的16位黑客列传
) ]9 p' b# ], i, M' w* t 0 m% y0 n; z$ d , h& \/ R( O8 W; ~) A5 x c$ p

[attach]505[/attach]

S/ R3 e$ o, Z

Richard Stallman

1 u7 u6 j. W* Q8 J$ Y6 r ?$ ]1 E( I! s+ w4 f + J- F" \$ W- H$ y( W( @" L

Handle: None (nothing to hide!)

! v$ N/ R( a P0 L

" y/ A, h4 S8 Y; J7 z* n Claim to fame: A hacker of the old school, Stallman walked in off the street and got a job at MIT’s Artificial Intelligence Lab in 1971. He was an undergraduate at Harvard at the time. Disturbed that software was viewed as private property, Stallman later founded the Free Software Foundation.

8 u4 K+ V5 e: J2 p* V% S. h3 k% j

" f# q5 L/ |0 v3 [4 g: Z$ D First encountered a computer: In 1969, at the IBM New York Scientific Center. He was 16 years old.

4 _ R8 Q5 u4 P; M5 q

. T {! Z4 b- F% q. x3 m8 T: KUnusual tools: In the 1980s Stallman left MIT’s payroll but continued to work from an office at MIT. Here he created a new operating system called GNU — short for GNU’s Not Unix.

/ B' o7 O; i O# Q# }

4 Q0 b! g" R" ?) Q, \6 `% kLittle-known fact: Recipient of a $240,000 MacArthur Foundation genius grant.

3 f) |& _5 k' N# \) P

3 C* \; X9 k/ L& w Current status: Richard Stallman has just published his latest book, Free Software, Free Society: Selected Essays of Richard M. Stallman, available through GNU Press." V1 v. i3 d* N$ z" m R1 I, w

; `+ X/ _$ b* V+ x8 f" w& {, _ # ?" d& `; I/ t0 E; M9 y; t

Richard Stallman

' i5 F# ?, X; b% w5 i, ] / A0 {% Q3 ?$ c$ z* J& k5 c8 o 8 p4 M2 w5 ?& V) h# m5 R0 d

柄: 任何(没有任何东西掩藏!)

, J$ J2 d& J) y

1 Y# ? H A5 y3 s 要求达到名誉: 旧的学校的黑客,在关中的Stallman的步行街道并且在1971年在MIT’s人工智能实验室得到工作。 他此时是哈佛大学的大学生。 扰乱软件被查看作为私人的财产,Stallman稍晚建立免费软件基础。

# F7 [" b' T6 a! k; I

6 Y+ H4 }0 T$ J0 d2 E首先遇到计算机: 1969年,在IBM纽约科学的中心。 他是16岁。

* G! _1 J* P0 ~+ O* e4 W, u

) F. I* h( n6 ~) g9 @2 y5 | m不寻常的工具: 在八十年代Stallman左的MIT’s工资单中但是继续以便从在麻省理工学院的办公室工作。 他在这里创建称为短的GNU — 的一个新的操作系统GNU’s Unix。

8 c' ?% b1 M0 B" L# M) E

0 ~, A( N: ]9 T) Y 鲜为人知的事实: $240,000 MacArthur基础天才的接收者应允。

! r7 U i: G0 x: s$ j

: A, [4 d2 U' d' n- z5 Z7 Q- g1 U 当前的状态: Richard Stallman仅仅已出版他的最新的书,免费软件,自由的社会: Richard米Stallman的选择的论文,可用GNU按下。 9 E9 `/ M4 w1 j6 h: w$ k4 ~0 w7 T2 r" b

全球最著名的16位黑客列传.jpg (7.14 KB, 下载次数: 186)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:37
以下是引用韩冰在2004-10-3 23:09:35的发言: u$ ?4 t) {6 ^ 全球最著名的16位黑客列传
0 m% }0 X* d$ ~6 w, O, C: C C# N: [! c9 x : N1 X7 C+ W) |! ]. |

[attach]506[/attach] 6 r: `- \' n7 i" T

! P d4 @) d8 ` d) _

Dennis Ritchie and Ken Thompson

' q- V7 T# T8 Z* u2 N! F! M! C & Y. P5 V+ Q" X1 p; \5 L ) c* _# E! \' E

Handles: dmr and Ken

- O5 N. B2 |3 j# u

2 D. [/ x! i3 Y: o$ J: [ Claim to fame: The driving creative force behind Bell Labs’ legendary computer science operating group, Ritchie and Thompson created UNIX in 1969. An elegant, open operating system for minicomputers, UNIX helped users with general computing, word processing and networking, and soon became a standard language.

, r& W: q" o7 B( u4 `( }2 a

7 S/ z& X4 J1 V5 p Unusual tools: Plan 9, the next-generation operating system created as the natural descendant of UNIX by Thompson and Bell Labs colleague Rob Pike.

) l; B7 a4 N: @ ?% _0 P

; a8 h. Z; ^! u% v) f( Z N Little-known fact: Although Ritchie is the author of the popular C programming language, his favorite language is Alef. Thompson, an amateur pilot, once traveled to Moscow to fly a MiG-29.

5 S( [2 F. B- s

9 }$ I, y* m+ a3 t9 }0 A Current status: Dennis Ritchie is currently the head of Lucent Technology’s System Software Research Department, while Ken Thompson has retired from both Bell Labs and the hacker spotlight. # \3 m3 r" V; X! S

- S5 [2 B$ Z8 j& O1 C

Dennis Ritchie和知识范围Thompson

' l. @, i& h9 I 8 S: j( J9 }0 X2 Q) G, A " c6 X2 Q; N+ ^7 x4 B1 s

柄: dmr和知识范围

V0 B2 g+ [* Z( y: Z

/ J1 k+ t2 H9 l5 [3 `: t- T( k 要求达到名誉: 在贝尔Labs’ 传奇的计算机科学操作组,Ritchie和Thompson后面的驱动的创造性的力量在1969年创建UNIX。 minicomputers的一个巨大,打开的操作系统,UNIX用一般的使用计算机,字处理和网络帮助用户,并且很快成为标准语言。

( `' M2 g: c- w- I q! U; G0 z

2 d9 k2 P+ S5 g+ p$ Z: k$ _不寻常的工具: 计划9,其次产生操作系统作为UNIX的自然后代通过Thompson和贝尔实验室同事Rob Pike创建。

' {) ]$ f k( X) z3 p3 p+ w& f

" T/ Z2 ]6 e% y* \鲜为人知的事实: 虽然Ritchie是流行的C编程语言的作者,他最喜爱语言是Alef。 业余者驾驶,Thompson到莫斯科的一次传送飞行MiG-29。

2 a& }1 _3 _3 M

+ H6 C& v% Q4 L* R5 M当前的状态: Dennis Ritchie当前是朗讯Technology’s系统软件研究部门的头,而知识范围Thompson已从两个贝尔实验室和黑客聚光灯退休。 ) a# G4 G! Y2 E; ~. s; e; y

全球最著名的16位黑客列传.jpg (7.63 KB, 下载次数: 178)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:38
以下是引用韩冰在2004-10-3 23:09:35的发言: , H4 n2 w0 u; E# h4 w1 {+ R全球最著名的16位黑客列传
2 `( e/ E7 B0 Z7 _: o( |2 N! v( i% I5 f4 A2 |, F `. W7 x . W5 U5 T7 [. i. v

[attach]507[/attach] $ F5 i0 S# y* ]4 k

0 p. s' U7 K) \5 J# I

John Draper

) K ?, y s9 Q6 ]( v& ` - `( h7 o& K) H G9 ^9 X2 R+ g3 H$ S9 p$ ^

Handle: Cap’n Crunch

2 c8 v: q! k) `; ?

: n0 ~8 g# d9 |8 bClaim to fame: Figured out how to make free phone calls using a plastic prize whistle he found in a cereal box. Cap’n Crunch introduced generations of hackers to the glorious concept of phone "phreaking."

7 B4 o2 ]; ^# y a

- h! l$ F' i) s! K6 w/ k( r/ A. D: B! VFirst encountered a computer: As a teenager, trying to convince pay phones to return his coin and put through his calls.

( d1 D$ Q2 Z8 u) V% ]' _

- q4 y# B% @) B: N* A& t Unusual tools: The toy whistle from boxes of Cap’n Crunch cereal. The whistle reproduced the 2600 hertz tone necessary to authorize a call. Used in conjunction with a bluebox, it allowed users to make free phone calls. (Oscar Meyer weiner whistles also briefly gained a following among phone phreakers.)

, i& @: w7 h7 ?2 m* P1 E

3 _+ B1 |* b' q& f, eLittle-known fact: Honorably discharged from the U.S. Air Force in 1968 after a stint in Vietnam.

' n/ d# k: l5 w) ?

) e& Z; I8 ^ I* c! y+ q7 N: e' HCurrent status: John Draper has set up his own security firm. He also recently developed Crunchbox, a firewall system that halts the spread of computer viruses.6 \) r9 y( U c# x' r7 q! E

3 s: J! {2 ^) G

约翰窗帘

! ^) N, }: ~5 y, @ j, k2 Y- N4 t. i# a1 l | - ]6 k) T3 a1 B8 P2 G& \

柄: Cap’n Crunch

/ O) I* O6 b i" e, ^

! f! t, B9 o2 D5 j6 U9 o3 p$ z- ~ 要求达到名誉: 被演算出以便使用一种塑料的奖品口哨如何做自由电话他在谷类盒子中查找。 Cap’n Crunch向电话“phreaking。”的光荣的概念介绍代的黑客

6 m* Y( H' r/ c3 e- G1 o* V

' K" u1 [* a6 _/ E首先遇到计算机: 作为teenager,试图使报酬电话相信归还他的硬币并且完成他的呼叫。

* d' ^ q( f: ?; E+ h) l

# y& _2 c! n/ D 不寻常的工具: Cap’n Crunch谷物的若干盒子的玩具口哨。 口哨复制必要的2600赫兹音调授权呼叫。 与bluebox一道被使用,它允许用户做自由电话。 (奥斯卡Meyer weiner吹口哨在电话phreakers中间也简要地赢得下列。)

2 q7 z8 i! q/ r5 F1 A

8 Q- Z2 Z4 F7 s8 R, S" g. K+ A1 q$ S B 鲜为人知的事实: 在1968年的美国空军的在之后Honorably的卸下在越南紧缩。

% D- q0 T" ]! E" m

; \: b0 _3 H( f$ I, D当前的状态: 约翰窗帘已建立他自己安全商行。 他也最近发展Crunchbox,停止计算机病毒的传播的防火墙系统。8 L! c8 Z; r* ?; G8 p, Y, B5 F0 l, y

全球最著名的16位黑客列传.jpg (10.28 KB, 下载次数: 199)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:41
以下是引用韩冰在2004-10-3 23:09:35的发言: . G" ]) ^9 S3 A$ ]2 k全球最著名的16位黑客列传 " w( b7 D% U2 u0 ~! M, K0 X! m ; m9 K, ?6 }& c. `9 R8 O

[attach]508[/attach]& \& K5 a9 o9 b! `3 _" B

( s0 ]4 E7 J" l% I" l) i' ~' q- R

. _- K/ ?5 G; N( H + Q: x# m% i, p: p/ `6 B & H$ \; O: U7 e" b" c4 \* A P . q" P' y2 Y3 N: G' K4 W0 X- w/ ?% z# u- D' t 2 O$ q7 u3 h1 ^; c6 L6 b 7 H5 l4 M- W/ @; o* }Mark Abene v! C8 ?; M9 v0 ] 6 U: G" n* k+ k) H1 q& Y2 {# Z

# k0 u1 c% ?8 p! n- C 2 o6 ?9 ?, `, w( B0 @Handle: Phiber Optik * V H8 u; S9 q- J0 \+ `, V: p" K4 p# b8 ]4 s2 s1 z% i . S0 @- ~2 k2 _4 \8 X

Claim to fame: As a founding member of the Masters of Deception, Phiber Optik inspired thousands of teenagers around the country to "study" the internal workings of our nation’s phone system. A federal judge attempted to "send a message" to other hackers by sentencing Phiber to a year in federal prison, but the message got garbled: Hundreds of well-wishers attended a welcome-home party in Abene’s honor at an elite Manhattan Club. Soon after, New York magazine dubbed him one of the city’s 100 smartest people. $ D; N4 w- [. D3 e . Q$ G2 G3 K9 c$ O

First encountered a computer: Hanging out in the electronics department of the A&S department store in Queens, N.Y., where his mother worked. There he was introduced to the Apple II, the Timex Sinclair and the Commodore 64. The first computer he owned was a Radio Shack TRS-80 (Trash-80). $ q5 p' S5 s/ v' {/ o 4 y5 k8 q. M9 V, p+ k: o

Unusual tools: Experimented by dialing patterns on a phone receiver. Abene used the receiver so frequently that it had to be bandaged with black electrical tape to keep its guts from falling out. 6 J6 P; n8 P3 M; d' u: X" [* p# b' k

Little-known fact: Phiber Optik’s favorite food: mashed potatoes from Kentucky Fried Chicken. Not real mashed potatoes. Real ones have lumps in them. 0 A2 ]3 U5 o: M1 m 9 Q) Z( B& }1 Y4 Z7 s

Current status: After doing time in a Pennsylvania prison, Mark Abene worked on penetration tests for an accounting firm, and formed the (now defunct) security company, Crossbar Security

" f7 g. [# x3 t' K5 L % F. S' m. _, b2 ]6 G8 j0 N$ `; @

8 e! H6 X4 v2 N9 v+ H/ O7 n / k6 `: \9 c6 ]: T9 A; u2 D$ w

标记Abene

5 \: [: M0 L# i3 x2 {6 |( Y* q: q- j8 d8 E* w: J8 {5 M5 s" f. k {5 ? ; }9 e; Q) s- u

柄: Phiber Optik

3 p% S/ z8 l& t

5 c) f6 c; D3 C& V 要求达到名誉: 当,Phiber Optik欺骗的主人的一个建立的成员在全国各地鼓励成千上万的teenagers“研究”我们的nation’s电话系统的内部的工事。 通过对联邦的监狱中的一年的Phiber判决试图的一位联邦的审判员其它黑客的“发送信息”,但是信息被断章取义: 在的Abene’s尊敬地参加受欢迎家庭党精英曼哈顿俱乐部。 很快在之后,纽约杂志使他又名为一city’s 100最聪明的人。

& O, B+ z) s' m# G+ o0 l6 o' I

5 u+ q% D9 _4 C+ S! o$ q. z# x首先遇到计算机: 在女王,N.Y.,中的A&S百货商店的电子学部门挂起在其中他的母亲工作。 他在那里向苹果II,Timex Sinclair和Commodore被介绍64。 他拥有的第一台计算机是无线电小室TRS-80(Trash-80)。

, C( w' `% `/ t# `0 F

1 x8 w* V$ K6 c7 m' w* R9 ? f9 [" x$ _不寻常的工具: 在电话收受者上拨打模式的实验。 Abene那样经常地使用收受者,以至于它不得不是黑色的电气的磁带的绷带避免其guts争吵。

+ g$ o# I% e; C/ v0 Y0 Q+ P

) Y* Q2 ^6 N i# j4 z0 `2 Z' F 鲜为人知的事实: Phiber Optik’s最喜爱的食物: 从肯塔基Fried小鸡捣碎土豆。 并非真正的捣碎的土豆。 真正的那些在他们中有块。

% }. Y( x5 |% E2 l

' r3 m7 |8 E- m; Q 当前的状态: 在宾夕法尼亚监狱做时间之后,马克Abene从事于会计商行的突破检验并且形成(现在死了)安全公司,,Crossbar安全* R; a+ |3 {/ N9 m9 M

全球最著名的16位黑客列传.jpg (13.13 KB, 下载次数: 182)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:43
以下是引用韩冰在2004-10-3 23:09:35的发言:; W" p; d, a5 V J8 X 全球最著名的16位黑客列传
8 G9 ~7 H; F4 s V. K* k - |3 t# b3 g4 O - V2 S Y" m6 T/ [. h5 A* ]5 g

[attach]509[/attach]! ^/ Z+ p( G& f( f+ M

, L, u3 ?( K4 {+ c

Robert Morris

* Z" q( F" E3 p3 V7 O' a( W# q3 j7 b- j : s6 I6 Q6 A* |- S* y) Q( b

Handle: rtm

. R) R2 R% c) j: I9 z

# L/ K9 d0 u( D7 v$ K8 Z" y1 U Claim to fame: The son of the chief scientist at the National Computer Security Center — part of the National Security Agency (NSA) — this Cornell University graduate student introduced the word "hacker" into the vernacular when he accidentally unleashed an Internet worm in 1988. Thousands of computers were infected and subsequently crashed.

2 y# y+ [1 C' b: T

+ l" C% }. P4 J/ f5 uFirst encountered a computer: At home. Morris’ father once brought home one of the original Enigma cryptographic machines from the NSA. It became a household conversation piece.

7 u6 V8 }/ W- h F2 `

$ G) q4 ?; L( W7 m& q% h. f9 oUnusual tools: As a teenager Morris had an account on the Bell Labs’ computer network, where early hacking forays gave him super-user status.

: P; W; b6 k- W' M" j X" l

/ p8 @7 _4 [* h5 [1 ]8 u Little-known fact: When the Secret Service raided the home of Legion of Doom member Erik Bloodaxe in 1990, they found a copy of the source code for Morris’ Internet worm.

/ j4 N0 g8 J7 m! l

( p1 i" [; s. C+ R) | Current status: Robert Morris is now an assistant professor at MIT, even though he released his worm virus from there in 1988 (thus disguising the fact that it was actually written at Cornell University).7 a, b! c, T- |7 F& m4 E

0 Q& [. n' y2 ?; c/ N3 ~2 P

Robert Morris

$ `5 i3 e! S3 c! I4 O ) I5 M: {/ u& H# i$ V) P! x9 s, n. u" @7 I' R( }3 d

柄: rtm

2 P% @- c5 ^$ D: j* L

- [0 D* L6 Y& {要求达到名誉: 在国家安全机构(NSA)— 的国家的计算机安全中心— 部分的主要科学家的儿子当他在1988年偶然地释放因特网蠕虫时,这名Cornell大学研究生引入词汇“黑客”本国。 成千上万的计算机被传染和其后毁坏。

; f. n9 n/ r- F2 z9 j* {' J& c1 O

# e. i9 }3 w) u+ L) B- j首先遇到计算机: 在家。 Morris’ 父亲从NSA带来回家一原来Enigma cryptographic机器一次。 这成为家庭谈话块。

( V% L l& T4 W3 s9 S. F

, R/ Z& {* m# C8 t 不寻常的工具: 当teenager Morris在贝尔Labs’ 计算机网络上有帐户往来,在其中早黑客入侵袭击把超级用户状态给他。

j& X& w* v. k9 L Y

- I" Q0 c. f1 g& f3 a2 F鲜为人知的事实: 当特务机关在1990年袭击末日成员Erik Bloodaxe的军团的家时,他们为了Morris’ 因特网蠕虫查找一册来源代码。

# H0 C0 b. J/ b6 M- A# G+ A

4 Z& V5 @! o" [3 \当前的状态: 即使他在1988(这样伪装它实际上被书面在Cornell大学的事实)年从那里释放他的蠕虫病毒,Robert Morris现在是在麻省理工学院的助手教授,。: z* `& y# m* {, D

全球最著名的16位黑客列传.jpg (11.29 KB, 下载次数: 196)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:45
以下是引用韩冰在2004-10-3 23:09:35的发言: . i7 P7 h$ t! v7 O' }$ M$ I全球最著名的16位黑客列传
- i! i# r, ]' a( @) B# U- i2 O # k- l/ F+ ?5 }5 ?! f6 L0 U2 r5 ]& i4 w. p _0 W3 n& P

[attach]510[/attach] B- E7 A" p; N Kevin Mitnick

5 P* K9 [7 T0 {+ D2 ?2 E \- d& Z' S% B- W5 r- E + D/ m* E- W# ?4 A9 V. Y- ]; J

Handle: Condor

2 y( ^/ M$ {; H* Q

( t3 F' s5 x& J( {Claim to fame: The first hacker to have his face immortalized on an FBI "Most Wanted" poster. His status as a repeat offender — a teenage hacker who couldn’t grow up — earned Mitnick the nickname "The Lost Boy of Cyberspace."

" l1 E" r/ i& f+ Q2 |

4 P0 X5 \! }5 c% \ WFirst encountered a computer: As a teenager. Mitnick couldn’t afford a computer, so he hung out in a Radio Shack store. He used the store’s demo models and modem to dial other computers.

~9 `- F$ s& ]7 B. ]. g1 g

. W y1 s7 T2 K! u5 A& b Unusual tools: During the three years he was on the lam, Mitnick used Internet Relay Chat (IRC) as a message drop and to communicate with his friends.

2 h- \; x' E/ a( q$ c* g' Z% L2 Y

1 k r7 v' J( P: I4 R( i( t Little-known fact: Sentenced to a year in a residential treatment center, Mitnick enrolled in a 12-step program to rid himself of what a judge agreed was his "computer addiction."

0 V/ t* E! ~8 ~0 i

1 A/ I0 L; c) P$ V' t nCurrent status: Kevin Mitnick played himself in 2001’s hacker documentary Freedom Downtime. He also appeared on ABC’s Alias as a CIA computer whiz; to play the role, Mitnick was only allowed to use prop computers. ; U" u l2 T: A, \* l9 V. P. Z- f

6 u+ E. }/ O% J

Kevin Mitnick

0 E1 A, O1 e& ?; O# r5 I/ w5 C* D $ i( e; M+ R4 y: q1 |! H 6 O' B8 q# J4 E8 U- d2 ?

柄: Condor

) b, | \% }2 f2 w Y' s% O# ^

! E* ~8 Y: t1 L8 b7 i 要求达到名誉: 第一个黑客在美国联邦调查局“大多数想要”告示上使他的脸不朽。 他的作为重复犯人— 的状态couldn’t长大的teenage黑客赚得的Mitnick — 绰号“Cyberspace的丢失的男孩。”

: q3 Z; {" {5 |$ g4 `5 d+ H' M

: q9 \# Y- E, G5 K首先遇到计算机: 作为teenager。 Mitnick couldn’t担负得起计算机,因此他在无线电小室商店挂起。 他使用store’s演示模型和调制解调器来拨打其它计算机。

# L+ ]2 j# X- F! W w

. P; q6 m. D5 J) n$ M 不寻常的工具: 在三年期间他在潜逃中,作为信息下跌的Mitnick被使用的因特网继电器聊天(IRC)和与他的朋友通信。

) M0 u. z: a3 S3 ]% T7 m6 o/ M9 T

( |( S- k" @6 B. A鲜为人知的事实: 被判决住宅的处理中心中的一年,在中成为成员的Mitnick 12-步骤程序摆脱他自己审判员所同意的是他的“计算机沉溺。”

, V! Z5 I% h! P2 @3 a) H0 | B; Z

" |: @+ U# [0 R. |1 M" Q2 f- A* g 当前的状态: Kevin Mitnick在2001’s黑客文件的自由Downtime中播放他自己。 他也在ABC’s别名上作为中央情报局计算机嗽嗽声出现; 为了起作用,Mitnick仅仅被允许使用支柱计算机。* n3 ^% n0 s" |; z+ A) S- Z* f

全球最著名的16位黑客列传.jpg (13.49 KB, 下载次数: 189)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:47
以下是引用韩冰在2004-10-3 23:09:35的发言:( G3 J3 Q6 H0 g9 g. L- q 全球最著名的16位黑客列传
1 e- V- o% R" H4 S) M" `0 O0 j6 s( }+ g2 Y5 y3 v 0 k: `) I- y* U, h$ O! o( ^

[attach]511[/attach]% ?7 h( \. N2 y' P

% ?$ E; D- c g

Kevin Poulsen

4 X3 z; d& u6 k2 D3 J 2 F" Y! W% L! U6 |9 c0 r " Z/ g. N4 |: T$ o6 W

Handle: Dark Dante

! y# Y, u. I2 R* O

& G4 d# B, R5 w | Claim to fame: In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM, assuring that he would be the 102nd caller. Poulsen won a Porsche 944 S2 for his efforts.

: I# @8 w6 \2 l0 |) S$ n6 t

+ l f, h! o+ \3 j, t& BFirst encountered a computer: When his parents bought him a TRS-80 (better known as a "Trash-80").

8 V7 h5 H& k; H

! b& M' I! V1 c8 `$ ~ Unusual tools: A set of locksmith tools he used to break into phone company trailers. He was caught after a friend commemorated the break-ins with snapshots of Poulsen picking locks.

6 W( v, ?* c9 ^8 k5 |

2 a/ ]! ]1 J8 K1 j8 l E- YLittle-known fact: Admitted breaking into computers to get the names of undercover businesses operated by the FBI.

. i" w; d' v/ C6 C; V9 w

1 i0 F- L* j: j$ E) \+ G Current status: Thanks to an episode of Unsolved Mysteries, Kevin Poulsen was arrested and spent three years in prison. He was then forbidden to touch a computer for another three years. Poulsen is now a self-proclaimed "reformed and penitent" journalist, and serves as editorial director for Security Focus. 0 T5 T- h0 w9 Z( v0 z: q7 g

+ F$ `3 @6 x9 |$ r

Kevin Poulsen

1 S' {5 H8 F, U1 H9 X9 }# O0 h5 o& E1 o) P9 I5 s ! ^, Z5 r% h3 |3 g: e: D$ a" L

柄: 黑暗的Dante

! }! `4 l& D* d, f- Z# q" Z- F

2 Z6 h$ p) ` C- I) S$ _( I要求达到名誉: 在1990年Poulsen中接管所有电话线进入洛杉矶区域无线电站KIIS-FM,保证他将是第102个呼叫者。 Poulsen为了他的努力赢得Porsche 944 S2。

9 |' i* x! r; ^

% N4 ?9 y* D( {: I: _首先遇到计算机: 当他的父母给他购买时TRS-80(好被认为是“Trash-80")。

! @; s; @1 s% n- B' e4 B

; O, f: Z2 u( V3 k7 E0 p 不寻常的工具: 一套locksmith工具他经常闯进电话公司trailers。 在朋友用Poulsen选择锁的快照纪念之后,他被抓住。

" }8 Z" s' K y" B" x; B

@, a0 v7 S- F鲜为人知的事实: 承认闯进计算机被美国联邦调查局操作秘密的商业的名称。

9 Q( u6 v* `1 O

1 x% k# Q: f9 J8 |0 I) w5 V当前的状态: 由于未解释的神秘的事件,Kevin Poulsen在监狱被拘捕并且度过三年。 他然后被禁止有另一个三年触到计算机。 Poulsen自宣告“改革和悔罪者”新闻工作者,并且作为安全焦点的编辑的指导者。 2 ~8 Q- o* Z2 T2 |5 x

全球最著名的16位黑客列传.jpg (12.32 KB, 下载次数: 180)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:48
以下是引用韩冰在2004-10-3 23:09:35的发言:; I: S/ @( ]# k% a$ \/ M 全球最著名的16位黑客列传
U, i# I% V% m# y/ E 9 B: v0 R$ P5 O* l k6 w , T/ V* G* w& [1 q' y

[attach]512[/attach]* |, o7 s# o/ b3 d Johan Helsingius

; u9 \' E1 i( }; ~0 A3 `$ X8 L2 H9 L4 G0 `) r 6 ^' d9 y4 H. ~9 Z& I

Handle: Julf

# T1 j2 n* W; N( e$ D& I# _7 b

6 }3 @! ] [- h" M4 I/ BClaim to fame: Operated the world’s most popular anonymous remailer, called penet.fi, until he closed up shop in September 1996. Helsingius’ troubles started when he was raided in 1995 by the Finnish police after the Church of Scientology complained that a penet.fi customer was posting the "church’s" secrets on the Net. Helsingius mothballed the remailer after a Finnish court ruled he must reveal the customer’s real e-mail address.

4 i2 Z! Y( D6 y$ ]2 U

: L F, ]4 n K0 h, _/ Q Unusual tools: Ran the world’s busiest remailer on a run-of-the mill 486 with a 200-megabyte harddrive.

& W8 f' D& L1 h8 N3 ]5 R

8 b: ?: _" k9 }3 z Little-known fact: Never felt the need himself to post anonymously.

5 Y/ e+ n7 O, i: Y2 E

1 p9 U; K+ o' Y: U2 L Current status: Johan Helsingius lends his cyber knowledge to communication companies worldwide. + B% x* _$ O- [: H& YJohan的Helsingius

# f% ?! k X! T7 h 7 X& V: _) P8 F ?( z6 r 1 S* b; ]: m' i3 c

柄: Julf

2 { _9 [2 o* X+ d/ P* @

$ a1 B% D5 r. A4 O& I/ E0 @) n要求达到名誉: world’s最流行的匿名再邮件被操作,称为直到他penet.fi,在1996年九月关闭商店。 Helsingius’ 麻烦开始当他在1995年被芬兰的警察袭击时在Scientology的教堂抱怨之后在网上penet.fi客户邮寄"church’s"秘密。 Helsingius mothballed再邮件在一个芬兰的庭院管辖之后他必须揭示customer’s真正的电子邮件地址。

7 y3 h" @; ?0 c( I' L4 V8 K9 ]' q6 }

9 |4 N( F2 S- ]; p0 `' A1 K不寻常的工具: 运行工厂上的world’s最忙再邮件486 200-megabyte harddrive。

: H8 [2 v' \5 P+ V3 e

' p* T% B" ?# f# z6 r鲜为人知的事实: 从不感到需要匿名地邮寄他自己。

( f' ?3 v- H3 ~7 [5 r% Y, T

* W; {2 [7 X, y) Y, D当前的状态: Johan的Helsingius把他的cyber知识借给世界范围的通信公司。 d( |1 h1 C+ { d

全球最著名的16位黑客列传.jpg (12.33 KB, 下载次数: 234)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:49

Vladimir Levin

& o( t1 G! g; _. C% w4 F

Handle: Unknown

% J. s2 j1 `0 I E) t+ l/ g5 B

+ V! p5 s n7 L9 f5 P' dClaim to fame: A graduate of St. Petersburg Tekhnologichesky University, this mathematician allegedly masterminded the Russian hacker gang that tricked Citibank’s computers into spitting out $10 million. Arrested by Interpol at Heathrow Airport in 1995.

% n! J7 p" w9 `6 _- c- c3 f+ n

, z# a8 _/ o* e. H4 {6 K First encountered a computer: Unknown. Accused of using his office computer at AO Saturn, a St. Petersburg, Russia, computer firm, to break into Citibank.

6 t% f1 e: E: A. x( e" ?

% P( x: C" w7 r2 L8 H Unusual tools: Along with a computer, computer games and disks, Russian police confiscated a camcorder, music speakers and a TV set from Levin’s apartment.

6 q2 {; l* b" m! Q3 m0 o4 ?

% J! z3 z+ {- n. b+ K# J' ]! V5 yLittle-known fact: Levin claimed that one of the lawyers assigned to defend him was actually an FBI agent.

# m6 d- P* ?/ {

4 t- K- Y- j( ?' d2 @Current status: Vladimir Levin fought extradition to the United States for two years, but eventually lost his case. He was sentenced to three years in prison and ordered to pay Citibank $240,015 (his share from the heist). Citibank has since begun using the Dynamic Encryption Card, a security system so tight that no other financial institution in the world has it. 9 m' C2 i/ U6 }6 a2 }( y

. x; x w8 I# z

Vladimir Levin

7 z% O, m _: @! t' L# u% D

柄: 未知

9 k/ v: z( T8 G2 c" `* g

1 H. Z' z+ ^& ` ^9 j6 H% J 要求达到名誉: 圣的毕业生彼得堡Tekhnologichesky大学,这位数学家断然策划诡计进入喷吐的Citibank’s计算机的俄罗斯黑客帮$10百万个。 被在在1995年的Heathrow机场的Interpol拘捕。

* a& z* t$ T! [5 U$ @7 `

0 Q2 M% N: ~+ }4 X, l1 a0 j首先遇到计算机: 未知。 由于在AO农神,圣彼得堡,俄国,计算机商行使用他的办公室计算机闯进Citibank被控告,。

0 t& R. [ _5 Y5 a6 O

8 Q- e# U3 l& k* A: ], r3 m3 i 不寻常的工具: 与计算机,计算机游戏和盘一同,俄罗斯的警察从Levin’s公寓没收摄像录象机,音乐演说者和电视机。

0 V) H0 }0 S( z1 B

4 q, |' u% v6 ?9 |1 |6 v; W鲜为人知的事实: Levin要求那一个被分配到的律师保卫他实际上是美国联邦调查局代理。

, p( ]8 Q. [0 k1 r# T. q6 v: m U

/ m* z, k8 a4 j. B1 A当前的状态: Vladimir Levin抗击美国的extradition有两年,但是终于失去他的情况。 他按监狱和秩序被判决三年支付Citibank$240,015(他的从heist的部分)。 Citibank自从以来有使用动态的Encryption卡片开始,那样严紧的安全系统,以至于其它金融的机构在世界上有它没有。 3 B( K% j( E' T& a

[attach]513[/attach] ! F% ?2 h; }4 @, B ]- x$ r0 V. V8 \, e1 x6 U! O4 x
[此贴子已经被作者于2004-10-3 23:52:49编辑过]

.jpg (12.18 KB, 下载次数: 234)

.jpg


作者: 韩冰    时间: 2004-10-3 23:54
以下是引用韩冰在2004-10-3 23:09:35的发言:. Q0 D* Z5 U" z. D 全球最著名的16位黑客列传
; ]1 a- h1 Y9 \, z- B: O/ W8 X4 [ 2 A3 Z4 I0 m& [4 A4 E! _ : X: }8 K" e# \$ M+ L+ t

[attach]514[/attach]+ |5 `' T4 c' @# ] Steve Wozniak

) E' d% _6 _+ J 8 v% S: b5 ?, ^) {) n* Z" f- b4 L : r" S4 M( O( p c+ T) w; ^1 C

Why Woz? Because he exemplifies the young hacker’s dream. Just out of college, the two Steves (Wozniak and Jobs) set to work designing computer games (for Atari) and building blue boxes (for themselves). Woz builds the Apple I. It has no keyboard, no case, no sound or graphics, but it is a thing of beauty nonetheless. The boys shake hands on April Fools’ Day 1976, and Apple Computer is born. The pride of the Homebrew Computer Club, Wozniak trades in his HP programmable calculator and Jobs sells his VW van to finance production from a Palo Alto garage.

2 W+ R/ o, l# \, [

Current status: Steve Wozniak continues to do work for Apple. You can learn more about him on his website, http , G j3 c* Y" G/ A9 L9 }. |Steve Wozniak

|6 L7 ?6 `1 {# x8 K% G/ E * k$ Z% Y) E& E' c4 F3 u( `: ?. R7 A' D$ ^9 t( l4 k9 S1 F

为什么Woz? 因为他以例说明年轻hacker’s梦想。 恰好从学院中,两Steves(Wozniak和工作)设置工作设计计算机游戏(对于Atari)和建设蓝的盒子(对于他们自己)。 Woz建立苹果I。 它没有键盘,没有情况,没有声音或者图表,但是然而它是美丽的事情。 男孩摇动传给1976四月Fools’ 天,而苹果计算机出生。 Homebrew计算机俱乐部的骄傲,他的惠普可编程的计算器和工作的Wozniak贸易出售他的VW货车提供资金给用Palo Alto车库生产。

' B! i" N# G1 T4 x8 Q. l

当前的状态: Steve Wozniak继续确实为了苹果工作。 你能在他的网站上得知更多的他,http - N0 }7 I9 n$ {5 f

全球最著名的16位黑客列传.jpg (13.96 KB, 下载次数: 222)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:56
以下是引用韩冰在2004-10-3 23:09:35的发言:; O* @! W/ C4 `# a* s2 q) J 全球最著名的16位黑客列传
8 \1 G( g, @# z# { e3 H- L. ~ # }3 k# i! `- n8 P 1 N- r) ?- q! l3 E

[attach]515[/attach] + H V( R; ]8 Z9 I4 ]2 nTsutomu Shimomura

$ O( \ a; v- W b+ G6 n + Z; q( z" Z& U ; U+ K* X5 m: {

To state the obvious: Shimomura outhacked and outsmarted Kevin Mitnick, the nation’s most infamous cracker/phreaker, in early 1994. After colleagues at the San Diego Supercomputing Center informed Shimomura that someone had stolen hundreds of software programs and files from his work station, the computer security expert worked on a tip to track the thief through the WELL. A labyrinthine telco trail eventually led to an apartment complex in Raleigh, N.C., where FBI agents apprehended Mitnick. (They’ve had less luck tracking down Mitnick’s alleged Israeli accomplice.) But that’s not all: A consultant to the FBI, Air Force and National Security Agency, Shimomura is rumored to have engaged in darkside dabblings himself. As Jon Littman notes, "I’ve always wondered why he wrote that program to eavesdrop on cell phone calls. Somehow it doesn’t sound like an NSA contract."

* I( P* E8 ^; e5 S4 J+ c: m

Current status: Tsutomu Shimomura co-wrote Takedown, an account of how he trapped hacker Kevin Mitnick. He still works for San Diego Supercomputer as a research fellow.3 o5 s7 ?+ y( D& M

: b5 P- k2 W) H! E1 O4 @! F# r

Tsutomu Shimomura

5 P9 _% e& H1 k3 ]; M" u / g' _3 }4 v. V, b1 b # B L+ Q+ i& _4 A& b/ t

为了说明明显: 早1994年的Shimomura outhacked和outsmarted Kevin Mitnick,nation’s最声名狼籍的饼干/phreaker,。 在在圣地亚哥Supercomputing的同事之后集中有人从他的工作车站曾经偷窃成千的软件程序和文件的被通知的Shimomura,计算机安全专家通过井从事于轨道的尖端盗贼。 一个错综复杂的telco形迹终于导致在Raleigh,N.C.,中复杂的公寓在何处美国联邦调查局代理被领会理解的Mitnick。 (They’ve 如果Mitnick’s被宣称的以色列人从犯跟踪的更少运气。) 但是that’s并非所有: 美国联邦调查局,空军和国家安全机构的顾问,Shimomura是的有从事于darkside他自己的传闻dabblings。 作为Jon Littman的笔记,"I’ve总想知道为什么他写在元件电话上窃听的程序。 以某种方式它健全的doesn’t像NSA合同一样。”

A! d9 C+ }2 b4 P R1 e1 {2 ~5 o: Z

当前的状态: Takedown,如何他俘获黑客Kevin Mitnick的原由。 他仍然作为研究人为了圣地亚哥Supercomputer工作。 , |: h% E$ ]+ z8 A/ U+ k

全球最著名的16位黑客列传.jpg (7.86 KB, 下载次数: 243)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:58
以下是引用韩冰在2004-10-3 23:09:35的发言:9 Q' j5 q6 {! e" p6 o- d% F! z* S 全球最著名的16位黑客列传
. c* K2 U- B- |4 p# V( Q/ H : v$ f" t7 k I0 A5 F8 ?- i 0 I! g6 d- d$ z9 f8 L

[attach]516[/attach]7 `$ v* d! @8 W$ Y- Z Linus Torvalds

+ `- v6 t0 J" o 2 N. _( ~. x2 F) P9 i4 \+ C 0 K/ h* o; {, |* i! V

A true hacker in the classic sense, Linus Torvalds was a computer science student at the University of Helsinki when he wrote the operating system Linux (a contraction of "Linus’ Minix") in 1991. The software has proven to be tremendously popular worldwide — and best of all it’s FREE! Torvalds modestly attributes much of Linux’s success to the Net and to Richard Stallman’s GNU: Both have facilitated development of his original kernel by fostering collaboration among software programmers and developers.

, A. R8 u. P/ a$ b7 Y+ h$ }6 R

Current status: Linus Torvalds — one of the most genuinely respected hackers in history — now works for Transmeta, a company that develops software-based microprocessors. He’s married with two daughters.2 M% ?1 D! Z2 i

0 V s' A# A7 P: Y5 b4 y

Linus Torvalds

3 L. v+ `9 I4 [/ w) t7 m, Z: D i" Y, F: F9 i: v & T) n+ P, m+ c% n4 j

第一流的感觉的一个真实的黑客,当他在1991年写操作系统Linux("Linus’ 予以Minix"的收缩)时,Linus Torvalds是在赫尔辛基的大学的计算机科学学生。 软件有proven是极为流行的世界范围— 和首先自由的it’s! Torvalds适度地归因于网的许多的Linux’s成功和对于Richard Stallman’s GNU: 他们两个都已通过培养在软件程序员和开发者中间的合作有利于开发他原来核心。

8 o! f$ `( k$ ^- P

当前的状态: Linus Torvalds — 一最真正历史— 的尊重的黑客现在为了Transmeta工作,开发软件为基础的微处理机的公司。 He’s 与两个女儿结婚。' h4 L* p( |. L4 w7 r& o" w

全球最著名的16位黑客列传.jpg (13.27 KB, 下载次数: 228)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-3 23:59
以下是引用韩冰在2004-10-3 23:09:35的发言:9 Z2 j3 q! i( M7 V4 \3 i/ g 全球最著名的16位黑客列传
. |1 c2 ?4 N( F. {: V0 v) G5 t' d0 b7 a, w/ t% c1 V6 ` / e2 n/ J& ]: x8 Y/ H

[attach]517[/attach] , x6 }7 q3 O1 k' `0 b' z) CEric Steven Raymond

1 q, F! X2 f) T/ l \; [ 3 z" ` D7 Q6 W* Q" ^ 0 X. H. h6 t; r! r4 a8 M4 U0 F7 ^

Eric Steven Raymond is the granddaddy of today’s hackers, a man who revels in living the life in all its geeky glory. According to him, "The world is full of fascinating problems waiting to be solved."

/ Y1 Y5 {2 ^# k$ P. {1 o7 K

Annoyed by the fact that most people misuse the term "hacker," he wrote The Hacker’s Dictionary and How to Be a Hacker. (Raymond says the basic difference is that "hackers build things, crackers break them.")

; X' o& U: E" D+ v0 v- I7 e/ x% Q

9 ^1 u) K, W8 F0 O3 O3 D Not only is he respected for his astounding skills as a programmer, but Raymond is also valued as a fierce defender of the Open Source Movement, which is based on the premise that programmers should be able to read and modify all software source codes. In this IT paradise, programmers would be able to improve software and fix any potentially lethal bugs. Steve Wozniak would be a god. Bill Gates would be the serpent.

0 ?$ l$ p3 I0 c) q8 P

) I/ }5 ~% }- I( PIn addition to programming, Raymond is also a fan of libertarianism, neo-paganism and the right to bear arms., k3 \. y: J/ \( T7 y

- f: l6 V% {, ^8 `/ g

Eric Steven Raymond

7 t6 V0 Z% I9 p7 a. d7 Q+ j* v & P8 }8 m; l5 D) v + M6 U" O1 }+ p; q! A& q5 z

Eric Steven Raymond是today’s黑客的granddaddy,喜欢在所有其geeky光荣中生活的人生活。 根据他,“世界充满着魔的问题等待解决。”

( @1 W y y8 V# U) T

对大多数人们误用期间“黑客,”的事实感到恼火他写Hacker’s词典和如何是黑客。 (Raymond说基本区别是那“黑客建立事情,饼干打破them.")

/ O9 c8 t6 A& p

' t- x# O- x7 r! Z5 V, O( F不仅是他尊重以便作为程序员使技巧他震惊,但是Raymond作为打开的来源运动的一个凶猛的防御者是也宝贵的,这基于前提程序员应该能够读取并且修改所有软件来源代码。 在这个IT天堂中,程序员将能够改进软件并且固定任何潜在地致死的错误。 Steve Wozniak将是上帝。 帐单门将是serpent。

7 z6 d- T6 l# H% M7 _

" E0 Z2 j2 U) v+ C; a除编写程序之外,Raymond也是libertarianism,neo-paganism和权力的迷携带武器。1 T3 D. J% H7 N3 C! C& M8 J3 g# a* I

全球最著名的16位黑客列传.jpg (9.91 KB, 下载次数: 230)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-4 00:01
以下是引用韩冰在2004-10-3 23:09:35的发言:' f2 I. K; Q/ u 全球最著名的16位黑客列传
. J5 N* A3 E( M0 F4 p# _/ @! v2 J+ f7 t6 S+ _" v% [4 f% z / A* b/ W# y V/ [( J9 y

[attach]518[/attach] . s+ _* H( r9 ?1 V# ~2 z$ P. mIan Murphy

7 O e3 S! e) D 6 {' v$ \6 i# D% X0 U" N( [6 G " Y% A4 c/ `/ o0 J6 Y

The year was 1981. The Reagan administration was in its infancy. "Elvira" was setting the Billboard charts on fire. And a young hacker was about to become the first person ever arrested for a computer crime.

# P1 Y9 {% z+ |1 E# u! J

Eighteen months earlier, Ian Murphy (a.k.a. "Captain Zap") along with three cohorts, hacked into AT&T’s computers and changed their internal clocks. People suddenly received late-night discounts in the afternoon, while others who waited until midnight to use the phone were greeted with hefty bills. For his part in the crime, Murphy was greeted with 1,000 hours of community service and 2 1/2 years probation (considerably less than what fellow hackers would receive today). He also became the inspiration for the movie Sneakers.

' e& q5 Q# y5 s! T

0 M3 M: ?2 Z; Q8 T4 N Today Murphy, like other hackers, runs his own security company — IAM Secure Data Systems, Inc. For $5,000 a day plus expenses, Murphy has dressed up as a phone-company employee and cracked a bank’s security system, aided a murder investigation, and conducted studies in airline terrorism. But Murphy’s great love is still hacking into company security systems — with their permission — and helping them guard against potential break-ins. t g9 K* ?# z0 e* ^( C2 c

- S! E6 _% K, F' O3 ]

Ian Murphy

3 {( L$ ]! {1 y$ c; a# r( J; S9 F5 @; i. P1 n8 j % Y$ _; |0 {4 }8 Z

一年是1981。 年龄的管理在其幼年。 “Elvira”放置着火的Billboard图表。 同时,一个年轻黑客将要成为曾经为了计算机犯罪拘捕的第一个人。

* Q: I5 t. P) S

十八个月更早,Ian Murphy(a.k.a。 “上尉Zap")与三cohorts一同,砍并且改变他们的内部的钟AT&T’s计算机。 人们在下午突然地收到晚夜晚折扣,当时一直等到午夜使用电话的其他人与hefty帐单被问候。 对于他的罪行中的部分,Murphy以1,000个小时的社区服务和2 1/2年检验(相当少于今天将接待什么人黑客)被问候。 他也成为电影Sneakers的灵感。

4 \- j0 C5 u W% }

4 L/ }1 I; Z b2 ~ r 今天Murphy,像其它黑客一样,为了$5,000运行他安全的自己安全公司— IAM数据系统公司,Murphy加上花费的一天已穿着,bank’s安全系统帮助谋杀调查当实施研究航线恐怖活动的电话公司雇员和裂缝,并且。 但是Murphy’s巨大爱仍然是进入公司安全系统— 的黑客入侵他们的允许— 和帮助他们警戒以免受到潜力。 * J3 X# c/ [; G- z/ N

全球最著名的16位黑客列传.jpg (19.92 KB, 下载次数: 191)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-4 00:02
以下是引用韩冰在2004-10-3 23:09:35的发言:/ A: H) j+ _9 v- b$ [. c 全球最著名的16位黑客列传
5 {$ Y' S$ j. ^; [ 8 l6 T9 ]) C9 w0 S+ ~$ B5 ]3 L1 J/ ^ - x+ X% D4 d! Y0 p# S0 k: o

[attach]519[/attach] $ ]0 @; {, C$ NJohn Perry Barlow

/ g8 E. b2 [, q# R g, d& s, F9 Y1 K0 X# M" j E2 i3 [) \" [& D* L5 N! _

John Perry Barlow is a study in contrasts. The man with the WASP-ish name was actually born in Wyoming and educated in a one-room schoolhouse. He was a cattle rancher before he dropped out and became a songwriter for an up-and-coming band called the Grateful Dead. He applied the term "cyberspace" to today’s media, and co-founded the Electronic Frontier Foundation, a nonprofit organization devoted to preserving freedom of speech on the Internet. Barlow is a tough guy to pin down. And that might make him one of the greatest hackers of all.

$ T+ d; a+ \1 G# o; u$ b( F

Though Barlow’s Apple PowerBook is hidden beneath Grateful Dead stickers and dancing bears, he’s still quite grounded in the 21st century. This self-described "techno-hippie" now spends his days fighting the "evil conglomerate," which includes Microsoft, AOL and even the Motion Picture Association of America, while pushing his agenda to preserve freedom of expression in cyberspace. Barlow’s greatest hope is that "we will create a civilization in the mind of cyberspace. May it be more humane and fair than your governments have created." In addition, he believes that "there is something inherently liberating about getting on the Internet. There has been demonstrated a cultural infection in Internet use that is more powerful than the infections that others bring to it. And I place a great deal of faith in what’s going to happen in society when more people are online and fewer people are watching television." & b' s! R) E/ g" I5 V1 W

' |2 \% N3 b6 O; ^7 x

约翰Perry Barlow

( o& b3 Y' z" F' I7 z" O# `' O " y6 k6 v* m/ Y# |( H8 B& y2 Y/ R) Z1 x1 ^7 e

相比之下,约翰Perry Barlow是研究。 黄蜂ish名称的人实际上出生在怀俄明和在中教育一房间schoolhouse。 他是牛农牧场在他落下并且成为songwriter,因为带称为之前和来感激死亡。 他把期间“cyberspace”运用于today’s媒介并且co-建立,电子的边疆基础,忠实的一个非营利的组织将言论自由保存在因特网上。 Barlow坚韧家伙别。 同时,那一点可以使他成为一所有人的最伟大黑客。

|" ]/ L+ g4 I

尽管Barlow’s苹果PowerBook仍然基于二十一世纪在感激的死亡stickers下面十分被掩藏和跳熊,he’s。 自描述“techno-hippie”这现在花费他的天抗击包括美国的微软,AOL和甚至运动图画联系的“邪恶聚结,”,当推他的议事日程保存cyberspace中的表达的自由时。 Barlow’s 巨大希望是那“我们将在cyberspace的头脑中创建文明。 你的政府已创建可以是更仁慈和博览会。” 此外,他相信那“有某样东西固定地解放上车因特网。 在那里被显示在比其他人带来的传染是更强大的因特网使用中文化的传染它。 同时,当更多人们联机时我将大量的信心放置在中在社会中what’s去发生和少人们看电视。” . G- ]2 _; m0 e* t. `9 t

全球最著名的16位黑客列传.jpg (15.83 KB, 下载次数: 190)

全球最著名的16位黑客列传

全球最著名的16位黑客列传


作者: 韩冰    时间: 2004-10-4 00:05

由于本人英语水平有限,所以用的翻译软件为大家翻译。

出现的微小差错,请大家见谅!






欢迎光临 数学建模社区-数学中国 (http://www.madio.net/) Powered by Discuz! X2.5