Tuesday, December 14, 2010

The world's top hackers figure - Kevin - Mitnick Legend

 People the world's top hackers, Kevin mm - Legend
Mitnick all in black ~ off, Kevin. Mitnick is the most legendary figure. Hollywood and even onto the screen of his. In his 15 years of age When alone a computer and a modem to break into the North American Air Defense Command computer system host. FBI listed him as the most wanted man, and his headache. can be said that m Teneyck is a real young black ~ off the first account.
Kevin. Mitnick was born in 1964 in Los Angeles in the United States west coast. Mitnick only 3 years old, his parents divorced. He followed mother lived, and soon learned to depend on, but the divorced parents of young in soul Mitnick caused a lot of trauma, his introverted, quiet.
Mitnick's mother is not much culture, lack of experience in the education of children, but this did not prevent the development of Mitnick superhuman intelligence. In fact, in the very young, Mitnick to show his computer in the future as the number one killer of the United States should have the talent.
Mitnick child like to play Surprisingly, Mitnick Napoleon soon led out of the encirclement. Two days later, Mitnick step let Napoleon spent only 83 survived the disaster of Waterloo. And a week later, Mitnick reached a level consistent with the experts mm78 step. Subsequently, Mitnick was put into the storage box of Napoleon, and the mother said softly: Mitnick was only 4 years old.
20 century, 70's, 13-year-old Mitnick is still in primary school, in love with the amateur radio activities, contact with radio amateurs around the world when he first a taste of the fun across space. When Mitnick access to a computer just to have learned his life was inextricably linked with the computer. Computer language l knife, an , he prepared the program simple, practical, aesthetic demonstrated that teachers were charmed by the computer. In the computer world, cyberspace's most fascinating to Mitnick. in cyberspace, Mitnick is temporarily out of his aversion to the real life, vent his discontent with the real world.
time, the United States has started to build some community computer network. Mitnick communities where networks and home computers not only companies, universities similarities, but also linked to government departments and, of course. computer. Since then, he goes far beyond the age of patience and perseverance, trying to decipher the senior U.S. military code. Soon, only 15 years old Mitnick broke into the He and some friends looked over the United States and its allies point to the former Soviet Union data of all nuclear warheads, and then quietly slipped out. This is really the history of black ~ Customer .1983 of a classic Hollywood Zengyi This is the blueprint for filming the movie began to run into a very difficult problem, after all, is related to the strategic security throughout North America, this system is very complex password is set, originally designed to track Mitnick decoding process quickly defeated. Mitnick like a challenge, but He through the efforts to upgrade in two months time after the decoding process of tracking him, finally found the North American Air Defense Command's their place into the system. In this way, Mitnick on swimmingly, nuclear missiles name, number and location! are being applauded this idea. In this regard, Mitnick psychologically satisfied. companions found their king told the adults did not believe these kids are telling the truth.
this matter to the U.S. military have become a major scandal, the Pentagon has been silent on this. Later, American military intelligence experts Creighton said: dollar remuneration. The United States spent billions of dollars need to re-deploy. endure almost to tears by the Pacific company had to apologize again and again. the company started thinking that the computer broke down, after repeated testing, found that computer software and hardware are intact, I realized that someone cracked the code, deliberately to cause trouble. when they push One measure is to change the password, but this in front of it is fluff Mitnick.
Fortunately, when the company Mitnick has little interest in the Pacific. He's the FBI had a keen interest in computer networks . One day, Mitnick found that the agents are investigating a Mitnick now trying every means to crack the FBI's dismissive of it, he laughed at the endless search for these agents, and mischievous to the agents responsible for the investigation of several file transfer that will alter all of them became full of criminals.
with the latest type of Web information tracking machine Mitnick unusual talent, a lot of good, does not know the truth of people have asked the court for his leniency. perhaps because of cyber crime is still fresh, few precedents on the law, court obeyed , merely Mitnick locked up in a He has not repented. large company's network,Bailey UGG boots, was issued with the wrong people angry bills, altered beyond recognition a number of important contracts. He even decided to industrial secrets U.S. computer data center mm assembly system to attack the nation.
1988 law enforcement authorities, he was again arrest, the reason is, DEC accused him of stealing from the company network, the software worth $ 1,000,000 and $ 4,000,000 resulted in the loss. This time, he even was not allowed bail. lingering fear of the police authorities believe that as long as he has keyboard will pose a threat to the community. Mitnick was sentenced to one year in prison. After his release, he tried to find a stable job. However, the federal government that he was a threat to society, like the same proven rapist He is under close watch. Each of his employers are interested in computer skills, eventually because of his probation officer's warning and refused his application. This may be a very regrettable thing, even in a certain sense it Mitnick denied the possibility of evil become good.
1993, the very heart of the FBI is not practical or even bought a black ~ off associates, to induce re-operation Mitnick tactic to get him into the re- prison. and in this regard, Mitnick never have to much temptation, he was easily hooked on the illegal invasion of a telephone network. But the number one customer, after all, black ~ extraordinary, and he into the FBI's internal network, found they set the trap, and then ran away before the arrest warrants issued. FBI immediately conducted a nationwide wanted list on Mitnick. the following two years, the FBI not only failed to find traces of Mitnick,cheap UGG boots, Moreover, the report is more so the case with the detective novel means: Mitnick on the run course, try to control a telephone system in California, so he can eavesdrop to track the whereabouts of his detectives.
Christmas Day 1994, Mitnick San Diego Supercomputer Center to launch an attack, Mitnick became famous as a character, later known as Tsutomu Shimomura so very angry, he decided to help the FBI to Mitnick brought to justice. Christmas, he painstakingly, non-stop, and finally in the occasion of Valentine's Day 1995 found Mitnick's whereabouts, and notify the Federal Investigation will arrest him. We can look back at the scene a little, Mitnick successfully invade the U.S. Motorola, the U.S. NOVELL, Finland's Nokia, the U.S. high-tech companies such as computer SUNMICROSYSTEMS and stole all kinds of procedures and data. According to information reported by these companies, FBI estimated the total amount of actual damage to 4 million. declared that pioneer, the first U.S. computer expert Tsutomu Shimomura level of challenge to a trial. He sent down to the village after the advance warning, invaded a computer at home the next village, theft out against the ; or am I smart. The , to the police department. personalized perverse decision immediately to the next village, have to get to the bottom can not be!

No comments:

Post a Comment