_____LEARN TO THE BEST INDONESIA_____
Check Page Rank of any web site pages instantly: |
This free page rank checking tool is powered by Page Rank Checker service |
After a long time not to post related to Hacking. For this time I will try to review some of the names of the legendary hacker who ever lived on this Earth. My goal this post so I can be a motivator for other friends in the work ..
Here's the story of Kevin Mitnick Hacker Legendari
A knock sounded from the door of his apartment, Kevin Mitnick opened the door and
found dozens of FBI agents and other law enforcement was prepared to
catch. This is the end of the journey of a hacker who had to run for
escape imprisonment. Hackers during that buronannya been
legendary status, and even has grown into a myth that more
greater than himself
The arrest happened in 1995 that marked the beginning of the detention cases
The most controversial of a cyber criminals. Mitnick is a
intruders in computer systems incarnated as America's Most Wanted Hacker.
Computer Addiction
Mitnick is easy to learn computer by hanging out at RadioShack store or
diperpustakaan general, his family was not wealthy enough to own their own computers.
Fondness for developing computer until he reaches maturity.
In the period of the 1990s, Mitnick's easy to get out into the computer system. But in
the late 1980s he actually wanted to leave hobynya and started looking
legitimate jobs. Unfortunately, before he could do that, in 1987 he was captured
because the company penetrate the Santa Cruz Organization, a software company
is primarily the field of the Unix operating system. When the lawyer mitnik
managed to reduce the alleged crime becomes less good action, Mitnick was
rewards only in 3 years' probation.
Not until a year back tripped Mitnick case law. It's a garanya
friends computer he uses to break into other computers reported
Mitnick was the first time the authorities who burglarized Mitnick is owned Digital Equipment
Corporation. Every time the computer break mitnik done is to take
code, the software's author. Code was then he learned to sungguhsungguh,
sometimes found several weaknesses in it. In a
Mitnick admitted only chance to take the code from the software authors who
she likes or that interested him.
Mitnick in DEC cases of prisoners who get heavier. When it
Mitnick has called his lawyer, 'addicted to the computer that can not be
stopped '. He was rewarded 1-year sentence in prison Mitnick got a bad experience. At that time the legend of Kevin
Mitnick or better known under the pseudonym 'the condor', has increasingly
enlarged. His reputation as a
Computer criminals are also increasingly rising beyond reality. Warden at Lompoc,
Mitnick was the prison where, thought Mitnick could infiltrate into the computer
armed only with voice and telephone. Result
Mitnick is not only not use the phone, he also spent time
months and months of isolation. No wonder then that he reportedly suffered
some mental disorders when serving his sentence at Lompoc.
In 1989 Mitnick was released from prison. He tried to find formal employment,
but its status as an ex-con makes Mitnick is hard to keep
job. Eventually he worked as a
miners of information for the office of private investigator's office. Surely this is dragging
Mitnick returns to the world of gray and black. In the early 1990s,
Mitnickpun sought by the FBI. This time the fear of isolation in space during bertahuntahun,
Mitnick decides to run away.
Hacking The Human Side
Mitnick skills as a hacker is not limited to purely technical Traffic. He
is the purely technical skills. He is a true understanding
that the security of computer systems consisting of aspects of organizational policies, resources
people, processes involved and the technology used. If he seoarang
main kemapuannya superheroes seoarang Mitnick is the practice of science
aka engginering social social engineering. This is a technique to get information
important, such as passwords, by exploiting human weakness.
Mitnick's ability is best illustrated in the following story, a story
Mitnick told myself on a forum online Slasdot.org
"On one occasion, I was challenged by a friend to get a number
(phone) Sprint Foncard it. He said he would buy dinner if I
can get that number. I will not refuse to eat good, so I berusahan
by contacting Customer Service and perpura act as one of the
information technology. I asked the officer who answered whether he had
difficulties in the system used. He said no, I ask that the system
used to access customer data, I pretended to verify. He
the name of the system. "
"After that I returned call Costumer Service and associated with officers
different. I said that my computer is broken and I want to see data
a customer. He said the data was berjibun questions. What is your name?
You work for who? Your address, where? Well, like that. Because I am less
research, I made up names and places. Failed. He said he would report the phone
this phone on security. "
"Because I noted his name, I brought a friend and tell sorang
about the situation. I asked a friend to masquerade as' investigator
keamaman 'to note the report from the Customer Service officer and talk to
officials said. As 'investigators' he says received reports of people
trying to get customer personal information. When asked questions about the phone
said, 'investigator menyakan what callers requested information earlier. The officer said
Foncard number. 'investigators' to ask, is what number? And officers
give the number. Oops. Case closed "
At Large
As a fugitive Mitnick berusahan best to not get caught. He often
moving home and always took the habit. Various
the way he did so not being tracked by the pursuers. But he could not leave
mengoprek hobby computer and its Internet network. Even some of his expertise
allegedly used to obtain a new identity.
Mitnick legend during the run in less than two years, increasingly become, so he
menjelama as 'Cyber Ninja' who is said to be breaking into Pentagon computers only
with the television remote, a rumor that exceeds any fiction.
Why Mitnick, a fugitive in the case of computer break-ins, can be
most wanted criminals? This could not be separated from the role of mass media. In particular is
a series of sensational articles by John Markoff that was published in the New York Times.
Mitnick Markoff condemn as a terrorist. In a statement after
old was released, Mitnick calls himself the displayed image as a Markoff
seoarang terrorists who tried to control the nuclear world. "I was as if a
Osama bin Mitnic, "he joked.
Mitnick Markoff describes as a lethal, unstoppable
and worthy of being a fugitive from the FBI and ten other law enforcement agencies. Articles
Mafkoff, who sometimes appeared on the front page, make the strongest candidate Mitnick
pilot project on cyber crime. So the future may Mitnick in prison
saati written practically the same.
During a fugitive Mitnick also continued to run the action. He broke into the
large company's computer. Including Sun Microsystems. He uses, and
maksutnya here was broken into a bank account at the online storage service
for storing backups of the action. Actually Mitnick does not work alone
but when caught he never expressed any colleague.
One of the victims was T. Mitnick Shimomura, a computer scientist who in
some writing on the Internet doubtful cleanliness. There are allegations that Shimomura
is also a hacker who often perform illegal acts. One thing that many agreed was the Shimomura have the arrogant attitude and seems to want to appear
as a hero in the story of the hunt Mintick.
Shimomura, Markoff and the FBI hand in hand to catch the fugitive. Guide
from Mafkoff sensational news, Shimomura hacking abilities and strengths
The FBI legal residence eventually track down Mitnick.
As usual story of the capture of fugitive seoarang, Mitnick did ketledoran.
Storage service which he seems to have automated programs to
check the contents of files stored. The owner of the account used Mitnick get
warnings from the system of excess capacity. This is the beginning of the capture
Mitnick.
Mitnick admitted that he was reckless because it did not expect that the FBI, Shimomura,
Markoff, and cellular phone service provider do the same work so closely
and integrated.
"Cellular operators to search in their billing database for dialup
to Internet service Netcom POP. This, as might be expected, making them able to
identify areas of calls and number MIN (mobile identification number) that
I use that time. Since I often change the number, they watched the call
Any data that occurred in these locations. Then, by means of Cellscope 2000 Shimomura,
I track my phone signal to the appropriate location, "Mitnick tells.
Two weeks before the capture of Mitnick recently moved to Raleigh. New location
make less aware and he forgot to track the path of dial-up digunakannnya.
Several hours before the capture of new Mitnick something happened, tracking
and supervision was carried out on the path he used. When he was
trying to track the extent to which surveillance has been undertaken to whom dilbalik
tracking it, he heard a knock on the door. Mitnick opened the door and confronted
with dozens U.S Marshall and the FBI.
Four Half Year Hanged
Mitnick was arrested after being caught with no possibility of bail. He also was presented
to court. Approximately four years he spent without any certainty. This benarbenar
make Mitnick frustrating.
During the FBI in prison he did not get a chance in his case. Even
Mitnick and his attorney could not see the data because there are cases in laptops
and access to laptops for Mitnick considered hazardous. Mitnick accused can make
glide missiles armed with only a laptop or phone. Larangn it remains valid even if
lawyers use a modem and a laptop without any network capabilities. Mitnick eventually blamed for causing damage to hundreds of millions of dollars
losses which, according to Mitnick is not true, because the company that allegedly harmed
not even report losses in their annual reports.
The final agreement for the Mitnick is a guilty plea. Guilty in the case
computer burglary and wiretapping phone lines. Mitnick gave up and followed
that, in return for 4 years in more time in prison counts as
mas prisoners. Total Mitnick was sentenced to 5 years in prison, 4 years in detention
is in limbo and the remaining 1 more year.
He was released in 2000 on condition can not touch a computer or
phone. In 2002 he could only use computers but not the
connected to the Internet. New in 2003 he used the Internet more for the first
time.
Since the release Mitnic trying to improve his life. He wrote two books
about hacking, but that he also founded his own security consulting company.
"Hackers are the only crime whose expertise could be used again for
something unethical. I never saw it the other fields, eg ethical robbery, "
Mitnick said.
Tips N Trik Registry History Hacker