Showing posts with label cyber. Show all posts
Showing posts with label cyber. Show all posts

Monday, July 22, 2013

InfoGraph: A brief history of hacking. . .(David Lim, Auckland)

Hackers are Cleaver Programmers who break Computer Security. A Hacker is interested in playing Computer and other tech devices or Electronics Stuff and Stay Updated with Latest Technology. Hacker is like to learn about how computer system will work and he/she interested finding new things in Computer.



This post is sponsored by:

Dr Mobiles Limited (Map)
1, Huron Street, Takapuna, Auckland 0622
Tel: (09) 551-5344, Mob: (021) 264-0000
info(a)drmobiles.co.nz
Facebook - Blogger - Twitter - Tumblr - Google+
 
New Lynn Branch (Map):
3069, Great North Road, New Lynn, 0622
Tel: (09) 5555-344, Mob: (021) 374-007sales(a)drmobiles.co.nz

Dr Mobiles Limited - Wellington (Map)

148, Willis Street, Te Aro, Wellington 6011
Tel: (04) 550-6399, Mob: (021) 265-2000
wgtn(a)drmobiles.co.nz,  FaceBook
Add to Technorati Favorites
Web - Map - Email - Posterous - Twitter - Blogger - Flickr -  Auhtor 
Blog Flux Scramble - Email Encryption and JavaScript Protection Submit Blog  Add to Google 

Sunday, December 25, 2011

World Class Hackers who got caught! (people, cyber, world, crime, www, net, web, crooks)

In the list of today we have very special personalities they were not heroes or champions but they are famous enough for their works such that the whole world wants to know about. They did the most offensive crimes the coolest way just by sitting in front of their Personal Computer. They were the hackers of all time who had the capability to stroll in the United States safest servers and retrieve as much information as they require. The list of top ten starts here;

10. John T. Draper

John Draper Top 10 Hackers who got caught
John T. Draper a United States Air Force trained personnel born in the year 1944, Draper due to his professional abilities and techniques learned became a renowned phone phreak and an iconic body in the world of computer programming, the skill was obtained while working as an engineer for National Semiconductor when he witnessed two blind kids using a modified toy shriek from a cereal box to make free phone calls through the payphone system. Using the mantle Captain Crunch, Draper popularized the use of the shriek and a host of other phreaking methods. Although his crimes are not extravagant, his lasting effect on the computing world is.

9. Kevin Mitnick

Kevin Mitnick Top 10 Hackers who got caught
Kecin Mitnick is the greatest hacker of all time due to his brilliance and luminosity his crimes never popped up in front of Police and FBI, he suffered very less imprisonment not more than six years. He was the only one the FBI even labeled him “the most wanted computer criminal in United States history.”

8. Adrian Lamo

Adrian Lamo Top 10 Hackers who got caught
Adrian Lamo also known as “homeless hacker”, because of the fact he used Internet cafes, libraries, and Kinko’s, to hack during the day, and squatted in deserted buildings at night. It is only his immeasurable skills and achievements who brought him to this fame and respect although at a later stage. Adrian Lamo is now a day’s high-profile public speaker and an award-winning journalist. He used his hacking techniques and expertise to exploit different major companies like Microsoft and The New York Times.

7. Sven Jaschan

Sven Jaschan Top 10 Hackers who got caught
Seventeen years old German Jaschan built two viruses Sasser and Netsky and unleashed them on the Internet. Those two viruses posed heavy damage to Windows exposing the defects and related issues with the best selling operating system. Not only the Microsoft observed heavy and colossal loss but the effect of these was much more dramatic than we could think. It disabled the networks of businesses throughout the world, which even included shutting down airlines and entire satellite systems. Well these related issues have posed a challenge to search for better windows security systems and etc.

6. Dmitri Galushkevich

Dmitri Galushkevich Top 10 Hackers who got caught
In the year 2007, Estonia and Russia sheltered up in a clash over the removal of Soviet era statues. Therefore, when Estonia suffered the worst hacker attack in their history at that same time, it was easy to blame the Russians. The attack overloaded servers throughout the country shutting down all forms of commerce. In the end, the culprit was Galushkevich, a 20-year old ethnic Russian living in Estonia. Some still suggest that Galushkevich was a Russian pawn, but there was never any evidence to support that claim.

5. Robert Tappan Morris

Kevin Poulsen 550x412 Top 10 Hackers who got caught
Robert Morris was the son of previous NSA scientist also famous for the name of Black Hat hacker when he unleashed the first computer worm on the Internet, a well known professor at MIT, United States of America.  To this day, Morris asserts that he built the Morris worm simply to evaluate the size of the Internet. However, it was clear that he had other plans for this excessively replicating worm that brought the Internet to its knees. Damage estimates from the worm’s crash differ greatly, as do the real number of systems and individual computers that were affected. But the numbers applied to Morris are concrete: After some plea bargaining, he was sentenced in December 1990 to three years’ probation and fined $10,000 (about $17,000 in today’s money).

4. Kevin Poulsen

Kevin Poulsen 11 Top 10 Hackers who got caught
Kevin Poulsen also Known as Dark Dante and tagged as the “the Hannibal Lector of computer crime” by law enforcement. Kevin Poulsen made some of the most noticeable hacks in history. The most famous one included winning a Porsche from KIIS-FM radio station by taking over their phone lines, and even shutting down the phone lines of the America’s Most Wanted television program when he was the feature. Among other things, Poulsen reactivated old Yellow Page accompany telephone numbers for an acquaintance that then ran a virtual agency. When the FBI started chasing Poulsen, he went underground as a renegade. When he was featured on NBC’s unanswered Mysteries, the show’s 1-800 telephone lines mysteriously crashed. He was finally arrested in February, 1995.

3. Raphael Gray

Raphael Gray Top 10 Hackers who got caught
Raphael was arrested by the FBI at his home on the 23 March 2000. Police and FBI agents arrived in the morning. It was supposed that he had intruded into nine e-commerce websites in Britain, America, Canada, Thailand and Japan and taken details of some 26,000 credit card numbers and disclosed some of the credit card information on the Internet. Raphael, who was only 18 at the time give details to the police and FBI when he was dialogued that he had been worried for sometime at the intrinsic security weakness in one exacting create of software called “Microsoft Internet Information Server”. This intrinsic flaw enabled distant users to entrĂ©e information stored on computers using this software. Raphael explained he had contacted a number of e-commerce sites using this software and pointed out the security weakness but they had ignored him, and he had also contacted Bill Gates, the Microsoft Chief who again ignored him.

2. Jonathan James

Jonathan James Top 10 Hackers who got caught
Perhaps James’/c0mrade’s greatest claim to fame is that at 16, he became the first juvenile hacker sent to prison. However, his offenses were legitimate and serious. His highest-profile crime occurred when he compromised NASA computers and stole software worth $1.7 million. Another major offense came when he installed backdoor access into the servers of the Defense Threat Reduction Agency, which is responsible for monitoring biological, chemical, conventional, nuclear, and special weapon threats to the U.S.

1. Gary McKinnon

Gary McKinnon Top 10 Hackers who got caught
Gary McKinnon, the Britain blamed of hacking Pentagon and NASA computer networks, faces an increasingly antagonistic weather on cyber security in the US if his exile is approved this week. He trespassed the networks of the U.S. Army, Air Force, Department of Defense, NASA, and Navy. The thing he required was the evidences of aliens and their space shuttle or spacecraft, which he could use to resolve the global energy disaster. McKinnon’s case is still continuing and his lawyers assert that he is worthy of special deliberation because he is bothered with Asperger’s Syndrome.



This post is This post sponsored by:
Dr Mobiles Limited
1 Huron Street, Takapuna, North Shore 0622
Tel: (09) 551-5344 and Mob: (021) 264-0000
Web - Map - Email - Posterous - Twitter - Blogger - Flickr -  Auhtor
Blog Flux Scramble - Email Encryption and JavaScript Protection Submit Blog Add to Technorati Favorites Add to Google Top Personal blogs    

Monday, August 9, 2010

FINALLY... This is the business you have waited for so long (online, easy, fun, cash, money, earning, Auckland, employment)



It is completely free, you earn through EVERYBODY who registers after you, even if you do not sponsor people; you must not sell or buy anything. Guaranteed!

The faster you register, the more can be your potential income, even if you do nothing else than register for free...


A market research company from the USA is searching for internet users all over the world, who get paid for testing websites and giving a short opinion. You also can earn up to 1,000 US$ per month working 1 to 10 hours weekly.

Even if the job as a website tester is not for you, you can earn two passive incomes month after month:

1. Team Provision for all the members that you have sponsored directly or indirectly.

2. Group Provision for all members which have registered in the system after your own registration!

So be fast, this is crucial, while you read these lines, new members register all over the world. There is absolutely no commitment involved with your registration and your data will NEVER be exposed to third parties!

By the way, did we mention that participation will ALWAYS be free of charge?

Why wait? Click here to join free now!

Blog Flux Scramble - Email Encryption and JavaScript Protection
Submit Blog Add to Technorati Favorites Add to Google Top Personal blogs Text-ads on your Blog with BidVertiser.

Saturday, October 24, 2009

Sales of virtual goods boom in US (Gadget, news, report, review)


Americans look set to spend $1bn (£600m) on virtual goods in 2009, claims a report.

The cash will be spent on add-ons for online games, digital gifts and other items that exist only as data.

Total spend on such items is expected to be up by 100% over 2008 and to double again by the end of 2010, said the analysts behind the report.

In related news, Facebook is updating its gift store so it offers a wider variety of virtual presents.

Social games

Written by games analysts Justin Smith and Charles Hudson, the report says that virtual goods are proving ever more popular with gamers and users of social network sites such as Facebook.

Many players of massively multiplayer online games such as World of Warcraft, spend real money on virtual currency to ensure their in-game avatars have the best gear.

Some games in Asia also use the so-called micro-payments model to fund their games in lieu of a monthly subscription fee.

Now, people playing social games such as virtual agriculture simulation Farmville on Facebook are using real cash to purchase game dollars for additions to their farm. Firms such as Zynga, Playdom and Playfish are all growing fast on the back of the rise in social gaming.

The purchase of virtual goods on smartphones, such as Apple's iPhone, are also starting to take off, said the report.

The figures in the report deal only with sales in the US. Introducing the report, the authors said: "While virtual goods have been driving revenues in Asia and Europe for years, 2009 will be remembered as the year virtual goods-based businesses began to scale in the United States."

Facebook has announced an overhaul of its virtual gift shop to expand the range of digital presents members can buy and send to friends, family and colleagues.

As well as virtual birthday cakes and pints of beer, Facebook users can now also send music tracks to each other.

The music service will initially only be available in the US. One Facebook credit (10 US cents/6p) buys one streamed song. Ten credits buys a downloadable MP3.


Sign up for PayPal and start accepting credit card payments instantly.

Friday, April 24, 2009

Nokia 1100 gets highly sought after for its potential criminal use.

One of the most popular handsets in the world - Nokia 1100 has found itself in the middle of a banking fraud scandal, according to a Dutch investigator. Allegedly, criminals are paying an arm and a leg for working second hand units of the once-50-euro handset that are manufactured in Nokia plant in Bochum, Germany.

Investigators are observing huge amounts of money being offered for the outdated handset recently. The largest recorded sum up to now is 25,000 euro (about 32,000 US dollars), which is about 11 times its weight in gold. According to the investigators the criminals are looking to acquire only units that are manufactured in the Bochum plant of the company.

The supposed reason behind this peculiar requirement is that those handset most probably come with flawed software or hardware, which allows them to be hacked and used to make a working copy of someone else's phone line.

When set up this way, the Nokia 1100 receives the same calls and most importantly text messages that the original recipient gets, without them ever suspecting anything.

The loophole that the criminals are allegedly using is that many European banks now send temporary transaction authentication numbers or mTANs as SMS to the account holders as a security feature for authorizing online money transfers.

This is where the supposedly counterfeit-capable Nokia 1100 handsets step in. As they receive the SMS intended for the authorized account holder, criminals can acquire a working mTAN and initiate a transfer after they have stolen the needed online ID credentials in some other way.

At this stage Nokia have refuted those accusations claiming that they have not identified any flaw or wormhole in their phone software that would allow the alleged use cases.

However, the investigations still continue.