ccabantog

A Man With Bipolar Disorder, A hacker?

A Man With Bipolar Disorder, A hacker?

PERSONAL BACKGROUND NAME: Max Ray Vision (Max Ray Butler) BORN: July 10, 1972 WHERE: Meridian Idaho OCCUPATION: Hacker Biography Max was born and raised in Meridian Idaho. His father was a Vietnam War veteran and a computer store owner while his mother is a Ukrainian immigrant that lived in the US. Early in his childhood […]

Share this:
Adrian “homeless hacker” Lamo

Adrian “homeless hacker” Lamo

PERSONAL BACKGROUND NAME: Adrian Lamo BORN: February 20, 1981 WHERE: Boston, Massachusetts OCCUPATION: Threat Analyst Adrian Lamo is a Columbian-American threat analyst and gay hat hacker.  He started to gain popularity when he broke into high profile company computer networks, like Yahoo, Microsoft and the New York Times, which also led to his arrest in […]

Share this:
Matthew Bevan As A Hacker

Matthew Bevan As A Hacker

PERSONAL BACKGROUND NAME: Matthew Bevan WHERE: Cardiff Wales OCCUPATION: Hacker Mathew Bevan is a British hacker from Cardiff, Wales. In 1996 he was arrested for hacking into secure US government networks under the handle or codename Kuji. At the age of 21, he hacked into US military network systems and gained access to their files such as the Wright Patterson Air Force […]

Share this:
“BIEST MILITARY COMPUTER HACK OF ALL TIME”

“BIEST MILITARY COMPUTER HACK OF ALL TIME”

PERSONAL BACKGROUND NAME: Gary Mckinnon BORN: February 10, 1966 WHERE: Glasgow, Scotland OCCUPATION: Hacker McKinnon was diagnosed with  Asperger’s syndrome or Asperger disorder, is an autism spectrum disorder (ASD) that is characterized by significant difficulties in social interaction, alongside restricted and repetitive patterns of behavior and interests. It differs from other autism spectrum disorders by its relative preservation of linguistic and cognitive […]

Share this:
Onel De Guzman: The Terminator

Onel De Guzman: The Terminator

  What did he do? 1999 – AMA Computer College Makati student Onel de Guzman submitted a thesis proposal for the creation of a computer program that will hack into computer systems and extract vital information, particularly Internet Service accounts. The thesis title is Email Password Sender Trojan.   What did the College do? The […]

Share this:
Richard Stallman: The man who loves the word "free"

Richard Stallman: The man who loves the word “free”

PERSONAL BACKGROUND NAME: Richard Matthew Stallman BORN: March 16,1953 WHERE: New York City OCCUPATION: President of the Free Software Foundation What did he do? As a hacker in MIT’s AI laboratory, Stallman worked on software projects such as TECO, Emacs, and the Lisp machine operating system. He would become an ardent critic of restricted computer […]

Share this:
The man who created computer worm

The man who created computer worm

PERSONAL BACKGROUND NAME: Robert Tapan Morris BORN: November 8,1965 WHERE: United States OCCUPATION: Professor, Massachusetts Institute of Technology, Partner,  Combinator What did he do? l  Back in 1988, while a graduate student at Cornell University, Morris created the first worm and released it on the Internet. He claimed it was all an experiment gone awry, […]

Share this:
Stephen Wozniak: A white hat hacker

Stephen Wozniak: A white hat hacker

PERSONAL BACKGROUND NAME: Stephen Gary Wozniak BORN: August 11,1950 WHERE: San Jose, California OCCUPATION: Entrepreneur, Computer Programmer, Engineer, Inventor, Hacker Steve Wozniak was the main designer on the Apple I and Apple II computers together with Steve Jobs (business brains) and others. The Apple II is noted as the first commercially successful line of personal computers, featuring a […]

Share this:
Tim Berners-Lee, A Hacker?

Tim Berners-Lee, A Hacker?

PERSONAL BACKGROUND NAME: Tim Berners-Lee BORN: June 8, 1955 WHERE: London, England OCCUPATION: Computer Programmer While working with CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them […]

Share this:
David Mitnick: "The Condor"

David Mitnick: “The Condor”

PERSONAL BACKGROUND NAME: Kevin David Mitnick (a.k.a The Condor) BORN: August 6, 1963 WHERE: Los Angeles OCCUPATION: Computer consultant and Author What did he do? At age 12, Mitnick used social engineering  to by pass the punch card system used in the Los Angeles bus system. After a friendly bus driver told him where he could […]

Share this: