SlideShare a Scribd company logo
1 of 12
Top 10 Most Famous
 Hackers of All Time




 Uroš Tasić
Black Hat Hackers vs. White Hat
            Hackers

• “black hats” exploit computer systems. They
  are the ones you've seen on the news being
  hauled away for cybercrimes. Some of them do
  it for fun and curiosity, while others are looking
  for personal gain.

• “white hats” often work as certified "Ethical
  Hackers" hired by companies to test the
  integrity of their systems. Others, operate
  without company permission by bending but
  not breaking laws and in the process have
  created some really cool stuff.
Black Hat Hackers



             Jonathan James
 • First juvenile to be sent to prison for hacking,
   served six months in prison

 • Crimes:
     – Installed a backdoor into a Defense Threat
       Reduction Agency server


     – Cracked into NASA computers, stealing software
       worth approximately $1.7 million
Black Hat Hackers



                Adrian Lamo
 • Sentence: six months of home confinement
   and two years of probation, 65.000$ in
   restitution

 • Crimes:
     – Penetration testing, in which he found flaws in
       security, exploited them and then informed
       companies of their shortcomings (Yahoo!, Bank
       of America)

     – Brake into The New York Times' intranet
Black Hat Hackers



                 Kevin Mitnick

 • Crimes:

     – Breaking into the Digital Equipment Corporation's
       computer network and stealing software

     – Half year "coast-to-coast hacking spree"




 • Sentence: five years in prison
Black Hat Hackers



              Kevin Poulsen
 • Sentence: five years in prison

 • Crimes:

    – KIIS-FM hack was accomplished by taking over
      all of the station's phone lines


    – Hack of federal investigation database and
      federal computers for wiretap information
Black Hat Hackers




           Robert Tappan Morris


 • Sentence: years' probation, 400 hours of community
    service and a fine of $10,500


 • Crime:
     – Creator of the Morris Worm - the first computer
       worm to be unleashed on the Internet
White Hat Hackers



            Stephen Wozniak


 • Achievements:

    – Blue boxes - devices that bypass telephone-
      switching mechanisms to make free long-
      distance calls.

    – The computer as a fully assembled PC board


    Awards: the National Medal of Technology, the
       National Inventors Hall of Fame
White Hat Hackers




               Linus Torvalds



  • The Linux operating system

    Torvalds: "I just want to have fun
    making the best damn operating system
    I can."
White Hat Hackers


              Richard Stallman
  • The GNU Project, which was founded to
    develop a free operating system


     Stallman: "Non-free software keeps users
     divided and helpless, forbidden to share it and
     unable to change it. A free operating system is
     essential for people to be able to use
     computers in freedom."

       Richard Stallman - Free Software Song
       http://www.youtube.com/watch?v=1BH7poMtPVU
White Hat Hackers



          Tsutomu Shimomura



  • Was hacked by Kevin Mitnick and
    made it his cause to help the FBI
    capture him.
Thank you for your attention!!!

More Related Content

What's hot

What's hot (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
History of the_internet
History of the_internetHistory of the_internet
History of the_internet
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Dark wed
Dark wedDark wed
Dark wed
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Deep Web
Deep WebDeep Web
Deep Web
 

Viewers also liked

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Manila Central University
 

Viewers also liked (6)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Similar to Top 10 most famous hackers of all time

Similar to Top 10 most famous hackers of all time (20)

Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Hacking
HackingHacking
Hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

More from PRESENTATIONSFORESL (20)

Filoloska edward de bono 6 hats
Filoloska   edward de bono 6 hatsFiloloska   edward de bono 6 hats
Filoloska edward de bono 6 hats
 
Shoes
ShoesShoes
Shoes
 
Beyonce
BeyonceBeyonce
Beyonce
 
Academy awards 2013
Academy awards 2013Academy awards 2013
Academy awards 2013
 
Japanese mythology
Japanese mythologyJapanese mythology
Japanese mythology
 
Cloud
CloudCloud
Cloud
 
Korean culture
Korean cultureKorean culture
Korean culture
 
History of cosmetics and makeup
History of cosmetics and makeupHistory of cosmetics and makeup
History of cosmetics and makeup
 
Witches
WitchesWitches
Witches
 
Women in musilm society
Women in musilm societyWomen in musilm society
Women in musilm society
 
Pablo picasso
Pablo picassoPablo picasso
Pablo picasso
 
Shoes03
Shoes03Shoes03
Shoes03
 
Beowulf
BeowulfBeowulf
Beowulf
 
Sport in serbia
Sport in serbiaSport in serbia
Sport in serbia
 
The mistery of bermuda triangle
The mistery of bermuda triangleThe mistery of bermuda triangle
The mistery of bermuda triangle
 
Beethoven
BeethovenBeethoven
Beethoven
 
Computer assisted neurosurgery
Computer assisted neurosurgeryComputer assisted neurosurgery
Computer assisted neurosurgery
 
The immune system
The immune systemThe immune system
The immune system
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Google earth
Google earthGoogle earth
Google earth
 

Top 10 most famous hackers of all time

  • 1. Top 10 Most Famous Hackers of All Time Uroš Tasić
  • 2. Black Hat Hackers vs. White Hat Hackers • “black hats” exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. • “white hats” often work as certified "Ethical Hackers" hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff.
  • 3. Black Hat Hackers Jonathan James • First juvenile to be sent to prison for hacking, served six months in prison • Crimes: – Installed a backdoor into a Defense Threat Reduction Agency server – Cracked into NASA computers, stealing software worth approximately $1.7 million
  • 4. Black Hat Hackers Adrian Lamo • Sentence: six months of home confinement and two years of probation, 65.000$ in restitution • Crimes: – Penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings (Yahoo!, Bank of America) – Brake into The New York Times' intranet
  • 5. Black Hat Hackers Kevin Mitnick • Crimes: – Breaking into the Digital Equipment Corporation's computer network and stealing software – Half year "coast-to-coast hacking spree" • Sentence: five years in prison
  • 6. Black Hat Hackers Kevin Poulsen • Sentence: five years in prison • Crimes: – KIIS-FM hack was accomplished by taking over all of the station's phone lines – Hack of federal investigation database and federal computers for wiretap information
  • 7. Black Hat Hackers Robert Tappan Morris • Sentence: years' probation, 400 hours of community service and a fine of $10,500 • Crime: – Creator of the Morris Worm - the first computer worm to be unleashed on the Internet
  • 8. White Hat Hackers Stephen Wozniak • Achievements: – Blue boxes - devices that bypass telephone- switching mechanisms to make free long- distance calls. – The computer as a fully assembled PC board Awards: the National Medal of Technology, the National Inventors Hall of Fame
  • 9. White Hat Hackers Linus Torvalds • The Linux operating system Torvalds: "I just want to have fun making the best damn operating system I can."
  • 10. White Hat Hackers Richard Stallman • The GNU Project, which was founded to develop a free operating system Stallman: "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom." Richard Stallman - Free Software Song http://www.youtube.com/watch?v=1BH7poMtPVU
  • 11. White Hat Hackers Tsutomu Shimomura • Was hacked by Kevin Mitnick and made it his cause to help the FBI capture him.
  • 12. Thank you for your attention!!!