All ten famous hacker: Jobs and Wozniak listPhoenix FRANCISCO, May 28 news, a reference to hackers, people will think of a sitting in front of five computers, rapid hands typing on the keyboard, the screen staring style bible code. Then tap Enter heavy, \u0026 ldquo; when \u0026 rdquo; cry, then the successful invasion or CIA system millions of dollars stolen from the bank. But hackers are not always destroy or steal information of evil, of which the most famous hacker indeed been punished for their illegal actions, but many of them are \u0026 ldquo; repented \u0026 rdquo; \u0026 mdash; \u0026 mdash; some established his own company and become a billionaire, and some books biography, became the best-selling book dealers. Robertson cited one of the ten famous hacker, including Apple co-founder Steve \u0026 middot; Wozniak (Steve Wozniak) and Steve Jobs \u0026 middot; Steve (Steve Jobs) due to the early manufacture and sale of fraudulent calls The \u0026 ldquo; \u0026 rdquo ;, blue box is also listed as \u0026 ldquo; hacker \u0026 rdquo; team. The following right yes right people and related events hackers brief review: Kevin \u0026 middot; Mitnick first: Kevin \u0026 middot; Mitnick (Kevin Mitnick) Mitnick was America's most wanted criminals caught He had scored the Pentagon computer networks and the US Digital Equipment Corporation (Digital Equipment Corp) and other agencies. Over the years, he had hacked several computer company and the telephone company's network, Mitnick therefore arrested and jailed several times. He currently operating in Nevada with a name in its own security consulting firm \u0026 mdash; \u0026 mdash; \u0026 ldquo; Mitnick \u0026 rdquo; security consulting firm. He is a writer, in his latest work 'ghost lines: number one hacker Adventures' (Ghost in the Wires), the record of the most famous hacker Nike Air Yeezy attacks, and 'hacker Pulp Fiction' (Takedown) tells the story of his arrest and was arrested in the mid-1990s, the process of the police. Since Mitnick was released, he is still the focus of public attention, often in speech and book signing occasion. George \u0026 middot; Hotz second place: George \u0026 middot; Hotz (George Hotz) George \u0026 middot; Hotz only 22 years old, because Hotz jailbreak Apple iPhone (parameter picture sample evaluation) phones, cracked Sony's PlayStation 3 and great reputation vibration, Hotz released due to massive jailbreak tool for creating and PlayStation 3, which Nike Heels Boots was sued Sony, the last two to shake hands with the proviso that they will no longer Hotz cracked Sony products. Hacker group Anonymous is picked Hotz previous possessions, he launched a retaliatory attack against Sony. This social networking site Facebook's Hou Huoci employed. Adrian \u0026 middot; Rameau third place: Adrian \u0026 middot; Lamo (Adrian Lamo) 2003, the Adrian \u0026 middot; Rameau result of the invasion, 'the New York Times' computer network and arrested his own name Adding to the team of experts which, for users to search LexisNexis account. He was sentenced to home confinement. In 2010, Adrian returned to public view. Adrian was providing intelligence to the US government, he said a man named Bradley \u0026 middot; Manning (Bradley Manning) young American soldiers to a confidential government document leaked to the wiki. Manning is accused of illegally final transmission of information, and Adrian were part of the peer as traitors, resulting in much tumult in the Internet and hacker conference. Robert \u0026 middot; Tappan \u0026 middot; fourth Morris: Robert \u0026 middot; Tappan \u0026 middot; Morris (Robert Tappan Morris) in 1988, Robert had been notorious, when he was at Cornell University (Cornell University) graduate . Robert \u0026 middot; nike dunk heels Tappan \u0026 middot; Morris posted on the Internet the first to be called \u0026 ldquo; Morris Nike Shoes \u0026 rdquo; (Morris) widespread worm that was allegedly the network worm spread to one-tenth of the entire Internet, resulting in $ 15 million loss. Robert was the son of the US National Computer Security Center, a scientist. Robert said, which \u0026 ldquo; worms \u0026 rdquo; the program was initially a research experiment, after losing control became a worm. Robert became the first was \u0026 ldquo; anti-hacking law \u0026 rdquo; target (anti-hacking law) allegations. Robert is a fine of $ 10,000, and in 400 hours of community service obligations. Some security experts believe that the penalty is not reasonable, because the current similar attacks occur almost daily on the Internet. Robert is now a professor of computer science at MIT (Massachusetts Institute of Technology) in. Marks \u0026 middot; Battle Fifth place: Marks \u0026 middot; Battle (Max Butler) served as FBI informant Max \u0026 middot; Battle, in San Francisco's home run with a stolen credit card site \u0026 mdash; \u0026 mdash; CardersMarket.com, the site is the Internet's largest commercial crime site with thousands of users. The use of stolen credit cards at retail stores consumption many mistakes, the site surfaced, while Battle jail. Because as Nike Basketball many as 2 million stolen credit card information, user loss of up to $ 86 million, Battle was sentenced to 13 years in prison. Michael \u0026 middot; Lynn Sixth: Michael \u0026 middot; Lynn (Michael Lynn) 2005, Michael \u0026 middot; Lynn fame. At that time Michael discovered a vulnerability on Cisco Systems Inc. software that could lead to hackers Cisco network and control of Cisco routers. Michael attempts to demonstrate the vulnerability at hacker conference, but was accused of Cisco, Cisco employees make more than 20-page project shredded material prepared for the hacker conference, while the destruction of the 2000 CD contains demo document. Michael worked in network security system company (Internet Security Systems) asking him to stop the demonstration, desperation, Michael chose to leave. Michael finally demonstrated the vulnerability, a hacker hero. Michael currently works in Cisco's competitors \u0026 mdash; \u0026 mdash; Juniper (Juniper Networks), senior engineer. Albert \u0026 middot; Gonzalez seventh: Abbott \u0026 middot; Gonzalez (Albert Gonzalez) Albert \u0026 middot; Gonzalez was the United States Secret Service (US Secret Service) of an informant Since the manufacture of the largest credit card theft in US history, he was sentenced to 20 years in prison. Gonzalez together with international criminal groups from the US retailer TJX Cos, OfficeMax and BJ's Wholesale Club, etc., a total of 40 million stolen credit card information. Prosecutors in a bucket Air Jordan 5 Retro in his parents' home in the backyard and found more than one million US dollars in cash, and Gonzalez agreed to a penalty paid. Poulsen eighth; Kevin \u0026 middot: Kevin \u0026 middot; Poulsen (Kevin Poulsen) inside the hacker community, Poulsen to \u0026 ldquo; Dark Dante \u0026 rdquo; is known, and specializes in attacking the telephone network is known, in particular, In the attack the radio side, won a variety of honors. His greatest Kids Nike Trainers honor is to attack the Los Angeles KIIS FM radio station phone lines in 1990, and successfully won a Porsche 944 S2. Poulsen had been sentenced to five years in prison, now it has transformed into a senior editor of Wired News magazine, also responsible Threat Level blog editor. Apple's two founders: Wozniak (left), Steve Jobs (right) ninth and tenth place: Steve \u0026 middot; Wozniak (Steve Wozniak) and Steve Jobs \u0026 middot; Steve (Steve Jobs) as the Apple co-founder, Steve \u0026 middot; Wozniak and Steve Jobs \u0026 middot; early Steve was a phone phreaking (phone phreakers), they use the telephone network vulnerabilities in free calls. It is called \u0026 ldquo; Olaf \u0026 middot; Tubac \u0026 rdquo; (Oaf Tobark) Jobs and called \u0026 ldquo; Berkeley Blue \u0026 rdquo; (Berkeley Blue) Wozniak, they created a long-distance telephone line theft of \u0026 ldquo; blue box \u0026 rdquo; (blue boxes), and sold to local college students to use. Although Steve Jobs died in October 2011, but after he had said that hackers create Apple's experience is bound to its pioneer. While Wozniak is currently headquartered in Salt Lake City computer storage vendor Fusion-io office, and served as the company's chief scientist. By the author of this article i horse finishing from Phoenix Technologies, view the original text!
