Bad Dog Needs Rotten Home

THE NEW HOME FOR THE BEST STUFF ON THE WEB.

FAMOUS HACKERS

Added on: 15th Jul 2015

 

ROBERT TAPPAN MORRIS

http://cdn3.list25.com/wp-content/uploads/2013/04/Slide1025.jpg

A computer scientist who in 1988 invented the first computer

worm on the internet known as the Morris Worm. Robert Tappan Morris

was the first person to have ever been convicted due to his violation

of the Computer Fraud and Abuse Act of the United States. He used

to be a professor at the Department of Electrical Engineering and

Computer Science of the Massachusetts Institute of Technology before

he was sentenced to three years of probation by the US court.

 

 

HD MOORE

http://cdn4.list25.com/wp-content/uploads/2013/04/Slide1129.jpg

HD Moore is the creator of the computer software Metasploit

which was developed to test computer networks resistance to

hacker penetration.  HD Moore is also known for software projects

such as WarVOX, AxMan, the Metasploit Decloaking Engine and

Rogue Network Link Detection Tools.  As a computer engineer, he

concerned himself with the development of platforms intended to

become security tools designed to test for vulnerabilities within

networks in order to aid the development of stronger network

protection software.

 

 

DENNIS MORAN

http://cdn4.list25.com/wp-content/uploads/2013/04/Slide1227.jpg

One of the most notorious computer criminals of the 20th century,

Dennis M. Moran was involved in a series of denial-of-service

attacks that caused hundreds of internet websites to shut down.

Also known as Coolio, Dennis Moran also masterminded the

defacement of the DARE and RSA Security websites, as well as

the unauthorized access of the computer systems of the US Air Force

and US Army. As an adult, he was charged of 7 counts of Class A

felonies related to illegal access to networks.

 

 

KRISTINA SVECHINSKAYA

http://cdn4.list25.com/wp-content/uploads/2013/04/Slide1325.jpg

Kristina Vladimirovna Svechinskaya is a young Russian hacker

who got involved in several plots to defraud some of the

largest banks in the United States and Great Britain. She used a

trojan horse to attack and open thousands of bank accounts in the

Bank of America, through which she was able to skim around

$3 billion in total.

 

 

SAM JAIN

http://cdn2.list25.com/wp-content/uploads/2013/04/Slide1425.jpg

An internet entrepreneur and the former chief executive officer

of eFront, Sam Jain was arrested in California in 2000 after being

charged with submitting fraudulent data to website ranking publisher

Media Matrix. Prior to that, he had a pending case in California

because of his involvement in the sale of counterfeit Symentec

software. He also got involved in the ICQ instant messaging scandal,

which allowed him to access private data from several internet accounts.

 

 

KARL KOCH

http://cdn2.list25.com/wp-content/uploads/2013/04/Slide1525.jpg

A German hacker who became famous in the 1980’s, Karl Koch

was involved in the sale of hacked information from US military

computers to the KGB, the main security agency of the Soviet Union.

He was a member of different hacking organizations such as the CCC

(Chaos Computer Club), and worked with individual hackers such as

DOB or Dirk-Otto-Brezinski and Urmel. He was among the few

hackers who got involved in the Cold War computer espionage incident.

 

 

EHUD TENENBAUM

http://cdn.list25.com/wp-content/uploads/2013/04/Slide1625.jpg

An Israeli cracker, Ehud Tenenbaum caught the attention of the

media at the young age of 19, after he led a group of young hackers

that damaged the computer networks of some of the largest institutions

in the United States. Young as he was, he was arrested for

hacking the computer systems of the US Air Force, NASA, US Navy,

The Pentagon, Knesset and MIT. He also hacked into the computers

of terrorist groups based in Palestine and destroyed the websites of

Islamist organization Hamas.

 

 

LEONARD ROSE

http://cdn.list25.com/wp-content/uploads/2013/04/Slide1725.jpg

Leonard Rose was a hacker convicted in 1991 due to wire fraud.

He was known for having stolen Unix source codes from AT&T

and distributed two Trojan Horse programs which allowed him

to gain illegal access to several computer systems. He was

also accused of being the mastermind of the Legion of Doom

hacking group, one of the most active hacker groups from

1980’s to 1990’s, and of collecting login information from

various websites.

 


View by Month