Hacking For Beginners – Manthan Desai

2) Adrian Lamo

2010

Adrian Lamo around computers as a very young child. He had a Commodore 64 when he was like 6 or so. And his firstinterest in seeing how things worked be hind the scenes wasn’t all about technology necessarily, and his interest in whatyou might call hacking isn’t really primarily about technology…He said” It’s not sexy when I’m exploring less obviousaspects of the world that don’t involve multibillion -dol lar corporations. There’s a certain amount of tunnel vision there.”Last year, Lamo earned the disapproval of his probation officer in the closing months of his two year probation term whenhe refused to provide a blood sample DNA Index System, or CODIS, wascreated to catalog violent criminals and Act expanded the system toinclude samples from all newly convicted white-collar criminals.

3) Kevin Mitnick

Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author. In the late 20th century, he wasconvicted of various computer- and communications-related crimes. At the time of his arrest, he was world-famous as themost-wanted computer criminal in the United States.Mitnick gained unauthorized access to his first computer network in1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation(DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copiedDEC’s software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followedby three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mailcomputers.

After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years. According to the U.S.Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. Heused cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from someof the country’s largest cellular tel ephone and computer companies. Mitnick also intercepted and stole computerpasswords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended in February1995 in North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, andmultiple pieces of false identification.

www.hackingtech.co.tv

Page 232