It is a name that is handed down.
In the computer world, there are many great hackers that have created their history.He ruddered computer science, shaped computers, and built internet and network paths.It can be said that it is impossible to do modern times without their hackers, without their existence.Even if you say a hacker, the hacker is in a position that is the opposite of black hat and white hat.A black hat hacker that steals information behind the Internet and causes confusion, a white hat hacker that uses a good knowledge for a good vector.However, it is certain that both hackers have been able to carry one end in their computer history.
Let's introduce 10 hackers who leave their names in such history.
コンラート・ツーゼEverything is here.
Just like what is the world's first computer, it's quite difficult to define what the world's first hacker, but maybe he was the world's first hacker.Without his existence, there is no subsequent in the first place.
Complete the world's first full -running program -controlled computer ZUZE Z3 in 1941.Of course, there was Z1 before the Z3, and Z1 was silently produced in his parents' apartment and completed in 1983.Later, we continued to develop from Z1 to Z3 with assistance from the German government and backing.It was the birth of a machine, called the mother of a modern computer.
ジョン・ドレイパー aka キャプテン・クランチHe had been hacking for a long time, when the existence of a computer was generally recognized.He was hacking in the 1970s in the phone system.He was hacking the phone system so that he could make a long -distance phone call for free.This is a technique called PHREAKING, and the free -king tool he created is a whistle that came to the serial bonus called Captain Crunch.The flute was infiltrated inside the computer of the telephone company using the 2600 Herz sound.After that, I created a device that generates a blue box sound that many people can make for free.
スティーブ・ウォズニアックNeedless to say, Apple's co -founder.
He had an acquaintance with Captain Crunch, and was fascinated by the design of the Blue Box in a gathering of the Home Brew Computer Club, and then created his own version of it.Seeing it, Steve Jobs felt the potential in the market, and the trip to the two computer ventures began.
ロバート・T・モリスWhen he was a graduate student at Kernel University, he created the Internet's first worm.He is said to have released a worm (Morrisworm) in 1988 and invaded as many as 6000 systems.This number is about 10 % of the computer at the time.According to him, he was not malicious to the size of the Internet, but he was found guilty in 1989 under the computer fraud and unauthorized usage Control Law.He became the first person to be accused of this law enacted in 1986.
マーク・アビーン aka Phiber OptikI think many people don't know. Neither was hacked to the Pentagon, nor did it infiltrate the Swiss Bank system and deceive a lot of money. He only offended AT & T, a major US mobile carrier. He was a member of the hacker group called Masters of Destraction, and often used a little AT & T system. In 1990, when a large -scale system failure of AT & T, as many as 60,000 AT & T users could not use the phone for nearly 9 hours, Mark was investigated by a US secret service. Later, it turned out that this obstacle was a mistake on the AT & T side. However, he was later caught by another computer -related crime and spent a year in a US prison. He was the first to enter prison for hacking -related crimes.
ケビン・ポールセン aka Dark DanteOne of his most famous hacking is that the hotline of KIIS-FM on the Los Angeles radio has been hooked all.He hacked all the radio stations hot lines in the planning that Porsche 944 S2 would hit the 102nd phone call so that he would definitely be the 102nd.After that, FBI tried to catch him and he disappeared.It is also a famous story that when his special feature was made on the TV program UNSOLVED MYSTERIES broadcasted by the NBC station, the free dial hotline of the program made a mysterious crash.He was arrested in 1991 and was convicted in 1994.He started walking on the path as a journalist after the source, and now WIRED.He is active as a senior editor of COM.In 2006, he also investigated and investigated sex criminals registered in MySpace.
ケビン・ミトニックHe is the most famous hacker in terms of the first hacker with the name of the FBI's most important nomination list.It is said that he hooked not only the system but also human hearts, the master of the sorting engineering.。In 1979, he, 16 years old, invaded a computer system for the first time and copied software.He pretends to be admin and approaches calls, emails, passwords and security information.After his arrest, he spent five years in a prison, and after his release, started a security consulting company.He turned to the protection side.
下村努A hacker who cooperated with the arrest of Kevin Mitonic.He is said to have grudged in 1994 that Mitonic put Shimomura's personal file on the net and cooperated with his arrest as revenge.One of the most famous hackers as a white hacker.
リチャード・ストールマンParticipated in the AI Lab as a Massachusetts Institute of Technology Graduate School.Here we will be addicted to MIT's hacking culture.He later became famous as a free software activist and liked open source during the MIT era.When MIT's College of Computer Science introduced a password system, he sometimes recommended that he deciphered his password, sent it by e -mail, and used it without a password to use it again.He first created a GNU license and GNU OS as a free software activist to have a software right.
リーナス・トーバルズOne of the famous white hackers, the developer of the well -known Linux kernel.Sinclair QL was also hacked from the hacking of Commodore Vix-20.In QL, he produces his unique text editor and a clone game Cool Man of Pac -Man.He obtained Intel 80386 in 1991 and developed LUNUX for the first time.Originally it was a unique project, but later it became part of the GNU project.
If you say "hacker is cool", you may think that you are a middle disease.But let me tell you.Hacker is cool!
[Maximumpc]
Soko (Paul Escallier -Maximumpc USA version)