How to start with a hacking!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Discussion about hacker.org's server
User avatar
jack krauser
Posts: 1005
Joined: Wed Aug 29, 2007 5:45 pm
Location: greece
Contact:

Post by jack krauser »

<<D.A.>> wrote:infrarecorder is burning software, right?? well, if it can burn ISO images then it's OK. Also u can use Alcohol120, Nero e.t.c.
yeah but infrarecorder is the best for this job :wink:
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.

by Loyal_Dark
leo
Posts: 86
Joined: Mon Feb 12, 2007 8:59 am

Post by leo »

jack krauser wrote:
<<D.A.>> wrote:infrarecorder is burning software, right?? well, if it can burn ISO images then it's OK. Also u can use Alcohol120, Nero e.t.c.
yeah but infrarecorder is the best for this job :wink:
well i have never used it
But i will try :) :)
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

But K3B is the best of the best!!!!!!! :twisted: :twisted: :twisted: :twisted: :twisted: :twisted:
User avatar
jack krauser
Posts: 1005
Joined: Wed Aug 29, 2007 5:45 pm
Location: greece
Contact:

Post by jack krauser »

<<D.A.>> wrote:But K3B is the best of the best!!!!!!! :twisted: :twisted: :twisted: :twisted: :twisted: :twisted:
what? i don't know this programme :? :? :? :?
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.

by Loyal_Dark
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

KDE burning tool.
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Top hackers

Post by <<D.A.>> »

Mark Zbikowski — In his senior year at Roeper, c. 1973/4, Zbikowski became known as one of the earliest computer crackers, after cracking the security system on Wayne State University's MTS (Michigan Terminal System, developed at University of Michigan) mainframe for his own amusement. According to Zbikowski, when he offered to show the university how to fix the security leak, university officials threatened prosecution and offered him a job during the same meeting.
Jonathan James (also known as c0mrade) made unauthorized copies of software controlling the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest cybercriminal ever incarcerated in the United States.
Dark Avenger — (but not The Dark Avenger :evil:) Bulgarian virus writer that popularized polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into giving out $10 million. To this day, the method used is unknown, but can be speculated.
Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
Nahshon Even-Chaim (also known as Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defense and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
Kevin Mitnick - Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property.
Jon Murdock (also known as Xtasy) — In 2004, Murdock was convicted on multiple counts of cyber-terrorism, internet fraud, and was then prosecuted for allegedly causing over $12,000,000 in online theft from thousands of stolen paypal and e-gold accounts. After Murdock's release in 2006 at the age of 19, Murdock was then indicted on another 17 counts of high-tech fraud and was linked to numerous underground "cracking communities" and forums. Murdock will be released from prison in 2008, following a 5 year probationary period.
David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
Celestino Canto- Creator of the celey Trojan & online theft from thousands of stolen paypal and e-gold accounts.
User avatar
jack krauser
Posts: 1005
Joined: Wed Aug 29, 2007 5:45 pm
Location: greece
Contact:

Re: Top hackers

Post by jack krauser »

<<D.A.>> wrote:Mark Zbikowski — In his senior year at Roeper, c. 1973/4, Zbikowski became known as one of the earliest computer crackers, after cracking the security system on Wayne State University's MTS (Michigan Terminal System, developed at University of Michigan) mainframe for his own amusement. According to Zbikowski, when he offered to show the university how to fix the security leak, university officials threatened prosecution and offered him a job during the same meeting.
Jonathan James (also known as c0mrade) made unauthorized copies of software controlling the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest cybercriminal ever incarcerated in the United States.
Dark Avenger — (but not The Dark Avenger :evil:) Bulgarian virus writer that popularized polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into giving out $10 million. To this day, the method used is unknown, but can be speculated.
Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
Nahshon Even-Chaim (also known as Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defense and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
Kevin Mitnick - Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property.
Jon Murdock (also known as Xtasy) — In 2004, Murdock was convicted on multiple counts of cyber-terrorism, internet fraud, and was then prosecuted for allegedly causing over $12,000,000 in online theft from thousands of stolen paypal and e-gold accounts. After Murdock's release in 2006 at the age of 19, Murdock was then indicted on another 17 counts of high-tech fraud and was linked to numerous underground "cracking communities" and forums. Murdock will be released from prison in 2008, following a 5 year probationary period.
David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
Celestino Canto- Creator of the celey Trojan & online theft from thousands of stolen paypal and e-gold accounts.
fuck i wanna be like them :cry: :cry:
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.

by Loyal_Dark
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

me too :lol: there was a fifteen (15) years old guy named himself MafiaBoy, he used DoS attacks to crash cnn.com, yahoo, dell, ebay. He caused 7.5$ worth of damage. Cool guy, isn't it?
User avatar
jack krauser
Posts: 1005
Joined: Wed Aug 29, 2007 5:45 pm
Location: greece
Contact:

Post by jack krauser »

<<D.A.>> wrote:me too :lol: there was a fifteen (15) years old guy named himself MafiaBoy, he used DoS attacks to crash cnn.com, yahoo, dell, ebay. He caused 7.5$ worth of damage. Cool guy, isn't it?
yeah but he went in prison right?
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.

by Loyal_Dark
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

he could be more careful...
leo
Posts: 86
Joined: Mon Feb 12, 2007 8:59 am

Post by leo »

<<D.A.>> wrote:he could be more careful...
Thats the reason why i dont dare to do it :( :(
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

Do what? HACK??? Don't tell me you're afraid of cops... they're stupid... just don't leave them your info, and that's gonna be cool.
leo
Posts: 86
Joined: Mon Feb 12, 2007 8:59 am

Post by leo »

well i am not so good at proxys :oops: :cry:
<<D.A.>>
Posts: 647
Joined: Wed Aug 15, 2007 5:16 pm
Location: nowhere

Post by <<D.A.>> »

Do you have WiFi?
leo
Posts: 86
Joined: Mon Feb 12, 2007 8:59 am

Post by leo »

well we don't have wifi every where instead some special places
Post Reply