yeah but infrarecorder is the best for this job<<D.A.>> wrote:infrarecorder is burning software, right?? well, if it can burn ISO images then it's OK. Also u can use Alcohol120, Nero e.t.c.
How to start with a hacking!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- jack krauser
- Posts: 1005
- Joined: Wed Aug 29, 2007 5:45 pm
- Location: greece
- Contact:
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.
by Loyal_Dark
by Loyal_Dark
- jack krauser
- Posts: 1005
- Joined: Wed Aug 29, 2007 5:45 pm
- Location: greece
- Contact:
what? i don't know this programme<<D.A.>> wrote:But K3B is the best of the best!!!!!!!
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.
by Loyal_Dark
by Loyal_Dark
Top hackers
Mark Zbikowski — In his senior year at Roeper, c. 1973/4, Zbikowski became known as one of the earliest computer crackers, after cracking the security system on Wayne State University's MTS (Michigan Terminal System, developed at University of Michigan) mainframe for his own amusement. According to Zbikowski, when he offered to show the university how to fix the security leak, university officials threatened prosecution and offered him a job during the same meeting.
Jonathan James (also known as c0mrade) made unauthorized copies of software controlling the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest cybercriminal ever incarcerated in the United States.
Dark Avenger — (but not The Dark Avenger ) Bulgarian virus writer that popularized polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into giving out $10 million. To this day, the method used is unknown, but can be speculated.
Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
Nahshon Even-Chaim (also known as Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defense and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
Kevin Mitnick - Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property.
Jon Murdock (also known as Xtasy) — In 2004, Murdock was convicted on multiple counts of cyber-terrorism, internet fraud, and was then prosecuted for allegedly causing over $12,000,000 in online theft from thousands of stolen paypal and e-gold accounts. After Murdock's release in 2006 at the age of 19, Murdock was then indicted on another 17 counts of high-tech fraud and was linked to numerous underground "cracking communities" and forums. Murdock will be released from prison in 2008, following a 5 year probationary period.
David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
Celestino Canto- Creator of the celey Trojan & online theft from thousands of stolen paypal and e-gold accounts.
Jonathan James (also known as c0mrade) made unauthorized copies of software controlling the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest cybercriminal ever incarcerated in the United States.
Dark Avenger — (but not The Dark Avenger ) Bulgarian virus writer that popularized polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into giving out $10 million. To this day, the method used is unknown, but can be speculated.
Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
Nahshon Even-Chaim (also known as Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defense and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
Kevin Mitnick - Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property.
Jon Murdock (also known as Xtasy) — In 2004, Murdock was convicted on multiple counts of cyber-terrorism, internet fraud, and was then prosecuted for allegedly causing over $12,000,000 in online theft from thousands of stolen paypal and e-gold accounts. After Murdock's release in 2006 at the age of 19, Murdock was then indicted on another 17 counts of high-tech fraud and was linked to numerous underground "cracking communities" and forums. Murdock will be released from prison in 2008, following a 5 year probationary period.
David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
Celestino Canto- Creator of the celey Trojan & online theft from thousands of stolen paypal and e-gold accounts.
- jack krauser
- Posts: 1005
- Joined: Wed Aug 29, 2007 5:45 pm
- Location: greece
- Contact:
Re: Top hackers
fuck i wanna be like them<<D.A.>> wrote:Mark Zbikowski — In his senior year at Roeper, c. 1973/4, Zbikowski became known as one of the earliest computer crackers, after cracking the security system on Wayne State University's MTS (Michigan Terminal System, developed at University of Michigan) mainframe for his own amusement. According to Zbikowski, when he offered to show the university how to fix the security leak, university officials threatened prosecution and offered him a job during the same meeting.
Jonathan James (also known as c0mrade) made unauthorized copies of software controlling the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest cybercriminal ever incarcerated in the United States.
Dark Avenger — (but not The Dark Avenger ) Bulgarian virus writer that popularized polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into giving out $10 million. To this day, the method used is unknown, but can be speculated.
Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
Nahshon Even-Chaim (also known as Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defense and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
Kevin Mitnick - Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property.
Jon Murdock (also known as Xtasy) — In 2004, Murdock was convicted on multiple counts of cyber-terrorism, internet fraud, and was then prosecuted for allegedly causing over $12,000,000 in online theft from thousands of stolen paypal and e-gold accounts. After Murdock's release in 2006 at the age of 19, Murdock was then indicted on another 17 counts of high-tech fraud and was linked to numerous underground "cracking communities" and forums. Murdock will be released from prison in 2008, following a 5 year probationary period.
David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
Celestino Canto- Creator of the celey Trojan & online theft from thousands of stolen paypal and e-gold accounts.
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.
by Loyal_Dark
by Loyal_Dark
- jack krauser
- Posts: 1005
- Joined: Wed Aug 29, 2007 5:45 pm
- Location: greece
- Contact:
yeah but he went in prison right?<<D.A.>> wrote:me too there was a fifteen (15) years old guy named himself MafiaBoy, he used DoS attacks to crash cnn.com, yahoo, dell, ebay. He caused 7.5$ worth of damage. Cool guy, isn't it?
hacker is a life style. its one that alters how you think, you perception of reality, your way of dealing with things in general, as well as things so common as how you talk, how you carry yourself, and even when and how long you sleep.
by Loyal_Dark
by Loyal_Dark