Banner Watamula

AA   AA  
       
 

Hackers

   
       
 

Wake up
Logo panic

Don't fight the system.
Go in the system and take them down on their own faults.

Alle acties komend uit wraak of ego zullen mislukken.
Alleen acties vanuit een hart en ziel zullen slagen.

In deze blog geef ik mijn zienswijze van de huidige wereld weer. 
Ik beroep me op het recht die geldt vanuit het Universum, namelijk: Het recht van respect naar elke energievorm in het Universum. In de menselijke wetten is het omschreven in het UVRM als zijnde: Artikel 1 Alle mensen worden vrij en gelijk in waardigheid en rechten geboren. Zij zijn begiftigd met verstand en geweten, en behoren
zich jegens elkander in een geest van broederschap te gedragen. In de reeds niet meer geldende Nederlandse grondwet staat het beschreven als zijnde: Artikel 1 Allen die zich in Nederland bevinden, worden in gelijke gevallen gelijk behandeld. Discriminatie wegens godsdienst, levensovertuiging, politieke gezindheid,
ras, geslacht of op welke grond dan ook, is niet toegestaan.
   
       
 
 
   
       

 

 

Of The World’s Most Famous Hackers & What Happened To Them

In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

1. Gary McKinnon

Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!

Gary McKinnon was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13-month period from February 2001 to March 2002, illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.

McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.
Being of Scottish descent and operating out of the United Kingdom, McKinnon was able to dodge the American government for a time. As of today, he continues to fight against extradition to the United States.

Hacker1

.2. LulzSec

LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, ;Laughing at your security since 2011! stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

.3. Adrian Lamo

Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

.4. Mathew Bevan and Richard Pryce

Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.

.5. Jonathan James

The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.

Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.

Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000.

The story of James has a tragic ending, however. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit.

Hacker2


.6. Kevin Poulsen

How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is
his past crafted his future. Poulsen now serves as a Senior Editor at Wired.

Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.”

He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution.

Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace

Hacker3

.7. Kevin Mitnick

Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedownand Freedom Downtown.

Kevin Mitnick’s journey as a computer hacker has been so interesting and compelling that the U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.

What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for 3 years of supervised release. Near the end of that period, however, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.

Mitnick was eventually caught and convicted, ending with a 5-year prison sentence. After serving those years fully, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC

Hacker4

.8. Anonymous

The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. hacktivist group called Anonymous are known with the penname of being the digital Robin Hood amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.

.9. Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

.10. Albert Gonzalez

How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison.

Albert Gonzalez paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.

Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen.

The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).

Hacker5

.11.George Francis Hotz

(also known as GeoHot)He dominates the list when it comes to hacking. At only 17 as the first person he hacked an iPhone to make it operable with all wireless careers as Apple planned it to be usable for only AT&T users. He also hacked into Sony PSP several times. Now he is working in his vehicle automation machine learning company - comma.ai. He has done all those notable hacks at a very young age, so to me he can get the top rank as a hacker without any judgement. He was technically very sound, the characteristic most programmers fail to achieve these days. He is still active but not with hackings anymore but with his company comma.ai.

.12. Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

Hacking Tools:
**#1 Metasploit.
**#2 Nmap.
**#3 Acunetix WVS.
**#4 Wireshark.
**#5 oclHashcat.
**#6 Nessus Vulnerability Scanner.
**#7 Maltego.

 

 

Xirtam

More information please visit this page

 

 
HOME


2017


- December 2017 01/15
- November 2017 16/30
- November 2017 01/15
- October 2017  16/31
- October 2017  01/15
- September 2017  16/30
- September 2017  01/15
- Agust 2017  16/31
- Agust 2017  01/15
- July 2017  16/31
- July 2017  01/15
- June 2017  16/30
- June 2017  01/15
- May 2017  16/31
- May 2017  01/15
- April 2017  16/30
- April 2017  01/15
- March 2017  16/31
- March 2017  01/15
- Februari 2017  16/28
- Februari 2017  01/15
- Januari 2017  16/31
- Januari 2017  01/15


2016

- December 2016  16/31
- December 2016  01/15
- November 2016  16/30
- November 2016  01/15
- October 2016  16/31
- October 2016  01/15
- September 2016  16/30
- September 2016  01/15
- August 2016  16/31
- August 2016  01/15
- July 2016  16/31
- July 2016  01/15
- June 2016  16/30
- June 2016  01/15
- May 2016  16/31
- May 2016  01/15
- April 2016  16/30
- April 2016  01/15
- March 2016  16/31
- March 2016  01/15
- Februari 2016  15/29
- Februari 2016  1/15
- Januari 2016  16/31
- Januari 2016  1/15

2015

- December 2015 16/31
- December 2015 01/15
- November 2015 16/30
- November 2015 1/15
- October 2015 16/31
- October 2015 1/15
- September 2015 16/30
- September 2015 1/15
- August 2015 16/31
- August 2015 01/15
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- Februari 2015
- Januari 2015

2014

- December 2014
- November 2014
- Oktober 2014
- September 2014
- Augustus 2014

2012

- Mededeling 2012
- June 2012
- April 2012
- Maart 2012
- Februari 2012
- Januari 2012

2011

- December 2011
- November 2011
- Oktober 2011
- September 2011
- Augustus 2011
- Juli 2011

- ALL FREE BOOKS

- BURGER PANEL 2015

- INGEZONDEN STUKKEN

- PROTOCOLLEN SION

- WATAMULA VIDEO'S

FILES - Afrika - Amazon - Antartica - Archonten - Aruba - Brain Control - Brainwash - Black Pope - Boston Globe files - Cancer - CELLTOWERS and CHEMTRAILS - Chemie-Farmaceutische kartels - Child Sex - Child Traffickers - CIA and Drugs part1 - CIA and Drugs part2 - CIA and Pedophile - Clinton Pizza gate - Colonia Dignidad - Core readings - Corrupt Nederland 1 - Corrupt Nederland 2 - Curacao maffia eiland - Demmink, Dutroux, Westminster - Demmink2 - Diana - DNA - Doping voetbal - Drone papers 1 - Drone papers 2 - Drone papers 3 - Drone papers 4 - Drugs - Els Borst - EuroNarcos - Evita Peron - False Flag - Flat - Round Earth - Fraude Goede doelen - Frequency - Gezond eten - Hackers - Helmin Wiels - Hitler ALIVE after WWII - Hitler ALIVE THE LIE - Hitler Story never told - Hollow Earth - Holocaust HOAX - Identity - Khazarian Mafia - Knights Templar - Lee Harvey Oswald - Land besturen - Leugens OM - Maffia Groepen - Martelingen Gevangenis - Martelingen Renwang - Montauk Project - Mind Weapons - Murder Illuminati - Narcotica Nederland - Nazi Reich - Neset Temirci - No Bai Vota - Obama children - Oranje dossier - Oranje Opium - Organ Harvesting - Orgonite - Panama Papers - Pedofolie - Pedofoliele
Koninklijkhuis
- Pim Fortuyn - Pope and Islam - Protest Dolphins - Radiation - Real life cartoons - Remove RFID chip - Rife 1 - Rife 2 - Root Canals - Semler school - Slaven - Soeverijn - Slimme meters - Soeverijn - Telegraaf - Tesla - Theo van Gogh moord - The Human problem - Utopia - Vaccine - Verboden artikel - VeriChip - Vrijmetselarij 300 jaar - Vrijmetselarij History - Vrijmetselarij Orde - Vrijmetselarij Ritualen 1 - Vrijmetselarij Ritualen 2 - Vrijmetselarij Ritualen 3 - Weather Manipulation - Weather Manipulation Curacao - Wijze les - World Corruption - X files de ware - XIRTAM - Zaak Hogan - Zaak Holloway - Zelfmoorden - Zika - Zion history - 1900-2000 - Index
       
 

 

 

 

LATEST BOOK

Verboden Publicaties


Title: Verboden Publicaties
ISBN 978-0-244-61655-7
http://www.place4free.com/Downloads/Books/Verboden_download.pdf

File size 1.0 MB

 

   
       
 

 

Wilt u werkelijk weten hoe ons eiland Curaçao bestuurd wordt 
en hoe wij burgers onderdrukt worden.
Lees de volgende vrij te downloaden boeken.

Boek 1 boek2 boek 3 boek 4 boek 5 boek 6 boek7 boek8

boek9 boek9 Hidden1 Hidden 2 Geloof en het geloven Dieptepunt Namen Drugs

Sion Verboden

 

- Klik op icon boek -

   
       
       

We are not responsible for the posts of the members
Due to the many visitors on this website, we are experiencing some delays in answering.
Your e-mail will be processed in the order it was received,
but if you get no response to your e-mail within 3 days please write/submit again.