Language Selection

English French German Italian Portuguese Spanish

Top 10 Most Infamous Black Hat Hackers of All Time

In the world of information technology, black hat hackers (also known as crackers or cyber-criminals) are known as the bad guys or villains. Most of them break into computers or networks without authorization to steal money and classified and sensitive information, while others are doing it simply for the challenge or the thrill of hacking. To accomplish their sinister work, crackers often create malware (malicious software) like viruses and worms to gain control of computer systems.

I have gathered here a list of ten of the most popular cyber-criminals the world has ever known. These evil geniuses were involved in high profile hacking that possibly caused millions, if not billions of dollars in total damages. However, some of them have now turned to the good side and are using their talents for the benefit of mankind.

Without further delay, here are the top 10 most infamous black hat hackers of all time:

10. Jonathan James

At the age of 16, Jonathan James (also known as c0mrade) became the first juvenile imprisoned for cybercrime in the United States. James carried out a series of intrusions into various systems including the computers of the Defense Threat Reduction Agency (DTRA) of the US Department of Defense. James had installed an unauthorized backdoor in a computer server in Dulles, Virginia that he used to install a sniffer allowing him to intercept over three thousand messages passing to and from DTRA employees while collecting countless usernames and passwords. This intrusion caused NASA to shut down its computers for three weeks costing them $41,000 to check and secure their systems. Jonathan James committed suicide in 2008.

rest here




More in Tux Machines

Chakra GNU/Linux Users Get KDE Plasma 5.7.2, Qt 5.7 and KDE Applications 16.04.3

Chakra GNU/Linux developer Neofytos Kolokotronis today, July 25, 2016, announced the release of the latest KDE and Qt technologies, along with new software versions in the main repositories of the Linux kernel-based operating system. Read more

In a Quiet Market for PCs, Chromebooks are Marching Steadily Forward

It's no secret that Chrome OS has not been the same striking success for Google that the Android OS has been. And yet, Chromebooks--portable computers running the platform--have not only found their niche, but they are also introducing a new generation to cloud computing. Chromebooks are firmly entrenched in the education market, where many young users have become used to the convention of storing apps and data in the cloud. Now, according to new research from Gartner, Chromebooks are ready to hit new milestones. Analysts there report that Chromebook shipment growth will be in the double digits this year. At the same time, though, Chromebooks have not become fixtures in the enterprise, replacing Windows PCs. Read more

Server Administration

  • SysAdmins With Open Source Skills Are In Demand
    System administrators play a crucial role in businesses today. They are the individuals responsible for the configuration, support and maintenance of company computer systems and servers. For this reason, they are a popular hiring request, with defense and media companies alike looking for these professionals on Dice. Yet, despite the ongoing demand, finding and recruiting system administrators may be more of a challenge. Data from the U.S. Bureau of Labor Statistics (BLS) found that the quarterly unemployment rate for system administrators was 0.6%, well below the national quarterly average (4.9%) and the quarterly average for all tech professionals (2.1%). Employers thus need to focus more of their recruitment strategies on poaching this talent from competitors.
  • One Phrase Sysadmins Hate to Hear (And How to Avoid It)
    A few years later, sysarmy, the local IT community, was born as the "Support for those who give support." And in that spirit, for this 8th AdminFest edition, we want to do exactly that: support those who help others in our Q&A platform, sysarmy.com/help. Each 500 points a participant earns, he/she gets a free drink in return!
  • DevOps'n the Operating System
    John Willis takes a brief look at the history of how Devops principles and operating systems have converged. He spends most of the time forward looking at what and how unikernels will converge with Devops tools, processes and culture. He ends with a demo of how containers, unikernels and Devops ideas can work together in the future.
  • 5 reasons system administrators should use revision control
    Whether you're still using Subversion (SVN), or have moved to a distributed system like Git, revision control has found its place in modern operations infrastructures. If you listen to talks at conferences and see what new companies are doing, it can be easy to assume that everyone is now using revision control, and using it effectively. Unfortunately that's not the case. I routinely interact with organizations who either don't track changes in their infrastructure at all, or are not doing so in an effective manner. If you're looking for a way to convince your boss to spend the time to set it up, or are simply looking for some tips to improve how use it, the following are five tips for using revision control in operations.

Kernel Space/Linux