Blogroll

Tuesday, January 7, 2014

Looking on the Bright Side: The Six Sexiest Female Hackers

Seriously, in the early ‘60s, to be a hacker is an honor.

At MIT, the Tech Model Railroad Club’s hackers were the nucleus of MIT’s Artificial Intelligence Laboratory, the world's leading center of AI research into the early 1980s.

Even today at MIT, the word “hacker” is used only in its original meaning—someone who applies ingenuity to create a clever result, called a “hack.”

This original benevolent meaning stands in stark contrast to the later and more commonly used meaning of a “hacker,” typically a person who breaks into computer networks in order to steal or vandalize.

These password crackers are pretty pesky nowadays. Sadly, they are expected to get peskier this year, and in the years to come, directing international efforts toward of strengthening online security.  

One of those unfortunate turn of a word’s fate, you might say. 

But hey, to cheer everyone at TMRC up, we have listed down the 5 bright sides—so bright they could make our day—there is to the phenomenon called hacking. No matter how mundane they are [insert naughty-boy smile here].

Adeanna Cooke

 Source: www.atcoitec.com

Adeanna is not just your typical Playboy model. Yes, you got it right. A former Playmate is on top of this list!

Sure she has taken some naked pictures, but she kept dignity intact. After an ill-meaning friend decided to send her hot photos online to make money from them without her consent, she took the matter into her own hands. 

If you think she went to authorities and pled her sad plight, you’re bound to be wrong. No, she was not a cry-baby. But just what did she do?

Well, she hacked the website displaying her face (and body!) and took down everything that has to be taken down. Badass.

After her much-celebrated success, Adeanna has been helping out women who have had the misfortune of being exploited unwillingly in the Internet.

 Ying Cracker


Source: www.sankartech.wordpress.com


The teaching profession is the last thing on earth that you would associate with hacking. And yet, there she is, a reminder that such extreme realities could coexist.

Guys, meet Ying, one of the most beautiful educators from Shanghai. She teaches the basics of hacking—from changing IP address to wiping Office passwords. Seriously, guys, who doesn’t want to learn how to hack from a teacher as hot as this?

Although her last name is anything but saying altogether what is obvious, she has one of the more resonating names in the hacking business.

How did she climb the popularity ladder? Well, it was in an online forum “Chinese Hottie Hackers” posting that got Cracker noticed by gawkers on the internet and created a huge fan base for her.

Her work is pretty impressive as well. She’s an expert in hacker software writing and charges good money for courses on simple hacking tools. She charges between RMB 500–5000 in helping other people crack software and usually makes about RMB 15,000 per month.

That is, of course, cracking the unwritten history of her last name.


Kim Vanvaeck a.k.a. Gigabyte



This Russian beauty is believed to have been the primary creator of a number of high-end viruses that sought to target hardware with sensitive information.

Unlike many other viruses that were meant to steal private information in order to make money, these viruses were used to destroy the information itself.

Vanvaeck began tweaking viruses at 14 but maintained she never actually released any of her creations on the Web. Law enforcement agencies have tried to paint her as a woman that is seeking notoriety in a field that is dominated by men, and Gigabyte’s name was traced to hundreds of viruses throughout the years.

She lives mostly in Belgium, Brussels and has completed her degree for Master of Industrial Sciences (Industrial Engineer). Now she works as an IT advisor.

Kristina Svechinskaya


Source: www.2.bp.blogspot.com

Kristina is a Russian money mule hacker. A money mule is a person who transfers money acquired illegally in person, through a courier service, or electronically, on behalf of others.

A New York University student, she was accused of a plot to defraud several British and U.S. banks of sizeable sums and usage of false passports.

According to charges, Kristina used Zeus Trojan horse to attack thousands of bank accounts and opened at least five accounts in Bank of America and Wachovia, which received $35,000 (£22,000) of money theft.

It is estimated that with nine other people, she had skimmed $3 million in total. However, she has since enjoyed liberty as the US court that handled her case has forgiven her.

Xiao Tian


Source: www.3.bp.blogspot.com

Seemingly upset that China’s massive population is male-dominated, a Chinese hottie founded a group of hackers exclusive for the hot female species.  

She was only 19 when she made the bold innovation, but Xiao Tian was and is the unquestioned leader of the exclusive group that calls itself China Girl Security Team. Now it boasts a huge membership that reached over 2 thousand which is by the way China’s largest group of hackers today.

According to Xiao Tian, she created the now-infamous hacking team because she felt that there was no other outlet for teenage girls like herself in the male-dominated world of hacking.

Little by little, the group has broken male dominance in the hacking business. The group has been targeting celebrities and has opened “career opportunities” to its qualified members.

 Joanna Rutkowska


Source: www.chaordicmind.com

An “ethical hacker.”

Is there such a thing today? And yet that’s how you would describe Joanna.

A Polish computer security researcher, she is primarily known for her research on low-level security and stealth malware. She specializes in developing software and tools to counter hackers in the webiverse.

She’s, of course, an elite hacker herself and has launched her own security services startup. She has even teamed up with Microsoft, advising vice president of Microsoft's Security Technology Unit on tightening the security on Windows Vista.

In 2006, she presented an attack against Vista Kernel protection mechanism in Las Vegas at the Black Hat Briefings conference. In the same conference, she also presented a technique dubbed as Blue Pill that used hardware virtualization to move a running OS into a virtual machine.

For her research on the topic, she was been named one of “Five Hackers who put a Mark on 2006” by eWeek Magazine.




1 comment:

  1. Hello all
    am looking few years that some guys comes into the market
    they called themselves hacker, carder or spammer they rip the
    peoples with different ways and it’s a badly impact to real hacker
    now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
    Anyone want to make deal with me any type am available but first
    I‘ll show the proof that am real then make a deal like

    Available Services

    ..Wire Bank Transfer all over the world

    ..Western Union Transfer all over the world

    ..Credit Cards (USA, UK, AUS, CAN, NZ)

    ..School Grade upgrade / remove Records

    ..Spamming Tool

    ..keyloggers / rats

    ..Social Media recovery

    .. Teaching Hacking / spamming / carding (1/2 hours course)

    discount for re-seller

    Contact: 24/7

    fixitrogers@gmail.com

    ReplyDelete