Seriously, in the early ‘60s, to be a hacker is an honor.
At MIT, the Tech Model
Railroad Club’s hackers were the nucleus of MIT’s Artificial Intelligence
Laboratory, the world's leading center of AI research into the early 1980s.
Even today at MIT, the word “hacker” is used only in its original
meaning—someone who applies ingenuity to create a clever result, called a “hack.”
This original benevolent meaning stands in stark contrast to the
later and more commonly used meaning of a “hacker,” typically a person who
breaks into computer networks in order to steal or vandalize.
These password crackers are pretty pesky nowadays. Sadly, they are
expected to get peskier this year, and in the years to come, directing
international efforts toward of strengthening online security.
One of those unfortunate turn of a word’s fate, you might say.
But hey, to cheer everyone at TMRC up, we have listed down the 5
bright sides—so bright they could make our day—there is to the phenomenon
called hacking. No matter how mundane they are [insert naughty-boy smile here].
Adeanna Cooke
Source: www.atcoitec.com
Adeanna is not just your typical Playboy model. Yes, you got it right. A former Playmate is on top of
this list!
Sure she has taken some naked pictures, but she kept dignity
intact. After an ill-meaning friend decided to send her hot photos online to
make money from them without her consent, she took the matter into her own
hands.
If you think she went to authorities and pled her sad plight,
you’re bound to be wrong. No, she was not a cry-baby. But just what did she do?
Well, she hacked the website displaying her face (and body!) and took
down everything that has to be taken down. Badass.
After her much-celebrated success, Adeanna has been helping out
women who have had the misfortune of being exploited unwillingly in the
Internet.
Ying Cracker
Source: www.sankartech.wordpress.com
The teaching profession is the last thing on earth that you would
associate with hacking. And yet, there she is, a reminder that such extreme
realities could coexist.
Guys, meet Ying, one of the most beautiful educators from Shanghai.
She teaches the basics of hacking—from changing IP address to wiping Office
passwords. Seriously, guys, who doesn’t want to learn how to hack from a teacher
as hot as this?
Although her last name is anything but saying altogether what is
obvious, she has one of the more resonating names in the hacking business.
How did she climb the popularity ladder? Well, it was in an online
forum “Chinese Hottie Hackers” posting that got Cracker noticed by gawkers on
the internet and created a huge fan base for her.
Her work is pretty impressive as well. She’s an expert in hacker
software writing and charges good money for courses on simple hacking tools. She
charges between RMB 500–5000 in helping other people crack software and usually
makes about RMB 15,000 per month.
That is, of course, cracking the unwritten history of her last
name.
Kim Vanvaeck a.k.a. Gigabyte
Source: http://www.vanvaeck.net/
This Russian beauty is believed to have been the primary creator
of a number of high-end viruses that sought to target hardware with sensitive
information.
Unlike many other viruses that were meant to steal private
information in order to make money, these viruses were used to destroy the
information itself.
Vanvaeck began tweaking viruses at 14 but maintained she never
actually released any of her creations on the Web. Law enforcement agencies
have tried to paint her as a woman that is seeking notoriety in a field that is
dominated by men, and Gigabyte’s name was traced to hundreds of viruses
throughout the years.
She lives mostly in Belgium, Brussels and has completed her degree
for Master of Industrial Sciences (Industrial Engineer). Now she works as an IT
advisor.
Kristina Svechinskaya
Source: www.2.bp.blogspot.com
Kristina is a Russian money mule hacker. A money mule is a person
who transfers money acquired illegally in person, through a courier service, or
electronically, on behalf of others.
A New York University student, she was accused of a plot to
defraud several British and U.S. banks of sizeable sums and usage of false
passports.
According to charges, Kristina used Zeus Trojan
horse to attack thousands of bank accounts and opened at least five
accounts in Bank of America and Wachovia, which received $35,000 (£22,000) of
money theft.
It is estimated that with nine other people, she had skimmed $3
million in total. However, she has since enjoyed liberty as the US court that handled her case has
forgiven her.
Xiao Tian
Source: www.3.bp.blogspot.com
Seemingly upset that China’s
massive population is male-dominated, a Chinese hottie founded a group of
hackers exclusive for the hot female species.
She was only 19 when she made the bold innovation, but Xiao Tian was
and is the unquestioned leader of the exclusive group that calls itself China Girl Security Team. Now it boasts
a huge membership that reached over 2 thousand which is by the way China’s
largest group of hackers today.
According to Xiao Tian, she created the now-infamous hacking team
because she felt that there was no other outlet for teenage girls like herself
in the male-dominated world of hacking.
Little by little, the group has broken male dominance in the
hacking business. The group has been targeting celebrities and has opened
“career opportunities” to its qualified members.
Joanna Rutkowska
Source: www.chaordicmind.com
An “ethical hacker.”
Is there such a thing today? And yet that’s how you would describe
Joanna.
A Polish computer security researcher, she is primarily known for
her research on low-level security and stealth malware. She specializes in
developing software and tools to counter hackers in the webiverse.
She’s, of course, an elite hacker herself and has launched her own
security services startup. She has even teamed up with Microsoft, advising vice
president of Microsoft's Security Technology Unit on tightening the security on
Windows Vista.
In 2006, she presented an attack against Vista Kernel protection
mechanism in Las Vegas at the Black Hat
Briefings conference. In the same conference, she also presented a
technique dubbed as Blue Pill that used hardware virtualization to move a
running OS into a virtual machine.
For her research on the topic, she was been named one of “Five
Hackers who put a Mark on 2006” by eWeek
Magazine.
Hello all
ReplyDeleteam looking few years that some guys comes into the market
they called themselves hacker, carder or spammer they rip the
peoples with different ways and it’s a badly impact to real hacker
now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
Anyone want to make deal with me any type am available but first
I‘ll show the proof that am real then make a deal like
Available Services
..Wire Bank Transfer all over the world
..Western Union Transfer all over the world
..Credit Cards (USA, UK, AUS, CAN, NZ)
..School Grade upgrade / remove Records
..Spamming Tool
..keyloggers / rats
..Social Media recovery
.. Teaching Hacking / spamming / carding (1/2 hours course)
discount for re-seller
Contact: 24/7
fixitrogers@gmail.com