Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,161,027 members, 7,845,333 topics. Date: Thursday, 30 May 2024 at 03:47 PM

Sholah96's Posts

Nairaland Forum / Sholah96's Profile / Sholah96's Posts

(1) (2) (3) (4) (5) (6) (7) (8) (9) (of 9 pages)

Webmasters / Recover Deleted Files On Ur Computer, Even If Emptied From The Recycle Bin by Sholah96(m): 8:07am On Jul 10, 2014
Recover Deleted Files:
Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.
Recover My Files - Data Recovery SoftwareSolution
Recover files even if emptied from the Recycle Bin
File recovery after accidental format, even if you have reinstalled Windows.
Disk recovery after a hard disk crash
Get back files after a partitioning error
Get data back from RAW hard drives
Recover documents, photos, video music and email.
Recover from hard drive, camera card, USB, Zip, floppy disk or other media. Download link, http://download.getdata.com/RecoverMyFiles-Setup.exe
Science/Technology / Re: 25 Most Notorious Hackers To Ever Get Caught (part 3) by Sholah96(m): 1:25pm On Jul 09, 2014
Lols
Science/Technology / 25 Most Notorious Hackers To Ever Get Caught (part 3) by Sholah96(m): 12:15pm On Jul 09, 2014
5.
(Julian Paul Assange)
An Australian editor and publicist, Julian Paul Assenge is the founder of WikiLeaks, a site that publishes submissions of secret information from personal web accounts and news leaks. Before he became internationally acclaimed for his founding of WikiLeaks, he was a teenage hacker who published US military documents. At age 16, he joined the International Subversives group and hacked computer systems under his pseudonym, “Mendax.”
4.
(Mike Calce)
Michael Demon Calce, also known as the MafiaBoy of cyberspace, was a high school apprentice at West Island, Quebec when he got involved in a series of publicized denial-of-service attacks against some of the largest commercial websites, including Yahoo!, eBay, CNN, Amazon.com and Dell, Inc. In 2000, he targeted Yahoo! through project Rivolta, a term which means “riot” in Italy. He initially denied the offenses charged against him but accepted the accusations in 2001.
3.
(Chad Davis)
An American hacker who operated under the pseudonym Mindphasr, Chad Davis is among the most notorious cybercriminals of the 20th century. He founded Global Hell, a syndicate of computer hackers in the United States, and authored the hacking of the websites of some of the largest organizations and corporations in the country. He was the man behind the vandalism of the homepage of The White House and the US Army with a message saying “GlobalHell will not die.”
2.
(Nahshon Even-Chaim)
Also known as Phoenix, Nahshon Even-Chaim was the first computer hacker to have ever been convicted in Australia. His mission was to break into computer systems by dialling indirectly or placing a call through X.25 networks or internet connectivity. Among the websites he damaged were those of the University of California, Berkley, University of Wisconsin-Madison, and the Lawrence Livermore National Laboratory. Hacking computers was his way of ridiculing the entire computer security community.
1.
(Raphael Gray)
At age 19, Raphael Gray was able to hack several computer systems around the world in just a matter of one month. His mission was to gain unauthorized access to credit card information, which eventually netted him millions of dollars. Dubbed “The Bill Gates Hacker,” Gray broke into secure computer systems and published all the credit card information he accessed as part of his multimillion credit card pound mission.
Science/Technology / Re: Time Travel : Real Or Fictional .. .?(how Possible) ? by Sholah96(m): 11:03am On Jul 09, 2014
I watched a movie, continuum, it's based on this time travel. Where a group of terrorists and a detective travelled from year 2077 back 2 2012. I think d scientists ar working on it, maybe they think it's possible.

9 Likes

Science/Technology / 25 Most Notorious Hacker To Ever Get Caught (part 2) by Sholah96(m): 10:35am On Jul 09, 2014
15.
(HD Moore)
HD Moore is the creator of the computer software Metasploit which was developed to test computer networks resistance to hacker penetration. HD Moore is also known for software projects such as WarVOX, AxMan, the Metasploit Decloaking Engine and Rogue Network Link Detection Tools. As a computer engineer, he concerned himself with the development of platforms intended to become security tools designed to test for vulnerabilities within networks in order to aid the development of stronger network protection software.
14.
(Dennis Moran)
One of the most notorious computer criminals of the 20th century, Dennis M. Moran was involved in a series of denial-of-service attacks that caused hundreds of internet websites to shut down. Also known as Coolio, Dennis Moran also masterminded the defacement of the DARE and RSA Security websites, as well as the unauthorized access of the computer systems of the US Air Force and US Army. As an adult, he was charged of 7 counts of Class A felonies related to illegal access to networks.
13.
(Kristina Svechinskaya)
Kristina Vladimirovna Svechinskaya is a young Russian hacker who got involved in several plots to defraud some of the largest banks in the United States and Great Britain. She used a trojan horse to attack and open thousands of bank accounts in the Bank of America, through which she was able to skim around $3 billion in total.
12.
(Sam Jain)
An internet entrepreneur and the former chief executive officer of eFront, Sam Jain was arrested in California in 2000 after being charged with submitting fraudulent data to website ranking publisher Media Matrix. Prior to that, he had a pending case in California because of his involvement in the sale of counterfeit Symentec software. He also got involved in the ICQ instant messaging scandal, which allowed him to access private data from several internet accounts.
11.
(Karl Koch)
A German hacker who became famous in the 1980’s, Karl Koch was involved in the sale of hacked information from US military computers to the KGB, the main security agency of the Soviet Union. He was a member of different hacking organizations such as the CCC (Chaos Computer Club), and worked with individual hackers such as DOB or Dirk-Otto-Brezinski and Urmel. He was among the few hackers who got involved in the Cold War computer espionage incident.
10.
(Ehud Tenenbaum)
An Israeli cracker, Ehud Tenenbaum caught the attention of the media at the young age of 19, after he led a group of young hackers that damaged the computer networks of some of the largest institutions in the United States. Young as he was, he was arrested for hacking the computer systems of the US Air Force, NASA, US Navy, The Pentagon, Knesset and MIT. He also hacked into the computers of terrorist groups based in Palestine and destroyed the websites of Islamist organization Hamas.
9.
(Leonard Rose)
Leonard Rose was a hacker convicted in 1991 due to wire fraud. He was known for having stolen Unix source codes from AT&T and distributed two Trojan Horse programs which allowed him to gain illegal access to several computer systems. He was also accused of being the mastermind of the Legion of Doom hacking group, one of the most active hacker groups from 1980’s to 1990’s, and of collecting login information from various websites.
8.
(Rafael Nunez)
Rafael Nunez was a member of the notorious hacking group World of Hell in 2011. As a member of the group, he got involved in several high profile attacks, finding websites with poor security and then defacing them with light-hearted messages. He was part of the Dan Verton book entitled “The Hacker Diaries: Confessions of Teenage Hackers” in 2002. Today, he is a notorious businessman dwelling in Venezuela.
7.
(Andrew Auernheimer)
More commonly known as “Weev,” Andrew Alan Escher Auernheimer was an internet troll who gained media attention because of his inflammatory, off-topic posts in several online communities and forums. An American grey hat hacker, Andrew was known for using several pseudonyms in his operations. He was the one responsible for the disruption of Amazon’s services in 2009 and for hacking the website of The New York Times.
6.
(Mark Abene)
Known by his pseudonym Phiber Optik, Mark Abene was a New York-based hacker who used to be a member of some of the most notorious hacker groups in the United States, including the Legion of Doom and the Masters of Deception. He was a high-profile hacker who targeted large corporations and was among the most important figures of the Masters of Deception. Aside from computers, he also explored and hacked several telecommunication systems.
Science/Technology / 25 Most Notorious Hacker To Ever Get Caught (part 1) by Sholah96(m): 10:27am On Jul 09, 2014
25.
(Jeanson James Ancheta)
A dropout of Downey High School in California, Jeanson James Ancheta became a hacker in 2004 after he started to work with software robots called “botnets.” His hacking practice began when he discovered rxbot, a computer worm that has the capacity to infect and destroy computer networks. He became the first person to have ever been charged for controlling a huge number of hijacked computers in the United States.
24.
(Kevin Poulsen)
A news editor at Wired.com, Kevin Lee Poulsen is a former hacker whose most remarkable hack was when he took over the telephone lines of the entire Los Angeles-based radio station KIIS-FM as he intended to make sure that he would be the 102nd caller in order to win a Porsche 944 S2. After he was released from prison, he decided to leave the computer programming world and become a journalist to distance himself from his criminal past.
23.
(Albert Gonzalez)
A computer criminal best known for having masterminded and orchestrated a string of credit card thefts in the United States that brought in 170 million US dollars to his personal account, Albert Gonzalez is a computer hacker who is said to have committed the biggest and most controversial fraud in history. He used SQL injections in his operations to steal computer data from private computer networks and launch ARP spoofing attacks, a technique that sends fake messages to local area networks.
22.
(George Hotz)
An alumnus of the John Hopkins Centre for Talented Youth program, George Francis Hotz is known for unlocking the iPhone to allow it to be used with other wireless carriers. He was also the one who developed the limera1n jailbreak tool, the tool that could remove the limitations of Apple devices such as iPad, iPhone, iPod touch, and Apple TV. He was also sued by Sony for hacking the PlayStation3.
21.
(Kevin Mitnick)
An American computer security consultant, Kevin David Mitnick is one of the most notorious hackers of the 20th century. He got involved in several computer and communications-related crimes and even became one of the most wanted computer criminals in the United States. At a very young age of 12, Kevin Mitnick begun to use his social engineering skills to circumvent the punch card system used in Los Angeles buses.
20.
(Gary McKinnon)
Convicted for having hacked a total of 97 US-based military and NASA computer systems, Gary McKinnon is a systems administrator based in Scotland. In 2002, he was known for having perpetrated the largest military computer hack of all time after shutting down a network of 2,000 computers in the US military and deleting critical files such as weapons logs in just a matter of 24 hours. This rendered the US military network inoperable for days.
19.
(Adrian Lamo)
Adrian Lamo first caught the attention of the media after he broke into several high-profile computer networks such as The New York Times, Yahoo!, and Microsoft. He also became known for operating Inside-AOL.com, an AOL watchdog website. He has performed several authorized and unauthorized security checks for high-profile networks and yet never asked for a fee. Lamo was complimented for fortifying the corporate security of Worldcom.
18.
(Jonathan James)
A hacker who was imprisoned at a juvenile age for violating the cybercrime law, Jonathan James was known for committing several unauthorized intrusions in computer networks and systems including those of Bellsouth and the Miami-Dade School. In his early 20’s, he admitted to the authorities that he had installed an illegal backdoor in a computer server in Virginia to access the usernames and passwords of some 300 internet users, particularly DRTA employees and military men.
17.
(Owen Walker)
A hacker based in New Zealand, Owen Walker was a ringleader of a notorious international hacking organization that was estimated to have caused about $27 million worth of damages to several groups. He did not receive formal training in computer programming since he dropped out of school because of bullying. He masterminded the attack of the computer network of the University of Pennsylvania through the use of unauthorized botnets which he established himself.
16.
(Robert Tappan Morris)
A computer scientist who in 1988 invented the first computer worm on the internet known as the Morris Worm. Robert Tappan Morris was the first person to have ever been convicted due to his violation of the Computer Fraud and Abuse Act of the United States. He used to be a professor at the Department of Electrical Engineering and Computer Science of the Massachusetts Institute of Technology before he was sentenced to three years of probation by the US court.
Science/Technology / 25 Most Notorious Hacker To Ever Get Caught by Sholah96(m): 10:20am On Jul 09, 2014
25.
(Jeanson James Ancheta)
A dropout of Downey High School in California, Jeanson James Ancheta became a hacker in 2004 after he started to work with software robots called “botnets.” His hacking practice began when he discovered rxbot, a computer worm that has the capacity to infect and destroy computer networks. He became the first person to have ever been charged for controlling a huge number of hijacked computers in the United States.
24.
(Kevin Poulsen)
A news editor at Wired.com, Kevin Lee Poulsen is a former hacker whose most remarkable hack was when he took over the telephone lines of the entire Los Angeles-based radio station KIIS-FM as he intended to make sure that he would be the 102nd caller in order to win a Porsche 944 S2. After he was released from prison, he decided to leave the computer programming world and become a journalist to distance himself from his criminal past.
23.
(Albert Gonzalez)
A computer criminal best known for having masterminded and orchestrated a string of credit card thefts in the United States that brought in 170 million US dollars to his personal account, Albert Gonzalez is a computer hacker who is said to have committed the biggest and most controversial fraud in history. He used SQL injections in his operations to steal computer data from private computer networks and launch ARP spoofing attacks, a technique that sends fake messages to local area networks.
22.
(George Hotz)
An alumnus of the John Hopkins Centre for Talented Youth program, George Francis Hotz is known for unlocking the iPhone to allow it to be used with other wireless carriers. He was also the one who developed the limera1n jailbreak tool, the tool that could remove the limitations of Apple devices such as iPad, iPhone, iPod touch, and Apple TV. He was also sued by Sony for hacking the PlayStation3.
21.
(Kevin Mitnick)
An American computer security consultant, Kevin David Mitnick is one of the most notorious hackers of the 20th century. He got involved in several computer and communications-related crimes and even became one of the most wanted computer criminals in the United States. At a very young age of 12, Kevin Mitnick begun to use his social engineering skills to circumvent the punch card system used in Los Angeles buses.
20.
(Gary McKinnon)
Convicted for having hacked a total of 97 US-based military and NASA computer systems, Gary McKinnon is a systems administrator based in Scotland. In 2002, he was known for having perpetrated the largest military computer hack of all time after shutting down a network of 2,000 computers in the US military and deleting critical files such as weapons logs in just a matter of 24 hours. This rendered the US military network inoperable for days.
19.
(Adrian Lamo)
Adrian Lamo first caught the attention of the media after he broke into several high-profile computer networks such as The New York Times, Yahoo!, and Microsoft. He also became known for operating Inside-AOL.com, an AOL watchdog website. He has performed several authorized and unauthorized security checks for high-profile networks and yet never asked for a fee. Lamo was complimented for fortifying the corporate security of Worldcom.
18.
(Jonathan James)
A hacker who was imprisoned at a juvenile age for violating the cybercrime law, Jonathan James was known for committing several unauthorized intrusions in computer networks and systems including those of Bellsouth and the Miami-Dade School. In his early 20’s, he admitted to the authorities that he had installed an illegal backdoor in a computer server in Virginia to access the usernames and passwords of some 300 internet users, particularly DRTA employees and military men.
17.
(Owen Walker)
A hacker based in New Zealand, Owen Walker was a ringleader of a notorious international hacking organization that was estimated to have caused about $27 million worth of damages to several groups. He did not receive formal training in computer programming since he dropped out of school because of bullying. He masterminded the attack of the computer network of the University of Pennsylvania through the use of unauthorized botnets which he established himself.
16.
(Robert Tappan Morris)
A computer scientist who in 1988 invented the first computer worm on the internet known as the Morris Worm. Robert Tappan Morris was the first person to have ever been convicted due to his violation of the Computer Fraud and Abuse Act of the United States. He used to be a professor at the Department of Electrical Engineering and Computer Science of the Massachusetts Institute of Technology before he was sentenced to three years of probation by the US court.
Culture / Re: For Yorubas... by Sholah96(m): 6:14pm On Jul 08, 2014
To englishmen, baton is used to knead dough during bread making by chefs, not in bakery o!
Romance / Re: Beautiful People Are Usually The Most Lonely by Sholah96(m): 5:25pm On Jul 08, 2014
Maybe dat's in time past. Cos nowadays, ladies knw quickly if they are beautiful due to large approach 4rm guys and flattery words, compliments or watever
Culture / Re: For Yorubas... by Sholah96(m): 5:16pm On Jul 08, 2014
Igbako is called 'saucer' and omorogun is 'baton'
Culture / For Yorubas... by Sholah96(m): 2:19pm On Jul 08, 2014
What are the english words for 'igbako' and 'omorogun', tools for preparing yoruba solid foods? Let's share our answers.
Programming / Learn Programming With Ease by Sholah96(m): 7:06am On Jul 08, 2014
Do u know u can learn programming free online? As we all know that Programming is the most essential aspect of a computer. U can write software applications, computer games and much more if u're a good programmer. The first aspect in learning programming is to learn at least a programming language some of which are java, C, C++, python. Novice are advised to start with python. After which he can proceed to others. U can learn python at http://www.learn-python.org , there are also free practice.
Nairaland / General / ...riddle Of The Week... by Sholah96(m): 6:37am On Jul 08, 2014
A psychologist once stated: "A man was travelling to a town, he saw the town ahead of him and walked 120years, yet he could not reach there". What/where is the town?
Nairaland / General / Re: HEAVEN ON EARTH; Dubai Set To Build Largest Shopping Mall In The World by Sholah96(m): 6:30am On Jul 08, 2014
They already had the world's largest aquarium
Politics / Politics, How Stuff Work... by Sholah96(m): 9:47pm On Jul 07, 2014
Unrest in some areas of the ife east local government in Osun state this evening, as some suspected PDP supporters spread on roads and burned properties believed to belong to an APC supporter, cocoa store, cars among others. This election stuff is becoming something, like seriously...

(1) (2) (3) (4) (5) (6) (7) (8) (9) (of 9 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 38
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.