campaign analysis of social media strategy bjp vs aap vs congress




आगामी प्रतियोगिता परीक्षाएं 2014

Country And Their President And Prime Minister

Country And Their President And Prime Minister

Exam Preparation Tips for AIEEE


Preparing for AIEEE is a challenge unto itself.

IBPS Clerk exam

IBPS Clerk exam

World Important Gk

****** World GK Questions That You Should
Know ********
********* Longest in the World
*****************
Longest river : Nile (Egypt)
Longest road : Pan American Highway
Longest dam : Hirakud (Orissa)(INDIA)
Longest mountain range : Andes(South America)
Longest railway tunnel : Seikan Rail Tunnel
(Japan)
Longest railway line : Siberian Railway (Russia)
Longest ship canal : Suez Canal
Longest estuary : Obituary (Russia)
Longest road tunnel : St. Gothard Road Tunnel
(Switzerland)
Longest bridge : Second Lake Pontchartrain
Causeway
Longest fresh water lake : Lake Tanganyika
Longest epic : Mahabharatha
Longest wall : Great Wall of China Anne
Longest non-stop train : Flying Scotsman
Longest drought : Atacama Desert (North Chile)
Longest snake : Python
Longest dictionary : Oxford English Dictionary
Longest Airport : Dallas (USA)
Longest Railway Bridge : Lower Zambezi (Africa)
Longest Thoroughfare : Broadway (New York)
Longest shipping Canal : Baltic White Sea Canal
Longest Beach : Rio de Janeiro (Brazil)
Longest Corridor : Rameswaram Temple (India)

important Gk For Exam

*******सामान्य ज्ञान
प्रश्नावली*******
1.भारत वर्ष में दूरभाष की शुरूआत
किस वर्ष हुई?
ANS- 1951
2.भारत मे सबसे सुन्दर इमारत का नाम
क्या है?
ANS-ताजमहल
3.बर्ष का सबसे छोटा दिन कौन
सा है?
ANS-22 दिसम्बर
3.अशोक चक्र मे
कितनी तिलिया होतीहै?
ANS-24 तीलियाँ
4.भारत मे टेलिफोन कब लगा?
ANS-1888 ई॰
5.भारत मे पहली बोलती फिल्म कौन
सी है
ANS-आलमआरा
6.भारत मे सबसे पहली फिल्म कोन
सी बनी?
ANS-राजा हरिश्चन्द्र
7.राजीव गाधी के पिता का नाम?
ANS-फिरोज गाधी
8.रावण के पिता का नाम क्या है?
ANS-विश्रवा
9.भारत मे कितने राज्य है?
ANS-28 राज्य
10.विश्व मे कितनी भाषाए
बोली जाती है?
ANS-2,792 भाषाये
11.बर्ष का सबसे बडा दिन?
ANS-21 जून
12.वह कोन सा देश है जिसके चार
नामहै?
ANS-भारत हिन्दुस्तान आर्यावर्त
इण्डिया
13.विश्व का वह कौन सा देश है
जहा सिनेमाघर
नही है?
ANS-भूटान
14.विश्व का सबसे गरीब देश कोन
सा है?
ANS-भूटान
.
कृपया इस पोस्ट को ज़्यादा से
ज़्यादा शेयर करें ।।

Top Ten Vocabulary Improvement Tips



Top ten vocabulary improvement tips

Important Indian Award


List of Padma Vibhushan, Padma Bhushan, Padma Shri Awards winners on 31 March 2014 

10 Famous Hackers and Hacks


While widely used, the term hacker is not always applied as it should be. In the hacking community in particular, there can be stark divisions between hackers -- people immensely skilled at navigating computer systems and diagnosing security flaws -- and crackers -- those who use their hacking knowledge for malicious gain. This same dichotomy is sometimes represented by the terms white hat and black hat. A white hat hacker, for example, may be someone hired by a company to break into its computer network in order to find vulnerabilities. A black hat hacker is someone on the outside who would break into a system in order to cause damage or for financial gain.



Although these various definitions exist, the term hacker is now largely a stand-in for anyone who breaks into computer networks, and it often carries a negative connotation. Some have broken the law in their careers, but many have also gone on to have productive (and legal) roles in the computer industry. Those that have broken the law have complex legal cases, and their motives are not necessarily malicious. In this article, we'll look at 10 famous hackers of all stripes.




10. Kevin Mitnick


Not all hackers break the law and even fewer become the targets of FBI manhunts. But Kevin Mitnick was jailed twice -- first in 1988, and then, after a plea bargain, from 1995 until 2000. For three years, he wasn't allowed to the use the Internet. He managed to send and receive e-mail by having his girlfriend do all the clicking and typing; Mitnick just watched the screen [source:Thompson].

Mitnick often trumpeted himself more as a "social engineer" than a hacker. He said he preferred to use "persuasion, influence and manipulation" in order to solicit information from influential people -- e.g. someone with access to a tech firm's computer network, which didn't require writing new software or otherwise breaking codes to get into a network [source: Thompson].

Mitnick has been the subject of several books, including "Takedown," which was made into a movie, and he even appeared in an episode of the TV show "Alias." Since regaining his computer privileges, he has started his own security-consulting firm, in addition to making rounds on the public speaking circuit.

Hacker Kevin Mitnick was jailed twice for his crimes, once in 1988, and then again from 1995 to 2000.


9. Kevin Poulsen



Like Kevin Mitnick, Kevin Poulsen was hunted by the FBI and was the subject of a book "The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen" chronicling his hacking exploits. And like Mitnick, Poulsen eventually went straight, giving up hacking.

But before Poulsen rediscovered the right side of the law, he accrued a litany of hacking exploits, some of them illegal. While still a child, he learned how to whistle into a payphone in order to get free calls (he channeled the sound through his braces). He hacked a radio station's phone lines in order to win a call-in contest whose prize was a Porsche. He eventually earned the distinction of being the first hacker charged with espionage after he allegedly stole classified information from the Air Force [source: Markoff]. Other charges against him include hacking into Pacific Bell. Eventually he was sentenced to 51 months for his crimes.

Since giving up hacking, Poulsen has become a journalist, working as a senior editor at Wired magazine, where he often writes about hackers.

Call Sign - It may be a cliché, but many hackers do go by nicknames. Poulsen's was Dark Dante.


8. Adrian Lamo



Earlier on in his hacking career, Adrian Lamo was something of a good Samaritan, known by the moniker "the homeless hacker" because he sometimes took up residence in abandoned buildings. As a hacker, Lamo broke into the networks of a number of major companies -- Excite@Home, MCI WorldCom, Yahoo, Microsoft and Google -- but he often contacted the companies and told them about the security holes. In some cases, he also helped them fix these holes without accepting any compensation [source: TheWeek].

He finally got into trouble when he hacked into The New York Times -- from a computer at a Kinko's -- in 2003. He found a trove of information there, including personal details on thousands of people who had written for the paper, including celebrities and ex-presidents. To avoid jail time, he negotiated a plea bargain that included six months of house arrest [source:TheWeek].

In recent years, Lamo has been in the news for reporting Bradley Manning to police. Manning, a U.S. Army private first class, allegedly funneled thousands of classified documents to the whistleblower organization WikiLeaks and then contacted Lamo, who said that Manning boasted about his actions. Lamo's role in the affair, in which he presented himself as a journalist, has attracted some controversy [source: Greenwald].

Hackers' Diagnosed

In April 2010, Lamo was diagnosed with Asperger's, an autism-spectrum disorder commonly associated with people of high intelligence who have difficulty socializing [source: Poulsen].


7. Gary McKinnon



Like Adrian Lamo, Gary McKinnon has been diagnosed with Asperger's syndrome. This Scottish hacker's supporters have protested plans for the U.K. government to extradite him to the United States to face trial for allegedly hacking into U.S. government computers. Those working on McKinnon's behalf worry that he is "too psychologically fragile" and may commit suicide [source: Kennedy]. His case has contributed to a serious debate about the U.K.'s extradition policies.

McKinnon is under suspicion for hacking into U.S. government computer networks in late 2001 and early 2002, in what's been called a historic breach of security [source: Bingham]. A British court judgment accuses McKinnon of infiltrating 97 computers, installing hacking software, deleting important files and stealing information [source: England and Wales High Court]. He confessed that he left a threatening note on one Army computer, in which he identified himself by the name "SOLO."

McKinnon has admitted to the hacks and said he thought he could find evidence that United States was covering up the existence of UFOs. His case remains ongoing.

Gary McKinnon is accused of hacking into U.S. government computer networks in late 2001 and early 2002.

6. Robert Tappan Morris



Robert Tappan Morris is now a tenured professor at MIT Computer Science and Artificial Intelligence Laboratory, but he has a colorful history as one of the computer world's most renowned hackers. In 1988, while still an undergraduate at Cornell, Morris released into the wild what may have been the first computer "worm," a virus that went on to infect 6,000 Unix-based computers. Many of these machines suffered serious damage.

Although Morris claimed that he was only trying to measure the "size" of the then-embryonic Internet, the government eventually decided to prosecute him. He became the first person convicted under the 1986 Federal Computer Fraud and Abuse Act [source: Markoff]. Because of the novelty of the case and Morris' claim that he didn't intend to cause any damage, a debate ensued about whether he deserved prison time. Eventually a judge sentenced Morris to three years probation and ordered him to pay a fine and perform 400 hours of community service.

A Hacking Convention

Since 1993, the DEFCON conference has been one of the world's largest gatherings of hackers. The event features lectures, hacking contests and other events, and is attended by many well-known hackers and computer-security specialists.

5. John Draper



While many hackers go mainstream and open consulting firms or become university professors, some never quite get there, and wind up in prison or somewhere else on society's margins. John Draper is one such person. After serving as a radar technician in the Air Force in the mid-1960s, Draper began tinkering with the phone system, learning its intricacies, its internal codes (including, allegedly, a code that allowed him to get President Nixon on the phone) and how to hack the system for free calls.

For his exploits, he became known as a "phone freak," adopting the name after finding a toy whistle in a cereal box and learning that the whistle could be used to imitate telephone tones. Later, Draper linked up with Steve Wozniak, co-founder of Apple, and also wrote one of the first word processing programs eventually picked up by Apple and IBM. But his eccentric behavior, poor business sense and bad luck hampered his ability to make money and to stay in a job for long. In the late 1970s, he served two stints in prison for phone fraud.

Over the years, some of Draper's more successful Silicon Valley friends, like Wozniak, have tried to help him, but his record and behavior make him difficult to employ. A 2007 newspaper article described Draper as living in a decrepit, one-room apartment, having almost no teeth, and getting by either on the kindness of friends or occasional programming gigs [source:Rhoads].


4. The Masters of Deception

The Masters of Deception (MOD) was a group of hackers based in New York who, in the late 1980s, went on a hacking spree, taking particular advantage of the country's phone system in order to hack into various corporate and government networks.

Although members of the MOD were top-notch hackers, their big mistake likely came when they engaged in a rivalry with the Legion of Doom (LOD). The battle between the two came to be known as the Great Hacker War, although the conflict allegedly started when one LOD member used a disparaging racial epithet in reference to an MOD member. What followed was a back-and-forth battle between the hacking groups, which also involved LOD members providing security advice to corporations that MOD had targeted.

Eventually, five members of MOD pled guilty to various crimes, and four spent brief periods in jail. The groups' members dispersed, and many found work for technology and security firms. Their story has been chronicled in many articles and books, including one whose title says it all: "Masters of Deception: The Gang That Ruled Cyberspace."


3. Matthew Bevan and Richard Pryce



Some hackers steal information or money, or damage or hijack systems, but few hackers can claim to have nearly started a war. But in 1996, Matthew Bevan and Richard Pryce were accused of just that by the U.S. government. Bevan and Pryce, who are both British, were arrested separately, several months apart, for trying to break into U.S. military systems.

Bevan was a 21-year-old IT worker at the time and went by the hacker alias "Kuji," while Pryce was only 17 and known as "Datastream Cowboy" [source: Knight]. According to a U.S. government report, the two allegedly worked together for several months, first establishing an electronic beachhead on a computer system located at Griffiss Air Force Base, in New York. They then installed password-collecting programs and began hacking their way into other government systems. After discovering the intrusions, U.S. officials became especially alarmed when they found that the duo may have infiltrated a North Korean system during an especially tenuous time of negotiations with that country over its nuclear-weapons program. Because the intrusion came via a hijacked U.S. government computer, it could've been construed as an act of war. Ultimately it was discovered that the hack in question had targeted a South Korean government agency [source: U.S. Department of Agriculture].

Phone Phreaks

Among "phone phreaks" -- hackers who manipulated the pre-Internet phone system -- none were better than Joybubbles (aka Joe Engressia), a blind man with a genius-level IQ who used his perfect pitch to whistle for free phone calls.


2. Jonathan James



By age 16, Jonathan James had already achieved renowned hacker status by becoming the first juvenile hacker to be sentenced to juvenile detention for 6 months in 2000 [source: Stout]. Going by the alias "cOmrade," James was charged with hacking into computer systems belonging to NASA and the Department of Defense. His hacks were harmless, but he stole information and the security breaches required extensive downtime in order to secure the systems, which cost tens of thousands of dollars.

James' father supported his son, saying that he hadn't caused any damage and had exposed security flaws [source: Stout]. Unfortunately, after leaving the juvenile institution, James' troubles continued when he tested positive for drugs. And when his mother died when he was 18, that left him alone with her house and little motivation to work, a recipe for hacking.

In 2008, government agents raided his house as part of an investigation into what was then called the largest identity theft case in U.S. history [source: Poulsen]. James and others were suspected of hacking into the systems of many large businesses and stealing information as part of an identity and credit-card theft ring that had netted millions of dollars. Two weeks after the raid, James committed suicide. He left a suicide note explaining that, while he considered himself innocent, he believed that because of his past notoriety, federal authorities would pin the blame on him rather than other guilty parties.


1. Albert "segvec" Gonzalez



In 2009, Albert Gonzalez pleaded guilty to hacking into numerous companies' computer systems in connection with the so-called TJX identity theft ring -- the same series of crimes that led to the raid on Jonathan James' house. The group that Gonzalez was a part of stole 36 million credit card numbers from TJX, which owns TJ Maxx and other large stores, although 70 percent or so of these cards were expired [source: Zetter]. Still, the costs to the companies responding to the attacks were immense; TJX alone spent more than $170 million [source: Zetter].

What's particularly strange about Gonzalez's case is that for years he worked as an informant for the secret service, providing information on other credit card thieves. However, by continuing and even expanding his criminal behavior, he left himself open to prosecution and was eventually sentenced to 20 years in prison [source: Zetter]. Several other men also were sentenced to prison time for their participation in the ring, although Gonzalez's sentence remains the longest ever handed down to a hacker in the United States.

The TJX Ringleader

Albert Gonzalez sent the data he stole to the TJX ring's mastermind, Maksym "Maksik" Yastremskiy. He was sentenced to 30 years in prison by Turkish authorities in 2009.

-----------------------------------------------------------

Important Awards


GkD - Important Awards and Their Fields

How to Score More In SSC CGL

How to Score More In SSC CGL

This Loading Effect is Powered ByGk Darshan