{"id":297,"date":"2016-07-22T20:45:46","date_gmt":"2016-07-22T20:45:46","guid":{"rendered":"http:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/?p=297"},"modified":"2016-08-07T18:17:38","modified_gmt":"2016-08-07T18:17:38","slug":"3-world-famous-hackers","status":"publish","type":"post","link":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/3-world-famous-hackers\/","title":{"rendered":"3 World Famous Hackers"},"content":{"rendered":"<p align=\"center\"><strong><a href=\"http:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/?attachment_id=254\" rel=\"attachment wp-att-254\"><img loading=\"lazy\" class=\"aligncenter  wp-image-254\" title=\"491893017\" src=\"http:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-content\/uploads\/4918930171-1024x627.jpg\" alt=\"\" width=\"640\" height=\"391\" srcset=\"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-content\/uploads\/4918930171-1024x627.jpg 1024w, https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-content\/uploads\/4918930171-300x183.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><\/strong><\/p>\n<p>Now there are actually two types of hackers. First, you have the type of hackers that are often portrayed by Hollywood as antisocial nerds that are out to rule the online world by breaking into secure networks and screwing things up. Second, you have the type of hackers who just enjoy fiddling around with software source code and hardware.<\/p>\n<p>For those that don\u2019t know, the term \u201chacker\u201d originally referred to the second type, which didn\u2019t have any malicious implications. However, recently the term is primarily used to describe criminal masterminds. There are both good and bad hackers. These days, harmless hackers are called \u201cwhite hats\u201d, while the more mischievous hackers are called \u201cblack hats\u201d.\u00a0 I have complied a list of three famous hackers that are termed black hats, and include the following:<\/p>\n<p><strong>Jonathan James- <\/strong>Jonathan James, known as \u201cc0mrade\u201d in the cyber world, was convicted of and sent to prison for hacking the United States government agencies. This all happened while he was a minor. \u00a0At the age of just fifteen, James managed to hack into networks, including those belonging to NASA and the U.S. Department of Defense.<\/p>\n<p>James hacked into NASA\u2019s network and downloaded enough source code to learn how the International Space Station operated. The total value of the assets he downloaded equaled nearly 1.7 million. To top it off, NASA had to shut down their network for three weeks while they investigated, which ended up costing them $41,000.<\/p>\n<p><strong>Kevin Mitnick- <\/strong>Kevin Mitnick was deemed the \u201cmost wanted&#8221; computer hacker in U.S. history. After Mitnick served his time for hacking into Digital Equipment Corporation\u2019s network, he was let out for three years of supervised release. However, near the end of that period he went on a two and a half year hacking spree. This hack spree involved breaching national defense warning systems and stealing corporate secrets.<\/p>\n<p>He was eventually caught and convicted, resulting in a five year prison sentence. After Mitnick served his time, he became a consultant and public speaker for computer security. Mitnick now runs Mitnick Security Consulting, LLC.<\/p>\n<p><strong>Kevin Poulsen- <\/strong>Kevin Poulsen, also known as \u201cDark Dante\u201d, gained his fame by utilizing his elaborate knowledge in telephone systems. At one point, Poulsen hack into radio station phone lines and fixed himself as a winning caller, which landed him a new Porsche. According to the media at the time he was called the \u201cHannibal Lecter of computer crime\u201d. Poulsen earned his way onto the FBI\u2019s wanted list when he hacked into the federal system and stole wiretap information. He was captured later in a supermarket and was sentence to 51 months prison time, as well as paying $56,000 in compensation.<\/p>\n<p><strong>Be sure to protect your network from potential hackers. Contact Up and Running Computer Solutions in Corona, CA 951-737-8558 to learn how to best protect you and your business from cyber attacks. Or visit <\/strong><a href=\"http:\/\/www.urcs.net\"><strong>www.urcs.net<\/strong><\/a><strong> for information regarding the services we offer. <\/strong><\/p>\n<p><strong>Up and Running Computer Solutions proudly serves Corona, Riverside, Anaheim, Irvine, Newport Beach, Tustin and all surrounding areas.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now there are actually two types of hackers. First, you have the type of hackers that are often portrayed by Hollywood as antisocial nerds that are out to rule the online world by breaking into secure networks and screwing things up. Second, you have the type of hackers who just enjoy fiddling around with software [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[62],"tags":[60,10],"_links":{"self":[{"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":3,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/posts\/297\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urcs.net\/computer-solutions-computer-repair-ca\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}