Great Programmers and Hackers Ever

Sometimes there are jobs that go recognized: this is something we see often in the IT industry.The average person recognizes the programs, but does not know who was the developer who was behind the software. So today on the day of the programmers will recognize ten programs whose work had a significant impact on our lives.
Linus Torvalds
    1. Ada Lovelace : Ada is considered the first programmer (or, indeed, the first programmer) of history. The programming language Ada was named in his honor. What was your contribution to the world of programming? Ada, daughter of poet Lord Byron, he developed his own poetry in the first algorithm designed to be processed by a machine. That was the analytical engine of Charles Babbage. Lovelace included a number of methods to estimate, using Babbage’s machine, Bernouille numbers, ie a sequence of rational numbers related to number theory.
    2. Alan Turing : we move a little further in time to get closer to the modern computer. One of the most important characters had in the development of computers as we know them today is Alan Turing. Turing formalized the concepts of computation and algorithms with theTuring machine , or as it is officially called, the machine automatically. The Turing machine can be adapted to simulate the logic of any algorithm, and helps to understand the workings of a personal computer and the limits of mechanical computation.
    3. Linus Torvalds : a list of the most famous programmers can not pass without adding the Finn Torvalds. It is the principal architect of the operating system Linux . After learning UNIX at university, began to develop what would be his thesis: Linux. Since the publication of the Linux code in 1991, today millions of people use on their personal computers. To finish, Torvalds was assisted minix programmers, so that his birth was entirely collective, with programmers around the world joining to help.
    4. Dennis Ritchie : Ritchie is best known for having developed the C language, which in turn was influenced in all sorts of programming languages and operating systems. Head of Lucent Technologies until his retirement in 2007, Ritchie is the creator of C and one of the leading developers of Unix. The C language is one of the most used in the history of programming, and provides many things. In fact, language, developed in the early ’70s, inspired other languages, like C + +, born as one of its extensions.
    5. Adi Shamir : Shamir is the co-inventor of the RSA algorithm (in fact, the S in the name comes from the name), and one of the inventors of differential cryptanalásis, so that his work has many implications in modern computing. RSA is an algorithm used in cryptography, the first that allows signatures and encryption. It is one of the tools used in e-commerce, and one of the most secure algorithms invented in the history. Another of his major contributions was the Shamir’s Secret Sharing , an algorithm that allows information to be divided into parts, with a unique part assigned to a specific user.
    6. John George Kemeny and Thomas Eugene Kurtz : These two programs were in charge back in the ’60s, in developing the BASIC programming. BASIC was the first to use simple language, and developed by these two colleagues from the University of Dartmouth. Is your purpose? Allow users who were not accustomed to programming languages known to have access to campus computers. Today, BASIC in its many variants is one of the most widely used programming languages in the world.
    7. Bill Gates : I think it is almost unnecessary to talk about Bill Gates, but if you’re writing about great programmers, it is impossible to leave out the man who developed the operating system used by the world’s computers. From designing a version of BASIC first used by computer enthusiasts, Gates joined Microsoft with Paul Allen, his fellow Harvard.One of his most memorable actions, at least for free software advocates, was an open letter that said you can not develop and maintain a software without a type of monetary compensation.
    8. Alan Cooper : Cooper is known for his role in the “humanization” of software development and Visual Basic for Microsoft. Started as a cell search system called Ruby, Cooper sold it to Gates and he decided to transform it into a development tool that joined QuickBASIC.With this tool, Windows has become a key product for the development of business applications .
    9. Richard Brodie : for people like me who use it almost constantly, Richard Brodie deserves a monument. It is the original creator of Microsoft Word , a program developed in less than seven months. This first version is just one of his works: he also wrote the first C compiler from Microsoft, the first version of Notepad, and Word for the IBM PC Jr. In fact, Brodie was so successful as a programmer named him Gates technical assistant in the early ’80s, a role from which handled the release of Word for Windows. He was also project manager Omega, which led to the birth of Microsoft Access.
    10. Brian Behlendorf : Behlendorf is a very important figure in the open source movement. He was one of the main developers of Apache Web Server, and was a member of the board of directors of the Mozilla Foundation . The astronomical growth of Internet in the last decade is due in large part, to Apache, which in 2009 became the first server to over 100 million websites. Behlendorf Apache developed to meet the most used server in the mid-90s could not tolerate the number of registered users that their new company needed.
Kurtz
Asher ross is an Expert technical writer from UK with expertise in writing articles over Cheap UK Hosting Mac OS, Apple, Mobile and UK Reseller hosting technology.

Hot Programmers

A programmer or Coder is a person who write computer programs and operating system with the help of computer languages. Today we are sharing sexiest computer enthusiasts Coders.
Sara Haider
Sara Haider is from Pakistan, but she holds Canadian nationality. She is currently working as Software Engineer at Twitter. Before for some time she worked on Google. Also involved in the development of Vine app for android.
Jade Raymond
Jade Raymond is video game designer and programmer. studied computer science at McGill University. Jade is the producer popular video game Assassin’s Creed and also she is the managing director of Ubisoft Publisher. Before Ubisoft she was working in Sony as programming games.

Amanda Wixted
Amanda Wixted is game programmer, for some time she was worked for Zynga mobile team. later she worked for Instagram. Currently she is consulting/managing few companies and she started a company Turf geography club. Amanda is also involved in the development of Farmville.
Tracy Chou
Tracy Chou was studied at Stanford University. Tracy worked for many big Companies like Google, Facebook, Quora and currently she is working for Pinterest as software engineer. 
Corrine Yu
Corrine Yu is a professional programmer/Coder, She involved in the development of Brothers in arms, Borderlands, Zombie, Unreal Engine 3 and some other games. Currently she is working as Principle Engine Architect in Microsoft’s Halo. Halo is the one of the most popular xbox video game. She won National award in 2009 for Nuclear Physics research.
Elena Silenok
Elena Silenok is well known for http://www.Clothia.com, She studied Computer science in University of California. Also a researcher at Collaborative Association for Internet Analysis. And she created network analyzer to check network data measurement.
Drew Houston 
Drew created Dropbox (One of the popular and best file hosting service), He is the Chief Executive Office of DropBox. Everyday 1 billion files uploaded to Dropbox. His Networth is $400 Million in 2011. Few months back Dropbox acquired Mailbox ( iOS email app).

Great Hackers

The term HACKER was given John Mash [A Mathematician]. For the first time technology hack discovered in 1972. Around the world Hackers have stolen $1 Trillion in Intellectual property Hacker is cleaver programmer, he/she interested in breaking computer system by using their skills. Hacking group increasing day by day.
Hacker is passionate about learning in how a system will work, and finding new things. In the business of hacking there are three types of hacker.
1. White Hat Hacker : These hackers are considered as good guys . They don’t use their hacking methods for doing illegal things. White hackers will help people from being hacked.
2. Grey Hat Hacker : Grey Hat Hackers are do both good things and bad things. They do legal and illegal things.
3. Black Hat Hacker : Black Hat Hackers are show their skill using hacking websites and stealing passwords and Creating some Trojan Malware Fuctions etc.
1. Kevin Mitnick
Kevin Mitnick is a most famous hacker. He is the author of two books The Art of Deception & The Art of Intrusion. He damaged some Communication networks like Nokia, Motorola and Sun Microsystem etc. Kevin Mitnick has damaged DEC systems source code [Digital Equipment Corporation has spent around $160,000 in cleanup the DEC systems]. To to win a bet he occupied administration privileges to IBM Computers at the Computer Learning center in LA [Los Angeles] .
2. Adrian Lamo
Adrian Lamo is a Grey Hat Hacker. Using his hacking skill he hacked many computer networks like The New York Time, Yahoo, Microsoft .
3. Gary Mckinnon
Gary Mckinnon is a Biggest Military Computer Hacker of all time. In one interview Gary Mckinnon said “Hacked into US military computer systems looking for information about UFO’s”. He Broken security systems of NASA and Pentagon And using his hacking skill he hacked 97 Computer systems [It damaged around $700,000 to the society].
Source: BBC News
4. Robert Tappan Morris
Robert Tappan Morris is Created the first Computer worm on the Internet in 1988 and named it as Morris Worm. Robert Tappan Morris now working as Professor at MIT CS and Artificial Intelligence Laboratory.
5. Jonathan James
Jonathan James is an American hacker. He damaged NASA Systems, It costed $41,000 to fix the systems. 
Jonathan stealed software from NASA It worth $1.7 Million. 

Top Hack Stories

No. 1 – Robert Tappan Morris
Even if you know next to nothing about computer viruses, you’ve probably heard of “worms.” That’s because news stories about this particularly contagious (and therefore destructive) breed of virus abound.
Blame Robert Tappan Morris for it all.
Back in 1988, while a graduate student at Cornell University, Morris created the first worm and released it on the Internet. He claimed it was all an experiment gone awry, a test to see how big the then-new Internet was. The worm turned out to be more than a test: it replicated quickly, slowing computers to the point of non-functionality and virtually crippling the Internet. He was eventually fined and sentenced to three years probation.
Since then, he’s earned his Ph.D. from Harvard and made millions designing software. Today, he’s a computer science professor at MIT. Not bad.
No. 2 – Kevin Mitnick
Kevin Mitnick started out just wanting a free ride on the bus.
He came a long way from his hacks into the Los Angeles metropolitan bus system and early dabbling in phone fraud. Mitnick went on to become the most wanted computer hacker in the country, known (and wanted) primarily for his hack into Digital Equipment Corporation’s network to steal their software.It may have been his first notable break-in, but Mitnick went on to other big targets, including cell phone giants Nokia and Motorola.
Even his eventual arrest was notable: After hacking into fellow hacker Tsutomu Shimomura’s computer, Mitnick was tracked down by Shimomura and the FBI in 1995.
Today, Mitnick has served a five-year sentence and come clean, but he continues to profit off his former title, authoring books and working as a security consultant.
No. 3 – Adrian Lamo
It’s true that companies sometimes hire hackers to test their systems for weaknesses, but no one ever hired Adrian Lamo.
In 2002 and 2003, Lamo broke into several high-profile targets, just for kicks. He then told the targets what he had been able to do and how he did it. How kind of him. Lamo’s targets included Microsoft, Yahoo and the New York Times, where he inserted his contact info into their database of experts.
Known as “the homeless hacker,” Lamo slept in abandoned buildings and hacked via laptop from Internet cafes and public libraries. His network-busting technique of choice involved going in through the out door, entering sites through proxy access, a setup that corporations often use to let their computers connect out to the Internet. That led to his arrest in 2003.
Lamo served two years probation and now works as a tech journalist.
No. 4 – Gary McKinnon (aka Solo)
Scottish-born, London-based hacker McKinnon wasn’t just in it for fun; he had a political axe to grind.
Conspiracy-theorist McKinnon broke into computers at the U.S. Department of Defense, Army, Navy, Air Force and NASA sometime in 2001 and 2002. What exactly was he looking for? Evidence of really fuel-efficient alien spacecraft, for one.
No joke.
McKinnon believes the U.S. government was hiding alien technology that could solve the global energy crisis. Now, in the process of snooping around for this stuff, the self-taught hacker concedes he may have deleted a whole bunch of other files and maybe some hard drives as he attempted to cover up his tracks. Nothing significant, he insists.
The U.S. government begs to differ, claiming McKinnon’s hack job cost them &36;700,000 to fix. They also kind of doubt the whole UFO story and wonder if his snooping had more earthly intentions. Back in the U.K., Gary’s lawyers insist that their client, who suffers from Asperger’s Syndrome, deserves special mental health considerations.
Gary himself has become a cause celebre, with his pending extradition being protested by celebrities like Sting.
No. 5 – Raphael Gray (aka Curador)
Raphael Gray called himself a saint, insisting he was only trying to help e-commerce sites when he broke into their databases to steal credit card numbers and personal information from 26,000 or so American, British and Canadian customers in 2000.
The then-18-year-old Welsh teenager insisted he was merely trying to draw attention to lax online security systems. So, if he was really just trying to help, then why did he post the card numbers online? Well, that’s another question.
Gray was sentenced in 2001 to three years of psychiatric treatment.
No. 6 – John Draper
Draper is pretty much the granddaddy of hackers.
Back in the early 1970s, he was the king of “phone phreaking,” meaning he was playing the phone company. Back in the pre-Internet, pre-personal computer days, the phone system was the big computer to beat and Draper did it well.
Draper’s breakthrough came when he and a friend realized that a toy whistle, a giveaway in a breakfast cereal box, emitted the same frequency as the tones used by AT&T switches to route phone calls.
Building off that, Draper made homemade devices, “blue boxes” that could get you all the long distance calls you wanted…for free.
What did all this get him? Some time in prison, as well as the attention of Apple co-founder Steve Wozniak, who wanted to get in on phone phreaking himself. Draper went on to write one of the first word-processing programs, EasyWriter, but now specializes in, go figure, security.
No. 7 – Kevin Poulsen (aka Dark Dante)
Today, Kevin Poulsen is an editor at tech-savvy Wired magazine, but back in the 1980s, he was just your average phone-phreaking, Porsche-driving hack.
Poulsen gained some notoriety for a clever prank he played on Los Angeles radio station KIIS, in which he rigged the phones to allow only him to get through and win a trip to Hawaii and the aforementioned Porsche.
Known as Dark Dante, Poulsen also took on more serious targets. His break-in to the FBI’s database eventually led to his 1991 arrest and five years prison time.
Since then, he’s gone respectable, retiring to the editor’s chair and using his cybersleuth powers for good deeds, like tracking sex offenders on MySpace.
No. 8 – Dmitri Galushkevich
When pretty much the whole country of Estonia was suddenly caught up in Internet gridlock in May 2007, the very-small-but-very-tech-savvy former Soviet Republic thought they knew who to blame: the Russian government.
At the time, the two countries were caught up in a series of riots over the removal of Soviet-era statues, but now it had gotten serious. The weapon of choice? A botnet.
The hackers responsible for the cyberterror hijacked computers and used them, en masse, to overload servers across the country. ATM machines didn’t work, Web pages didn’t load, government systems were shut down.
It took weeks for Estonian officials to untangle the mess and even longer for them to find the culprit: Dmitri Galushkevich, a 20-year-old ethnic Russian living in Estonia. Was he working alone? Unclear, but for wreaking this havoc, Galushkevich was fined 17,500 kroons. Or about &36; 1,620.
No. 9 – Jonathan James (aka c0mrade)
On the list of computer systems you’d want to be really, really, really secure, the Department of Defense surely shows up, which makes Jonathan James’ (aka c0mrade) break-in to the DoD’s Defense Threat Reduction Agency server all the more impressive.
James’ 1999 spree included not only the DoD, but NASA as well. The then 16-year-old used his purveyed access to steal software, not defense secrets, but James still got into some dangerous territory, including software used to control the International Space Station’s living environment.
For his crimes, he served an abbreviated minor’s sentence of six months and also had to pledge to give up computer use.
No. 10 – The Deceptive Duo
In 2002, the Deceptive Duo (really 20-year-old Benjamin Stark and 18-year-old Robert Lyttle) were responsible for a series of high-profile break-ins to government networks, including the U.S. Navy, NASA, FAA and Department of Defense.
Like so many other hackers, California-based Lyttle and Florida-based claimed they were merely trying to expose security failures and protect Americans in a post-911 world. The two hackers posted messages, left email addresses and defaced Web sites in an attempt to get the government’s attention…and get the government’s attention, they did.
Lyttle and Stark pleaded guilty in 2005. Stark was sentenced to two years probation, Lyttle served four months in prison with three years probation, and both were ordered to pay tens of thousands of dollars in restitution for the damage they caused.

Hot Hackers

Kristina Svechinskaya

Kristina Vladimirovna Svechinskaya born in February 16-1989. She is a Russian Hacker. Studied in Stavropol University. She used Malware and Trojans to steal $35,000 Million from US bank Accounts & used multiple fake passports, Kristina Svechinskaya arrested in 2010 and released under bail. Kristina dubbed as a “World Sexiest Computer Hacker”.
Anna Chapman
Anna Chapman born in February 23-1982, In June 27th 2010 she was arrested due to working on Illegals program, And she was deported back to Russia on 8th July 2010. In 2011 she hosted a TV show and then In 2012 June 8th she caught on Fashion show in Turkey.
Joanna Rutkowska
Joanna Rutkowska is security expert and security researcher. And CEO of http://www.invisiblethinglab.com . She is focusing on System level security . She is one of the hacker who Put a Mark on 2006 by eWeek magazine for her research on the topic.

Infamous Hackers In Prison

Today we are sharing an quite interesting information about some skillful hackers who are in Jail.
LulzSec
Lulz Security is Hackers group consist of 11 members, group founded by American Computer security expert “Sabu”. In 2011 they released a statement about their hacks “50 days of lulz”.
Ryan Cleary aka Viral 21 (age), 32 months prison sentence
Jake Davis aka Topiary 20 (age), 2 year prison sentence (Now he is released)
Ryan Ackroyd aka Kayla 26 (age), 30 months prison sentence
Mustafa Al-Bassam aka T-flow 18 (age), 20 months suspended sentence
Raynaldo Rivera aka neuron 21 (age), 1 year in Prison
Ryan Cleary, Ryan Ackroyd, Mustafa Al-Bassam, Jake Davis
Cyber Crimes Activities :
– Attacks on Sony pictures, compromized 1 million accounts.
– They took down CIA (Central Intelligence Agency) website
– Attacks on PBS
– Hacked fox.com
– 180 Passwords stolen from FBI partner Infragard
Lewys Martin
Lewys Martin Aka Sl1nk 21 years old British Computer Expert bring down a high profile websites like Oxford and Cambridge University sites and websites of Kent Police force jailed for two years.
Hamza Bendelladj
Mr.Hamza Bendelladj AKA Happy Hacker (24 years old) graduated in Computer Science in Algeria, Who illegally obtained money from 217 online banks, stolen millions of dollars. and FBI was searching for him from last three years. He was arrested in Thailand airport in January 2013.
Sources said with just in one bank transaction he can earn 10 to 20 Million US dollars. The Thai police said his main hacking tools were Satellite phone and Notebook Computer.
Andrew Auernheimer AKA Weev
Auernheimer is a American Grey Hat Hacker, In 2010 Weev discovered a vulnerability/fault in AT&T’s iPad users database and he was able to exploit it and it collected 114,000 email address (Including some Celebrities, Government and Military). Weev Sentenced 41 months in Prison. 
John Anthony Borell III
John Anthony Borell III 22 years years old from Toledo,Ohio. Who shared his exploits on his Twitter Account (@ItsKahuna) and encouraged hacktivists to crack websites. In 2012 Borell attacked various law enforcement agency websites agencies from Los Angeles. Also released 500 Police officers private details. 
At first He denied his cyber crime activities/Charges, Later He admitted his crimes on Computer fraud charges. Sentenced 3 Years in Prison and $227,000 for damaging Computer System.
Like the article? You should subscribe and follow us on Facebook and Twitter

Leave a comment