Prev NEXT

How Hackers Work

Famous Hackers

Steve Jobs, co-founder of Apple and pioneer hacker
Sean Gallup/Getty Images

Steve Jobs and Steve Wozniak, founders of Apple Computers, were both hackers. Some of their early exploits even resembled the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.

Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

Advertisement

Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.

Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.
Greg Finley/Getty Images

Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.

Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He's famous for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he's famous for being a senior editor at Wired magazine.

Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant -- his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.

It's likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don't really know what they are doing -- they're just using dangerous tools they don't completely understand. Others know what they're doing so well that they can slip in and out of systems without anyone ever knowing.

To learn more about hackers, follow the links below.

Related HowStuffWorks Articles

More Great Links

Sources

  • "Computer Crime & Intellectual Property Section." United States Department of Justice. http://www.usdoj.gov/criminal/cybercrime/cclaws.html
  • "Computer security." Encyclopaedia Britannica. 2007. Encyclopaedia Britannica Online. 16 Oct. 2007. http://search.eb.com/eb/article-9001626
  • "Cybercrime." Encyclopaedia Britannica. 2007. Encyclopaedia Britannica Online. 16 Oct. 2007. http://search.eb.com/eb/article-235707
  • "Google Milestones." Google.com. http://www.google.com/corporate/history.html
  • "Open source." Encyclopaedia Britannica. 2007. Encyclopaedia Britannica Online. 16 Oct. 2007. http://search.eb.com/eb/article-256443
  • "The Brute Force Algorithm, by Lineman." Hacker in the Box. January 9, 2005. http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=15172&mode=thread&order=0&thold=0
  • "The World's Billionaires." Forbes. March 8, 2007. http://www.forbes.com/lists/2007/10/07billionaires_The-Worlds-Billionaires_Rank.html
  • "UK hacker loses extradition fight." BBC News. April 3, 2007. http://news.bbc.co.uk/2/hi/uk_news/6521255.stm
  • Blau, John. "German antihacker law could backfire, critics warn." IDG News Service. August 13, 2007. http://www.infoworld.com/article/07/08/13/German-antihacker-law_1.html
  • DeAngelis, Gina. "Cyber Crimes." Chelsea House Publishers. Philadelphia. 2003.
  • Graham, Paul. "Great Hackers." July, 2004. http://www.paulgraham.com/
  • Hitchcock, J.A. "Net Crimes & Misdemeanors." Information Today, Inc. Medford, New Jersey. 2003.
  • K­nittel­­­, John and Soto, Michael. "Everything You Need to Know About The Dangers of Computer Hacking." Rosen Publishing Group, Inc. New York. 2000.
  • Leyden, John. "Briton charged with hacking loses extradition fight." The Register. April 4, 2007. http://www.securityfocus.com/news/11457
  • Robson, Gary. "How to Become a Hacker." Blacklisted! 411. December, 2003. http://www.robson.org/gary/writing/becomeahacker.html
  • Schneier, Bruce. "What is a Hacker?" Schneier on Security. September 14, 2006. http://www.schneier.com/blog/
  • Sterling, Bruce. "The Hacker Crackdown: Law and Disorder on the Electric Frontier." http://www.mit.edu/hacker/hacker.html
  • The New Hacker's Dictionary. http://www.ccil.org/jargon/jargon_toc.html
  • U.S. Federal Anti-Hacking Laws. http://www.rent-a-hacker.com/hacklaw.htm