Kevin Mitnick Enters The Pentagon
It was in 1983 that Kevin Mitnick achieved his major coup, a truly impressive hack. At that time he was a student at the University of South California. Using one of the machines at the university, probably a TRS-80 equipped with a Zilog processor at 1.77 MHz, Mitnick gained access to ARPANet, the ancestor of the Internet, which was then reserved for the Army, large corporations and universities.
Mitnick's Early Glories
By infiltrating this network, he gained access to the most protected computers of the time, those of the Pentagon. He had access to all files in the US Department of Defense. There was no evidence of data theft or degradation at the time: Mitnick simply followed his curiosity and tested his abilities.
The intrusion was detected by a systems administrator, who sounded the alert. The investigation led to the author of the exploit, and Kevin Mitnick was arrested inside the university campus. He was tried and served his first real sentence for illegally accessing a computer system, spending six months in a young adult detention center.
Current page: Kevin Mitnick Enters The PentagonPrev Page Hijacking Lines: Mitnick At Work Next Page The Appearance Of Scrambled Communications
Stay on the Cutting Edge
Join the experts who read Tom's Hardware for the inside track on enthusiast PC tech news — and have for over 25 years. We'll send breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware and more straight to your inbox.
They should have very serious consequences for hackers. I'm tired of defaced websites, viruses, trojans, etc. Although it is fun to screw around with other people's computers..especially if they've done it to you...but either way there should be some huge penalties for hacking. I say chop off a thumb on the first offence. 2nd offence: chope off the rest of the fingers on that hand. Hackers along with script kiddies would cease to exist.Reply
sounds like you have been the victim of malware and virii while doing some questionable internet browsing...Reply
Well, 'Anonymous', I hope you're using Tor to browse the 'intarweb', you worthless plebian.Reply
Here in the USA, we aren't barbarians, and the only people who would even deserve such harsh treatment would be rapists and their ilk. Even so, we just lock em up and release them on probation a few months/years later. :P
Not perfect, but I say cutting off fingers because you're too stupid to take basic steps to protect your system? Kinda harsh.
The difference between a robber and a hacker, is that you can completely stop a hacker by unplugging your phone line from your modem.
Do that, for the sake of humanity. :P
Well it is important info, but i don't think you can call them the best :) they got basted after all. Governments got best hackers if you ask me.Reply
There are numerous other well documented hacks that probably deserved a mention.Reply
At least you did take the moral high ground.
You neglected to mention Electron and Phoenix ... clearly they were better than most of these mentioned here.
hmmm so this hacker list is not complete oh oh oh , you should have guys, it was most interesting reading about this. But i think hackers are a necessary evil without them how would i play my pirated games :DReply
"Well it is important info, but i don't think you can call them the best :) they got basted after all. Governments got best hackers if you ask me. "
Lol, where do you think the Government found there hackers? They hired guys like this ^^Rofl
Script kiddies. Blegh.Reply
its good to be a hacker
the best website for programming language:Reply