请输入您要查询的百科知识:

 

词条 List of hackers
释义

  1. 0–9

  2. A

  3. B

  4. C

  5. D

  6. E

  7. F

  8. G

  9. H

  10. I

  11. J

  12. K

  13. L

  14. M

  15. N

  16. O

  17. P

  18. Q

  19. R

  20. S

  21. T

  22. U

  23. V

  24. W

  25. X

  26. Y

  27. Z

  28. See also

  29. References

{{pp|small=yes}}{{multiple issues|{{cleanup-list|date=October 2015}}{{famous|date=October 2015}}
}}

Here is a list of notable hackers who are known for their hacking acts.

{{Compact ToC | short1 | num=yes | sym=no | seealso=yes | notesfirst=no | further=no | extlinks=no}}

0–9

{{empty section|section=1|date=September 2015}}

A

  • Mark Abene (Phiber Optik)[1]
  • Ryan Ackroyd (Kayla)[2]
  • Mustafa Al-Bassam (Tflow)[2]
  • Mitch Altman[3][4]
  • Jacob Appelbaum (ioerror)[5]
  • Julian Assange (Mendax)[6][7]
  • Trishneet Arora
  • Andrew Auernheimer (weev)[8]

B

  • Loyd Blankenship (The Mentor)[9]
  • Erik Bloodaxe[9]
  • Max Butler

C

  • Brad Carter (RBCP, Red box Chili Pepper)
  • Jean-Bernard Condat

D

  • Kim Dotcom
  • John Draper (Captain Crunch)[12]
  • Sir Dystic

E

  • Alexandra Elbakyan
  • Nahshon Even-Chaim (Phoenix)

F

  • Ankit Fadia
  • Bruce Fancher (Dead Lord)[10]

G

  • Joe Grand (Kingpin)
  • Richard Greenblatt[11]
  • Virgil Griffith (Romanpoet)
  • Rop Gonggrijp
  • Guccifer
  • Guccifer 2.0

H

  • Jeremy Hammond
  • Susan Headley (Susan Thunder)
  • Markus Hess (hunter)[12]
  • Billy Hoffman (Acidus)
  • George Hotz (geohot)

I

J

  • The Jester (hacktivist)
  • Jonathan James
  • Joybubbles (Joe Engressia, Highrise Joe)[13][14][15]

K

  • Karl Koch (hagbard)
  • Alan Kotok
  • Patrick K. Kroupa (Lord Digital)

L

  • Adrian Lamo[16]
  • Chris Lamprecht (Minor Threat)[17]
  • Gordon Lyon (Fyodor)

M

  • MafiaBoy
  • Morgan Marquis-Boire
  • Gary Mckinnon (Solo)
  • Jude Milhon (St. Jude)
  • Kevin Mitnick (Condor)
  • Mixter
  • Hector Monsegur (Sabu)[2]
  • HD Moore
  • Robert Tappan Morris (rtm)
  • Dennis Moran (Coolio)
  • Jeff Moss (Dark Tangent)
  • Katie Moussouris
  • Andy Müller-Maguhn

N

  • Craig Neidorf (Knight Lightning)
  • Rafael Núñez (RaFa)

O

  • Beto O'Rourke (Psychedelic Warlord)

P

  • Justin Tanner Petersen (Agent Steal)
  • Kevin Poulsen (Dark Dante)

Q

{{empty section|section=18|date=March 2015}}

R

  • Grandmaster Ratte'
  • Christien Rioux (DilDog)
  • Leonard Rose (Terminus)
  • Oxblood Ruffin
  • Joanna Rutkowska

S

  • Peter Samson[11]
  • Roman Seleznev (Track2)
  • Alisa Shevchenko
  • Rich Skrenta
  • Dmitry Sklyarov
  • Edward Snowden
  • Richard Stallman (rms)[18]
  • StankDawg
  • Matt Suiche
  • Gottfrid Svartholm (Anakata)
  • Kristina Svechinskaya
  • Aaron Swartz

T

  • Ehud Tenenbaum[19]
  • Cris Thomas (Space Rogue)[20]
  • John Threat[21]
  • Topiary[2]
  • Tron (Boris Floricic)[22]
  • Justine Tunney

U

{{empty section|section=22|date=March 2015}}

V

  • Kimberley Vanvaeck (Gigabyte)

W

  • Steve Wozniak
  • Chris Wysopal (Weld Pond)[23]

X

{{empty section|section=25|date=March 2015}}

Y

  • YTCracker[24]

Z

  • Peiter Zatko (Mudge)[25]

See also

  • Tech Model Railroad Club
  • List of computer criminals
  • List of fictional hackers
  • List of hacker groups
  • List of hacker conferences
  • Hackerspace
  • Phreaking

References

1. ^{{cite web|last1=Gabriel|first1=Trip|title=Reprogramming a Convicted Hacker; To His On-Line Friends, Phiber Optik Is a Virtual Hero|url=https://www.nytimes.com/1995/01/14/nyregion/reprogramming-convicted-hacker-his-line-friends-phiber-optik-virtual-hero.html|publisher=The New York Times|accessdate=17 March 2015|date=14 January 1995}}
2. ^{{cite web|last1=Bright|first1=Peter|title="The cutting edge of cybercrime"—Lulzsec hackers get up to 32 months in jail|url=https://arstechnica.com/tech-policy/2013/05/the-cutting-edge-of-cybercrime-lulzsec-hackers-get-up-to-32-months-in-jail/|publisher=Ars Technica|accessdate=17 March 2015|date=16 May 2013}}
3. ^{{cite web|last1=Tweney|first1=Dylan|title=DIY Freaks Flock to ‘Hacker Spaces’ Worldwide|url=https://www.wired.com/2009/03/hackerspaces/|website=wired.com|publisher=Wired|date=29 March 2009}}
4. ^{{cite web|author1=Emmanuel Goldstein|author2=Mitch Altman|author3=Bre Pettis|author4="[dot]Ret"|author5=Bernie S.|author6=Jim Vichench|author7=Rob Vincent|author8=Mike Castleman|title=Off The Hook 13 January|url=http://www.2600.com/offthehook/2010/0110.html|publisher=Off The Hook, The Hacker Quarterly, WBAI|format=MP3|date=13 January 2010}}
5. ^{{cite web|last1=Rich|first1=Nathaniel|authorlink1=Nathaniel Rich (novelist)|title=The American Wikileaks Hacker|url=https://www.rollingstone.com/culture/news/meet-the-american-hacker-behind-wikileaks-20101201|publisher=Rolling Stone|accessdate=21 March 2015|date=1 December 2010}}
6. ^{{cite web|last1=Assange|first1=Julian|title=Julian Assange: 'I am – like all hackers – a little bit autistic'|url=https://www.independent.co.uk/news/uk/home-news/julian-assange-i-am-ndash-like-all-hackers-ndash-a-little-bit-autistic-2358654.html|publisher=The Guardian|date=22 September 2011}}
7. ^{{cite web|last1=Moss|first1=Stephen|title=Julian Assange: the whistleblower|url=https://www.theguardian.com/media/2010/jul/14/julian-assange-whistleblower-wikileaks|publisher=The Guardian|accessdate=21 March 2015|date=13 July 2010}}
8. ^{{cite web|last1=Zetter|first1=Kim|title=Appeals Court Overturns Conviction of AT&T Hacker ‘Weev’|url=https://www.wired.com/2014/04/att-hacker-conviction-vacated/|website=wired.com|publisher=Wired}}
9. ^{{cite book|last=Sterling|first=Bruce|authorlink=Bruce Sterling|title=The Hacker Crackdown: Law and Disorder on the Electronic Frontier|year=1991|publisher=Bantam Books|isbn=0-553-56370-X}}
10. ^{{cite web|last1=Penenberg|first1=Adam L.|title=Hacking the corporate ladder|url=https://www.forbes.com/1997/10/10/feat.html|publisher=Forbes|date=10 October 1997}}
11. ^{{cite book|last1=Levy|first1=Steven|authorlink1=Steven Levy|title="Heroes of the Computer Revolution"|date=1984|publisher=Doubleday Publishing|isbn=0-385-19195-2}}
12. ^{{cite book | author=Clifford Stoll | publisher=Doubleday | title=The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | year=1989 | isbn=0-385-24946-2 }}
13. ^{{cite book|author1=Phil Lapsley|author2=Steve Wozniak|title=Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell|date=January 2013|publisher=Grove Press|isbn=9780802120618}}
14. ^{{cite news|last1=Martin|first1=Douglas|title=Joybubbles, 58, Peter Pan of Phone Hackers, Dies|url=https://www.nytimes.com/2007/08/20/us/20engressia.html?_r=0|publisher=The New York Times|date=20 August 2007}}
15. ^{{cite news|last1=Rosenbaum|first1=Ron|title=Secrets of the Little Blue Box|url=http://www.slate.com/articles/technology/the_spectator/2011/10/the_article_that_inspired_steve_jobs_secrets_of_the_little_blue_.html|work=slate.com (7 October 2011).|publisher=Esquire Magazine|date=October 1971}}
16. ^{{cite web|url=https://www.wired.com/wired/archive/12.04/hacker_pr.html |title=Wired 12.04: The Homeless Hacker v. The New York Times |publisher=Wired.com |accessdate=August 25, 2013}}
17. ^{{cite web|last1=Heiman|first1=J.D.|title=Banned from the Internet|url=http://www.paranoia.com/~mthreat/swing.html|publisher=Swing Magazine|accessdate=4 April 2015|archiveurl=https://web.archive.org/web/19980215154642/http://www.paranoia.com/~mthreat/swing.html|archivedate=15 February 1998|pages=70–75|date=March 1997}}
18. ^{{cite book|author1=Williams, Sam|title=Free as in Freedom: Richard Stallman's Crusade for Free Software|date=1 March 2002|publisher=O'Reilly Media|isbn=0-596-00287-4|language=English|via=Free Software Foundation 2nd edition ("2.0") [https://static.fsf.org/nosvn/faif-2.0.pdf online copy]. (PDF).}} Retrieved 17 March 2015.
19. ^{{cite news|last=Reed|first=Dan|title=Whiz-kid hacker caught|url=http://www.mercurycenter.com/archives/reprints/hacker110698.htm|newspaper=San Jose Mercury News|date=November 6, 1998|author2=Wilson, David L.|archiveurl=https://web.archive.org/web/20001007150311/http://www.mercurycenter.com/archives/reprints/hacker110698.htm|archivedate=October 7, 2000}}
20. ^{{cite news |last=Penenberg |first=Adam |date=7 Feb 2000 |title=Space Rogue |url=https://www.forbes.com/2000/02/07/penenberg_0207.html#2692fae510da |work=Forbes |location=USA |access-date=25 May 2018}}
21. ^{{cite web|author1=Michelle Slatalla|author2=Joshua Quittner|title=Gang War in Cyberspace|url=http://archive.wired.com/wired/archive/2.12/hacker.html|website=archive.wired.com|publisher=Wired Magazine|accessdate=28 March 2015|page=5|date=December 1994}}
22. ^{{cite web|title=Suing Wikipedia: How a Dead Hacker Shut Down Wikipedia Germany|url=http://www.spiegel.de/international/suing-wikipedia-how-a-dead-hacker-shut-down-wikipedia-germany-a-396307.html|publisher=Spiegel Online|accessdate=28 March 2015|language=english|date=20 January 2006}}
23. ^{{cite web|author1=Fred Thompson|title=Prepared Statement of Senator Fred Thompson, Chairman Committee on Governmental Affairs|url=http://www.hsgac.senate.gov/download/?id=7ef5e7ad-2005-4006-801f-9b9c65839ded|publisher=U.S. Federal Government|format=PDF|date=24 June 1998}}
24. ^{{cite news | url = http://archives.cnn.com/1999/TECH/computing/12/22/feds.easy.hack.idg/index.html | title = Feds leave doors open for hackers | publisher = CNN | date = 1999-12-22 | author1=Diane Frank |author2=Paula Shaki Trimble }}
25. ^Hacker Mudge Gets DARPA Job

5 : Hacker culture|Hacking (computer security)|Computing-related lists|People associated with computer security|Lists of people by activity

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/17 15:15:26