SlideShare ist ein Scribd-Unternehmen logo
1 von 7
HACKING
Irene Gerasklis
Athina Zaharaki
2nd Lyceum of Kos
For years, "hacker" was a positive term that described computer enthusiasts who had a zeal for computer programming.
Those who hacked took pride in their ability to write computer programs that stretched the capabilities of computer systems
and find clever solutions to seemingly impossible problems. Although many computer enthusiasts still ascribe to this
definition, the everyday usage of the word has changed significantly. Today, "hacking" generally refers to individuals who
break into computer systems or use their programming skills or expert knowledge to act maliciously.
Some of the most common types of hacking include:
Breaking into computer networks.
Bypassing passwords or copy protection in computer software.
Defacing and damaging Internet web sites.
Causing a denial of service attack on a web site or network.
Stealing valuable information such as passwords and credit card data.
What are hackers?
Hackers are people who try to gain unauthorised access to
your computer. This is normally done through the use of a
'backdoor' program installed on your machine. You can
protect yourself from these by using a firewall and a good up-
to-date anti-virus program. You would normally get such a
backdoor program by opening an E-mail attachment
containing the backdoor program. It is normal for such a
backdoor program to send out more copies of itself to
everyone in your address book, so it is possible for someone
you know to unintentionally send you a malicious program. A
few backdoor programs can work with any e-mail program by
sitting in memory and watching for a connection to a mail
server, rather than actually running from within a specific mail
program. These programs automatically attach themselves to
any e-mail you send, causing you to unintentionally send out
malicious programs to your friends and associates.
Why do hackers hack?
To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically
intend to do damage to the computer. The thrill of simply gaining access is often enough.
Hackers often try to show off their skills to the world by hacking into government computers,
or as revenge against another user or agency. Hackers are indeed as the stereotype depicts
them as young males with a thirst for knowledge. Despite rumours, all hackers do not wear
nerdy glasses.
What damage can a hacker do?
This depends upon what backdoor program are hiding on your PC. Different programs can do
different amounts of damage. However, most allow a hacker to smuggle another program
onto your PC. This means that if a hacker can't do something using the backdoor program, he
can easily put something else onto your computer that can. Hackers can see everything you
are doing, and can access any file on your disk. Hackers can write new files, delete files, edit
files, and do practically anything to a file that could be done to a file. A hacker could install
several programs on to your system without your knowledge. Such programs could also be
used to steal personal information such as passwords and credit card information. Some
backdoor programs even allow a hacker to listen in on your conversations using your
computer's microphone if one is attached!
Types of hackers
Hackers often can be characterized by their motives. The following are the more common
types of hackers and the motives they cite:
Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely
to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony
bomb threats. Copycat hackers would also fall into this category.
Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these
individuals target high-profile sites such as Yahoo, eBay, or NASA to achieve bragging rights
among their peers.
Educational: Students justify hacking into systems by saying that they are honing their
programming skills.
Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied:
"That’s where the money is." Stored data or "data at rest" is more profitable to steal than
data moving over the Internet. Why steal one credit card number at a time when you can
steal tens of thousands to millions with one break-in? This happened to CDUniverse and
RealNames. Pacific Bell had to have more than 60,000 customers change their passwords
after hackers stole them.
Jonathan James
Kevin Mitnick
Albert Gonzalez
Kevin Poulsen
Gary McKinnon
5 Of The World’s Most Famous Hackers
http://www.encyclopedia.com/topic/Hacking.aspx
http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-
hackers-what-happened
http://en.m.wikipedia.org/wiki/Hacker_(computer_security)
Sources

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hackingleet detected
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tacticsFariha Khudzri
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: HackingQhaiyum Shah
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 

Was ist angesagt? (19)

Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
HACKING
HACKINGHACKING
HACKING
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
185
185185
185
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 

Andere mochten auch

B. κακόβουλο λογισμικό
B. κακόβουλο λογισμικό B. κακόβουλο λογισμικό
B. κακόβουλο λογισμικό Athina MINAIDI
 
Β. Kakoboylo logismiko
Β. Kakoboylo logismikoΒ. Kakoboylo logismiko
Β. Kakoboylo logismikoAthina MINAIDI
 
1. πολυχωρος σφαγειου
1. πολυχωρος σφαγειου1. πολυχωρος σφαγειου
1. πολυχωρος σφαγειουgxart
 
B. ΛΟΓΟΚΛΟΠΗ ΙΙ
B. ΛΟΓΟΚΛΟΠΗ ΙΙB. ΛΟΓΟΚΛΟΠΗ ΙΙ
B. ΛΟΓΟΚΛΟΠΗ ΙΙAthina MINAIDI
 
2. παρελθόν
2. παρελθόν2. παρελθόν
2. παρελθόνgxart
 
η βιβλιοθηκη του σχολειου μου
η βιβλιοθηκη του σχολειου μουη βιβλιοθηκη του σχολειου μου
η βιβλιοθηκη του σχολειου μουgxart
 
Β. ΛΟΓΟΚΛΟΠΗ Ι
Β. ΛΟΓΟΚΛΟΠΗ ΙΒ. ΛΟΓΟΚΛΟΠΗ Ι
Β. ΛΟΓΟΚΛΟΠΗ ΙAthina MINAIDI
 
προτάσεις
προτάσειςπροτάσεις
προτάσειςgxart
 

Andere mochten auch (10)

B. κακόβουλο λογισμικό
B. κακόβουλο λογισμικό B. κακόβουλο λογισμικό
B. κακόβουλο λογισμικό
 
Β. Kakoboylo logismiko
Β. Kakoboylo logismikoΒ. Kakoboylo logismiko
Β. Kakoboylo logismiko
 
1. πολυχωρος σφαγειου
1. πολυχωρος σφαγειου1. πολυχωρος σφαγειου
1. πολυχωρος σφαγειου
 
Β. έκθεση
Β. έκθεσηΒ. έκθεση
Β. έκθεση
 
B. ΛΟΓΟΚΛΟΠΗ ΙΙ
B. ΛΟΓΟΚΛΟΠΗ ΙΙB. ΛΟΓΟΚΛΟΠΗ ΙΙ
B. ΛΟΓΟΚΛΟΠΗ ΙΙ
 
2. παρελθόν
2. παρελθόν2. παρελθόν
2. παρελθόν
 
η βιβλιοθηκη του σχολειου μου
η βιβλιοθηκη του σχολειου μουη βιβλιοθηκη του σχολειου μου
η βιβλιοθηκη του σχολειου μου
 
Β. ΛΟΓΟΚΛΟΠΗ Ι
Β. ΛΟΓΟΚΛΟΠΗ ΙΒ. ΛΟΓΟΚΛΟΠΗ Ι
Β. ΛΟΓΟΚΛΟΠΗ Ι
 
προτάσεις
προτάσειςπροτάσεις
προτάσεις
 
Β.erasmus site
Β.erasmus siteΒ.erasmus site
Β.erasmus site
 

Ähnlich wie Β. Hucking

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs crackingNaren Naren
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 

Ähnlich wie Β. Hucking (20)

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 

Mehr von Athina MINAIDI

Ecclesiastical nursing home in Kos, Greece
Ecclesiastical nursing home in Kos, GreeceEcclesiastical nursing home in Kos, Greece
Ecclesiastical nursing home in Kos, GreeceAthina MINAIDI
 
20 environmental expressions
20 environmental expressions20 environmental expressions
20 environmental expressionsAthina MINAIDI
 
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑ
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑΑ. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑ
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑAthina MINAIDI
 
Β. ΛΟΓΟΚΛΟΠΗ
Β. ΛΟΓΟΚΛΟΠΗΒ. ΛΟΓΟΚΛΟΠΗ
Β. ΛΟΓΟΚΛΟΠΗAthina MINAIDI
 
Prodject peiratia κοζαταπανης σεχαι αδιορθωτο
Prodject peiratia κοζαταπανης σεχαι αδιορθωτοProdject peiratia κοζαταπανης σεχαι αδιορθωτο
Prodject peiratia κοζαταπανης σεχαι αδιορθωτοAthina MINAIDI
 
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτο
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτοPowerpoint peirateia κοζαταπανης σεχαι αδιορθωτο
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτοAthina MINAIDI
 
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟ
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟ
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟAthina MINAIDI
 
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗ
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗ
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗAthina MINAIDI
 
Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Athina MINAIDI
 

Mehr von Athina MINAIDI (20)

Giannis antetokounmpo
Giannis antetokounmpoGiannis antetokounmpo
Giannis antetokounmpo
 
Hatziemmanouil winery
Hatziemmanouil   wineryHatziemmanouil   winery
Hatziemmanouil winery
 
Ecclesiastical nursing home in Kos, Greece
Ecclesiastical nursing home in Kos, GreeceEcclesiastical nursing home in Kos, Greece
Ecclesiastical nursing home in Kos, Greece
 
20 environmental expressions
20 environmental expressions20 environmental expressions
20 environmental expressions
 
A.IOI HY
A.IOI HYA.IOI HY
A.IOI HY
 
A. Meeting in Norway
A. Meeting in NorwayA. Meeting in Norway
A. Meeting in Norway
 
A. DARK NET TOTAL
A. DARK NET TOTALA. DARK NET TOTAL
A. DARK NET TOTAL
 
A. IOI
A. IOIA. IOI
A. IOI
 
A. DARK NET I
A. DARK NET IA. DARK NET I
A. DARK NET I
 
A. DARK NET II
A. DARK NET IIA. DARK NET II
A. DARK NET II
 
A. DARK NET III
A. DARK NET IIIA. DARK NET III
A. DARK NET III
 
A. IOI ERGASIA
A. IOI ERGASIAA. IOI ERGASIA
A. IOI ERGASIA
 
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑ
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑΑ. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑ
Α. ΙΟΙ ΚΑΙ ΠΡΟΣΤΑΣΙΑ
 
Β. ΛΟΓΟΚΛΟΠΗ
Β. ΛΟΓΟΚΛΟΠΗΒ. ΛΟΓΟΚΛΟΠΗ
Β. ΛΟΓΟΚΛΟΠΗ
 
Prodject peiratia κοζαταπανης σεχαι αδιορθωτο
Prodject peiratia κοζαταπανης σεχαι αδιορθωτοProdject peiratia κοζαταπανης σεχαι αδιορθωτο
Prodject peiratia κοζαταπανης σεχαι αδιορθωτο
 
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτο
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτοPowerpoint peirateia κοζαταπανης σεχαι αδιορθωτο
Powerpoint peirateia κοζαταπανης σεχαι αδιορθωτο
 
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟ
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟ
ΕΡΓΑΣΙΑ ΝΤΟΥΡΟ ΝΤΕΝΙΣΑ ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜΙΚΟ
 
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗ
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗ
ΕΡΓΑΣΙΑ ΑΝΝΑ ΕΤΕΜ ΛΟΓΟΚΛΟΠΗ
 
Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Internet addiction 9. febr 2015
Internet addiction 9. febr 2015
 
2nd Lyceum of Kos
2nd Lyceum of Kos2nd Lyceum of Kos
2nd Lyceum of Kos
 

Β. Hucking

  • 2. For years, "hacker" was a positive term that described computer enthusiasts who had a zeal for computer programming. Those who hacked took pride in their ability to write computer programs that stretched the capabilities of computer systems and find clever solutions to seemingly impossible problems. Although many computer enthusiasts still ascribe to this definition, the everyday usage of the word has changed significantly. Today, "hacking" generally refers to individuals who break into computer systems or use their programming skills or expert knowledge to act maliciously. Some of the most common types of hacking include: Breaking into computer networks. Bypassing passwords or copy protection in computer software. Defacing and damaging Internet web sites. Causing a denial of service attack on a web site or network. Stealing valuable information such as passwords and credit card data.
  • 3. What are hackers? Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewall and a good up- to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.
  • 4. Why do hackers hack? To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses. What damage can a hacker do? This depends upon what backdoor program are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!
  • 5. Types of hackers Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite: Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category. Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo, eBay, or NASA to achieve bragging rights among their peers. Educational: Students justify hacking into systems by saying that they are honing their programming skills. Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied: "That’s where the money is." Stored data or "data at rest" is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.
  • 6. Jonathan James Kevin Mitnick Albert Gonzalez Kevin Poulsen Gary McKinnon 5 Of The World’s Most Famous Hackers