List of hackers

Summary

Here is a list of notable hackers who are known for their hacking acts.

0–9 edit

A edit

B edit

C edit

D edit

E edit

F edit

G edit

H edit

I edit

J edit

K edit

L edit

M edit

N edit

O edit

P edit

Q edit

R edit

S edit

T edit

U edit

V edit

W edit

X edit

Y edit

Z edit

See also edit

References edit

  1. ^ Gabriel, Trip (14 January 1995). "Reprogramming a Convicted Hacker; To His On-Line Friends, Phiber Optik Is a Virtual Hero". The New York Times. Retrieved 17 March 2015.
  2. ^ a b c d Bright, Peter (16 May 2013). ""The cutting edge of cybercrime"—Lulzsec hackers get up to 32 months in jail". Ars Technica. Retrieved 17 March 2015.
  3. ^ Tweney, Dylan (29 March 2009). "DIY Freaks Flock to 'Hacker Spaces' Worldwide". wired.com. Wired.
  4. ^ Emmanuel Goldstein; Mitch Altman; Bre Pettis; [dot]Ret; Bernie S.; Jim Vichench; Rob Vincent; Mike Castleman (13 January 2010). "Off The Hook 13 January" (MP3). Off The Hook, 2600: The Hacker Quarterly, WBAI.
  5. ^ Rich, Nathaniel (1 December 2010). "The American Wikileaks Hacker". Rolling Stone. Retrieved 21 March 2015.
  6. ^ Assange, Julian (22 September 2011). "Julian Assange: 'I am – like all hackers – a little bit autistic'". The Guardian.
  7. ^ Moss, Stephen (13 July 2010). "Julian Assange: the whistleblower". The Guardian. Retrieved 21 March 2015.
  8. ^ Zetter, Kim. "Appeals Court Overturns Conviction of AT&T Hacker 'Weev'". Wired. Wired.
  9. ^ a b Sterling, Bruce (1991). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books. ISBN 0-553-56370-X.
  10. ^ "Teen 'Cyber Anakin' hacker wants revenge on Russia after the MH17 crash". news.com.au. 5 March 2016. Retrieved 1 June 2019.
  11. ^ a b Rosenbaum, Ron (October 1971). "Secrets of the Little Blue Box". slate.com (7 October 2011). Esquire Magazine.
  12. ^ Penenberg, Adam L. (10 October 1997). "Hacking the corporate ladder". Forbes.
  13. ^ a b Levy, Steven (1984). "Hackers: Heroes of the Computer Revolution". Doubleday Publishing. ISBN 0-385-19195-2.
  14. ^ Clifford Stoll (1989). The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Doubleday. ISBN 0-385-24946-2.
  15. ^ Phil Lapsley; Steve Wozniak (January 2013). Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell. Grove Press. ISBN 9780802120618.
  16. ^ Martin, Douglas (20 August 2007). "Joybubbles, 58, Peter Pan of Phone Hackers, Dies". The New York Times.
  17. ^ Kahn, Jennifer. "Wired 12.04: The Homeless Hacker v. The New York Times". Wired. Retrieved August 25, 2013.
  18. ^ Heiman, J.D. (March 1997). "Banned from the Internet". Swing Magazine. pp. 70–75. Archived from the original on 15 February 1998. Retrieved 4 April 2015.
  19. ^ Williams, Sam (1 March 2002). Free as in Freedom: Richard Stallman's Crusade for Free Software. O'Reilly Media. ISBN 0-596-00287-4 – via Free Software Foundation 2nd edition ("2.0") online copy. (PDF). {{cite book}}: External link in |via= (help) Retrieved 17 March 2015.
  20. ^ Reed, Dan; Wilson, David L. (November 6, 1998). "Whiz-kid hacker caught". San Jose Mercury News. Archived from the original on October 7, 2000.
  21. ^ Penenberg, Adam (7 Feb 2000). "Space Rogue". Forbes. USA. Retrieved 25 May 2018.
  22. ^ Michelle Slatalla; Joshua Quittner (December 1994). "Gang War in Cyberspace". archive.wired.com. Wired Magazine. p. 5. Retrieved 28 March 2015.
  23. ^ "Suing Wikipedia: How a Dead Hacker Shut Down Wikipedia Germany". Spiegel Online. 20 January 2006. Retrieved 28 March 2015.
  24. ^ Fred Thompson (24 June 1998). "Prepared Statement of Senator Fred Thompson, Chairman Committee on Governmental Affairs" (PDF). U.S. Federal Government.
  25. ^ Diane Frank; Paula Shaki Trimble (1999-12-22). "Feds leave doors open for hackers". CNN. Archived from the original on 2010-05-29. Retrieved 2015-03-21.
  26. ^ Hacker Mudge Gets DARPA Job