5. Kevin Poulsen

Kevin Poulsen, or better known as Dark Dante. Initiate action sengan radiotelephone network hacking Kii-FM Los Angeles, this action earned him a Porsche. Poulsen FBI began hunting for hacking into the FBI database and federal computers for wiretap information. Poulsen is a hero to Hack a phone network and Poulsen was arrested at a supermarket in the rewards and punishments five years. Since the resistance, Poulsen worked as a journalist and was promoted to senior editor in a reputable newspaper (Wired News). Identify the most popular article is someone accused of sexual harassment in the 744 Myspace profile.

4. Robert Tappan Morris

Robert is the son of Robert Tappan Morris, a former scientist of the National Security Agency. Robert is the creator of the "Morris worm". This worm is the first worm that spreads via the Internet. Robert Morris created the worm just to know the size of the Internet world at that time. This worm merepropduksi himself without being able to be controlled, shutting down thousands of computers until the computer is really not working. Robert is now a Professor at the MIT Artificial INTELLIGIENCE 
INTERNATIONAL COMPUTER SCIENCE LABORATORY and the focus is computer and network architectures.

3. Jonatan James

At the age of 16 years, is the youngest hacker in jebloskan jail for hacking her action. James is the greatest action when he was hacking into the Defense Threat AGENCY REDUCTION, which is a branch of the U.S. Department of Homeland Security. Through this action, he was able to steal usernames, passwords and e mail to see e-mail confidential. James also hacked in NASA computers and stole software valued at U.S. $ 1.7 million. Justices Dapartement The United States said that software stolen by James related to the international space station, including temperature and humidity settings in space. Caused James, NASA had to close all its computer network at a cost of U.S. $ 41,000. Today James became a computer security expert at a large company

2. Adrian Lamo

Adrian Lamo is time to break down large companies such as MICROSOFT, and THE NEW YORK TIMES. Lamo using internet connection from Cafe-cafe, library and Lamo Kinko and got the nickname "The Homeless Hacker". Lamo frequently found security holes in software and menjebolnya famous. Because ulahnya network hacking into The New York Times, Lamo become the top target of security forces and are required to pay U.S. $ 65,000 as compensation. In addition, Lamo was sentenced to six months and two years of the experiment. Lamo is now a public speaker and journalist berpretasi.

1. Kevin Mitnick

Kevin Mitnick is a young man born in America, August 1963, a young man with extraordinary abilities, the family was not the one kevin was so familiar with computers and acquire capabilities in RadioShack stores and public libraries where he used to spend time, but the story of Kevin Mitnick is not the beginning of a good story- well, at the age of 17 years began to feel the chill caused by iron railings on a computer hacking Cosmos (Computer System Operation Mainstrem) owned telephone company Pacific Bell in Los Angeles,

To Change Windows 7 Icons


Microsoft has always been successful in changing the way we look at our operating systems. Right from the time of the Disk Operating System, it has been instrumental in enhancing operating systems and enhancing the user experience when it comes to Operating System. With Windows 7, it has taken the concept of Operating Systems to a whole new level.

Tricks to Help You Keep Your Laptop Functioning Normal


Laptop or computer viruses are spreading widespread among online consumers as of late mainly because it's very easy for the cyberpunk to wind up in your personal machine. Such different spy ware ailments enter the particular computer systems which enables it to truly slow your pc down or perhaps ruin it completely. Some malware are used against you that will steal your private data that you distribute on different sites.

New USB Flash Drive


USB flash drives have been a popular device by the time it is available in the market with all good demand. An USB flash drive is a storage device of small size used to transfer files from one system to other. They are compact in size and quite easy in use. It is similar to computer hard drives which can easily keep in pocket and movable from one place to other.

Keylogger


Our lives, study, and working are making a closely knit with it. Nevertheless it' s also a place where is full of both danger and predator. Stealing personal information by means varying from social security number, credit card number, and passwords to just about everything, This reality resulted in the development of many utilities. Amongst them there are the key loggers.

Protecting Your PC From Internet Dangers


If you buy items online, surf the internet or use email then here are several tips to keeping your computer and your personal information secure.

Many people find it very easy to safeguard themselves by installing antivirus protection. Most antivirus protection software protects your computer from known viruses and Trojan horses. If a new virus is detected, your virus software will automatically download the new definition so that your computer will be safe.

Safe Surfing


If you’re going to connect to the internet, you need to protect your computer, otherwise it’s like leaving your front door wide open with a big ‘Robbers Welcome’ doormat on your front step. You’ve probably heard all the terms – such as virus, hacker, firewall, spyware and a million more – but perhaps think that the anti-virus programme that came with the computer, or that your PC-savvy mate downloaded for you is enough to keep you safe, right? Wrong …

Hardware


A personal computer is made up of multiple physical components of computer hardware, upon which can be installed an operating system and a multitude of software to perform the operator's desired functions.
Though a PC comes in many different forms, a typical personal computer consists of a case or chassis in a tower shape (desktop) and the following parts:

Preventing Password Hackers

PC security and safety is always an issue nowadays thanks to the advent of computer technology and the Internet. More computer intruders are boldly coming forward and are looking for ways to attack helpless computer users with valuable information stored in their PCs. Intruders are getting their hands on the latest security measures brought out by various developers and are looking for ways to get through them.

Overcoming Program Not Responding

When using the computer, some programs that have been opened often experienced not responding. This, to slow down other programs, waiting for the program is closed. If the process fails, you have to open the Task Manager with Ctrl + Alt + Del. Will surely annoy you. It would be better if the program is not responding quickly closed automatically. Here are the steps:

1. Open Regitry Editor

2. In the Registry Editor window, click the HKEY_USERS> DEFAULT> ControlPanel> Desktop.

3. See the entry on the window right AutoEndTasks If entry is missing, then you must make the first step right-click with your mouse to the right, select New> DWORD Value and give name AutoEndTasks.

4. Double-click the entry, give the value 1 in Value Data.

5. Click Ok, refresh (F5), and close the registry and restart the computer.

Not at all easy and you will not be disappointed if your computer error