-
Essay / Hacker: Kevin David Mitnick - 1649
Kevin David Mitnick was born in Los Angeles on August 6, 1963 and attended James Monroe High School in Los Angeles. He was a hacker, phreaker and social engineer, who was the most wanted in the world. computer criminal in the 90s, he was accused of numerous criminal activities for fraud and hacking into many large companies and stealing their confidential data. The Federal Bureau of Investigation arrested Kevin Mitnick on February 15, 1995. He spent nearly five years in federal prison on these charges. He is now a computer security consultant, author and ethical hacker, who started a computer security company called "Mitnick Security Consulting, LLC" and has been paid by companies for ethical hacking. He was first convicted at the age of 17. and his two friends broke into Pacific Bell's COSMOS telephone center in Los Angeles in 1981 and stole passwords, including the passwords for Pacific Bell's central office locks and some system user manuals COSMOS. One of the gang members' girlfriends disclosed the information to police. Soon, Kevin and his friends were arrested and he was sent to the Los Angeles Juvenile Detention Center for three months and was on probation for a year. In 1983, he was arrested again for breaking into a Pentagon computer via ARPANET at the University of Southern California from a computer in the campus terminal room and was sent to prison for six months at the California Youth Authority's Karl Holton Training School, a juvenile prison. In 1987, he was accused of stealing software from the software company Santa Cruz Operation for which he was on probation for 36 months. Kevin's fourth arrest occurred in 1987 and 1988 for attacking Digital Equipment's Palo Alto research laboratory. paper ......er decrypts using its private key, causing a lot of damage to everyone involved. That's why there are two types of signatures used, non-exportable signature is used between friends or known people, which is reliable to some extent, but before signing an exportable signature on someone's public key, you have to meet him before in person and exchange photos and examine his public key and verify that it is his real key and confirm that everything is fine, then only you sign some public keys with an exportable signature, otherwise it is a great risk of doing so. This is the problem encountered in pgp where anyone can place a public key on the global server using another guy's name, which causes difficulty for some people to identify the right person if they don't follow procedures and falls into the trap of pirates. This can be avoided by using signatures.