měi guó zuòzhělièbiǎo
fēi William Marrài lún · Edgar Alan Poeài shēng Ralph Waldo Emerson
huì màn Walt Whitman gēngshēng Emily Dickinson fēn · lán Stephan Crane
shǐ wén Wallace Stevens luó Robert Frost 'ěr · sāng bǎo Carl Sandberg
wēi lián William Carlos Williamspáng Ezra Pound 'ěr Hilda Doolittle
ào dēng Wystan Hugh Auden míng E. E. Cummings · lāi 'ēn Hart Crane
luó · dèng kěn Robert Duncanchá 'ěr · ào 'ěr sēn Charles Olsonā mén A. R. Ammons
jīn bǎo Allen Ginsbergyuē hàn · ā shénbǎi John Ashberyzhān · tài James Tate
lán dūn · xiū Langston Hughes wēn W. S. Merwinluó · lāi Robert Bly
xiào Elizabeth Bishopluó · luò wēi 'ěr Robert Lowell Sylvia Plath
yuē hàn · bèi màn John Berrymanān · sài dùn Anne Sexton nuò W. D. Snodgrass
lán · ào Frank O'Hara luò L.D. Brodskyài · luò wēi 'ěr Amy Lowell
āi · shèng wén sēn · lěi Edna St. Vincent Millay · tái 'ěr Sara Teasdale Edgar Lee Masters
wēi lián · William Staffordài 'ān · Adrienne Rich wèi · nèi tuō David Ignatow
jīn nèi 'ěr Galway Kinnell · 'ěr Sidney Lanierhuò huá · nài luò Howard Nemerov
· ào Mary Oliverā · mài 阿奇波德麦 Kerry Xujié shī xuǎn Robinson Jeffers
· Louise Glückkǎi · lāi Kate Lightshī jiā zhāng Arthur Sze
yáng Li Young Lee 'ā nuò L. S. Stavrianosā Art
fèi xiáng Kris Phillips huì xīn eVonnejié luó · wèi · sài lín Jerome David Salinger
· ào Barack Hussein Obamazhū lín · qiáo sài 'ěr sēn Josselson, R.zhān · tài 詹姆斯泰伯
wēi lián · ēn dào 'ěr Frederick William Engdahl · pèi 'ēn Mark - Payne - 'ěr Raj - Patel
kǎi wén · Kevin Mitnick
měi guó xiàn dài měi guó  (1963niánbāyuè6rì)
jíguàn: měi guó jiā zhōu de luò shān

xìn xué information science piàn de shù

yuèdòukǎi wén · Kevin Mitnickzài百家争鸣dezuòpǐn!!!
凯文·米特尼克
凯文·米特尼克
  kǎi wén · ( KevinDavidMitnick), 1964 nián shēng měi guó jiā zhōu de luò shān zhǐ yòu 3 suì de shí hòu de jiù liǎo gēn zhe qīn shēng huóhěn kuài jiù xué huì liǎo dàn de zài yòu xiǎo de xīn líng shēn chù zào chéng liǎo hěn de chuāngshāngshǐ xìng nèi xiàngchén guǎ yán bèi chēng wéi shì shì jiè shàng tóu hào diàn nǎo hēi yòu píng lùn chēng wéishì jiè tóu hào hēi ”。 zhè wèizhù míng rén de shù bìng shì hēi zhōng zuì hǎo deshèn zhì xiāng dāng duō de hēi mendōu fǎn gǎn rèn wéi shì zhǐ huì yòng gōng dǒng shù de gōng kuángdàn shì hēi jīng shì de chuán xìng zhàn quán shì jiè wéi zhī zhèn jīng shǐ suǒ yòu wǎng luò 'ān quán rén yuán diū jìn miàn
   jiē chù suàn zài shí suì de shí hòu hái mǎi de suàn zhǐ néng lài zài jiā mài xiàn diàn de xiǎo shāng diàn yòng de yàng pǐn tiáozhì jiě diào lái hào dào suàn
   de gōng zài qián táo de sān nián miàn zhù yào kào huó lián wǎng zhōng liáo tiān gōng ( IRC) lái xiāo tóng péng yǒu lián
   xiǎnwéirénzhī de shì shí céng bèi pàn dào shè zhì liáo zhōng xīn zhì liáo niánzài zhè duàn shí jiān wèile jiè diào de suàn yǐn céng jīng dēng cān jiā liǎo xiàng zhuān wéi zhǒng yǐn jūn zhǔn bèi de 12 jìhuà
   kǎi wén · - jīng
   tiān yīng cái
   3 suì shí zhè duàn jīng lìng xiǎo de xìng biàn 。 70 nián dài , 13 suì de ( dāng shí hái zài shàng xiǎo xué ) huān shàng liǎo xiàn diàn huó dòngzài shì jiè xiàn diàn 'àihào zhě lián luò shí lǐng lüè dào liǎo kuà yuè kōng jiān de hěn kuài duì shè xiǎo xué shēng wéi de tái diàn nǎo zhe liǎo bìng yīn zhǎng liǎo fēng de suàn zhī shí gāo chāo de cāo zuò néngzhè bèi lǎo shī men zhì rèn wéi cōng míngyòu péi yǎng qián de hái què gān liǎo jiàn lìng rén men zhèn jīng de shì yòng xué xiào de suàn chuǎng liǎo xué xiào de wǎng luòcóng xiǎo kāi liǎo xué xiào
   qīn de chéng gōnglìng xīng fèn yòng gōng zuàn de qián gòu mǎi liǎo tái dāng shí xìng néng cuò de suàn bìng yuǎn yuǎn chāo chū nián líng de nài xīn chuǎng liǎo shén de hēi shì jiè。 15 suì shí chéng gōng qīn liǎoběi měi kōng zhōng fáng zhǐ huī tǒngde zhù zhè qīnchéng wéi hēi shǐ shàng de jīng diǎn zhī zuò
   qīnběi měi kōng zhōng fáng zhǐ huī tǒng jiǔ yòu chéng gōng měi guótài píng yáng diàn huà gōng zài nán jiā zhōu tōng xùn wǎng luò degǎi ”。 shàonián wán de tiān xìnglìng suí gēnggǎi zhè jiā gōng de diàn nǎo yòng bié shì zhī míng rén shì de diàn huà hào tōng xùn zhǐ shí jiānyòng men bèi zhēténg xiào tài píng yáng gōng lián lián dào qiàngōng zhōng xiàn zhè shì diàn nǎo chū liǎo zhàngér shì yòu rén liǎo dàn men xiū gǎi de jiù cuò shī zài miàn qián shì diāo chóng xiǎo liǎo
   shǒu bèi
   lián de chéng gōng 'àn lìng xìn xīn zēng jiāng biāo suǒ dìng dào liǎo měi guó lián bāng diào chá (FBI) de diàn nǎo wǎng luò shàng tiān xiàn FBI de gōng men zhèng diào chá míng diàn nǎo hēi biàn ráo yòu xīng tōu yuè gōng men de diào chá liàokàn zhe kàn zhe rán chī jīngbèi diào chá zhě jìng rán shì ! shī zhǎn hún shēn xièshù liǎo lián bāng diào chá dezhōng yāng diàn nǎo tǒng měi tiān rèn zhēn chá yuèàn qíng jìn zhǎn qíng kuàng de bào gào”。 jiǔ jiù duì gōng men xiè liǎo kāi shǐ cháo xiào zhè xiē gōng rén yuánduì diào chá de gōng xiè bìng 'è zuò jiāng men de liào gǎi chéng shí de zuì fàn guòpíng jiè xiān jìn dediàn nǎo wǎng luò xìn gēn zōng ”, gōng rén yuán hái shì jiāng huò liǎodāng gōng men xiàn zhè míng nòng men láng bèi kān de hēi jìng shì míng mǎn 16 suì de hái shí jīng 'ě wàn fēnyóu dāng shí wǎng luò fàn zuì hái shì hěn xīn xiān de shì shàng xiǎnyòu xiān yuàn zhǐ jiāng sòng jìn liǎo shàonián fàn guǎn jiào suǒ chéng liǎo shì jiè shàng diàn nǎo wǎng luò shàonián fàn”。
   bèi FBI tōng
   hěn kuài jiù bèi jiǎ shì liǎo guò bìng wèi shōu shǒu, 1983 niányīn fēi tōng guò ARPA wǎng jìn jiǎo lóu de diàn nǎo wǎng luò 'ér bèi pàn zài qīng nián guǎn jiào suǒ 6 yuè。 1988 nián yīn wéi qīn shù shè bèi gōng DEC zài bèi 。 1990 nián guāng tóu xiàng liǎo xiē xìn cuò de gōng zài hěn duǎn de shí jiān lián jìn liǎo měi guó 5 jiā gōng (Sun、 Novell、 NEC、 Nokia Motorola) de wǎng luòxiū gǎi suàn zhōng de yòng liàozhèng dāng jǐng fāng zhǔn bèi zài jiāng dài shí què rán xiāo shīguò liǎo liú wáng de xià shēng huó
   wéi jìn kuài jiāng zhuō guī 'àn, 1993 niánlián bāng diào chá shè xià juàn tào yòng míng bèi shōu mǎi de hēi yòu shǐ fàn 'àn zài huò zài zhī nèi de qíng kuàng xià yòu qīn jiā diàn huà wǎng, FBI zài qìng xìng men shè chéng gōng shí què zài qīng sōng jìn FBI de nèi wǎng bìng hěn kuài kuài shí men de juàn tào 'ér táo zhī yāo yāowèicǐměi guó lián bāng diào chá zài quán guó fàn wéi chū liǎo duì de tōng lìng yīn chéng wéi bèi měi guó FBI tōng de suàn hēi 'ér yǐn shì rén guān zhù。 1994 nián 7 yuè bèishí dài zhì xuǎn wéi fēng miàn rén méi chēng wéi suǒ néng suí shí dòng diàn nǎo zhàn zhēng de chāo rén shí bèi liè FBI shí tōng fàn de hángliè
   huá tiě
  1994 nián 12 yuè 25 xiāo shī de zài chū shǒuzhè de biāo shì shèng dié chāo suàn zhōng xīnyīn wéi zhè gōng huò liǎo hēi de chēng hào yīn wéi zhè gōng liǎo wèi zhù míng de suàn 'ān quán zhuān jiā ---- xià cūn miǎncóng 'ér dǎo zhì liǎo shēng zhōng zuì de huá tiě xià cūn miǎn shì wèi suàn zhuān jiādāng shí shèng dié chāo suàn zhōng xīn suàn shù de 'ān quán de qīn xíng wéi shǐ fēi cháng zhèn wéi wǎn huí de sǔn shī jiào xùn xià cūn miǎn zhè wèi suàn gāo shǒu jué dìng yòng jīng zhàn de 'ān quán shù bāng FBI jiāng shéng zhī
   zhè shì yīcháng gāo shǒu zhī jiān de jiào liàngyīcháng méi yòu dāo guāng jiàn yǐng de chāo zhì shāng de jiào liàngxià cūn miǎn jīng guò qián xīn zhuī zōng zhōng zài 1995 nián 2 yuè 14 xiàn liǎo de zōng bìng yòng jiāng yǐn shàngdàng 'ér jiāng huòzài tíng shàng duì zhè wèi zūn jìng de xué jiā biǎo xiàn chū liǎo yóu zhōng de qīn pèiyīn zhè xíng dòngxià cūn miǎn bèi měi guó méi chēng wéi měi guó zuì chū de diàn nǎo 'ān quán zhuān jiā
   lián bāng yuàn 25 zōng fēi qiè diàn huà dào yòng rén xìn yòng zhèng hào chuǎng rén wǎng luò de zuì míng ér qiě wèi jīng shěn pàn jiù jiāng guān liǎo 4 nián bànzhè duàn shí jiān zhí bèi guān zài jiān 'ér bǎo shìzhè shì měi guó shǐ shàng duì míng gāo zhì shāng zuì fàn suǒ cǎi de zuì yán de cuò shī
   guò jiān suǒ zhù rénquè suǒ zhù shù zhī cóng 'ér nòng lái liǎo tái AM/FM shōu yīn jiāng gǎi zào hòu rán néng qiè tīng jiān guǎn rén yuán de tán huà ...... jiān zài 1997 nián jiāng dān guān zài jiān láo fáng nèi
   bǎo shì
   de jǐn méi yòu ràng zhè 'ān quán de wǎng luò biàn 'ān quánfǎn 'ér ràng qún shù gāo chāo de suàn hēi jié chéng liǎo lián méng。 1997 nián 12 yuè 8 shì jiè zhī chí de hēi men yào qiú měi guó zhèng shì fàng men xuān chēng guǒ yào qiú dào mǎn men jiāng dòng jīng tōng guò wǎng luò zhì shì jiè duō diàn nǎo zhōng de bìng lìng wǎng luò shùn jiān tān huàn guǒ huò shì men jiāng gōng bìng de jiě hēi men shèn zhì zhuān mén jiàn liǎo jiàoshì fàng de wǎng zhàn (www.kevinmitnick.com), wèitā de chū zuò dǎo shí
  2001 nián 1 yuè zài chéng rèn céng fàn yòu diàn huà qiè tīng yòng suàn zhàfēi qiè suàn wǎng luò liào de zuì xíng hòuhuò liǎo jiān shì xìng de shì fàng huò shì fàng hòu zūn shǒu zhǔn chù suàn shǒu rèn shàng wǎng de zhuāng zhì ; dāi zài jiā zhōu zhōng zhǔn dào fāng xíng ; zhì shǎo zài 7 nián shí jiān zhǔn tán lùn hēi shù néng jiǎng shù cóng hēi jīng zhōng huò de rèn hǎo chù
   chū hòuzhèng féng 2000 nián qiú hēi ( jiǎn chēng H2K) huì zhào kāijìn guǎn běn rén bìng méi néng qīn lín huì xiàn chǎngdàn réng rán zài luò shān biǎo liǎo diàn huà jiǎng huà shù de hēi jìn fènzǐ jiāng liǎng jiān huì tīng shuǐ xiè tōng
   zhèng guān yuán zài yuè lái yuè yán zhòng de wǎng luò 'ān quán miàn qián qǐng chū wàng gōng hēi gōng diàn nǎo wǎng luò de nèi xìn gāo zhèng diàn nǎo wǎng luò de kàng hēi gōng néng xiàn zài jīng xiàng zhèng bǎo zhèng gǎi xié guī zhèng guò de chuán jīng lìng chéng wéi jīn wéi zhǐ hēi shǐ shàng zuì chū de suàn gāo shǒuzhèng wèi bàn 'àn rén yuán zài píng jià shí suǒ shuō dediàn nǎo de líng hún zhī jiān yòu tiáo dài xiāng liánzhè jiù shì wèishénme zhǐ yào zài suàn miàn qián jiù huì chéng wéi rén de yuán yīn
   kǎi wén · - zhù yào chéng jiù
   shì zài měi guó lián bāng diào chá xuán shǎng zhuō hǎi bào shàng lòumiàn de hēi yóu zhǐ yòu shí suìdàn què wǎng luò fàn zuì xíng wéi duànsuǒ bèi rén chēng wèishì shī zài wǎng luò shì jiè de xiǎo nán hái”。
  2002 niánduì céng jīng chòu míng zhāo zhù de suàn hēi kǎi wén · lái shuōshèng dàn jié qián lái dào liǎozhè niándíquè shì KevinMitnick kuài de nián dàn shì huò liǎo chè de yóucóng yóu shàng wǎng néng shàng wǎng duì hēi lái shuōjiù shì lìng zhǒng jiān shēng huó)。 ér qiě hái tuī chū liǎo běn gāng gāng wán chéng de chàng xiāo shū piàn de shù》 (TheArtofDeception:ControllingtheHumanElementofSecurity)。 shū huò chéng gōngchéng wéi KevinMitnick chóngxīn yǐn rén men guān zhù de pào
   kǎi wén · - píng jià
   chēng hào:“ diàn nǎo shén tóng”“ tóu hào diàn nǎo hēi
   céng yòudiàn nǎo kǒng fènzǐzhī chēng
   zài suǒ yòu de hēi zhōngkǎi wén · shì zuì chuán cǎi de rén hǎo lāi shèn zhì jiāng bān shàng liǎo yín zài 15 suì de shí hòujǐn píng tái diàn nǎo tiáozhì jiě diào jiù chuǎng liǎo běi měi kōng zhōng fáng zhǐ huī de suàn tǒng zhù měi guó lián bāng diào chá jiāng liè wéi tóu hào tōng fànbìng wéi shāng tòu liǎo nǎo jīn shuō shì zhēn zhèng de shàonián hēi
   kǎi wén · -
   xún yóu jiǎo lóudēng lín gōngjìn chū quán qiú suǒ yòu suàn tǒngcuī kuǎ quán qiú jīn róng zhì chóngjiàn xīn de shì jiè shuí dǎng liǎo men de jìn gōng men cái shì shì jiè de zhù zǎihéng héng kǎi wén ·


  Kevin David Mitnick (born August 6, 1963) is a computer security consultant, author, and former computer hacker.
  In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.
  
  Computer hacking
  
  At age 12, Mitnick used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering became his primary method of obtaining information, including user names and passwords and modem phone numbers.
  Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.
  According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended in February 1995 in North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.
  
  Confirmed criminal act
  Using the Los Angeles bus transfer system to get free ride
  Evading the FBI
  Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)
  Gaining full administrator privileges to an IBM minicomputer at the Computer Learning Center in Los Angeles in order to win a bet
  Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens system
  
  Alleged criminal act
  Stole computer manuals from a Pacific Bell telephone switching center in Los Angele
  Read the e-mail of computer security officials at MCI Communications and Digital
  Wiretapped the California DMV
  Made free cell phone call
  Hacked Santa Cruz Operation, Pacific Bell, FBI, Pentagon, Novell, California Department of Motor Vehicles, University of Southern California and Los Angeles Unified School District systems.
  Wiretapped FBI agents, according to John Markoff; although this is denied by Kevin Mitnick.
  
  Arrest, conviction, and incarceration
  
  After a well-publicized pursuit, the FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina, on federal offenses related to a 2½-year period of computer hacking.
  In 1999, Mitnick confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, as part of a plea agreement before the United States District Court for the Central District of California in Los Angeles. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Louis De Payne.
  Mitnick served five years in prison — four and a half years pre-trial and eight months in solitary confinement — because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone". He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet.
  Under the plea deal, Mitnick was also prohibited from profiting from films or books based on his criminal activity for seven years.
  Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy.
  
  Controversy
  
  Mitnick's criminal activities, arrest, and trial, along with the associated journalism were all controversial.
  Though Mitnick has been convicted of copying software unlawfully and possession of several forged identification documents, his supporters argue that his punishment was excessive. In his 2002 book, The Art of Deception, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security.
  Two books explored the allegations: John Markoff and Tsutomu Shimomura's Takedown, and Jonathan Littman's The Fugitive Game. Littman made four main allegations:
  journalistic impropriety by Markoff, who had covered the case for the New York Times based on rumor and government claims, while never interviewing Kevin himself.
  overzealous prosecution of Mitnick by the government
  mainstream media over-hyping Mitnick's actual crime
  Shimomura's involvement in the matter being unclear or of dubious legality
  Further controversy came over the release of the movie based on the book by John Markoff and Tsutomu Shimomura, with Littman alleging that portions of the film were taken from his book without permission.
  The case against Mitnick tested the new laws that had been enacted for dealing with computer crime, and it raised public awareness of security involving networked computers. The controversy remains, however, and Mitnick is often cited today as an example of the quintessential computer criminal.
  Supporters of Mitnick have asserted that many of the charges against him were fraudulent and not based on actual losses.
  
  Media
  
  In 2000, Skeet Ulrich and Russell Wong portrayed Kevin Mitnick and Tsutomu Shimomura in the movie Track Down, which was based on the book Takedown by John Markoff and Tsutomu Shimomura. The DVD was released in September 2004.
  A fan-based documentary named Freedom Downtime was created in response to the corporate-based documentary Track Down.
  Mitnick is the co-author, with William L. Simon, of two computer security books:
  The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceiver
  The Art of Deception
  He and his co-author are currently writing Kevin's autobiography, to be titled "Ghost in the Wire"
    

pínglún (0)