Great Hacker War
   HOME
*





Great Hacker War
The Great Hacker War was a purported conflict between the Masters of Deception (MOD), an unsanctioned splinter faction of the older hacker group Legion of Doom (LOD), and several smaller associated groups. Both primary groups involved made attempts to hack into the opposing group's networks, across the Internet, X.25, and telephone networks. In a panel debate of The Next HOPE conference, Phiber Optik re-iterated that the rumored "gang war in cyberspace" between Legion of Doom and Masters of Deception never happened, and that it was "a complete fabrication" by the U.S attorney's office and some sensationalist media. Furthermore, two other high-ranking members of the LOD confirmed that the "Great Hacker War" never occurred, reinforcing the idea that this was just a competition of one-upmanship and not a war. Timeline The Great Hacker War escalated in the space of only a few days with four key events. Event One The Great Hacker War began with the closing of an invite-only bulletin b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Masters Of Deception
Masters of Deception (MOD) was a New York City, New York–based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution. Origin of Masters of Deception MOD's initial membership grew from meetings on Loop around, Loop-Around Test Lines that led to legendary collaborations to hack RBOC Telephone switch, phone switches and the various minicomputers and Mainframe computer, mainframes used to administer the telephone network. They successfully remained underground using alternative handles to hide even their true hacker identities. Elias Ladopoulos, Acid Phreak founded the Masters of Deception with Scorpion and HAC. The name itself was, among other things, a mockery of Legion of Doom (hacking), Legion of Doom (LOD), as 'M' is one letter up in the alphabet from 'L', although the name originally was a flexible acronym that could be used to identify membership in situations where anonymity would be the best course of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mark Abene
Mark Abene (born February 23, 1972) is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonym Phiber Optik, he was once a member of the hacker groups Legion of Doom and Masters of Deception. Phiber Optik was a high-profile hacker in the 1980s and early 1990s, appearing in ''The New York Times'', ''Harper's'', ''Esquire'', and in debates and on television. He is an important figure in the 1995 nonfiction book ''Masters of Deception: The Gang That Ruled Cyberspace'' (). Early life Abene's first contact with computers was at around 9 years of age at a local department store, where he would often pass the time while his parents shopped. His first computer was a TRS-80 MC-10 with 4 kilobytes of RAM, a 32-column screen, no lower case, and a cassette tape recorder to load and save programs. As was customary at the time, the computer connected to a television set for use as a monitor. After receiving the gifts of a RAM ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Legion Of Doom (hacker Group)
The Legion of Doom (LOD) was a hacker group founded by the hacker Lex Luthor (Raavan) after a rift with his previous group called the Knights of Shadow. LOD was active from the 1980s to the early 2000s, but was most active from 1984–1991 and at the time was considered to be the most capable hacking group in the world. Today, Legion of Doom ranks as one of the more influential hacking groups in the history of technology, appearing to be a reference to the antagonists of ''Challenge of the Super Friends''. At different points in the group's history, LOD was split into LOD and LOD/LOH (Legion of Doom/Legion of Hackers) for the members that were more skilled at hacking than pure phreaking. There was a second hacking group at the time, called MOD, short for the Masters of Deception. The overall beliefs of LOD and MOD were different, but it can be difficult to untangle the actions of the members since there was a cross-over between the two groups. Unlike the hacking group MOD, the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Hacking (computer Security)
Hacking may refer to: Places * Hacking, an area within Hietzing, Vienna, Austria People * Douglas Hewitt Hacking, 1st Baron Hacking (1884–1950), British Conservative politician * Ian Hacking (born 1936), Canadian philosopher of science * David Hacking, 3rd Baron Hacking (born 1938), British barrister and peer Sports * Hacking (falconry), the practice of raising falcons in captivity then later releasing into the wild * Hacking (rugby), tripping an opposing player * Pleasure riding, horseback riding for purely recreational purposes, also called hacking * Shin-kicking, an English martial art also called hacking Technology * Hacker, a computer expert with advanced technical knowledge ** Hacker culture, activity within the computer programmer subculture * Security hacker, someone who breaches defenses in a computer system ** Cybercrime, which involves security hacking * Phone hacking, gaining unauthorized access to phones * ROM hacking, the process of modifying a video game's pr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




The Hacker Crackdown
''The Hacker Crackdown: Law and Disorder on the Electronic Frontier'' is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of "Knight Lightning" (one of the original journalists of ''Phrack''), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of "Emmanuel Goldstein" (publisher of '' 2600: The Hacker Quarterly''), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow. In 1994, Sterling released the book for the Internet with a new afterword. Historical perspective Though published in 1992, and released as a freeware, electronic book in 1994, the book offers a unique and colorful portr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Nahshon Even-Chaim
Nahshon Even-Chaim (born May 1971), aka Phoenix, was the first major computer hacker to be convicted in Australia. He was one of the most highly skilled members of a computer hacking group called The Realm, based in Melbourne, Australia, from the late 1980s until his arrest by the Australian Federal Police in early 1990. His targets centered on defense and nuclear weapons research networks."Court 'no power' in hack case," Herald Sun, 14 August 1991, page 9. Story covered Even-Chaim's appearance in Melbourne Magistrates Court on 48 computer crime charges. Victims mentioned in the story include NASA, Lawrence Livermore National Laboratory and an unspecified Texas company."Hacker 'revelled in American publicity", Herald Sun, 26 August 1993, page 5. Story covered Even-Chaim's plea hearing in Victorian County Court. Even-Chaim had pleaded guilty to 15 charges. Victims mentioned in the story include University of California, Berkeley, NASA, Execucom Systems Corporation, Lawrence Livermo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Knight Lightning
Craig Neidorf (born 1969), Knight Lightning, was one of the two founding editors of ''Phrack'' Magazine, an online, text-based ezine that defined the hacker mentality of the mid 1980s. Craig, along with ''Phrack'' co-founder Randy Tischler (aka Taran King), came up with the concept of ''Phrack'' and published it from 1985 onwards. The ''Phrack'' newsletters were recognized for providing very informative updates of the national scene considering their oblique sources and served as a bible to the hackers of the day. In 1990, Neidorf was facing 31 years in jail after being arrested and charged with receiving a document stolen from BellSouth, and with publicly distributing it online. BellSouth described the document, on the subject of the inner workings of the Enhanced 911 system, as being worth US$79,449
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computers, Freedom And Privacy
The Computers, Freedom and Privacy Conference (or CFP, or the Conference on Computers, Freedom and Privacy) is an annual academic conference held in the United States or Canada about the intersection of computer technology, freedom, and privacy issues. The conference was founded in 1991, and since at least 1999, it has been organized under the aegis of the Association for Computing Machinery. It was originally sponsored by CPSR. CFP91 The first CFP was held in 1991 in Burlingame, California. CFP92 The second CFP was held on March 18–20, 1992 in Washington, DC. It was the first under the auspices of the Association for Computing Machinery. The conference chair was Lance Hoffman. The entire proceedings are available from the Association for Computing Machinery at https://dl.acm.org/doi/proceedings/10.1145/142652. CFP99 The Computers, Freedom and Privacy 99 Conference, sponsored by the Association for Computing Machinery, the 9th annual CFP, was held in Washi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Phiber Optik
Mark Abene (born February 23, 1972) is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonym Phiber Optik, he was once a member of the hacker groups Legion of Doom and Masters of Deception. Phiber Optik was a high-profile hacker in the 1980s and early 1990s, appearing in ''The New York Times'', ''Harper's'', ''Esquire'', and in debates and on television. He is an important figure in the 1995 nonfiction book ''Masters of Deception: The Gang That Ruled Cyberspace'' (). Early life Abene's first contact with computers was at around 9 years of age at a local department store, where he would often pass the time while his parents shopped. His first computer was a TRS-80 MC-10 with 4 kilobytes of RAM, a 32-column screen, no lower case, and a cassette tape recorder to load and save programs. As was customary at the time, the computer connected to a television set for use as a monitor. After receiving the gifts of a RAM ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DMS-100
The DMS-100 is a member of the Digital Multiplex System (DMS) product line of telephone exchange switches manufactured by Northern Telecom. Designed during the 1970s and released in 1979, it can control 100,000 telephone lines. The purpose of the DMS-100 Switch is to provide local service and connections to the PSTN public telephone network. It is designed to deliver services over subscribers' telephone lines and trunks. It provides plain old telephone service (POTS), mobility management for cellular phone systems, sophisticated business services such as automatic call distribution (ACD), Integrated Services Digital Network (ISDN), and Meridian Digital Centrex (MDC), formerly called Integrated Business Network (IBN). It also provides Intelligent Network functions (AIN, CS1-R, ETSI INAP). It is used in countries throughout the world. There are also DMS-200 and DMS-250 variants for tandem switches. Much of the hardware used in the DMS-100, with the possible exception of the line ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Conference Call
A conference call is a telephone call in which someone talks to several people at the same time. The conference call may be designed to allow the called party to participate during the call or set up so that the called party merely listens into the call and cannot speak. It is sometimes called ATC (audio teleconference). Conference calls can be designed so that the calling party calls the other participants and adds them to the call; however, participants are usually able to call into the conference call themselves by dialing a telephone number that connects to a "conference bridge," which is a specialized type of equipment that links telephone lines. Companies commonly use a specialized service provider who maintains the conference bridge, or who provides the phone numbers and PIN codes that participants dial to access the meeting or conference call. These service providers can often dial-out to participants, connecting them to call and introducing them to the parties who are o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]