Bill Landreth

Last updated

William Troy Landreth [1] (born April 5, 1963) [2] is an American hacker notable for his cracking activities during the early 1980s within a cracking club called "The Inner Circle". [3] MySpace cofounder, Tom Anderson (Lord Flathead) [4] was an associate. [5] In 1984, Landreth was convicted of hacking computer systems, and accessing NASA and Department of Defense computer data. [6] In 1986, he disappeared [7] [8] (from which he re-appeared a year later). [9] [10] Landreth's and Howard Rheingold's book, Out of the Inner Circle: A Hacker's Guide to Computer Security , published in 1986, [11] [12] [13] is considered a best-seller. [9]

In 1989, Landreth was homeless. [1]

As of 2016 he was still homeless. [14] [9] [15] [16]

Works

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals.

Software cracking is an act of removing copy protection from a software. Copy protection can be removed by applying a specific crack. A crack can mean any tool that enables breaking software protection, a stolen product key, or guessed password. Cracking software generally involves circumventing licensing and usage restrictions on commercial software by illegal methods. These methods can include modifying code directly through disassembling and bit editing, sharing stolen product keys, or developing software to generate activation keys. Examples of cracks are: applying a patch or by creating reverse-engineered serial number generators known as keygens, thus bypassing software registration and payments or converting a trial/demo version of the software into fully-functioning software without paying for it. Software cracking contributes to the rise of online piracy where pirated software is distributed to end-users through filesharing sites like BitTorrent, One click hosting (OCH), or via Usenet downloads, or by downloading bundles of the original software with cracks or keygens.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of copyright infringement or software piracy.

<span class="mw-page-title-main">Howard Rheingold</span> American critic, writer, and teacher (born 1947)

Howard Rheingold is an American critic, writer, and teacher, known for his specialties on the cultural, social and political implications of modern communication media such as the Internet, mobile telephony and virtual communities.

In cryptanalysis and computer security, password cracking is the process of guessing passwords protecting a computer system. A common approach is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.

Out of the Inner Circle: A Hacker's Guide to Computer Security is a book by Bill Landreth and Howard Rheingold, published in 1985 by Microsoft Press and distributed by Simon & Schuster (ISBN 0-671-30942-0). The book was created to provide insight into the ways and methods of the hacking community in the days before Internet became prevalent. Although largely outdated and nostalgic, it does show what brought on many of the current trends we see in network security today.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.

<span class="mw-page-title-main">Tom Anderson</span> American internet entrepreneur (born 1970)

Thomas Anderson is an American technology entrepreneur and co-founder of the social networking website Myspace, which he founded in 2003 with Chris DeWolfe. He was later president of Myspace and a strategic adviser for the company. Anderson is popularly known as "Tom from Myspace", "Myspace Tom" or "My friend, Tom" because he would automatically be assigned as the first "friend" of new Myspace users upon the creation of their profiles.

<span class="mw-page-title-main">George Hotz</span> American software engineer

George Francis Hotz, alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit brought against him by Sony. From September 2015 onwards, he has been working on his vehicle automation machine learning company comma.ai. Since November 2022, Hotz has been working on tinygrad, a deep learning framework.

<span class="mw-page-title-main">Kaspersky Lab</span> Russian multinational cybersecurity and anti-virus provider

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

Kristoffer Wilhelm von Hassel is an American boy known for being the world's youngest known hacker and notable for being the youngest "security researcher" listed on Microsoft's Security Techcenter as having exposed a security vulnerability. At the age of five, Hassel exposed security lapses in the Microsoft Live Xbox system, prompting wide media coverage, with some journalists highlighting the dropping age of hackers and their technology mastery.

CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides endpoint security, threat intelligence, and cyberattack response services.

EternalBlue is a computer exploit software developed by the U.S. National Security Agency (NSA). It is based on a vulnerability in Microsoft Windows that allowed users to gain access to any number of computers connected to a network. The NSA knew about this vulnerability but did not disclose it to Microsoft for several years, since they planned to use it as a defense mechanism against cyber attacks. In 2017, the NSA discovered that the software was stolen by a group of hackers known as the Shadow Brokers. Microsoft was informed of this and released security updates in March 2017 patching the vulnerability. While this was happening, the hacker group attempted to auction off the software, but did not succeed in finding a buyer. EternalBlue was then publicly released on April 14, 2017.

Cryptojacking is the act of exploiting a computer to mine cryptocurrencies, often through websites, against the user's will or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown. The cryptocurrencies mined the most often are privacy coins—coins with hidden transaction histories—such as Monero and Zcash.

Lapsus$, stylised as LAPSUS$ and classified by Microsoft as Strawberry Tempest, is an international extortion-focused hacker group known for its various cyberattacks against companies and government agencies. The group was active in several countries, and has had its members arrested in Brazil and the UK in 2022. According to City of London Police at least two of the members were teenagers.

References

  1. 1 2 "Genius Computer Hacker Now Living On The Streets". AP NEWS . March 20, 1989. Retrieved 23 November 2022.
  2. "William T Landreth, Born 04/05/1963 in California". CaliforniaBirthIndex.org. Retrieved 23 November 2022.
  3. Landreth, Bill. "Confessions Of A Hacker: Here Is The Cracker'S Story Of Adolescent Innocence And Ingenuity, Mixed With Corporate And Government Intrigue, That Ultimately Led To His Arrest By The FBI". Sun Sentinel . Archived from the original on 3 December 2020. Retrieved 22 November 2022.
  4. Penenberg, Adam L. (13 October 2009). Viral Loop: From Facebook to Twitter, How Today's Smartest Businesses Grow Themselves. Hachette Books. p. 166. ISBN   978-1-4013-9493-6.
  5. Arrington, Michael (30 August 2008). "MySpace Cofounder Tom Anderson Was A Real Life "WarGames" Hacker in 1980s". TechCrunch . Retrieved 22 November 2022.
  6. "A brief history of hacking". encyclopedia.kaspersky.com. Retrieved 22 November 2022.
  7. Gorman, Tom (11 December 1986). "A Hacker Vanishes : Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . Retrieved 22 November 2022.
  8. "A Hacker Vanishes Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . December 11, 1986. Archived from the original on 2016-03-21. Retrieved February 3, 2011.
  9. 1 2 3 "Hacker Is Down And Out In San Diego". The Sydney Morning Herald . April 3, 1989. Retrieved August 22, 2022.
  10. "Bill Landreth: The Cracker & Out Of The Inner Circle & Pig Sty". September 26, 2011. Retrieved April 9, 2013.[ permanent dead link ]
  11. Landreth, Bill; Rheingold, Howard (1985). Out of the Inner Circle: A Hacker's Guide to Computer Security. Microsoft Press. ISBN   978-0-14-087139-5 via archive.org. Open Access logo PLoS transparent.svg
  12. Marc Rogers (ed.) Psychology and Computer Crime Center for Education and Research in Information Assurance and Security, Purdue University
  13. Rogers, Marc (2000). "A New Hacker Taxonomy". Graduate Studies, Dept. of Psychology University of Manitoba . Purdue University . Retrieved 23 November 2022.
  14. "The Untold Story of the Teen Hackers Who Transformed the Early Internet". Gizmodo . April 14, 2016. Retrieved September 13, 2021.
  15. Spafford, Eugene H. (January 1992). "Are computer hacker break-ins ethical?" (PDF). Journal of Systems and Software. 17 (1): 41–47. doi:10.1016/0164-1212(92)90079-Y . Retrieved 22 November 2022.
  16. Halvorson, Michael J. (29 April 2020). "Hackers and cyberpunks". Code Nation. doi:10.1145/3368274.3368282. ISBN   9781450377584. S2CID   218489632 . Retrieved 23 November 2022.{{cite book}}: |journal= ignored (help)