Bill Landreth

Last updated

William Troy Landreth [1] (born April 5, 1963) [2] is an American hacker notable for his cracking activities during the early 1980s within a cracking club called "The Inner Circle". [3] MySpace cofounder, Tom Anderson (Lord Flathead) [4] was an associate. [5] In 1984, Landreth was convicted of hacking computer systems, and accessing NASA and Department of Defense computer data. [6] In 1986, he disappeared [7] [8] (from which he re-appeared a year later). [9] [10] Landreth's and Howard Rheingold's book, Out of the Inner Circle: A Hacker's Guide to Computer Security , published in 1986, [11] [12] [13] is considered a best-seller. [9]

In 1989, Landreth was homeless. [1] Bill Landreth is currently[ when? ] homeless in Santa Monica. [14] [9] [15] [16]

Works

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

<span class="mw-page-title-main">Microsoft</span> American multinational technology corporation

Microsoft Corporation is an American multinational technology corporation headquartered in Redmond, Washington. Microsoft's best-known software products are the Windows line of operating systems, the Microsoft 365 suite of productivity applications, and the Edge web browser. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface lineup of touchscreen personal computers. Microsoft ranked No. 14 in the 2022 Fortune 500 rankings of the largest United States corporations by total revenue; it was the world's largest software maker by revenue as of 2022. It is considered one of the Big Five American information technology companies, alongside Alphabet, Amazon, Apple, and Meta.

A script kiddie, skript kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes.

Software cracking is an act of removing copy protection from a software. Copy protection can be removed by applying a specific crack. A crack can mean any tool that enables breaking software protection, a stolen product key, or guessed password. Cracking software generally involves circumventing licensing and usage restrictions on commercial software by illegal methods. These methods can include modifying code directly through disassembling and bit editing, sharing stolen product keys, or developing software to generate activation keys. Examples of cracks are: applying a patch or by creating reverse-engineered serial number generators known as keygens, thus bypassing software registration and payments or converting a trial/demo version of the software into fully-functioning software without paying for it. Software cracking contributes to the rise of online piracy where pirated software is distributed to end-users through filesharing sites like BitTorrent, One click hosting (OCH), or via Usenet downloads, or by downloading bundles of the original software with cracks or keygens.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of copyright infringement or software piracy.

<span class="mw-page-title-main">Howard Rheingold</span> American critic, writer, and teacher (born 1947)

Howard Rheingold is an American critic, writer, and teacher, known for his specialties on the cultural, social and political implications of modern communication media such as the Internet, mobile telephony and virtual communities.

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.

Out of the Inner Circle: A Hacker's Guide to Computer Security is a book by Bill Landreth and Howard Rheingold, published in 1985 by Microsoft Press and distributed by Simon & Schuster (ISBN 0-671-30942-0). The book was created to provide insight into the ways and methods of the hacking community in days before internet became prevalent. Although largely outdated and nostalgic, it does show what brought on many of the current trends we see in network security today.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

Chris Goggans is an American hacker, a founding member of the Legion of Doom group, and a former editor of Phrack magazine. He is known as an expert in security as well as for his statements on hacker ethics and responsibility.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.

<span class="mw-page-title-main">Tom Anderson</span> American internet entrepreneur (born 1970)

Thomas Anderson is an American technology entrepreneur and co-founder of the social networking website Myspace, which he founded in 2003 with Chris DeWolfe. He was later president of Myspace and a strategic adviser for the company. Anderson is popularly known as "Tom from Myspace", "Myspace Tom" or "My friend, Tom" because he would automatically be assigned as the first "friend" of new Myspace users upon the creation of their profiles.

<span class="mw-page-title-main">George Hotz</span> American software engineer

George Francis Hotz, alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit brought against him by Sony. Since September 2015, he has been working on his vehicle automation machine learning company comma.ai. Since November 2022, Hotz has been working on tinygrad, a deep learning framework.

<span class="mw-page-title-main">Kiwicon</span>

Kiwicon is a New Zealand computer security conference held annually in Wellington from 2007. It brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

Kristoffer Wilhelm von Hassel is an American boy known for being the world's youngest known hacker and notable for being the youngest "security researcher" listed on Microsoft's Security Techcenter as having exposed a security vulnerability. At the age of five, Hassel exposed security lapses in the Microsoft Live Xbox system, prompting wide media coverage, with some journalists highlighting the dropping age of hackers and their technology mastery.

EternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability.

References

  1. 1 2 "Genius Computer Hacker Now Living On The Streets". AP NEWS . March 20, 1989. Retrieved 23 November 2022.
  2. "William T Landreth, Born 04/05/1963 in California". CaliforniaBirthIndex.org. Retrieved 23 November 2022.
  3. Landreth, Bill. "Confessions Of A Hacker: Here Is The Cracker'S Story Of Adolescent Innocence And Ingenuity, Mixed With Corporate And Government Intrigue, That Ultimately Led To His Arrest By The FBI". Sun Sentinel . Archived from the original on 3 December 2020. Retrieved 22 November 2022.
  4. Penenberg, Adam L. (13 October 2009). Viral Loop: From Facebook to Twitter, How Today's Smartest Businesses Grow Themselves. Hachette Books. p. 166. ISBN   978-1-4013-9493-6.
  5. Arrington, Michael (30 August 2008). "MySpace Cofounder Tom Anderson Was A Real Life "WarGames" Hacker in 1980s". TechCrunch . Retrieved 22 November 2022.
  6. "A brief history of hacking". encyclopedia.kaspersky.com. Retrieved 22 November 2022.
  7. Gorman, Tom (11 December 1986). "A Hacker Vanishes : Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . Retrieved 22 November 2022.
  8. "A Hacker Vanishes Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . December 11, 1986. Archived from the original on 2016-03-21. Retrieved February 3, 2011.
  9. 1 2 3 "Hacker Is Down And Out In San Diego". The Sydney Morning Herald . April 3, 1989. Retrieved August 22, 2022.
  10. "Bill Landreth: The Cracker & Out Of The Inner Circle & Pig Sty". September 26, 2011. Retrieved April 9, 2013.[ permanent dead link ]
  11. Landreth, Bill; Rheingold, Howard (1985). Out of the Inner Circle: A Hacker's Guide to Computer Security. Microsoft Press. ISBN   978-0-14-087139-5 via archive.org. Open Access logo PLoS transparent.svg
  12. Marc Rogers (ed.) Psychology and Computer Crime Center for Education and Research in Information Assurance and Security, Purdue University
  13. Rogers, Marc (2000). "A New Hacker Taxonomy". Graduate Studies, Dept. of Psychology University of Manitoba . Purdue University . Retrieved 23 November 2022.
  14. "The Untold Story of the Teen Hackers Who Transformed the Early Internet". Gizmodo . April 14, 2016. Retrieved September 13, 2021.
  15. Spafford, Eugene H. (January 1992). "Are computer hacker break-ins ethical?" (PDF). Journal of Systems and Software. 17 (1): 41–47. doi:10.1016/0164-1212(92)90079-Y . Retrieved 22 November 2022.
  16. Halvorson, Michael J. (29 April 2020). "Hackers and cyberpunks". Code Nation. doi:10.1145/3368274.3368282. ISBN   9781450377584. S2CID   218489632 . Retrieved 23 November 2022.{{cite book}}: |journal= ignored (help)