Bill Landreth

Last updated

William Troy Landreth [1] (born April 5, 1963) [2] is an American hacker notable for his cracking activities during the early 1980s within a cracking club called "The Inner Circle". [3] MySpace cofounder, Tom Anderson (Lord Flathead) [4] was an associate. [5] In 1984, Landreth was convicted of hacking computer systems, and accessing NASA and Department of Defense computer data. [6] In 1986, he disappeared [7] [8] (from which he re-appeared a year later). [9] [10] Landreth's and Howard Rheingold's book, Out of the Inner Circle: A Hacker's Guide to Computer Security , published in 1986, [11] [12] [13] is considered a best-seller. [9]

In 1989, Landreth was homeless. [1]

As of 2016 he was still homeless. [14] [9] [15] [16]

Works

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

In a positive connotation, a hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

A script kiddie, skript kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes.

Software cracking is an act of removing copy protection from a software. Copy protection can be removed by applying a specific crack. A crack can mean any tool that enables breaking software protection, a stolen product key, or guessed password. Cracking software generally involves circumventing licensing and usage restrictions on commercial software by illegal methods. These methods can include modifying code directly through disassembling and bit editing, sharing stolen product keys, or developing software to generate activation keys. Examples of cracks are: applying a patch or by creating reverse-engineered serial number generators known as keygens, thus bypassing software registration and payments or converting a trial/demo version of the software into fully-functioning software without paying for it. Software cracking contributes to the rise of online piracy where pirated software is distributed to end-users through filesharing sites like BitTorrent, One click hosting (OCH), or via Usenet downloads, or by downloading bundles of the original software with cracks or keygens.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of copyright infringement or software piracy.

<span class="mw-page-title-main">Howard Rheingold</span> American critic, writer, and teacher (born 1947)

Howard Rheingold is an American critic, writer, and teacher, known for his specialties on the cultural, social and political implications of modern communication media such as the Internet, mobile telephony and virtual communities.

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.

Out of the Inner Circle: A Hacker's Guide to Computer Security is a book by Bill Landreth and Howard Rheingold, published in 1985 by Microsoft Press and distributed by Simon & Schuster (ISBN 0-671-30942-0). The book was created to provide insight into the ways and methods of the hacking community in the days before Internet became prevalent. Although largely outdated and nostalgic, it does show what brought on many of the current trends we see in network security today.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.

<span class="mw-page-title-main">Tom Anderson</span> American internet entrepreneur (born 1970)

Thomas Anderson is an American technology entrepreneur and co-founder of the social networking website Myspace, which he founded in 2003 with Chris DeWolfe. He was later president of Myspace and a strategic adviser for the company. Anderson is popularly known as "Tom from Myspace", "Myspace Tom" or "My friend, Tom" because he would automatically be assigned as the first "friend" of new Myspace users upon the creation of their profiles.

<span class="mw-page-title-main">George Hotz</span> American software engineer

George Francis Hotz, alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit brought against him by Sony. From September 2015 onwards, he has been working on his vehicle automation machine learning company comma.ai. Since November 2022, Hotz has been working on tinygrad, a deep learning framework.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

Global kOS ('kos' pronounced as chaos) were a grey hat computer hacker group active from 1996 through 2000, considered a highly influential group who were involved in multiple high-profile security breaches and defacements as well as a releasing notable network security and intrusion tools. Global kOS were involved with the media heavily and were interviewed and profiled by journalist Jon Newton in his blog titled "On The Road in Cyberspace" (OTRiCS). The group were reported multiple times to the FBI by Carolyn Meinel who attempted to bring the group to justice while members of Global kOS openly mocked her. The FBI had a San Antonio based informant within the group and individually raided several members after contact with the informant.

Kristoffer Wilhelm von Hassel is an American boy known for being the world's youngest known hacker and notable for being the youngest "security researcher" listed on Microsoft's Security Techcenter as having exposed a security vulnerability. At the age of five, Hassel exposed security lapses in the Microsoft Live Xbox system, prompting wide media coverage, with some journalists highlighting the dropping age of hackers and their technology mastery.

EternalBlue is computer exploit software developed by the U.S. National Security Agency (NSA). It is based on a vulnerability in Microsoft Windows that, at the time, allowed users to gain access to any number of computers connected to a network. The NSA had known about this vulnerability for several years but had not disclosed it to Microsoft yet, since they planned to use it as a defense mechanism against cyber attacks. In 2017, the NSA discovered that the software was stolen by a group of hackers known as the Shadow Brokers. Microsoft was informed of this and released security updates in March 2017 patching the vulnerability. While this was happening, the hacker group attempted to auction off the software, but did not succeed in finding a buyer. EternalBlue was then publicly released on April 14, 2017.

Cryptojacking is the act of exploiting a computer to mine cryptocurrencies, often through websites, against the user's will or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown. The cryptocurrencies mined the most often are privacy coins—coins with hidden transaction histories—such as Monero and Zcash.

Lapsus$, stylised as LAPSUS$ and classified by Microsoft as Strawberry Tempest, was an international extortion-focused hacker group known for its various cyberattacks against companies and government agencies. The group was globally active, and has had members arrested in Brazil and the UK.

References

  1. 1 2 "Genius Computer Hacker Now Living On The Streets". AP NEWS . March 20, 1989. Retrieved 23 November 2022.
  2. "William T Landreth, Born 04/05/1963 in California". CaliforniaBirthIndex.org. Retrieved 23 November 2022.
  3. Landreth, Bill. "Confessions Of A Hacker: Here Is The Cracker'S Story Of Adolescent Innocence And Ingenuity, Mixed With Corporate And Government Intrigue, That Ultimately Led To His Arrest By The FBI". Sun Sentinel . Archived from the original on 3 December 2020. Retrieved 22 November 2022.
  4. Penenberg, Adam L. (13 October 2009). Viral Loop: From Facebook to Twitter, How Today's Smartest Businesses Grow Themselves. Hachette Books. p. 166. ISBN   978-1-4013-9493-6.
  5. Arrington, Michael (30 August 2008). "MySpace Cofounder Tom Anderson Was A Real Life "WarGames" Hacker in 1980s". TechCrunch . Retrieved 22 November 2022.
  6. "A brief history of hacking". encyclopedia.kaspersky.com. Retrieved 22 November 2022.
  7. Gorman, Tom (11 December 1986). "A Hacker Vanishes : Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . Retrieved 22 November 2022.
  8. "A Hacker Vanishes Computer Whiz, Missing Since September, a Source of Mystery". Los Angeles Times . December 11, 1986. Archived from the original on 2016-03-21. Retrieved February 3, 2011.
  9. 1 2 3 "Hacker Is Down And Out In San Diego". The Sydney Morning Herald . April 3, 1989. Retrieved August 22, 2022.
  10. "Bill Landreth: The Cracker & Out Of The Inner Circle & Pig Sty". September 26, 2011. Retrieved April 9, 2013.[ permanent dead link ]
  11. Landreth, Bill; Rheingold, Howard (1985). Out of the Inner Circle: A Hacker's Guide to Computer Security. Microsoft Press. ISBN   978-0-14-087139-5 via archive.org. Open Access logo PLoS transparent.svg
  12. Marc Rogers (ed.) Psychology and Computer Crime Center for Education and Research in Information Assurance and Security, Purdue University
  13. Rogers, Marc (2000). "A New Hacker Taxonomy". Graduate Studies, Dept. of Psychology University of Manitoba . Purdue University . Retrieved 23 November 2022.
  14. "The Untold Story of the Teen Hackers Who Transformed the Early Internet". Gizmodo . April 14, 2016. Retrieved September 13, 2021.
  15. Spafford, Eugene H. (January 1992). "Are computer hacker break-ins ethical?" (PDF). Journal of Systems and Software. 17 (1): 41–47. doi:10.1016/0164-1212(92)90079-Y . Retrieved 22 November 2022.
  16. Halvorson, Michael J. (29 April 2020). "Hackers and cyberpunks". Code Nation. doi:10.1145/3368274.3368282. ISBN   9781450377584. S2CID   218489632 . Retrieved 23 November 2022.{{cite book}}: |journal= ignored (help)