Wilujeng Sumping Di Site Sim Kuring



»» Hèîclè Kîngdôm ««

Teen Hacker Become Security Consultants

Diposting oleh Admin Rabu, 24 Juni 2009

VIVAnews - Owen Thor Walker, New Zealand hacker origin, be present as a cyber security consultant by TelstraClear, the second-largest telecommunications company in the country. TelstraClear is the son of Australia's largest telecommunications company, Telstra.

"We believe Walker has the ability to assist senior executives and customers understand the security threats that can attack their network," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington, Wednesday 25 March 2009.

Years ago, Walker sued over data success penetrate 1.3 million computers around the world. Hacker by the name of this fictitious AKILL terbukti also damage the computer system and go through a number of bank accounts and steal more money from Rp 132.4 billion. At that time, the new Walker aged 18.

Not surprisingly, when he became the division incaran internet crime investigators from the Bureau of the United States (U.S.), FBI. The AKILL already meresahkan the penggun computer in the U.S. European

In front of the judge, the court in the city of Hamilton, New Zealand, he pleaded guilty on six criminal indictment internet. The judge at that time only impose penalties and fines to the Walker terpidana prohibit using the computer.

However, a group helping with the Walker pay fines and return the money so that they can claim on Walker revoked and youth is released.

Mirams said Walker had some counseling and providing advice to managers and security staff TelstraClear. Walker also participated in the program ad TelstraClear.

"Walker tells what are the cyber criminals and how to fortify their networks from threats that," said Mirams.

Some of the many hackers send electronic mail to the company's computer system or the government so that the excess capacity of the mailbox and enter the system.

Hacker techniques use other botnet, which is trying the computer and combine hundreds of computers in a kluster that have centralized control.

Then the hacker can use a combination of the computer to steal credit card information, manipulate stock trading, computer systems and destroy an industry. (AP)
> tukar
Click Here If U Wanna Be Sumber

1 Responses to Teen Hacker Become Security Consultants

  1. Admin Says:
  2. Selamat datang di new interface heicle .....