Kevin Mitnick

1904 Words4 Pages

Who Kevin Mitnick Is:

Kevin David Mitnick is a computer hacker and an American Computer Security Consultant. He was bought up in Los Angeles in the late 1970’s, this was the time when the personal computer industry was exploding. He was from a lower middle class family with his parents divorced at a very young age and was mainly a loner and an underachiever. He learnt and discovered the power to control over the telephone networks.

What He did:

During his time the underground culture of phone phreaks had already flourished over the years. He was able to commandeer a phone company’s digital central office switch by remotely dialling in by just using a personal computer and modem. Along with free calls that he had mastered, also used to eavesdrop on the rich and the powerful or even on his own enemies. He later joined in an informal phone phreak gang in Hollywood where they delivered pranks. One among the gang destroyed the files of a computer company set out in San Francisco. This crime was unsolved for over the year.

In the year 1981, Couple of Kevin’s Friend and Kevin physically entered the Pacific Bell’s COSMOS phone centre in downtown L.A. The group took a list of door combinations and computer passwords and series of operation manuals, they later implanted their phone numbers and pseudonyms in one of the desk rooms in a rolodex sitting. On implanting this process they used to use the fake name “John Draper” who was a computer programmer by profession and was well known for the misrouting numbers which would ring elsewhere from the desired destination. Soon they were arrested as the telephone company managers discovered the phony numbers which he reported to the local police and were caught. Kevin since being 17 a...

... middle of paper ...

...enerated on look up of the message is called as private key. The other key which can be used for any sort of message as nothing in general is called as public Key. The private key is used to encrypt the messages personally and will not be seen or shared by any other user. Whereas the public key is used again for the same reason as of encryption but is hidden from others except our self. The encryption of the data by a public key can be also decrypted by the private key.

Open PGP Encryption

Generate new PGP Key

Enter email and name of the user to generate a particular key. More emails can be added to it.

Advanced modification on the PGP can be defined using the following steps:

A specific Key type should be chose between RSA and Deffie-Hellman.

We have to sign in the key size in order to choose the sub- key which has to be sized between 1024-4096

More about Kevin Mitnick

Open Document