The top ten security heroes
Posted on 3 Dec 2009 at 14:35
Imagine the security nightmare if, when you typed in the web address of your bank, the DNS database translated this to a different IP address, while believing all the time it was the authentic one. Imagine what would happen if hackers could exploit this.
Kaminsky discovered just such a flaw, called DNS cache poisoning. Instead of taking the oft-trodden path of collecting kudos and announcing his find at a hacker convention, Kaminsky instead notified major DNS vendors, ISPs and internet technology companies, so they could work on a fix.
For months, security experts from around the world worked in incredible secrecy to snuff out the bug before hackers cottoned on. While he received an award for the Most Overhyped Security Vulnerability at the Black Hat convention in 2008, this DNS detective is a hero to many, including PC Pro.
6. Steve Linford
The history of spam is as long as it is deplorable. From the very first commercial spam sent by DEC marketer Gary Thuerk in 1978, through to today where upwards of 90% of email is junk.
Steve Linford decided in 1998 that enough was enough and fought back with the Spamhaus Project. This international non-profit organisation has a bold mission: to track spammers, provide protection for internet networks, lobby governments for antispam legislation and work with global law-enforcement agencies to pursue the spammers.
Spamhaus maintains the real-time spam-blocking database used by governments and military networks, as well as two-thirds of ISPs and some 1.4 billion email users around the world.
Spamhaus also publishes ROKSO, The Register Of Known Spam Operations, a database that collates evidence on the 100 most active spamming gangs and individuals around the world. Law enforcement uses it to target prosecutions.
Linford’s efforts to thwart the spammers have earned him death threats and a battery of nuisance litigation, but he continues to thwart the spammers’ best efforts.
7. Peter Norton & Peter Tippett
The name Norton has been synonymous with security for, well, about as long as most of us in the IT security industry can remember. Yes, this is the same Peter Norton who gave his name to the Norton brand that was purchased by the Symantec Corporation back in 1990.
However, we haven’t included him here for his involvement with antivirus or internet security software. No, Peter Norton is a security hero because of his work in pioneering data-recovery tools for the PC that pre-date Windows and stretch way back to the age of DOS, when the ability to recover deleted data really was an innovation.
Norton produced a utility to do just that in the 1980s, and this became part of the hugely popular Norton Utilities collection.
So who is Peter Tippett then? Tippett worked alongside Norton to produce what eventually became Norton AntiVirus, as well as being responsible for pioneering the now commonplace recovery disc concept. So when (through either error or malice) your data mysteriously disappears, you can tip your hat in the direction of the two Peters.
8. Peter Gutmann
Of course, there are times when you don’t want to get your data back. In fact, there are times when you don’t want anyone to be able to get your data back; when you sell or recycle your computer, for example. Which is where Peter Gutmann comes in.
This is the computer scientist responsible for the Gutmann method, a technique whereby the contents of a hard drive are overwritten by a series of 35 patterns that totally erase the data.
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on email@example.com
- Europol warns: public Wi-Fi isn't safe
- IDC: iPad intertia opens door for Windows tablets
- Rivals put on notice as Spotify snaps up The Echo Nest
- Windows 8.1 Update 1 leaks via Microsoft's website
- Mozilla questions why Dell charges £16 to install Firefox
- Hundreds of NHS sites vulnerable to hackers
- Samsung Chromebook 2 gets faux-leather look - and bloatware
- Windows 8.1 Update 1 hits RTM
- Hackers take Meetup.com offline over $300 ransom
- Office 365 goes social with "Oslo" news feed
- Quickest way to upload 1GB? Hop on a train
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look