The Faces in Front of the Monitors
Pictures of people who have made a mark in any of the following: programmable computer systems, computer networks, the Internet or the security involved with those systems.
This is not a complete list but a work in progress. |
ARPA Network- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17 |
ARPANet (Advanced Research Project Agency Network) the Internet predecessor, started in 1969. The first four nodes (networks) consisted of the, University of California Los Angeles (UCLA), University of California Santa Barbara (UCSB), University of Utah and the Stanford Research Institute (SRI). Arpanet was finally decommissioned in 1990 having been largely replaced by NSFNET. The pictures are in chronological order.
|
Bolt Beranek and Newman (BBN), the Cambridge, MA team that designed and deployed the Interface Message Processors (IMP) for the ARPA Network in 1969. Pictured: Truett Thach, Bill Bartell, Dave Walden, Jim Geisman, Bob Kahn, Frank Heart, Ben Barker, Marty Thrope, Will Crowther, and Severo Ornstein.
|
Dr. Lawrence G. Roberts- 1,2,3,4,5,6 |
Engineer, director and principal architect of the ARPA network experiment. Often referred to as 'the father of the ARPANET', designed and wrote the network specification, drafted the Request For Proposals and oversaw all work on the project from 1966 to 1973. He's also considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Vinton Cerf, Robert Kahn and Frank Heart.
|
Co-designer of the Internet TCP/IP networking protocol. He's also considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Lawrence Roberts, Robert Kahn and Frank Heart.
|
Co-designer of the Internet TCP/IP networking protocol. One time director of DARPA (Defense Advanced Research Projects Agency). Dr. Kahn coined the term National Information Infrastructure (NII) in the mid 1980s which later became more widely known as the Information Super Highway. He's also considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Vinton Cerf, Lawrence Roberts and Frank Heart.
|
Considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Vinton Cerf, Lawrence Roberts and Robert Kahn.
|
Leonard Kleinrock- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16 |
Considered one of the, 'Fathers of the Internet', along with Frank Heart, Vinton Cerf, Lawrence Roberts and Robert Kahn.
|
ARPAnet founder, also did important work at Digital Equipment Corp., Xerox and Compaq. As he says, "There are a lot of people who think that Al Gore or Bill Gates invented the Internet. It's all right. It doesn't bother me. I know what I did".
|
J. C. R. Licklider- 1,2,3 |
Part of the ARPANet team, J. C. R. Licklider is largely credited as the man with the earliest vision of the internet as it is today. 1915-1990
|
Dennis Ritchie- 1,2,3,4,5 |
One of the first hackers and the father of Unix, C language (and B for that matter). The driving creative force behind Bell Labs' legendary computer science operating group, Ritchie and Thompson created UNIX in 1969.
|
One of the first hackers and the father of Unix. The driving creative force behind Bell Labs' legendary computer science operating group, Ritchie and Thompson created UNIX in 1969.
|
Linus Benedict Torvalds- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30 |
Linus (Lee-nus) Torvalds -While a computer science student at the University of Helsinki he created the Linux operating system in 1991. See Linus receive an award, see Linus getting drunk (11,12,13).
|
Steve Wozniak- 1,2,3,4,5,6,7,8,9,10,11,12 |
'Woz' -Started Apple Computer in 1976-launching the personal computer age. Got his start making devices for phone phreaking. Can be found here.
|
Chief Technical Officer for Red Hat. He made his first major open source contribution over a decade ago by writing the GNU C++ compiler.
|
Chairman and CEO of Sun Microsystems. Typical McNealy quote, "You have zero privacy anyway. Get over it."
|
Even Bill had skills (Bill is pictured lower left in picture 1).
|
Co-founder and Chief Scientist of Sun Microsystems, he was the principal designer of Berkeley UNIX (BSD). He also developed the C Shell (csh) and Vi (bastard).
|
Designer and original implementor of C++ in 1983.
|
In 1993 helped develop the first Mosaic browser. Soon after, Andreessen formed Netscape Communications Corp.
|
Philip R. Zimmermann- 1,2,3,4,5,6,7,8,9,10,11,12 |
Pretty Good Privacy (PGP) creator. Target of a three-year criminal investigation, because the government held that US export restrictions for cryptographic software were violated when PGP spread all around the world following its 1991 publication as freeware.
|
Whitfield Diffie- 1,2,3,4,5,6,7,8,9,10,11 |
It was in 1976 that Diffie and Stanford University electrical engineering professor Martin Hellman created public key cryptography.
|
Creator of HTML, and to any extent the World Wide Web (WWW). The man who wove the first few strands in what has grown into the World Wide Web.
|
Michael Dertouzos- 1,2,3,4,5 |
Computer scientist who was central in establishing the World Wide Web as an international standard.
|
Developed the concept of packet switched networks.
|
'Phiber Optik' -Hacker & phreaker who was a onetime member of LOD and founder of MOD. Inspired thousands of teenagers around the country to "study" the internal workings of our nation's phone system. Can be found here.
|
'Masters Of Deception' -Phiber Optik, Acid Phreak, Scorpion, Corrupt, The Wing, The Seeker, HAC, Red Knight and Lord Micro.
|
Kevin Lee Poulsen- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 |
'Dark Dante' -Hacker & phreaker, now writes for Security Focus. Poulsen, a native of Pasadena, California is a former programmer, network administrator and hacker.
Kevin had burrowed deep into the giant switching networks of Pacific Bell, exploring and exploiting nearly every element of its computers. His forays led to a now-infamous incident with KIIS-FM in Los Angeles. In 1990 the station ran the "Win a Porsche by Friday" contest, with a $50,000 Porsche given to the 102nd caller. Kevin and his associates, stationed at their computers, seized control of the station's 25 telephone lines, blocking out all calls but their own. Then he dialed the 102nd call -- and later collected his Porsche 944.
The hacker also uncovered FBI and national security wiretaps throughout California, including taps on the Israeli consulate in Los Angeles. Some of Poulsen's actions turned into the first-ever espionage case against a hacker, the charges were later dropped.
Kevin pled guilty to breaking into computers to get the names of undercover businesses operated by the FBI.
In 1995 Poulsen was sentenced to 51 months imprisonment.
|
Kevin Poulsen's longtime friend and fellow hacker.
|
Former roommate of Kevin Poulsen, Mark was an avid cell phone enthusiast, who had a few run-ins with Mitnick. Mark has also authored four RFCs (check out the RFC on SFTP, port 115). He can be found here.
|
Kevin David Mitnick- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22 |
'Condor' -Hacker & phreaker, served 5 years. Widely considered the 'most famous hacker in history'. Broke into Digital Equipment Corp., Motorola, Nokia Mobile Phones, Fujitsu, Novell, NEC, Sun Microsystems, the University of Southern California, the Well and Colorado SuperNet, just to name a few. Also broke into computers run by Dan Farmer and Mark Lottor. Mitnick was first suspected of hacking into Tsutomu's computers in 1994 but an unknown Israeli hacker (friend to Mitnick) was later suspected. The Israeli hacker was thought to be looking for the Oki cell phone disassembler written by Shimomura and wanted by Mitnick.
|
'Lew Payne' -Friend of Kevin Mitnick since the late 70s. Together, they explored and manipulated the telephone network as Los Angeles' most notorious "phone phreaks." Can be found here.
|
One of the persons that tracked down Kevin Mitnick in 1994. Tsutomu has worked for the San Diego Supercomputer Center, Los Alamos National Laboratory, FBI, Air Force and the NSA.
|
If there ever was a person that met the true definition of a White Hat Hacker, Neill Clift would be that person. Instead of making his findings of bugs (in the DEC/VMS operating system) open to the public, Neill would report (sell) them directly to DEC. Neill also had a few run-ins with Mitnick.
|
'Susan Thunder' -One of the few female phreakers/hackers and member of the Roscoe gang. Members included Kevin Mitnick and Lewis De Payne.
|
RFP- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22 |
'Rain Forest Puppy' -Likes to beat up on Microsoft servers (IIS). Can be found here.
|
Jeff Moss- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17 |
'Dark Tangent' -Founder of DefCon.
|
'ytcracker' -Defaced some websites, including NASA.
|
'Erik Bloodaxe' -Member of LOD (Legion of Doom).
|
Doctor Who- 1,2,3,4,5,6,7,8,9,10,11,12 |
'Doctor Who' -Member of LOD (Legion of Doom).
|
Robert Tappan Morris, Jr.- 1,2,3,4 |
Cornell University graduate student who accidentally unleashed an Internet worm in 1988. Thousands of computers were infected and subsequently crashed.
|
Peiter Zatko- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34 |
'Dr. Mudge' -Member of cDc and L0pht Heavy Industries, now works as Vice President of Research and Development for @Stake.
|
Dildog- 1,2,3,4,5,6,7,8,9,10,11,12 |
'Grandmaster Ratte' -Founder of the cDc.
|
'Franken Gibe' -Founder of the cDc.
|
Count Zero- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15 |
'Count Zero' -Member of the cDc.
|
'Reid Fleming' -Member of the cDc.
|
Chris Wysopal- 1,2,3,4,5,6,7,8,9,10,11,12,13 |
'Weld Pond' -L0pht
dude and research scientist at security services provider @Stake.
|
'OXblood Ruffin' -cDc's Foreign Minister (he's from Canada).
|
Tweety Fish- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 |
'Tweety Fish' -cDc member.
|
Sir Dystic- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16 |
'Sir Dystic' -cDc member and author of Back Orifice.
|
Eric Skoog- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 |
'The Deth Vegetable' -cDc member. A 14 and 16 year old were taken to a Montreal emergency room after experimenting with a copy of bomb instructions posted by Deth Vegetable.
|
'The Nightstalker' -cDc member.
|
'Obscure Images' -cDc member.
|
'Tequila Willy' -cDc member.
|
'Lady Carolin' -cDc member.
|
Space Rogue- 1,2,3,4,5,6,7,8,9,10,11,12,13 |
'White Knight' -cDc member.
|
'Simple Nomad' -Can be found here.
|
Mike Schiffman- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28 |
'Bronc Buster' -"A well-known California-based hacker."
|
'MostHated' -The co-leader of Global Hell.
|
'Fyodor' -Nmap author. Can be found here.
|
Peter Shipley- 1,2,3,4,5,6,7,8,9,10,11,12 |
Wrote the first network scanner, NetSweep, in '88 (ISS was based on this early work) and invented Wardriving ('99). Can be found here.
|
'Minor Threat' -Author of ToneLoc, served jail time.
|
Eric Corley- 1,2,3,4,5,6,7,8,9,10,11 |
'Emmanuel Goldstein' -Editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook."
|
'Terminus' & 'Terminal Technician' -Some how got his hands on System V 3.2 AT&T Unix Source Code, login.c Can be found here.
|
'Coolio' -Defaced some websites, RSA Security Inc., and dare.com.
|
'Cureador' -Allegedly been involved in the online theft of about 26,000 credit cards and posting them on-line.
|
Jerome T. Heckenkamp- 1,2,3,4,5,6,7,8,9,10,11 |
'SK8' -Allegedly hacked eBay, E*Trade, Lycos, Exodus Communications, Juniper Networks and Qualcomm using the name 'MagicFX'. One time Los Alamos National Laboratory employee.
|
'Mafia Boy' -Executed denial-of-service attacks (Dee-DoS) on web sites, including Yahoo, Amazon.com, ZDNet, CNN, e-Bay and Dell.com on Feb. 7, 2000. Just showing that it could be done, he pled guilty and was sentenced to eight months.
|
'Cap'n Crunch' -Let people know about making free phone calls using a plastic prize whistle found in a cereal box. Cap'n Crunch helped introduced generations of hackers to the glorious world of phone "phreaking." Can be found here.
|
Ian Goldberg- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18 |
Chief Scientist, Zero-Knowledge Systems. In 1997, as a graduate student at the University of Californial at Berkeley, he cracked RSA Data Security's 40-bit crypto code in just three and a half hours using a network of 250 workstations.
|
'Pimpshiz' -17-year-old hacker allegedly responsible for defacing some 200 Web sites in 2000 with pro-Napster graffiti. Can be found here.
|
Brian Martin- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38 |
He did important work showing how logic could be applied to the design of relay circuits--in short, that the true-and-false of Boolean logic could be the same as the on-and-off of an electric switch.
|
Elias Levy- 1,2,3,4,5,6,7,8,9,10,11,12 |
Author of several major Internet firewall products, including the DEC SEAL, the TIS Gauntlet, and the TIS Internet Firewall Toolkit. Can be found here. But "I'm mostly a suit these days." :-p
|
'Mixter' -Authored Tribe Flood Network (TFN). The tool that was used by 'Mafia Boy' in the Dee-Dos attacks of 2000.
|
RFC's were invented by Stephen Crocker.
|
Managed the Internet numbers, country codes, and other parameters that provide the basic structure that enables the net to work (IANA & ICANN). One of the key people who helped administer the Internet from its beginning, until he passed away in 1998. A RFC without his name on it, is rare.
|
'RMS' -Created the GNU free software project. Stallman walked in off the street and got a job at MIT's Artificial Intelligence Lab in 1971.
|
Developed the mouse, the graphical user interface, and the first working hypertext system.
|
Cryptography expert and Counterpane's chief technology officer. Designed the Blowfish and Twofish algorithms.
|
'Bernie S.' -A hacker who was prosecuted for having items which "could be used' for illegal activity.
|
Jon Johansen is one of the three founding members of MoRE (Masters of Reverse Engineering), the trio of programmers who created a huge stir in the DVD marketplace by releasing DeCSS, a program used to crack the Content Scrambling System (CSS) encryption used to protect every DVD movie on the market.
|
Steve Bellovin- 1,2,3,4,5 |
Jim Ellis and Tom Truscott conceived of the Usenet concept, and Steve Bellovin wrote the first program.
|
Developed the Korn Shell (ksh), a command language that makes computers easier for programmers and nonprogrammers to use.
|
Def Con press coordinator and attrition.org staff member.
|
Peekabooty's technical lead. An anonymous, peer-to-peer network, Peekabooty is meant to enable Web surfers in countries with strict state-sponsored Internet censorship to have access to information.
|
Dave Dittrich is a senior security engineer and consultant for the University of Washington. He was one of the first to identify distributed denial-of-service (DDoS) attack programs in 1999. Dee-Dos expert.
|
Writes some good articles on the hacking culture. Can be found here.
|
'c0mrade'- A teen-ager who broke into a Pentagon computer system that monitors threats from nuclear weapons.
|
Herwart Holland-Moritz- 1,2,3,4,5,6,7 |
Vacuum- 1,2,3,4,5,6,7,8,9,10,11,12 |
Rhino9 Team member. Can be found here.
|
'Zyklon'- Global Hell member, served 15 months.
|
Founder of Internet Relay Chat, IRC, in 1988.
|
'Datastream Cowboy' -Enjoyed penetrating .mil sites. The Times of London reported that knowing he was about to be arrested, Richard "curled up on the floor and cried."
|
'Kuji' -Accused of breaching some sensitive computers belonging to ths USAF and a commercial missile manufacturer in 1994. Can be found here.
|
Was in charge of the technical aspects of computer and network security for Silicon Graphics, Inc., Sun Microsystems and most recently EarthLink. Co-authored SATAN (Security Administrator's Tool for Analyzing Networks) and wrote COPS (Computer Oracle and Password System). Can be found here.
|
Co-authored SATAN, he also wrote TCP Wrappers (tcpd). Can be found here.
|
Justin Tanner Petersen- 1,2,3 |
'Agent Steal' & 'Eric Heinz' -Hate him or like him, he served over 2 years in prison for hacking. Can be found here.
|
Professor Edward Felten- 1,2,3 |
A Princeton University team cracks SDMI music encryption scheme(s), after SDMI offers a challenge. Professor Felten decided to publish a paper on their findings. Legal threat made by the Recording Industry Association of America (RIAA). Felten decided not to offer his teams findings. Buh-bye free speech. Can be found here.
|
Gifted programmer, who has contributed to the Perl community. Was found guilty under an Oregon computer crime law, and sentenced. Essentially for running Crack (password cracker program), as a system administrator at Intel. Can be found here.
|
Randy was an early FIDOnet pioneer and co-chair of the IETF.
|
Senior Technical Staff Member at AT&T Labs, Research in the secure systems research department. Helped reveal weaknesses in the underlying cipher that provides security for the 802.11 wireless LAN protocol. Can be found here.
|
John 'Mad Dog' Hall- 1,2,3,4,5,6 |
The legendary executive director of Linux International was directly responsible for the port of Linux to the Alpha processor. Jon has been a very vocal advocate of Linux and had been in the UNIX group for sixteen years as an engineer.
|
Russian programmer who was arrested in 2001 by the FBI, at DefCon 9, for giving away software that removes the restrictions on encrypted Adobe Acrobat files.
|
Frequent presenter at conferences, including Networld+Interop, BlackHat, SANS, and TISC. She is also the author of Surviving Security.
|
Adrian Lamo- 1,2,3,4,5,6,7,8,9,10,11,12,13 |
A talented, young Grey Hat. Has found holes in Microsoft, Excite@Home, Yahoo, MCI WorldCom, Bank of America, Citicorp, Pfizer Chase Mellon, Daimler Chrysler, FOX TV, H&R Block, and General Electric networks. In 2000 he also found a way to break into AOL Instant Messenger accounts. And in 2002, hacked his way into the NY Times corporate intranet database. Can be found here.
|
An engineer at eEye, or as he likes to tell it "chief hacking officer". Marc and eEye have been credited with finding numerous vulnerabilities in WinNT and Windows XP.
|
Miguel de Icaza- 1,2,3,4,5,6,7,8,9,10,11,12,13,14 |
Co-founder of Ximian (Helix) GNOME. Can be found here.
|
Co-founder of Ximian (Helix) GNOME.
|
Java inventor. James Gosling also invented NeWS, the networked PostScript-based window
system used by Sun for years. He also wrote the first Unix version of
EMACS (Gosling Emacs which became Unipress Emacs).
|
Crack author (password cracker). Can be found here.
|
Professor at the University of Pennsylvania and Research Scientist at AT&T. Discovered a serious flaw in the U.S. Government's "Clipper" encryption system and co-designed swIPe, the predecessor of IPSEC. Can be found here.
|
In 1994 Vladimir, a 23-year-old, led a Russian hacker group in the first publicly revealed international bank robbery over a network. Stealing around 10 million dollars from Citibank, which claims to have recovered all but $400,000 of the money. Levin was later caught and sentenced to 3 years in prison.
|
'Locke' -Former phreaker, John was also on the first team to ever win Capture the Flag at Defcon. Can be found here.
|
All around cool security expert. A contributing member of the OpenSSH project.
|
Michael Buen & Onel
de Guzman- 1 |
Both are suspected of writing the 'I Love You' virus.
|
Melissa virus author. The virus was released on March 26, 1999. Causing an estimated 80 million dollars in damages.
|
Khan was instrumental in the investigation leading to the arrest of David L. Smith, who authored the Melissa virus.
|
'Cancer Omega' -Attrition member.
|
'Analyzer' -In 1998, this Israeli teen was responsible for hacking dozens of unclassified Pentagon systems in what was "the most organized and systematic attack to date" on US military systems. The attacks exploited a well-known vulnerability in the Solaris operating system for which a patch had been available for months.
|
Chen Ing-Hou, the creator of the CIH virus, that takes his initials. This was the first known virus to target the flash BIOS.
|
Created CP/M, the first operating system to see popular use. He also helped form the Home Brew Computer Club.
|
Grace Murray Hopper- 1,2,3,4,5,6,7,8,9,10,11,12 |
Grace developed the Flowmatic computer language for the UNIVAC 1. Flowmatic was the foundation from which COBOL was developed (1959). She was an explorer at the dawn of the digital age, a visionary programmer at a time when the world of computer science was overwhelmingly male. Was also named a rear admiral, the first female rear admiral in the U. S. Navy.
|
Together with Whitfield Diffie invented public-key cryptography in 1976. One of the results is the so called Diffie-Hellman algoritm for key exchange.
|
The inventor of Ethernet and founder of 3Com Corporation.
|
'CyberPsychotic' -X probe author and contributor to Snort. Can be found here.
|
The author of Snort, an open source lightweight network intrusion detection system. Can be found here.
|
Works for Sun Microsystems in the Network Security Group. He's also maintainer of the Solaris 2.x FAQ
.
|
Operated the world's most popular anonymous remailer, called penet.fi. Was raided by the Finnish police in 1995 after the Church of Scientology complained that a penet.fi customer was posting the "church's" secrets on the Net. Helsingius closed the remailer after a Finnish court ruled he must reveal the customer's real e-mail address.
|
Jonathan Littman- 1,2,3,4 |
'Tabbis' -Lindsly was the major ringleader in a computer hacker organization, known as the "Phone Masters", whose ultimate goal was to own the telecommunications infrastructure from coast-to-coast. The group penetrated the systems of AT&T, British Telecom., GTE, MCI WorldCom, Sprint, Southwestern Bell and systems owned by state and federal governmental agencies, to include the Nation Crime Information Center (NCIC) computer. They broke into credit-reporting databases belonging to Equifax Inc. and TRW Inc. They entered Nexis/Lexis databases and systems of Dun & Bradstreet. They had access to portions of the national power grid, air-traffic-control systems and had hacked their way into a digital cache of unpublished phone numbers at the White House. A federal court granted the FBI permission to use the first ever "data tap" to monitor the hackers' activities. In 1999 Lindsly was sentenced in federal court to forty-one months imprisonment.
|
'El Griton' -A 21 year old Argentinean who was sentenced to a three-year probation in 1997 for hacking into computer systems belonging to Harvard, NASA, Los Alamos National Laboratory and the Naval Command, Control and Ocean Surveillance Center.
|
Shawn Fanning- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26 |
Authored Napster, the first program that popularized Peer-to-Peer file sharing (P2P).
|
'The-Rev' -One of two members of the Sm0ked Crew, the group that defaced websites belonging to Intel, Compaq Computer, Alta Vista, Hewlett-Packard, Gateway, Disney, and The New York Times.
|
One of the leaders of Dutch hacking group Hit2000, he had access to Nasdaq.com, CBS.MarketWatch.com, BigCharts.com, and FTMarketWatch.com in Oct. of 2000.
|
David Filo and Chih-Yuan "Jerry" Yang- 1,2,3,4,5,6,7,8,9 |
Founders of the search engine Yahoo (Yet Another Hierarchical Officious Oracle). They were working on their doctorates, at Stanford, in the Computer Systems Laboratory in 1994 when they began compiling a guide to World Wide Web sites that they found interesting. Yahoo made both David and Jerry billionaires before they were 30, it was later reported in 2002 that they had lost their billionaire status, with Filo losing a reported $10.31 billion during the tech. slump.
|
Chief Scientist of the National Security Agency. Legendary for security breaches at Bell Labs before joining NSA. Now retired.
|
Worked on the first atomic bomb at Los Alamos. Cracked security left and right. Won the Nobel prize for physics in 1965. Mentor of Tsutomu Shimomura.
|
Inventor of hypertext. Author of Computer Lib / Dream Machines, a hand-written 1970's self-published classic, that self-taught thousands of people about the promise of small computers, in an era when most computers lived in big glassed-in air-conditioned rooms. Visionary whose vision, Xanadu Hypertext Publishing System, exceeded his grasp. Mentor of Tsutomu Shimomura at Princeton.
|
EFF co-founder John Gilmore has been thinking about computers and writing software and standing up for freedom for 20 years.
|
|