whitehat

Dildog

IRL Name: 
Christien Rioux
Biography: 

Dildog is now the co-founder and chief scientist of Veracode. He is the main patent holder for Veracode, based in Burlington, Mass. He worked at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec). While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA). He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.

He is also a member of Cult of the Dead Cow and its Ninja Strike Force. Formerly, he was a member of L0pht and subsequent employee of @stake and Symantec, where he was responsible for many security advisories.

DilDog is best known as the author of the original code for Back Orifice 2000, an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."

Pictures: 
References

Frank Drake, Sir Francis Drake

IRL Name: 
Steven G. Steinberg
Biography: 

Principal of Steinberg Consulting. He is currently employed by an investment firm in New York as a technology trend-spotter. He founded and led the company's quantitative research group and created their online portfolio system. Was a member of the LOD from late 1984 to early 1986.

References

Woz

IRL Name: 
Steve Wozniak
Biography: 

Steve "Woz" Wonziak is the co-founder of Apple Inc. with Steve Jobs.

Pictures: 
References

Doom Prophet, Trouble Verify

Biography: 

Was a part of LOD while living in Illnois.

References

http://en.wikipedia.org/wiki/Legion_of_Doom_(Hacking)

Brian Oblivion

IRL Name: 
Brian Hassick
Biography: 

One of the founding members of L0pht and the only member to be a part of the group throughout it's existance until merging with @stake in January 2000.

References

Count Zero

IRL Name: 
John Lester
Biography: 

One of the founding members of L0pht and a member of cDc.

Pictures: 
References

Guninski

IRL Name: 
Georgi Guninski
Biography: 

Known for his vulnerability research on older versions of Internet explorer, His main targets where Microsoft products, but he did find some flaws within other products as well. George has now publicly retired from the Vuln Dev scene.

References

Matthias Ettrich

IRL Name: 
Matthias Ettrich
Biography: 

Matthias Ettrich (born 14 June 1972 in Bietigheim-Bissingen, southern Germany) is a computer scientist known for his contributions to the KDE and LyX projects. He founded the KDE project in 1996 and in 2009 received the German Federal Cross of Merit, the most prestigious decoration awarded by the German government.

Pictures: 
References

Matt Blaze

IRL Name: 
Matt Blaze
Biography: 

Matt Blaze is a researcher in the areas of secure systems, cryptography, and trust management. He is currently an Associate Professor of Computer and Information Science at the University of Pennsylvania; he received his PhD in Computer Science from Princeton University.

In 1993, Blaze published (with John Ioannidis) a paper presenting a protocol ("swIPe") that was to be one of the forerunners of IPsec. In 1994, he found a means to circumvent the wiretapping mechanisms of the Clipper chip, contributing to the death of this government-sponsored initiative. In 2003, he independently rediscovered a serious vulnerability in "master key" security in physical locks that was an open secret among locksmiths; his decision to disclose it publicly provoked controversy.

Pictures: 
References

Martin Roesch

IRL Name: 
Martin Roesch
Biography: 

Martin Roesch founded Sourcefire in 2001 and serves as its Chief Technology Officer. A respected authority on intrusion prevention and detection technology and forensics, he is responsible for the technical direction and product development efforts. Martin, who has 17 years industry experience in network security and embedded systems engineering, is also the author and lead developer of the SNORT® Intrusion Prevention and Detection System (http://www.snort.org/) that forms the foundation for the Sourcefire 3D System.

Over the past 10 years, Martin has developed various network security tools and technologies, including intrusion prevention and detection systems, honeypots, network scanners, and policy enforcement systems for organizations such as GTE Internetworking, Stanford Telecommunications, Inc., and the Department of Defense. He has applied his knowledge of network security to penetration testing and network forensics for numerous government and large corporate customers. Martin has been interviewed as an industry expert in multiple technology publications, as well as print and online news services such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Snort has been featured in Scientific American, on A&E's Secret Places: Inside the FBI, and in several books, such as Network Intrusion Detection: An Analysts Handbook, Intrusion Signatures and Analysis, Maximum Security, Hacking Exposed, and others.

In 2006, Martin was named as one of InformationWeek's 18 "Innovators and Influencers" and one of the Tech Council of Maryland's "Most Influential CTOs in Maryland." Martin has also been the recipient of the 2004 InfoWorld IT Heroes Innovator Award as well as winning the 2004 "40 Under 40" award from the Baltimore Business Journal.

Martin holds a B.S. in Electrical and Computer Engineering from Clarkson University.

Pictures: 
References
Syndicate content