The World's Best Hackers Indonesian Origin
Hello all, here I am trying to write an interesting article that I get several sources, here I will try to write about the hacker, the hacker is from Indonesia and I both come from Indonesia, I am proud to have this hacker because he hackers were good, not Jim Geovedi criminal hackers or cracker, he is often referred to as a "dangerous man."
![]() |
| Jim Geovedi |
Why? Today, when almost all the information and people connected, if he wanted to, could have been any time out looked reading emails or just peek at other people's accounts. Even he could steal critical data traffic such as bank transactions, the financial statements of the company or even observe the country's defense system. but subdued him good hackers believed even the entire company as well as the world's largest. "If I wanted to I could control the Internet throughout Indonesia," Jim said in a conversation with Deutsche Welle German site. When the statement is confirmed observers IT Enda Nasution, he claimed to believe Jim Geovedi can do that. Hacker accomplished from Indonesia were able to hack satellite Jim is a native Indonesian hacker with a global reputation. He was always pacing Berlin, Amsterdam, Paris, Torino, to Krakow to be a speaker at a meeting of international hackers. With the ability in the field of hacking, hacker world in a meeting, Jim demonstrated how to hack satellite. He can change direction or shifting the position of the satellite. Jim Geovedi currently living in London and set up a service company in information technology security systems and colleagues. He handles the client who needs satellite systems security services, banking and telecommunications. The last two years, he claimed to be interested to develop artificial intelligence computer. Ability to be recognized internationally. In addition to working as a consultant for information security system, he is also listed as the owner of shares of two companies engaged in the field of Information Technology. "When I work only two hours a day. once casual, but earnings satisfactory. The rest of the time I would call leisure time. Free independent. Going for a walk or research up to me, "he said.
Learning Hacking Self Taught
without lectures Jim Geovedi prove the school is not the only path to success. Although he never stepped on to college, this young man could earn tens of millions of rupiah per month. He now works as an information security consultant in Bellua Asia Pacific. So, where Jim got the ability in the field of hacking and information technology? Certainly not from the college. Jim taught himself. When faced with final exams in high school, her parents died. maybe from there hit his burden and tried to get up from his grief. Actually, he was accepted at a state university and had to force myself to college, but soon dropped out because there is not enough charge. Eventually Jim was just wandering in the house for two to three months to feel a sense of frustration. Until one when a friend offered a job helping typing documents on a computer. Where he works is adjacent to the office consultant planner. Incidentally, the office was understaffed. Long story short he helped work in the office. From there the first step to learn ransacked the computer and the Internet. Of deliberately tinkering with the program, he felt challenged to seriously learn to understand computers. Jim began to explore the world of information security since 1997. "I happen to go in the right chat community, so it can be as it is now. At first I thought it was just for a chat to find a boyfriend. But, it turns out from the world that I actually motivated to explore the world of hacking, "he said. Motivation was pushed Jim do their own research for two years. Endeavors to fruition. His name is increasingly flying in the security community underground. He then participated actively developing computer operating systems, FreeBSD and OpenBSD, and applications relating to other security. Jim worked as a security systems engineer Bellua Asia Pacific, an information technology consulting firm. He is also busy as a speaker at various events information technology seminar. His intention is simple: to share knowledge. Jim also proves, if used properly knowledge and ability hacking proved very useful and promising. Here's the full interview with Jim Geovedi Deutsche Welle.
What Have You Been Hacked?
"I have never hacked if it is, I will not reveal in the interview, hehehe. But I paid a lot to test the security system. I have a consultant security companies to test applications and networks. My clients from banking, telecommunications, insurance, electricity, cigarette manufacturers and others."
How do You Build a Reputation as a Hacker?
"I did not start to hack the system, then after the famous open identity and build business security systems. Since the beginning, I am more sociable with the hacker world than Indonesia, and from there I was often invited as a speaker seminars or international media interviews. A few years after that I began to be noted in Indonesia. In 2004, I was asked to help the Commission, at which time the data center ballot counting had been hacked. I was hired to find out who was responsible. As a result, a hacker Indonesia also named Dani Firmansyah eventually arrested. When a new wireless entered Indonesia in 2003, I've been asked to be a speaker at Kuala Lumpur about the dangers of the system. In 2006, I was asked to be a speaker satellite security system issues, and that might make the name of my riding."
They Say You Can Hack The Satellite?
"Yes, can. The satellite system is quite unique. People who can control the satellite should know the A to Z of the satellite. And the only way is that you have to get into the operator room or in the work situation with meretasnya operator. From there you will understand all things: the satellite was launched when, how to control, what system is used. After that you will be able to understand: oh here anyway weaknesses of the system. It was all a total instinct. The more often you study the case, when dealing with other cases, you will be able to see the similarity pattern. If you already see the similarity pattern, then you will know."
Satellite Anywhere You've Ever hack?
"It satellites my clients ha ha ha, satellite Indonesian and Chinese satellite."
What do You do With The Satellite?
"At that time I was asked to test the security system satellite control, and I saw "turned out to have the chance of shifted or rotated slightly, then yes I slide and it made them panic because it is rather difficult to restore a satellite into orbit. Luckily they had extra fuel" They says: Okay, enough! Do not continue! "Satellites are from China but if I could slide that of Indonesia I change the rotation."
With This Ability, How do You Overcome Temptation?
"If you want, I can control the internet throughout Indonesia. I could divert data traffic, I could observe traffic outgoing or incoming Indonesia," he said. "I could modify all financial transactions. With my ability that might be done. But for what? I am among those who are grateful for what I have. I have no interest exaggeration about the matter."
So, of the story I was motivated to write this article, it is easy Hopefully I can also be a Jim, someone who has tremendous knowledge and work into something positive, ameen.. So the above conclusion, not only educated who have the knowledge, the self taught learning can also be an example jim, so it all depends on the intention own. I'll see you in the next article, bye ..
loading...
loading...

Comments
Post a Comment