Content deleted Content added
m date formats per MOS:DATE TIES |
Adolphus79 (talk | contribs) punctuation, spacing, informal caption (none of the extra info is included in description of image), attempt to condense multiple one sentence paragraphs, other minor cleanup... |
||
Line 5:
| name = Steve Gibson
| image = SteveG.jpg
| caption =
| birth_name =
| birth_date = {{birth date and age|1955|3|26}}<ref name="twit">{{cite web|url=http://twit.tv/show/security-now/500|title=Security Now 500 | TWiT.TV|publisher=twit.tv|access-date=May 15, 2015}}</ref>
Line 19:
}}
'''Steven'''<ref>{{Cite web|url=https://businesssearch.sos.ca.gov/CBS/SearchResults?SearchType=CORP&SearchCriteria=gibson+research+corporation&SearchSubType=Keyword|title=California Business Search for "gibson research corporation"|website=California Secretary of State|access-date=2017-11-03}}</ref> "'''Steve Tiberius'''<ref>{{Cite web|url=https://www.grc.com/sn/sn-700.htm|title=Security Now! Transcript of Episode #700|website=www.grc.com|access-date=2019-02-12}}</ref>" '''Gibson''' (born March 26, 1955) is an American [[software engineer]], security researcher, and IT security proponent. In the early 1980s,
==
Gibson started working on computers as a teenager, and got his first computing job with [[Stanford University]]'s [[artificial intelligence]] lab when he was 15 years old.<ref name=MillarGuardian/> He
==Career==
Gibson was hired as a programmer for [[California Pacific Computer Company]] in 1980, where he worked on copy protection for the company's products.<ref>{{cite journal |last=Knudsen |first=Richard |title=Exec California Pacific: Innovative Marketing Budges |url=http://www.softalkapple.com/sites/default/files/Softalk_V1.05_draft.pdf |journal=Softalk Magazine |date=January 1981 |volume=1 |number=5 |page=34}}</ref> He then founded Gibson Laboratories in [[Laguna Hills, California]], in 1981, which developed a [[light pen]] for the Apple II, Atari, and other platforms before going out of business in 1983.<ref name=GibsonResume>{{cite web |first=Steve |last=Gibson |url=https://www.grc.com/resume.htm |title=Steve's Resumé |work=GRC.com |access-date=February 8, 2015}}</ref><ref>{{cite news |url=https://books.google.com/books?id=ei4EAAAAMBAJ&pg=PA61 |title=Hardware: Light Pen Technology looks to the Micro |last=Mace |first=Scott |date=December 26, 1983 |page=61 |work=InfoWorld |access-date=January 27, 2015 |quote=The Gibson Light Pen has been developed for Atari home computers.}}</ref><ref>{{cite web|title=InfoWorld Aug 9, 1982 / P13-17|url=https://books.google.com/books?id=NDAEAAAAMBAJ&q=david+needle+lps+II&pg=PA13|website=books.google.com|date = August 9, 1982|publisher=Popular Computing Inc|access-date=February 24, 2016}}</ref>
In
In 2005,
▲From 1986 to 1993 Gibson wrote the "Tech Talk" column for ''[[InfoWorld]]'' magazine.<ref>{{cite news |url=https://books.google.com/books?id=9ToEAAAAMBAJ&pg=PA102 |title=SpinRite upgrade |date=October 11, 1993 |work=InfoWorld |quote=...Steve Gibson, whose Tech Talk column has run in InfoWorld for close to eight years...}}</ref>
In 2006, Gibson raised the possibility that the [[Windows Metafile vulnerability]] bug was actually a [[Backdoor (computing)|backdoor]] intentionally engineered into the system.<ref>{{cite web |url=https://www.grc.com/sn/sn-022.htm |title=Security Now! Episode Archive |work=GRC.com |publisher=Gibson Research Corporation |access-date=December 12, 2017}}</ref>
In 2013, he proposed [[SQRL]] as a way to simplify the process of authentication without the risk of revelation of information about the transaction to a third party.<ref>{{cite web |work=GRC.com |url= https://www.grc.com/sqrl/demo.htm |title=Secure Quick Reliable Login |first=Steve |last=Gibson |date=October 2013}}</ref>
▲In 2001, Gibson predicted that Microsoft's implementation of the [[raw socket|SOCK_RAW]] protocol in the initial release of [[Windows XP]] would lead to widespread chaos by making it easier for Windows XP users to create [[denial of service]] (DoS) attacks.<ref>{{cite news |first=Deborah |last=Radcliff |work=Computerworld |date=October 22, 2001 |url=http://www.computerworld.com/article/2585406/operating-systems/windows-xp--is-it-safe-.html |title=Windows XP: Is it safe?}}</ref><ref>{{cite AV media |type=video |url=http://www.vpwsys.net/download/grc_low.wma | title=Raw Sockets Debate: Steve Gibson with Tom C. Greene |year=2001 |work=Online Tonight with David Lawrence |archive-url=https://archive.org/details/stevegibsoninterviewrawsocketsgrc |archive-date=May 7, 2014 |url-status=live |access-date=February 7, 2015}}</ref><ref>{{cite news |first=Seth |last=Fogie |work=InformIT |date=June 21, 2002 |url=http://www.informit.com/articles/article.aspx?p=27289 |title=Raw Sockets Revisited: What Happened to the End of the Internet?}}</ref> In that year, his company's website was brought down by a DoS attack;<ref name=MillarGuardian /> the attacks continued for two weeks. Gibson blogged about the attacks and his (ultimately successful) efforts to track down the hacker.<ref name=MillarGuardian>{{cite news |first=Stuart |last=Millar |work=The Guardian |date=June 5, 2001 |url=https://www.theguardian.com/technology/2001/jun/05/hacking.security |title=Teenage hackers}}</ref> Three years after the Windows XP release, Microsoft limited raw socket support in [[Windows XP#Service Pack 2|Service Pack 2]].<ref>{{cite news |first=Ian |last=Griffiths |work=IanG on Tap |date=August 12, 2004 |url=http://www.interact-sw.co.uk/iangblog/2004/08/12/norawsockets |title=Raw Sockets Gone in XP SP2}}</ref>
▲In 2005 Gibson launched a weekly [[podcast]] called "[[Security Now]]" with [[Leo Laporte]] on [[TWiT.tv]], with its archives hosted on GRC's website.<ref>{{cite web |url=https://www.grc.com/sn/past/2005.htm |title=Security Now! Episode Archive |work=GRC.com |publisher=Gibson Research Corporation |access-date=February 8, 2015}}</ref><ref>{{cite news |first=Andy |last=Bowers |work=Slate |date=December 9, 2005 |url=http://www.slate.com/articles/podcasts/podcasts/2005/12/slates_podcast_roundup.html |title=Slate's Podcast Roundup}}</ref>
▲In 2006 Gibson raised the possibility that the [[Windows Metafile vulnerability]] bug was actually a [[Backdoor (computing)|backdoor]] intentionally engineered into the system.<ref>{{cite web |url=https://www.grc.com/sn/sn-022.htm |title=Security Now! Episode Archive |work=GRC.com |publisher=Gibson Research Corporation |access-date=December 12, 2017}}</ref> A response by Microsoft<ref>{{cite news|last=Toulouse|first=Stephen|date=January 13, 2006|title=Looking at the WMF issue, how did it get there?|work=Microsoft Security Response Center|url=http://blogs.technet.com/msrc/archive/2006/01/13/417431.aspx|url-status=dead|access-date=October 29, 2021|archive-url=https://web.archive.org/web/20060116042756/http://blogs.technet.com/msrc/archive/2006/01/13/417431.aspx|archive-date=January 16, 2006}}</ref> and by [[Mark Russinovich]] on Microsoft's ''Technet'' blog<ref>{{cite news|last=Helweg|first=Otto|date=January 18, 2006|title=Inside the WMF Backdoor|work=Mark Russinovich's Blog|url=http://blogs.technet.com/markrussinovich/archive/2006/01/18/inside-the-wmf-backdoor.aspx|access-date=October 29, 2006|archive-url=https://web.archive.org/web/20061218003852/http://blogs.technet.com/markrussinovich/archive/2006/01/18/inside-the-wmf-backdoor.aspx|archive-date=December 18, 2006}}</ref> stated that the bug appeared to be coding error and that Gibson's reasoning was based upon Microsoft's abort procedure documentation being misleading.
===GRC products===
Line 75 ⟶ 69:
*http://www.computerhistory.org/collections/catalog/102674112
{{TWiT podcasts}}▼
{{Authority control}}
▲{{TWiT podcasts}}
{{DEFAULTSORT:Gibson, Steve}}
|