The history of Hacking





I have remodified this History of hacking based on St. Petersburg times newspaper


The history of computer hacking can be traced back to the 1870s, but I will emphasize on the most recent years for simplicity.

The 1960s

    It all started at MIT’s (Massachusetts Institute of Technology) artificial intelligence lab.The university’s mainframe computers were used by the first hackers. At first, hacker was a name with a positive significance for a person who was good at computers and could push computer programs beyond the normal functioning standard. It was a borrowed name from a term to describe members of a model train group at MIT who hacked the electric trains and switches to make them perform faster, better and differently.



The 1970s

    John Draper was the talk of the 70s because of his ability to make free calls. He built a "blue box" that, when used together with the whistle and phone receiver, phone calls would be made for free. He was arrested on several counts for tampering with the phone lines throughout the 70s. Steve Jobs, Steve Wozniak (founders of apple computer) used this knowledge.



The early 1980s

    People often say the public was lured into hacking by the movie war game. The main character was Matthew Broderick. It is said that the movie made hackers seem cyber heroes which captured the imagination of young minds in this year.

    Hacking groups like Legion of Doom in the United States, and Chaos Computer Club in Germany began to emerge. Sherwood Forest and Catch-22 were used by phreaks and hackers to interact, and share stolen passwords and credit card numbers.

    Los Alamos labaoratory’s computers for developing nuclear weapons were hacked by the 414 gang. A gang that comprised of six teenagers who were later apprehended by the law.


The Late 1980s

    The Computer Fraud and Abuse Act was passed in 1986
    A self-replicating worm was use on the government's ARPAnet to test its effect on UNIX systems by Robert T. Morris, Jr., a graduate student at Cornell University. Which later spread to 6000 computers. He was fined 10,000 USD.

    Some German hackers were arrested for breaking into the United States government and corporate computers and sold operating-system source code to the Russian KGB.




The early 1990s

    A radio stations phone system was rigged by three hacker-friends during a call-in contest. They won 20 000USD, two cars and all expense paid trips.

    The use of internet came in and hackers started formulating new strategies.

    Kevin Mitnick was arrested for stealing 20,000 credit card numbers.

    Vladimir Levin and other Russian crackers siphoned 10 million USD from Citibank and transfer it to bank accounts in Finland and Israel.



The late 1990s

    The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice. Once installed on a machine with Windows 95 or Windows 98 Operating systems, it allows unauthorized remote access to the machine.
    A 19-year-old Israeli hacker Ehud Tenenbaum known as Analyzer was arrested for breaking into pentagon’s computers and stealing some software.



The 2000s

Well, the popular attacks in the 2000s are,
    the attacks launched on yahoo, Amazon and eBay, that resulted to the denial of service for users.


    Break-ins on Microsoft, for latest versions of their products. The 2001 attack that led to the prevention of millions of users from reaching Microsoft Web pages for two days.


This brief history of Hacking and cracking above is meant to serve as a quick reference point to those who really want to know how it all started. That's why its been in summary. Its good to know the history of most things we do.


A second that has just past is history. Share what you know.

Do you have a great story about this? Share it!

[ ? ]

Upload 1-4 Pictures or Graphics (optional)[ ? ]

 

Click here to upload more images (optional)

Author Information (optional)

To receive credit as the author, enter your information below.

(first or full name)

(e.g., City, State, Country)

Submit Your Contribution

 submission guidelines.


(You can preview and edit on the next page)


initial back to history computer security hacking tutorials















----------------------------

Custom Search

----------------------------

How website building pay my bills

Infopublishing
How do I pay my bills by only providing information without hacking.

Come to think of it, I pay webhosting fee, sit on the computer adding content to my site and a lot of other activities.

Look at it this way, facebook, myspace, twitter, yahoo are trying to get better by the minute.

why....?

They earn from the information and services they provide. How is that possible….?


click here for more

Infopublishing


----------------------------


Wholesale Security products at affordable rates.

Lots of affordable computer products.


----------------------------

PROTECTIVEHACKS Related-DIRECTORIES


button

---------------------------- Advertising website online free at UseAds.com - Submit & add url - advertise site promotion internet & exchange text links + increase traffic & improve page rank!

---------------------------- Search Engine Submission - AddMe
You can submit your site here.
----------------------------

List in a PR6 Web Directory for Free! This site is listed under Commentary Directory

--------------------------- Subscribe