Short history of hacking

When hacking first started it wasn't thought of as that serious. The hackers were not even known as hacker...

First hacking: the switch boards were handled by a bunch of teenage lads who would disconnect or misdirect calls in 1987. But the first authentic computer hacking came in the 1960s.

*1960s*Suprisingly, the term "hack" doesn't come from the word of computers. Rather it began with the Tech model Railrood Club at MIT.When members of the club modified the functions of their high-teach train sets They moved on toy trains to computers later, using the elusive and expencive IBM 704 computers at MIT to invent, investigate create new paradigms, and try to brooden the tasks that computers could perform. These early hackers like other MIT students, were simply interested in researching, enchancing and pushing the limits of existing programs. In some situations, such as Dennis Ritchie and Keith Thompson's Unix operating system, these hacks even produced programs that were sionificontly superior than the pre-existing ones.

*1970s*

In the 1970s, hacking has progressed from a joke to a serious enterprise. It was all about exploration and figuring out how the wired world operated for hackers.

In 1971, a Vietnam veteran named John Draper carried out the first serious hacking. He devised a method for making free phone calls. This was dubbed "phreaking" later on. With "The Youth Internation Party Line". Abbie Hoffman followed John Drapers's guidance. The only thing missing from the hacker community, however, was a meeting space. Randy Seuss and Ward Christiansen, two Chicagoans, built the first personal computer bulletin board system in 1978. Even today, this system is still in use.

*1980s*

The release of turnkey personal computers to the general public in the 1980s constiterted a watershed moment in the history of hacking. Computers were no longer restricted to comprations and prominent universities, but were now avabile to anybody for their own reasons ---whatever they might be. Unsuprisingly the wide spread avability of personal computers has resulted in a dramatic growth in the number of hackers. It wasn't the only significantin the hacker community. While there were still many hackers who were solely interested in toging with operating systems , a new breed of hacker emerged who were more more concered with personal gain. Instead of using their technological expertise to improve computers, they utilized it to commit crimes such as piratiry software, developing viruses, and hacking into systems to steal sensitive data.

It didn't take long for the law to respond. The Federal Computer Fraud and Abuse Act, which was passed in 1986 in response on the advent of cyber criminals, was the first legistation connected to hacking.

Meanwhile , the concept of hackers as digital genuises rapable of both good and bad descended into popular culture about this time. The premise was populerized by a variety of interature and films, most famoustly the 1983 film War Games, in which suburban youngster discovers a backdoor in a military central computer and nearly beings WW3.

*1990s*The 1990s were when hacking truly began to gain notoriety riding on the coattails of the major developments that occured in the 1980s. An ever-increasing number of cyber crimes committed by "crackers" (or malicious hackers) and the high-profile profile prosecutions that followed tainted the term hacker.

Kevin Mitnick, Kevin Poulsen, Robert Morris and Vladimir Levin were among the most well-known crackers of the decade, having been charged with stealing proprietary software from major corporations, during radio stations to win luxury cars, launching the first computer worm and archestrating the first digital bank heist.

This decade also saw the disintegration of the once-close-knit backing community. The Secret Service condueted sting investigations, early motning raids, and arrested a number of hackers in an effort to combat computer crime. In order to avoid being prosecuted, members of the hacker community began cooperating with one another in exchange for immunity.

submitted by /u/acitly
[link] [comments]

from hacking: security in practice https://ift.tt/3AR6k2U

Comments