Wednesday, November 10, 2010

History of hacking

Hello Friends I have posted this video and this post for you to know what is the History of hacking.

Hacking has been for around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities
Let See Some of the Hacker who have created the history due to there Passion in Hacking:
John Draper:Inspiration of Hacker
Jhon Draper  also known as Captain Crunch, Crunch or Crunchman . He is a computer programmer and former phone phreak.Draper was the son of a U.S. Air Force engineer.
Jhon draper was not hacking Computers but he was hacking phone which is known as phone phreak 
and become the the Inspiration for future hacker.
One day he noticed that some blind kids, named Dennie and Jimmie, were using the whistle from a "Cap'n Crunch" box to make free long distance telephone calls. They glued one of the holes shut in the whistle, and then blew it into the telephone. The modified whistle produced a pure 2600 Hz tone, which was the standard used by telephone electronics to signal that a call was over. When the telephone system heard the whistle it stopped all long distance charges, even though the call continued until one of the parties hung up.
John popularized the use of this whistle, and became known by the hacker handle "Cap'n Crunch". John became infamous, and was arrested in May, 1972 for illegal use of the telephone company's system. He received probation, and then was arrested again in 1976, convicted on wire fraud charges, and spent four months in Lompoc Federal Prison in California. Since then, he has held a variety of positions and given interviews on his experiences during the earliest days of long distance hacking. 

Robert Tappan Morris: Creator of First Worm
The Creator of first Worm
In 1988, Robert Tappan Morris [wiki], a Cornell University grad student (and son of the chief scientist at the National Computer Security Center), created the first Internet "worm [wiki]," a destructive program that replicates itself and moves through a computer network at breakneck speed. Partly to demonstrate his cracking prowess to classmates and partly to show how an MIT security system was vulnerable to attack, Morris wrote a software program that exploited a glitch in a Unix email program. Allegedly, Morris intended the worm program to infect only the MIT network. But during a 12-hour period, it spread rapidly, infecting thousands of systems and forcing some universities to shut down their computers altogether. Shocked by how quickly the worm was spreading, Morris helped a friend send out an anonymous message with instructions for system administrators to stop the plaque. But it was too late; the worm had propagated beyond control. In the end, every university affected had to spend thousands of dollars to fix its infected computers. Morris became the first person indicted under the CFAA when the U.S. government fined him $10,000 and sentenced him to probation and community service. However, the source code for the worm remains in wide circulation today. Almost 18 years after the incident, hackers are still using Morris’ worm as a starting point for new viruses.
Kevin Mitnick:The Real Hacker
Kivin Mitnic

By the 1990s, hacking had clearly transitioned from the child’s play of Cap’n Crunch toys to a brave new world of tech crime. And nothing underscored that shift more than when Kevin Mitnick [wiki] became the first hacker to earn an FBI Most Wanted distinction.
In 1976, while other Americans were celebrating the centennial, Mitnick was sweeping floors at a Radio Shack – not because he loved cleaning, but because he loved using their computers at night to hone his cracking skills. Before long, he’d developed a habit of unraveling computer code in order to see how an operating system worked or (later) how a cell phone connected to a network. Combine that kind of know-how and enthusiasm with a gregarious personality, and you’ve got a problem. Mitnick once called Motorola and charmed them into sharing their source code for free – information he promptly used to break into the computer systems at Motorola, Nokia, Sun Microsystem, and Fujitsu.
The New York Times broke the story about Mitnick’s activities that ultimately led to his 1995 arrest and a five-and-a-half-year prison term. However, there remains widespread misunderstanding (and controversy) about the case. Mitnick denies causing any serious damage to the computer systems he hacked, though he admits sneaking into private networks was wrong. Regardless, the government – still uncertain of what hackers were capable of – treated him as a seriously dangerous man. Authorities were bombarded with claims that Mitnick had done everything from wiretapping the FBI to hacking his way ito NORAD. (He denies those allegations, as well.) They assumed he could crack anything, even fearing he could launch nuclear bombs or shut down the Internet by whistling into a phone. In fact, after he was released from prison, Mitnick was barred from owning or using any electronic communications devices. When he played the role of a computer whiz on a 2001 episode of "Alias," the producers would only allow him access to a dummy computer.
Mitnick has influenced an entire generation of hackers with his innovative and stealthy cracking tactics, such as using IRC (Internet Relay Chat) [wiki] technology, an Internet conferencing system. He’s also written treatises stating his belief that the future of hacking lies in "social engineering," in which sensitive computer and coding information is not obtained through people’s computers, but from the persons themselves, via false emails and the like. But Mitnick’s greatest legacy might be in setting a good example. Today, he’s on the straight-and-narrow. The master hacker now spends about 25 percent of his time earning primo consulting fees helping fellow specialists break into "secure" systems in order to show companies how their networks are vulnerable.

This were the some Hacker of the history
Source of Information is from: Google,Wikipidia-The free Encycropidia,neatorama.com
                                         
                                          




No comments:

Post a Comment