Hello Friends I have posted this video and this post for you to know what is the History of hacking.
Let See Some of the Hacker who have created the history due to there Passion in Hacking:
John Draper:Inspiration of Hacker
Jhon Draper also known as Captain Crunch, Crunch or Crunchman . He is a computer programmer and former phone phreak.Draper was the son of a U.S. Air Force engineer.
Jhon draper was not hacking Computers but he was hacking phone which is known as phone phreak
and become the the Inspiration for future hacker.
One day he noticed that some blind kids, named Dennie and Jimmie, were using the whistle from a "Cap'n Crunch" box to make free long distance telephone calls. They glued one of the holes shut in the whistle, and then blew it into the telephone. The modified whistle produced a pure 2600 Hz tone, which was the standard used by telephone electronics to signal that a call was over. When the telephone system heard the whistle it stopped all long distance charges, even though the call continued until one of the parties hung up.
John popularized the use of this whistle, and became known by the hacker handle "Cap'n Crunch". John became infamous, and was arrested in May, 1972 for illegal use of the telephone company's system. He received probation, and then was arrested again in 1976, convicted on wire fraud charges, and spent four months in Lompoc Federal Prison in California. Since then, he has held a variety of positions and given interviews on his experiences during the earliest days of long distance hacking.
Robert Tappan Morris: Creator of First Worm
The Creator of first Worm |
Kevin Mitnick:The Real Hacker
Kivin Mitnic |
In 1976, while other Americans were celebrating the centennial, Mitnick was sweeping floors at a Radio Shack – not because he loved cleaning, but because he loved using their computers at night to hone his cracking skills. Before long, he’d developed a habit of unraveling computer code in order to see how an operating system worked or (later) how a cell phone connected to a network. Combine that kind of know-how and enthusiasm with a gregarious personality, and you’ve got a problem. Mitnick once called Motorola and charmed them into sharing their source code for free – information he promptly used to break into the computer systems at Motorola, Nokia, Sun Microsystem, and Fujitsu.
The New York Times broke the story about Mitnick’s activities that ultimately led to his 1995 arrest and a five-and-a-half-year prison term. However, there remains widespread misunderstanding (and controversy) about the case. Mitnick denies causing any serious damage to the computer systems he hacked, though he admits sneaking into private networks was wrong. Regardless, the government – still uncertain of what hackers were capable of – treated him as a seriously dangerous man. Authorities were bombarded with claims that Mitnick had done everything from wiretapping the FBI to hacking his way ito NORAD. (He denies those allegations, as well.) They assumed he could crack anything, even fearing he could launch nuclear bombs or shut down the Internet by whistling into a phone. In fact, after he was released from prison, Mitnick was barred from owning or using any electronic communications devices. When he played the role of a computer whiz on a 2001 episode of "Alias," the producers would only allow him access to a dummy computer.
Mitnick has influenced an entire generation of hackers with his innovative and stealthy cracking tactics, such as using IRC (Internet Relay Chat) [wiki] technology, an Internet conferencing system. He’s also written treatises stating his belief that the future of hacking lies in "social engineering," in which sensitive computer and coding information is not obtained through people’s computers, but from the persons themselves, via false emails and the like. But Mitnick’s greatest legacy might be in setting a good example. Today, he’s on the straight-and-narrow. The master hacker now spends about 25 percent of his time earning primo consulting fees helping fellow specialists break into "secure" systems in order to show companies how their networks are vulnerable.
This were the some Hacker of the history
Source of Information is from: Google,Wikipidia-The free Encycropidia,neatorama.com