Wednesday, October 6, 2010

Things You Need to Know About Computer Hacking

Originally, the term "hacker" meant "one who makes furniture with an ax." It's probably because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
It was in the late 1950's that computer hacking started when members of MIT's Tech Model Railroad Club became obsessed with electrical switching began preparing punch cards to control an IBM 704 mainframe.
A code that illuminates lights on the mainframe's console was one of the club's early programs, which made it look like a ball zipping from left to right, then vice versa with the flip of a switch.
Hacker "Cap'nCrunch" also known as John Draper used a toy whistle to match the 2,600 hertz tone used by AT&T's long distance switching system, which gave him access to call routing way back in the early 1970's.
Steve Wozniak and Steve Jobs who are both Apple founders made and sold "blue boxes", - the electronic versions of Draper's whistle before they become rich.
Using a blue box, Wozniak crank-called the Pope's residence in Vatican City and pretended he was Henry Kissinger.
Hollywood movies in 1983 such as WarGames, was about a whiz kid who breaks into a Defense Department computer and hijacks a payphone by hot-wiring it with a soda can pull-ring at one point. This was when hacking came through Hollywood.
Six Milwaukee teens hacked Los Alamos National Lab in 1983 which develops nuclear weapons.
In 1988, a worm which was a self-replicating program was created by Robert T. Morris purportedly to evaluate internet security.
The worm created a multi million dollar havoc when it reproduced too well, that led to Morris' felony conviction, one of the first under the Computer Fraud and Abuse Act.
The 97 US Navy, Army, Pentagon and NASA computers were hacked by a British, - Gary McKinnon in 2001-2002. His defense; - he wasn't hunting military secrets; he was only seeking suppressed government files about space aliens.
According to a rumore, agents of China's People's Liberation Army attempted to hack the US power grid, triggering the great North American blackout of 2003.
Scott Lunsford, an IBM researcher took just one day to penetrate the network of a nuclear power station.
When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online; - concept was still unclear.
Charlie Miller, a security researcher, used a flaw in Safari to break into Mcbook in as short as 10 seconds. So, if you think your Mac is hackproof, think again!
Tadayoshi Kohno from University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal strength jolts of electricity.
And the greatest kludge of all...Roger Angel from University of Arizona has proposed building a giant sunscreen in space to hack the planet's climate!

0 comments: