Saturday, 23 June 2018

History of hacking





History of hacking

It's interesting to note that the 1st hacking actually began with telephone, Joe Draper creator the blue box when used with the receiver ad whistle enable him to make free call. Of course he was arrested for tampering with phone lines. This was the 70s. Before that in the 60s, some MIT students got together and hacking their model train system to get more out of them and modify  their working. They later applied this curiosity to the new computer systems and groups.
In Milwaukee a group of hackers called 414 broke into systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan Kettering Cancer Center. Then the cops shut them down. The great rivalry started between two groups called LOD and MOD. This rivalry was called "The Great Hacker War". A man who called himself Lex Luther founded the Legion of Doom. It was named after a Saturday morning cartoon. The LOD had a reputation of attracting the best of the best, until one of their brightest members, fiber Optic, feuded with Legion of Doomer, Erik Bloodaxe and got kicked out of the clubhouse. He and some of his friends then formed a rival group called, the Masters of Deception. Starting in 1990, LOD and MOD were involved in online warfare for almost two years. They were jamming phone lines, monitoring calls and trespassing in each other's private computers. Things got so bad that the Fed's stepped in to put a stop to it. Phiber and his friends were then sent to jail. This is what put an end to the era.
The newest form of hacking is when the hackers breach secure protocols and break down walls to enter into an illegal space. Connecting to secure networks using WPA or WEP is the new form of hacking. However, using the world hacking for all reaching would be incorrect. Cracking is considered the hacking cousin from the wrong side of the track. While hacking is about pushing limits and creating programmers, cracking specializes in cracking those protocols for personal gain.
            PRIMARY MOTIVETIONS:-
The darker side of hacking has three primary motivations with varying degrees of intent. The simplest crack are attempts to gain unauthorized access to networks that are secure in order to satisfy a curiosity or satiate pride in the act. The nastier version of cracking is to gain access and destroy information that is stored on the network. However, the worst offense of the category is the endeavor to enter into government or large enterprise driven organizations to steal data and information for criminal activitys.

-N$

No comments:

Post a Comment

WEP INSECURITIES

  WEP I NSECURITIES Two researchers from the University of California at Berkeley and one from Zero Knowledge Systems Inc. published a repor...