History of hacking
It's
interesting to note that the 1st hacking actually began with
telephone, Joe Draper creator the blue box when used with the receiver ad
whistle enable him to make free call. Of course he was arrested for tampering with
phone lines. This was the 70s. Before that in the 60s, some MIT students got
together and hacking their model train system to get more out of them and
modify their working. They later applied
this curiosity to the new computer systems and groups.
In
Milwaukee a group of hackers called 414 broke into systems at institutions
ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan
Kettering Cancer Center. Then the cops shut them down. The great rivalry
started between two groups called LOD and MOD. This rivalry was called
"The Great Hacker War". A man who called himself Lex Luther founded
the Legion of Doom. It was named after a Saturday morning cartoon. The LOD had
a reputation of attracting the best of the best, until one of their brightest
members, fiber Optic, feuded with Legion of Doomer, Erik Bloodaxe and got
kicked out of the clubhouse. He and some of his friends then formed a rival
group called, the Masters of Deception. Starting in 1990, LOD and MOD were
involved in online warfare for almost two years. They were jamming phone lines,
monitoring calls and trespassing in each other's private computers. Things got
so bad that the Fed's stepped in to put a stop to it. Phiber and his friends
were then sent to jail. This is what put an end to the era.
The
newest form of hacking is when the hackers breach secure protocols and break
down walls to enter into an illegal space. Connecting to secure networks using
WPA or WEP is the new form of hacking. However, using the world hacking for all
reaching would be incorrect. Cracking is considered the hacking cousin from the
wrong side of the track. While hacking is about pushing limits and creating programmers,
cracking specializes in cracking those protocols for personal gain.
PRIMARY MOTIVETIONS:-
The
darker side of hacking has three primary motivations with varying degrees of intent.
The simplest crack are attempts to gain unauthorized access to networks that
are secure in order to satisfy a curiosity or satiate pride in the act. The nastier
version of cracking is to gain access and destroy information that is stored on
the network. However, the worst offense of the category is the endeavor to
enter into government or large enterprise driven organizations to steal data
and information for criminal activitys.
-N$
No comments:
Post a Comment