The term probably originated in the 1960s when the modern computing system was evolving and people were studying computers in the labs of the Massachusetts Institute of Technology (MIT). There were a few people who could make the system work faster or differently and they were called hackers. These people were programmers who could simply break into a computer to see its code — the statements written by the original programmers to specify the actions to be performed by a computer.
Most of these early hackers were visionaries who would later shape the computer industry in the way we see it today. But in the 1970s this word started getting a bad reputation after the emergence of phone hackers. The most remarkable of them was John Draper , who devised the technique of breaking into regional and international phone networks for making free calls. He was later convicted and soon the word started getting its present day meaning — unauthorized access of computers and computer networks .
When did hackers start building communities or groups?
The early ’70s witnessed hardwiring of neighbourhood computers and a community memory was created, which was nothing but an electronic bulletin board where the users can teletype their messages and retrieve the messages meant for them.
By the early ’80s, the system was improved resulting in the evolution of a more efficient electronic bulletin board system (BBS). Users could now use usernames to hide their identities and the BBS became a place to boast of hacking accomplishments as well as trading stolen passwords and credit card numbers. The BBS witnessed the formation of the first hacking groups and groups like Legion of Doom and Chaos Computer Club were formed in the US and Germany respectively.
The 1983 film ‘War Games’ is considered the first mainstream film which introduced the general public to the world of computer hacking. In the same year, six teenagers, known as the 414s, were arrested for breaking into dozens of high profile computer systems. The event got widespread publicity and the image of hackers as being young and intelligent got established in society.
When did hacking start gaining notoriety?
Although it started in the early ’70s, the first case to get international publicity was the cyber espionage of 1989 when four German hackers led by Karl Koch hacked US military computers and sold the information to the KGB . Koch, who confessed to his role in the hacking, was later found burnt to death in a forest.
By now the hacking community had got divided into two groups — black hats or crackers who worked to exploit computer systems, and white hats or hackers who were hired by companies to do ethical hacking for improving network security. The crackers included Jonathan James , who cracked into Nasa computers , stealing software worth approximately $1.7 million , or people like Adrian Lamo , who used to break into the websites of big corporations like Yahoo , Bank of America and Citigroup to find the network hole which he would later inform the company about.
Lamo was arrested after hacking the systems of the New York Times and his excuse that he was doing penetration testing did not work. Similarly, in 1993, Kevin Poulsen managed to hack into the system of a radio station in Los Angeles. Along with his friends, he rigged the station’s phone system so that only their calls were received. This helped them win two Porsches, vacation trips and cash worth $20,000.
What are the frequently used techniques and motives of hackers?
Passwords are perhaps the most sought after target of hackers. Intruding into email might lead to more passwords. For hacking inside a user’s computer, hackers use several techniques like using a Trojan Horse. Downloaded as legitimate software, the Trojan can permanently damage the operating system or can be used to steal passwords.
Apart from this, hackers can also initiate a man-in-themiddle attack when they are able to fool the user into establishing a link with a rouge entity rather than connecting to the legitimate server. The recent denial of service (DoS) attacks carried out on various websites which obstructed WikiLeaks operations were done using similar software which were installed in the computers of various users. While some of them downloaded it voluntarily, others were simply not aware that their computers had software that was being used against these websites.
Disclaimer: All information on this news has been compiled from their respective official websites or through public domain sites and leading newspapers. Although, we have taken reasonable efforts to provide you with accurate information, but we assumes no responsibility for the accuracy (or inaccuracy) of the Information and would advise you to verify it from the official product provider. We cannot guarantee that the information on this page is 100% correct. If you would like to advertise on our site please contact us
Bharat,
ReplyDeleteI am writing you, asking to speak with you or a member of your team, about CyberCom Secure, LLC, a small Newport Beach, California based software company, specializing in one thing, unhackable encryption security, and the need to prevent malicious hacking worldwide.
I have a team of former Bell Laboratory scientists and engineers who after several years have finalized and perfected our technology, using the offices and laboratory at CACI in San Diego. We are now ready to market an encryption algorithm, not based on the current and vulnerable AES platform, for which we have received three new patents for our technology. It has extremely low overhead, no latency, and to date, has been “unhackable” by several highly credentialed software security experts who have tried.
We have recently been accepted into the vetting program at the Naval Post Graduate School in Monterey, California, so we can provide our technology to future military applications.
We would like to demonstrate our technology to you and your team. I have independent third party validation reports for your review, from a source that is highly respected in the industry as a software security expert. His credentials speak for themselves. I would like to send you his third party research, conclusions, credentials and partial client list, if you would first give me permission to email an attachment to you.
If we have what we say we have, (and we can prove that we do), this will become the new standard in the encryption industry. It would have huge worldwide applications in the search for complete security.
My contact information is below. I would be happy to coordinate a conference call with our engineers to explain the technology, and should like what you hear, meet with you to provide a comprehensive demonstration of our technology. We would offer a challenge to anyone of your choosing, to break our code.
I sincerely look forward to hearing from you.
Dave Worlow
CyberCom Secure, LLC
760-568-1683
daveworlow@gmail.com