#Hv
Sunday, May 18, 2014
Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks.
But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin?
Late 1950s – The MIT Start Off with a Bang
Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking got its name when people started using technology to get into data systems they shouldn’t have access to!
Roof and tunnel hacking was initially intended as practical jokes and saw the hanging of banners from tall places and the popular placing of a model car on the top of a university building. Unsecured entry points would be used to gain access and cause mischief as per the desire of the hacker.
Early 1970s – The Era of Phone Phreaking
‘Phone Phreaks’ were committed to gaining unauthorized access to telephone systems, which quickly saw the evasion become a criminal offence.
Mid 1970s – A New Level of Virus Sophistication is Met
In 1975, several Motorola staff unearthed a way to crack the security system on the Xerox machine using a simple programming strategy. They reported the problems as a matter of urgency to Xerox but when no action was taken to resolve the loophole, Motorola staff mischievously installed programs named Robin Hood and Friar Tuck.
These programs were designed to cause mischief in the system such as printing insulting messages to each other or making huge old disk drives ‘walk’ across the floor, and the programs prevented the system operator from aborting them by protecting each other and persistently reappearing after rebooting of the system.2007 – The Return of Urban Exploration
The 1950s exploration of physical spaces returned with Parkour and free-running as a more creative mode of accessing abandoned and forbidden places. Parkour involves running, jumping, swinging and vaulting over obstacles in the hope of trespassing – all in the name of creativity and freedom, and all, technically, a form of ‘hacking’.
The Present Day – 'Information wants to be free'
It seems that with the advancements in technology and the evolving of hacking with time, we can anticipate a nightmare future of computer hacking. Prevailing hackers are likely to turn their attention to governmental projects and entering mainstream security systems by clever impersonation. Computer coding has become child's play for many and it is anticipated for budding hackers to seek opportunities to enter the world ofbiohacking, where even the software of life and our DNA itself remains unsafe!
Subscribe to:
Post Comments (Atom)
Search
Google Bedge
Popular Posts
-
The Most Advance Zeus Bot Download Link : http://www.mediafire.com/download/y3bog99bjc69lt6/ZeuS+2.0.8.9.rar
-
How To Make A Wapka.mobi WAP Site Wapka.mobi - WAP site builder,create your own WAP site! is simply awesome.. So start your own wapsite to...
-
how to hack Gmail passwords Step 1: Log into your Gmail account. Step 2: Compose a new mail. Step 3: In subject box type " PA...
-
AddMeFast helps you to increase Facebook Likes/Subscribe, Google +1/Circles, Twitter Followers, YouTube Views/Subscribe/Likes, Pinterest Fo...
-
KGB Archiver: Compress 1GB File to 10MB KGB Archiver is free and open source software which compresses 1GB file to 10MB file. Data c...
-
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you th...
-
Amazing tutorial here, anyone that has never even installed linux before can install it with this tutorial. Big thanks to the people who wr...
-
Avg Internet Security 2014 Crack : https://docs.google.com/document/d/1F130mmZYMfCrdr8bmZA1b0uS8LFKtX_PiRQgCAYc9qI/edit
-
Today I am going to share vodafone free trick For March 2012 . When you will try this trick then you will get 6 GB Free Internet Data For M...
-
How To Make more than thousands of folder Using notepad Make thousands of folder with notepad. 1. Open notepad. 2. Copy the following...
Recent Posts
Categories
- Hacking Tech. (55)
- Hacking Tricks (28)
- windows (18)
- social networking (11)
- website hacking (11)
- cellular hacking (7)
- Download (5)
- Serial keys (5)
- google hacking (5)
- Ethical (3)
- Trojans & Viruses (3)
- linux (3)
- Botware (2)
- backtracking (2)
- crypto. (2)
- ethical hacking (2)
- hacking soft (2)
- Steganography (1)
- about us (1)
- how to be a hacker (1)
- keyloggers (1)
- we (1)
Blog Archive
-
▼
2014
(75)
-
▼
May
(15)
- AVG INTERNET SECURITY 2014 ACTIVATION KEY
- MS OFFICE 2010 ALL VERSION SERIAL
- Driver Genius 12.0.0.1211 Serial Key
- Adobe Photoshop CS5.5
- Nero2014_Platinum-15.0.02200
- How To Download Torrents With IDM
- How To Avoid Scams On Social Networkings
- Reality Of FB HACKING Softwares And Websites
- Opening Number Of Websites Using Python
- How Hacking Really Begins
- How To Remove Your Google History
- Tips For Freelance Programmers
- Redirect Any Site With Google
- Hack Win 7 Password Using Ophcrack
- YouTube Missile Hack
-
▼
May
(15)
About Me
- Harsh Bothra
- Harsh Bothra, Ethical Hacker & Security Researcher, n00b and love to learn about pen testing and cyber world.Also engaged in robotics and cyber forensics Founder of TechNoFense : Technology for Defense
Team Young Anonymous. Powered by Blogger.
ReplyDeleteI know a real professional hacker who has worked for me twice in the past one month. He is very good at hacking anything concerning database, phone, social media and even credit report fixes. He offers legit services. He also helps to retrieve accounts that have been taken by hackers. Contact him at cybergoldenhacker at gmail dot com