Skip to main content

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks.
But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin?



Late 1950s – The MIT Start Off with a Bang

Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking got its name when people started using technology to get into data systems they shouldn’t have access to!
Roof and tunnel hacking was initially intended as practical jokes and saw the hanging of banners from tall places and the popular placing of a model car on the top of a university building. Unsecured entry points would be used to gain access and cause mischief as per the desire of the hacker.

Early 1970s – The Era of Phone Phreaking

phone phreaking
The telephone network was the first technological victim of hacking know as Phone Phreaking. It was ingeniously discovered that whistling down a phone in a specific tone could in fact force a switchboard to allow calls. The exploitation of telecommunications systems using audio frequencies was further enhanced by the use of tone-generating devices to permit even free long-distance calls.
‘Phone Phreaks’ were committed to gaining unauthorized access to telephone systems, which quickly saw the evasion become a criminal offence.


Mid 1970s – A New Level of Virus Sophistication is Met

In 1975, several Motorola staff unearthed a way to crack the security system on the Xerox machine using a simple programming strategy. They reported the problems as a matter of urgency to Xerox but when no action was taken to resolve the loophole, Motorola staff mischievously installed programs named Robin Hood and Friar Tuck.
These programs were designed to cause mischief in the system such as printing insulting messages to each other or making huge old disk drives ‘walk’ across the floor, and the programs prevented the system operator from aborting them by protecting each other and persistently reappearing after rebooting of the system.


2007 – The Return of Urban Exploration

The 1950s exploration of physical spaces returned with Parkour and free-running as a more creative mode of accessing abandoned and forbidden places. Parkour involves running, jumping, swinging and vaulting over obstacles in the hope of trespassing – all in the name of creativity and freedom, and all, technically, a form of ‘hacking’.


The Present Day – 'Information wants to be free'

free information hacking
Technology activists and the availability of free online schools has encouraged the illicit access of information. Online schools such as Udacity, Codecademy and Khan Academy have provided people with the tools required for coding and have led to an increase in the number of code-literate individuals. With a booming number of techies, breach of online security systems has also proportionally risen.
It seems that with the advancements in technology and the evolving of hacking with time, we can anticipate a nightmare future of computer hacking. Prevailing hackers are likely to turn their attention to governmental projects and entering mainstream security systems by clever impersonation. Computer coding has become child's play for many and it is anticipated for budding hackers to seek opportunities to enter the world of biohacking, where even the software of life and our DNA itself remains unsafe!


H@cK$t@r!


    Comments

    Popular posts from this blog

    How to Unlock (and Play) Hidden Chess Game Inside Facebook Messenger

    What can you do with Facebook Messenger? Chat with your friends Send GIFs, stickers, and photos Make video calls Send people money in Messenger Have you ever wondered to Play a game while you chat with friends? Yes, it is possible. Facebook had made it to the reality by building a hidden built-in functionality in Facebook Messenger that lets you play Chess with your friends without having to install a third-party app. It just takes one simple step to unlock this hidden game. All you need to do is: type " @fbchess play " and hit Enter, during a conversation, and a small square box would appear in the chat box. Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement. Although there is some standard algebraic notation like:- B for “Bishop” R for “Rook” Q for “Queen” K for “King” N for “Knight” P for “Pawn” Pawns could b

    How to Build a Successful Incident Response Plan

    The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. According to SANS, there are 6 key phases of an incident response plan. Preparation -  Preparing users and IT to handle potential incidents in case they happen Identification -  Figuring out what we mean by a “security incident” (which events can we ignore vs. which we must act on right now?) Containment -  Isolating affected systems to prevent further damage Eradication -  Finding and eliminating the root cause (removing affected systems from production) Recovery -  Permitting affected systems back into the production environment (and watching them closely) Lessons Learned -  Writing everything down and reviewing

    WannaCry:All about WannaCry

    Malicious software or "ransomware" has been used in a massive hacking attack, affecting tens of thousands of computers worldwide. Software security companies said a ransomware worm called "WannaCry" infected about 57,000 computer systems in 99 countries on Friday, with Russia, Ukraine, and Taiwan being the top targets. The hack forced British hospitals to turn away patients, affected Spanish companies such as Telefonica, and threw other government agencies and businesses into chaos. How it works: WannaCry is a form of ransomware that locks up files on your computer and encrypts them in a way that you cannot access them anymore. It targets Microsoft's widely used Windows operating system. When a system is infected, a pop-up window appears with instructions on how to pay a ransom amount of $300. The pop-up also features two countdown clocks; one showing a three-day deadline before the ransom amount doubles to $600; another showing a deadline