Preview

Hacking

Powerful Essays
Open Document
Open Document
3915 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking
A brief history of hacking...

bsd 4.11> █

zuley clarke / james clawson / maria cordell

november 2003

LCC 6316: Historical Approaches to Digital Media

table of contents the evolution of hacking .................................................................................

1

the drive to hack ............................................................................................

2

cultural infiltration ...........................................................................................

4

event timeline .............................................................................................

6

bibliography ...................................................................................................

8

LCC 6316: Historical Approaches to Digital Media

the evolution of hacking
Though it wasn’t yet called “hacking,” the earliest known incidents of modern technological mischief date from 1878 and the early days of the Bell Telephone Company. Teenage boys hired by Bell as switchboard operators intentionally misdirected and disconnected telephone calls, eavesdropped on conversations, and played a variety of other pranks on unsuspecting customers (Slatalla 1).1 first hacks

The first bona fide appearance of a computer hacker occurs nearly 100 years later, in the
1960s. A “hack” has always been a kind of shortcut or modification—a way to bypass or rework the standard operation of an object or system. The term originated with model train enthusiasts at MIT who hacked their train sets in order to modify how they worked. Several of these same model train hackers later applied their curiosity and resourcefulness to the then new computer systems being deployed on the campus (CNN 1). These and other early computer hackers were devout programming enthusiasts, experts primarily interested in modifying programs to optimize them, customize them for specific applications, or just for the fun of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    working at HP, lead to early successes in creating a computer aimed at hacks. He landed an…

    • 598 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    3. What application and tools can be used to perform this initial reconnaissance and probing step?…

    • 681 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Better Essays

    A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Computers in the 1950's

    • 1469 Words
    • 6 Pages

    People have been in awe of computers since they were first invented. At first scientist said that computers would only be for government usage only. "Then when the scientists saw the potential computers had, scientist then predicted that by 1990 computers may one day invade the home of just about ever citizen in the world" ("History" Internet), the scientists were slightly wrong, because by 1990 computers were just beginning to catch on. Then a few years later when scientists when to major corporations to get help with a special project, the corporations said no, because computers would just be a fad and they wouldn 't make much money off of it. "By definition Abacus is the first computer (the proper definition of a computer is one who or that which computes) ever invented" (Internet).…

    • 1469 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Cyberslacking

    • 387 Words
    • 2 Pages

    “A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Jeremy Kirk, reporter for the IDG (International Data Group), describes an event where Barnaby Jack, a well-known white hat hacker (someone who hacks to ensure the security of an organization or device), presents one of those security risks by hacking a pacemaker and making it send an 830 shock from a laptop. This problem was caused by the change to a wireless society as with previous pacemakers, in order to change settings on the pacemakers a wand needed to be close to the pacemaker, but now that wireless technology is everywhere medical devices evolved with the rest of technology. However, this was only one event that a pacemaker was hacked, so even though he hacked the pacemaker, it could have been tampered with to allow this hack. Similarly, in another white hat hack, Jerome Radcliffe, Mocana’s smart device threat center director, hacks his own insulin pump in order to inform companies that are attempting to produce an artificial pancreas that they need to fix their security problems to keep the consumers safe. He hacks the insulin pump and changes its settings from a separate microprocessor chip which could prove to be dangerous. Although there are flaws in his hacking, most notably his prior knowledge of the device's identification number, something most hackers cannot discover without directly accessing…

    • 1088 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    References: * Eric C.,(2012). 7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies", pp558-600.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Today, computers are a part of our lifestyle, but the first computer that was used was developed at the University of Pennsylvania in the year 1946! It had an ENIAC (Electronic Numerical Integrator And Computer) processor. The reprogramming feature that is so extensively used today, was introduced by Alan Turing and John von Neumann with their teams. The von Neumann architecture is the basis of modern computers.…

    • 1918 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    What Really Is a Hacker?

    • 424 Words
    • 2 Pages

    meant to be a invasion of privacy issue, but rather free use of all computers…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tommy flowers (British) made the code breaking computer called colossus to break German messages in 1943…

    • 596 Words
    • 3 Pages
    Satisfactory Essays