Sunday, April 6 2025

Let's learn from the beginning about hacking

Let's learn from the beginning about hacking

Steve Jobs, Apple's first to do the work. So later he became the CEO of the popular Apple appliance. But if we do anything inadvertently to any one of our computers, Because your computer is a crime.

Anyhow, it is today's most widely known topic in the world ... From the beginning, as in the title, teach you how to say .. But not so! The way the world came into existence was about the hackers that were at that time

Over the past 40 years, there have been attacks on phones from websites to various types of attacks. There is nothing to say about it.

The first inception of the word Hacker was in 1960 by students who had been trained and trained at the MIT. However, in the 1970s, they were more popularly known for calling over-the-air calls to Hurricanes.

They are called phreak hackers (called phreaks). Jhon Draper, the most famous and famous person, was known as Cap'n Crunch. For that, he changed the toy plastic tube in 1972 and recreated it to produce a 2600-hertz signal, making it accessible to the phone operator to access the telephone network and receive calls free of charge.

He then produced a device as a Blue Box, which included various sounds for each number. Soon, the information on its creation was published in the Secret of the Little Blue box in Esquire.

Afterwards, many of them accessed the design, and Steve Wozniak, co-founder of Apple CEO Steve Wozniak, made that much more and Blue Box at his home was sold for $ 150. Steve Jobs's Apple Store in Garage Jhon Draper, who was arrested in 1976 for losses incurred by telephone companies, was sentenced to four months in prison.

With the advent of the computer in the decade and the smallest of computers, the hackers looked at the computer and exchanged information and exchanges using BBSs (or Bulletin Board Systems) that were then in place.

Sherwood Forest and Catch 22 were well-known. Similarly, groups emerged as well. Among them are Legion of Doom in the United States Germany's Chaos Computer Club.

Where did the most famous Face Mask of today's hacker, Anonymous, get?

It was clearly shown to the world through the film War War, which was screened in 1983. It was a great desire to produce hackers around the world.

When attempting to enter a computer game, the young man in the film accidentally enters a supercomputer computer system in the US Defense Department's missile system. Whatever will happen to him. See if there is any time.

In the year that the movie was premiered, six youths were arrested in secret for 60 computers. They had also entered the computer system of the Los Alamos Laboratory, which operates in the field of nuclear weapons. That group was called 414 Gang. Do you know "Hacking"? But Dangerous Do you know "Hacking"? Come and see. In 1984, the company released a 2600-series chunk of hacking information on the market. It was a very popular magazine at the time.

With the increase in crime with computers, the US Parliament created rules and regulations for it. It was called Computer Fraud and Abuse Act (CFAA). In 1988, a student at Cornell University, the son of a leading scientist at the American Security Agency, Robert T.Morris studied the software's first use of the Unix e-mail system on the government ARPAnet network, Morris Worm is a virus.

Since it was added to that system for 12 hours, government agencies and universities destroyed a computer network of more than 600,000 computers, and Robert T.Morris was abducted from the university, fined $ 10,000, and three years suspended jail. He was the first person to be punished under CFAA. Currently, hackers use his codes.

The most famous thing about the hacker was the inclusion of an American state-of-the-art computer system, and the arrest of three suspected members of the Chaos Computer Club in Germany at the Russian KGB spying service.

In the same year, the text of the hackers' text reads as the Mentor, a hacker who has been arrested for another incident. That "My Crime is that of Curiosity ... I am a hacker, and this is my manifesto. You can stop this individual, but you can not stop us all."

In the 1990s, Operation Sun Devil, the American intelligence unit for the suppression of hackers, arrested many hackers for various misconduct. Do you know all the intelligence in America? Then here ... One of the first signs of a Los Angeles-based KIIS FM radio program is the Porsche 944 S2 car and the prize money for the 102nd call, and his computer secret code name (Dark Dante), which he goes to radio, It has won over and given calls by itself.

He was arrested in April 1991 and released in 1996. He is now available as a freelance journalist for Wired magazine for computer crimes.

In 1995, a computer hacker Kevin Mitnick was arrested for stealing a credit card number of 20,000 and stealing five years in prison. He was the first computer hacker to be named by the FBI.

In 1976, he worked as a computer engineer, who developed his skills using the same computer at night, staggering Motorola 's data, Motorola, Nokia, Fujitsu and SunMicrosystem, Have entered the computer system.

He had been banned from using any electronic items after being sentenced. In 2001 he acted as a detective in the TV program Alias, where he also used a fake computer. There is also a book about him. It's called Ghost in the Wires.

After his duties, Vladimir Levin was arrested for cheating American Citi-named Bank of America money transferring over $ 10 million into accounts in the world, and recovered $ .400,000 in cheated money.

In 1998, the team introduced the Back Orifice as the "Cult of the Dead Cow," which enabled it to run computers with a Windows 95 and 98-type operating system from another location.

During the Gulf Wars, they entered the Pentagon computer system and stole software. At the end of the investigation, two young Americans, 19, were arrested. Ehud Tenebaum, who appeared as The Analyzer, and currently serves as a Chief Technical Officer at a computer company.

From the past, the hackers' information and the history of hacking, while in the present, while popular, teams are still working with new systems.  

Face Book site by Anonymous Hackers Cyber attack? Free of charge the latest operating system - The RQ 170 cyber attack on the world of turbulent Iran and the American war secrets from the Google Maps - If there is a hacker, this is the best opportunity ... you are looking for it!

Meet a new post.

Powered by Blogger.