Hacking History and Development

8bz1...QVcw
20 Jan 2024
37

When hacking first started, it wasn't thought to be that serious. The hackers were known not even as hackers, but as practical jokers. The first hacking took place in 1878 with the establishment of the telephone company Bell Telephone. A group of young men hired to manage the switchboards were intercepting or misdirecting calls.


Today, the term is generally used to describe skilled programmers who exploit weaknesses or bugs in computer systems to gain malicious or malicious intrusion.

With the increasing interest in the Internet and e-commerce, malicious hacking has become the most well-known form, with the impression being reinforced by taking different forms in the media and entertainment industry. The goal of malicious/unethical hacking is often to steal valuable information or gain financial gain.


The first hack occurred in 1878, when a group of teenage boys hired to manage Bell switchboards intercepted or misdirected calls.

Hacking” was first used in reference to the use of technical knowledge at a meeting of the Technical Model Railroad Club in 1955. In the meeting minutes, it was explained how the members changed the functions of the high-tech train sets.

The first real hackers appeared in the 1960s. Back then, computers were mainframes locked in temperature-controlled, glassed areas. These machines cost a lot of money to run, so programmers had limited access to them. Smarter students, usually MIT students, had an insatiable curiosity about how things worked. Therefore, the smartest ones created programming shortcuts they called "hacks" to complete computing tasks faster. In some cases the shortcuts were better than the original program. One of the hacks created in the 60s, i.e. 1969, was created to act as an explicit set of rules for operating machines at the computer edge. It was created by two employees from Bell Labs' think tank. The two employees were Dennis Ritchie and Ken Thompson, and the "hack" was called UNIX.


In the 1970s, the world was prepared for hackers. For hackers, it was about discovering and understanding how the wired world worked. This is the year that hacking went from being a practical joke to a serious business.

The first major hack occurred in 1971 by a Vietnamese veterinarian named John Draper. He found a way to make free phone calls. This was later called "Phreaking". Abbie Hoffman followed John Draper's lead with the "International Youth Party Line" newsletter. But the one thing missing in the hacking world was a meeting space. So, in 1978, two men from Chicago, Randy Seuss and Ward Christiansen, created the first personal computer bulletin board system. This system still works today.


John Draper, also known as Captain Crunch, managed to do all this with a toy whistle that came out of a cereal package, instead of having a lot of high-tech hacking tools in his hands. Here's how: In the early 1970s, the largest computer network accessible to the public was the telephone system. At the time, phones were managed by an automated system that used specific analog frequencies to place calls. Draper was able to take advantage of the situation by using the toy whistle that came free in Cap'n Crunch cereal boxes. He would use it to make free long distance and international calls.


The first internet hacker
One of the first internet hackers and the first to attract mainstream media attention was Robert Morris in 1989. This was the first "Denial of Service" attack in history and was caused by a worm that Morris developed at Cornell University. year ago.
According to Morris, his intention was not to cause any harm, but instead to highlight security flaws. Unfortunately, due to an error in the code, the worm proliferated excessively, causing massive damage that lasted for days.

In the 1980s, hacking reached the peak of seriousness. By 1980, over one million total units were in use in the United States. By 1983, this number was over 10 million. In 1986, this number was over 30 million. As you can see, computer use increased greatly in the 80s.


The reason for this significant increase in computer use was IBM. In 1981, IBM announced “personal computers.” It was an independent machine; CPU, software, memory, utilities, storage, etc. It was fully loaded with. You could go anywhere and do anything on these computers. In 1983, a movie called War Games was released. This was the first movie to show the inner workings of hackers. To audiences across the country, this movie served as a warning. The region was changing. More people were moving to the online world. ARPANET was evolving into the Internet and bulletin board systems were beginning to grow in popularity.


Data breaches and attacks happen every day. In fact, these incidents are so common now that it takes something pretty big to make headlines.
And when I say massive, I mean millions of accounts being hacked simultaneously.

The biggest hacking incident!

Yahoo Hack! Yahoo's epic data breach, arguably the biggest hack in history, happened in 2013, but Yahoo didn't acknowledge the extent of the problem until 2016. The names, dates of birth, email addresses, passwords, and security questions and answers of 3 billion users were compromised. This included Tumblr and Flickr users.


Yahoo said all 3 billion of its accounts were hacked during a data theft in 2013, tripling its previous estimates of the size of the biggest breach in history. The new owner is Verizon Communications Inc.
It was stated that the news increased the potential number of class action lawsuits and claims filed by shareholders and Yahoo account holders. Yahoo, the first face of the internet for many around the world, already faces at least 41 class-action lawsuits in U.S. federal and state courts, according to company filings in May. John Yanchunis, an attorney representing some of the affected Yahoo users, said the federal judge who allowed the case to move forward

still wants more information to justify his clients' claims. “I think we have those facts now,” he said. “It really is mind-numbing when you think about it.” Yahoo said last December that data from more than 1 billion accounts had been compromised in 2013, the largest in a series of thefts that forced Yahoo to undercut the price of its assets in a sale to Verizon.


Are you curious about unusual hacking events? Stay tuned for our next article.





Write & Read to Earn with BULB

Learn More

Enjoy this blog? Subscribe to Hacker

0 Comments

B
No comments yet.
Most relevant comments are displayed, so some may have been filtered out.