Friday, March 15, 2019
Hack Me Once, Phreak Me Twice :: Computers Technology Hacking Hackers Papers
Hack Me Once, Phreak Me TwiceThere are a few elite in our technology-driven world that possess the unnatural index to understand and wield the power of electronic computers. To the media they are managen as hackers, threats to computer security everywhere. To the underground they are known as console cowboys, samurais, and the stick egress defenders of free information. To the common man they are young teenage boys that gap your computer and ruin your e-mail. Hackers are not criminals or mischievous kids with no purpose. They play an important role in our culture and are the raise behind our technological revolution. Before we can fully understand the listen of a hacker, we need to look at the history of hacking. Hacking is usually disoriented up into three time periods The sr. Days, The Golden Age, and Zero Tolerance. The Elder Days were the years from 1965-1979 when the hackers emerged from the computer labs of MIT, Cornell, and Harvard. These computer geeks of the 60s ha d an incurable thirst to know how machines worked, specifically computers. While professors were trying to teach structured, mathematical programming, students were staying up lately nights hacking away at their programs until they found shorter and more elegant solutions to the problems. This process of bumming enactment contradicted the professors methods, and so began the defiant and rebellious origins of hackers. This time period produced one of the come out of the closetmatch hacks of all time, when Dennis Ritchie and Ken Thomson of Bell Labs created the operating system UNIX in 1969. This pristine operating system was written by hackers, for hackers. There was now a standard to run programs on, although it required an enormous amount of knowledge of computers for as yet the simplest tasks. As a consequence of UNIX, the 1970s became all about exploring and figuring out how the computer world worked. In 1971, a hacker found out how to get free calls from AT&T by emitting a 2600 megacycle tone into the receiver. He called himself Capn Crunch because he used the free blab that came in the cereal box to give off the 2600 MHz tone. From this, a new type of hacking gained popularity, one that did not deal specifically with computers entirely rather with telephones. Hackers like Capn Crunch were called phreaks, for phone freaks. So, fittingly, hacking phones is known as phreaking. As more phreakers and hackers emerged, they needed a way to communicate with each other.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.