![]() Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The precursor to Usenet newsgroups and e-mail, the boards - with names such as "Sherwood Forest" and "Catch-22" - become the venue of choice for phreaks and hackers to gossip, trade tips, and share stolen computer passwords and credit card numbers. Phone phreaks begin to move into the realm of computer hacking, and the first electronic bulletin board systems (BBSs) spring up. Among the perpetrators: college kids Steve Wozniak and Steve Jobs, future founders of Apple Computer, who launch a home industry making and selling blue boxes. Shortly thereafter, Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box, and wire fraud in the United States escalates. One phreak, John Draper (aka "Cap'n Crunch"), learns that a toy whistle given away inside Cap'n Crunch cereal generates a 2600-hertz signal, the same high-pitched tone that accesses AT&T's long-distance switching system.ĭraper builds a "blue box" that, when used in conjunction with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Phone hackers (phreaks) break into regional and international phone networks to make free calls. A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. They borrow their name from a term to describe members of a model train group at the school who "hack" the electric trains, tracks, and switches to make them perform faster and differently. ![]() The first computer hackers emerge at MIT. Here are some of the key events in the last four decades of hacking. ![]() ![]() (IDG) - Hacking has been around pretty much since the development of the first electronic computers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |