skip to main |
skip to sidebar
Hacking's History:
From phone phreaks to Web attacks, hacking has been a part of computing for 40 years.
Hacking has been around pretty much since the development of the first electronic computers. Here are some of the key events in the last four decades of hacking.
Contents
1. Introduction
2. History
3.Categories of Hackers
4. Hacking in the real world
5.Hackers Motivation & Hacking Attacking
6.Hacking Techniques
7.Security
8.Conclusion
HACKING
1. Introduction to Hacking:
The Internet, like any other new media historically, provides new methods of engaging in illegal activities. That is not to say that the Internet is intrinsically 'bad', as many tabloid journalists would have us to believe, it is simply a means for human beings to express themselves and share common interests. Unfortunately, many of these common interests include pornography, trading Warez (pirated software), trading illegal MP3 files, and engaging in all kinds of fraud such as credit card fraud
Hacking on the other hand is a greatly misrepresented activity as portrayed by the wider media and Hollywood movies.
Although many hackers go on from being computer enthusiasts to Warez pirates, many also become system administrators, security consultants or website managers.