90 likes | 193 Views
The History of the Hacker. By: Aaron Tuma. Definition. A microcomputer user who attempts to gain unauthorized access to proprietary computer systems.
E N D
The History of the Hacker By: Aaron Tuma
Definition • A microcomputer user who attempts to gain unauthorized access to proprietary computer systems. • Hackers have been here since the 1950s. They were from MIT. They studied in the Phone Switching Network. Also, they did their work in the lab of MIT Artificial Intelligence Lab which was run by Marvin Minsky.
Top 5 Best Computer Hackers of All Time • 1: Kevin Mitnick. Today, the Department of Justice thinks that he is the most wanted hacker in history. He is now a speaker, a computer security author and a consultant. • 2: Adrian Lamo. His nickname is “The Homeless Hacker”. When he was caught, he was forced to pay $65,000. One of his crimes included Yahoo. He is now a public speaker. • 3:Jonathon James. He hacked NASA. He is now wanting to start his own computer security company.
4: Robert Tappan Morris. He created a worm that shut down many computers. He was put on three years of probation, a fine of $10,500, and he needed 400 hours of community service. He is now a professor for the MIT computer Science and Artificial Intelligence laboratory. • 5: Kevin Poulsen. He hacked the FBI federal computers and databases. He is now a journalist.
Examples of What Hackers Do • Inside job: Hacking that involves stealing passwords, obligate misuse, and cause harm. They usually come from within the place being harassed. • Back Doors: They go in through by taking advantage of errors. • Viruses and Worms: Programs that put themselves onto other ones, which put fake travel in so it can be flooded.
How the government deals with hackers • 1: Banning them from recreational computer usage. • 2: Give a fine • 3: Arresting them • 4: Getting captured • 5: putting up anti spy software.
How hacking can be used for good • It can be used for good by hacking bombs from terrorists, or just hacking their computer for information. • I bet that most agencies use hacking when dealing with a situation involving terrorists and computers.