Odnośniki
- Index
- Edward D Hoch Computer Investigation Bureau 03 The Fellowship of the HAND
- John Moore Heroics for Beginners (BD) (v3.1)
- Cammilleri_Rino_ _Inkwizytor
- James_Arlene_Samotny_ojciec_DzieciSzczescia6
- Anna_Marie_May_ _Love_For_Hire
- Celeste Jones The Long Arm of the Law And Other Short Stories [DaD] (pdf)
- M340. Marinelli Carol Wyznanie doktora
- D397. Wilks Eileen M晜źatka na niby
- 0296. West Annie MiśÂ‚ośÂ›ć‡ na Krecie
- Card Orson Scott PśÂ‚omieśÂ„ serca (pdf)
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- ginamrozek.keep.pl
[ Pobierz całość w formacie PDF ]
dedicating a great deal of time with computers."
1983 the IBM Personal Computer enters the stage powered by Bill Gates' MS-DOS operating system. The
empire of the CP/M operating system falls. Within the next two years essentially all microcomputer
operating systems except MS-DOS and those offered by Apple will be dead, and a thousand Silicon Valley
fortunes shipwrecked. The Amiga hangs on by a thread. Prices plunge, and soon all self-respecting hackers
own their own computers. Sneaking around college labs at night fades from the scene.
In 1984 Emmanuel Goldstein launches 2600: The Hacker Quarterly and the Legion of Doom hacker gang
forms. Congress passes the Comprehensive Crime Control Act giving t he US Secret Service jurisdiction over
computer fraud. Fred Cohen, at Carnegie Melon University writes his PhD thesis on the brand new, never
heard of thing called computer viruses.
1984. It was to be the year, thought millions of Orwell fans, that the government would finally get its hands
on enough high technology to become Big Brother. Instead, science fiction author William Gibson, writing
Neuromancer on a manual typewriter, coins the term and paints the picture of "cyberspace." "Case was the
best... who ever ran in Earth's computer matrix. Then he doublecrossed the wrong people..."
In 1984 the first US police "sting" bulletin board systems appear.
Since 1985, Phrack
has been providing the hacker community with information on operating systems, networking
technologies, and telephony, as well as relaying other topics of interest to the international computer
underground.
The 80s are the war dialer era. Despite ARPAnet and the X.25 networks, the vast majority of computers can
only be accessed by discovering their individual phone lines. Thus one of the most treasured prizes of the
80s hacker is a phone number to some mystery computer.
Computers of this era might be running any of dozens of arcane operating systems and using many
communications protocols. Manuals for these systems are often secret. The hacker scene operates on the
mentor principle. Unless you can find someone who will induct you into the inner circle of a hacker gang
that has accumulated documents salvaged from dumpsters or stolen in burglaries, you are way behind the
pack. Kevin Poulson makes a name for himself through many daring burglaries of Pacific Bell.
Despite these barriers, by 1988 hacking has entered the big time. According to a list of hacker groups
compiled by the editors of Phrack on August 8, 1988, the US hosts hundreds of them.
The Secret Service covertly videotapes the 1988 SummerCon convention.
In 1988 Robert Tappan Morris, son of NSA chief scientist Robert Morris Sr., writes an exploit that will
forever be known as the Morris Worm. It uses a combination of finger and sendmail exploits to break into a
computer, copy itself and then send copy after copy on to other computers. Morris, with little
comprehension of the power of this exponential replication, releases it onto the Internet. Soon vulnerable
computers are filled to their digital gills with worms and clogging communications links as they send copies
of the worms out to hunt other computers. The young Internet, then only a few thousand computers strong,
crashes. Morris is arrested, but gets off with probation.
1990 is the next pivotal year for the Internet, as significant as 1980 and the launch of TCP/IP. Inspired by
Nelson's Xanadu, Tim Berners-Lee of the European Laboratory for Particle Physics (CERN) conceives of a
new way to implement hypertext. He calls it the World Wide Web. In 1991 he quietly unleashes it on the
world. Cyberspace will never be the same. Nelson's Xanadu, like Plato, like CP/M, fades.
1990 is also a year of unprecedented numbers of hacker raids and arrests. The US Secret Service and New
York State Police raid Phiber Optik, Acid Phreak, and Scorpion in New York City, and arrest Terminus,
Prophet, Leftist, and Urvile.
The Chicago Task Force arrests Knight Lightning and raids Robert Izenberg, Mentor, and Erik Bloodaxe. It
raids both Richard Andrews' home and business. The US Secret Service and Arizona Organized Crime and
Racketeering Bureau conduct Operation Sundevil raids in Cincinnatti, Detroit, Los Angeles, Miami, Newark,
Phoenix, Pittsburgh, Richmond, Tucson, San Diego, San Jose, and San Francisco. A famous unreasonable
raid that year was the Chicago Task Force invasion of Steve Jackson Games, Inc.
June 1990 Mitch Kapor and John Perry Barlow react to the excesses of all these raids to found the
Electronic Frontier Foundation. Its initial purpose is to protect hackers. They succeed in getting law
enforcement to back off the hacker community.
In 1993, Marc Andreesson and Eric Bina of the National Center for Supercomputing Applications release
Mosaic, the first WWW browser that can show graphics. Finally, after the fade out of the Plato of twenty
years past, we have decent graphics! This time, however, these graphics are here to stay. Soon the Web
becomes the number one way that hackers boast and spread the codes for their exploits. Bulletin boards,
with their tightly held secrets, fade from the scene.
In 1993, the first Def Con invades Las Vegas. The era of hacker cons moves into full swing with the Beyond
Hope serie s, HoHocon and more.
1996 Aleph One takes over the Bugtaq email list and turns it into the first public "full disclosure" computer
security list. For the first time in history, security flaws that can be used to break into computers are being
discussed openly and with the complete exploit codes. Bugtraq archives are placed on the Web.
In August 1996 I start mailing out Guides to (mostly) Harmless Hacking. They are full of simple instructions
designed to help novices understand hacking. A number of hackers come forward to help run what becomes
the Happy Hacker Digest.
1996 is also the year when documentation for routers, operating systems, TCP/IP protocols and much, much
more begins to proliferate on the Web. The era of daring burglaries of technical manuals fades.
In early 1997 the readers of Bugtraq begin to tear the Windows NT operating system to shreds. A new mail
[ Pobierz całość w formacie PDF ]