stories about how hacking started an approach by gym
+3
tears_of_cry
riz
gym
7 posters
Page 1 of 1
stories about how hacking started an approach by gym
stories about how hacking started an approach by gym
stories about hackers (there threats to computer world) how dangerous they are
hackers a defination
what is hackers ethics
hacking is some time called social engineering
how a lay man will divide hackers
Network hackers
Software crackers
Virus builders
and then they will subdivide but my method is different any way i will discuss later
some old stories
# During the Gulf War, Dutch hackers stole information about U.S. troop movements from U.S. Defense Department computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down.
# In March 1997, a 15-year-old Croatian youth penetrated computers at a U.S. Air Force base in Guam.
# In 1997 and 1998, an Israeli youth calling himself "The Analyzer" allegedly hacked into Pentagon computers with help from California teen-agers. Ehud Tenebaum, 20, was charged in Jerusalem in February 1999 with conspiracy and harming computer systems.
# In February 1999, unidentified hackers seized control of a British military communication satellite and demanded money in return for control of the satellite.
The report was vehemently denied by the British military, which said all satellites were "where they should be and doing what they should be doing." Other knowledgable sources, including the Hacker News Network, called the hijacking highly unlikely.
in 1996 Computer hacker plants porno on Air Force Web page
it started very early
in 1996 cia website was hacked
In 1997 Hacker compromised astronaut safety
The lives of space shuttle astronauts were put at risk by a computer hacker who overloaded Nasa's communication system in 1997
stories about hackers (there threats to computer world) how dangerous they are
hackers a defination
'the best hacking can be defined is breaking in a system'
'In big sense hacking means digging for information in ways the holders of information never intended '
'
'The hacker is an ordinary person who, for once, has an advantage over the system -- "It's someone watching the watchers,
"'But hacking, they say, is not stealing; there's a general scorn for computer criminals who abuse the knowledge developed by "real" hackers. The people who break into machines to steal are often labeled "Black Hats'
'The original meaning of the word "hack" was born at MIT, and originally meant an elegant, witty or inspired way of doing almost anything'
what is hackers ethics
"Hackers are driven by curiosity, exploring computers the way kids climb over fences. "Hacking, at its basic level, is the pursuit of knowledge"
hacking is some time called social engineering
'Several of the hackers mention "social engineering," a high-tech name for the ancient process of asking questions. "When I talk to you, and I get you to say information, I'm hacking your brain," Low Tek says. "When you shook my hand, I was social engineering you."
'The only true form of hacking that's still going to be here when computers come to an end is social engineering," Low Tek says. "There's always going to be a weak link in the chain -- it's always going to be operated by a human'
how a lay man will divide hackers
Network hackers
Software crackers
Virus builders
and then they will subdivide but my method is different any way i will discuss later
some old stories
# During the Gulf War, Dutch hackers stole information about U.S. troop movements from U.S. Defense Department computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down.
# In March 1997, a 15-year-old Croatian youth penetrated computers at a U.S. Air Force base in Guam.
# In 1997 and 1998, an Israeli youth calling himself "The Analyzer" allegedly hacked into Pentagon computers with help from California teen-agers. Ehud Tenebaum, 20, was charged in Jerusalem in February 1999 with conspiracy and harming computer systems.
# In February 1999, unidentified hackers seized control of a British military communication satellite and demanded money in return for control of the satellite.
The report was vehemently denied by the British military, which said all satellites were "where they should be and doing what they should be doing." Other knowledgable sources, including the Hacker News Network, called the hijacking highly unlikely.
in 1996 Computer hacker plants porno on Air Force Web page
it started very early
in 1996 cia website was hacked
In 1997 Hacker compromised astronaut safety
The lives of space shuttle astronauts were put at risk by a computer hacker who overloaded Nasa's communication system in 1997
[
Re: stories about how hacking started an approach by gym
the begning of hacking and the stories
1969
1983
Kevin Mitnick
' Kevin Mitnick is convicted of stealing software from Digital Equipment and codes for long-distance lines from US telephone company MCI. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes. He serves a one-year prison term.'
picture of David Smith: Creator of the Melissa virus
next topic will be posted soon
1969
1971'Arpanet, the forerunner of the internet, is founded. The first network has only four nodes.'
1972'First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes'.
1980'John Draper, also known as Captain Crunch, finds that a toy whistle given away in the cereal with the same name could be used to mimic the 2600 hertz tones phone lines used to set up long distance calls'.
''In October, Arpanet comes to a crashing halt thanks to the accidental distribution of a virus.
1983
'The internet is formed when Arpanet is split into military and civilian sections.'
1986'Wargames, a film that glamorises hacking, is released. Many hackers later claim it inspired them to start playing around with computers and networks.'
1988'In August, while following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers responsible'.
1989'Robert Morris, a graduate student at Cornell University, sets off an internet worm program that quickly replicates itself to over 6,000 hosts bringing almost the whole network to a halt. Morris is arrested soon afterwards and is punished by being fined $10,000, sentenced to three years on probation and ordered to do 400 hours of community service. '
Kevin Mitnick
' Kevin Mitnick is convicted of stealing software from Digital Equipment and codes for long-distance lines from US telephone company MCI. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes. He serves a one-year prison term.'
1993'At the Cern laboratory for research in high-energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the world wide web.'
1994'Kevin Poulsen, Ronald Austin and Justin Peterson are charged with conspiring to rig a radio phone-in competition to win prizes. The trio seized control of phone lines to the radio station ensuring only their calls got through. The group allegedly netted two Porsches, $20,000 in cash and holidays in Hawaii.'
'A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, Nasa and the Korean Atomic Research Institute. His online mentor, "Kuji", is never found.'
1995
'Also this year, a group directed by Russian hackers breaks into the computers of Citibank and transfers more than $10 million from customers' accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money.'
'In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.'
'On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail.'
1996'The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995.'
'Popular websites are attacked and defaced in an attempt to protest about the treatment of Kevin Mitnick.'
1999'The internet now has over 16 million hosts and is growing rapidly'
picture of David Smith: Creator of the Melissa virus
2000' In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith.'
''In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data.'
'In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn't do enough to protect themselves.'
gym'In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen. '
next topic will be posted soon
Re: stories about how hacking started an approach by gym
actually i get to know the history. thanks for the report gym. keep posting gym.
though i aint a hacker but i m very much curious about hakcers'. they are really talented.
though i aint a hacker but i m very much curious about hakcers'. they are really talented.
riz- Administrator
-
Number of posts : 1502
Age : 39
Location : australia
mig33 username : riz_sydney
Registration date : 2007-03-20
Re: stories about how hacking started an approach by gym
i love hacker too
i also wana meet some of them
nice information gym
i also wana meet some of them
nice information gym
Re: stories about how hacking started an approach by gym
Nice gym great story, did you know the I LOVE YOU virus is from Philippines and created by Filipino hacker who gave so much problems worldwide i know its bad but im greatful because my fellow citizen is a great hacker and very talented
angelface02- Regular Member
-
Number of posts : 173
Age : 49
Location : Philippines
mig33 username : angelika418
Registration date : 2007-09-05
Re: stories about how hacking started an approach by gym
gym um really happy to hear the history of hacker with u and our friendz forum.
the hackers are very very brilliant too.
they have use their knowledge diffrent side.
thanks gym
the hackers are very very brilliant too.
they have use their knowledge diffrent side.
thanks gym
Re: stories about how hacking started an approach by gym
the virus was first descovered in hongkong rather than philipines though was belived to be written by philipin citizen
th e attachment was LOVE-LETTER-FOR-YOU.TXT.vbs
as most virus are made by antivirus themself this was the virus made by some indepent coder
the virus caused a rampage i was using window 98 at that time
first time in the history of coding a virus vb script was used
the mec hanism was tht the virus attacked the system file of antivirus then make sever copies (replicates)
in terms of spreading it begans with philipines on 4th may 2000 and spread whole world causing a major crisis
it was estimated tht 10 percent of the world computers with internet connection was effected
tonly wiNDOW PLATform was effected
his worm program is believed to have been written by Michael Buen. The Barok trojan used by the worm is believed to have been written by Onel de Guzman, a Filipino student of AMA Computer University in Makati, Philippines.
the worm infected computer and replace *.JPG, *.JPEG, *.VBS, *.VBE, *.JS, *.JSE, *.CSS, *.WSH, *.SCT, *.DOC *.HTA mp3 mp2 files changing it into vbs ext
th e attachment was LOVE-LETTER-FOR-YOU.TXT.vbs
as most virus are made by antivirus themself this was the virus made by some indepent coder
the virus caused a rampage i was using window 98 at that time
first time in the history of coding a virus vb script was used
the mec hanism was tht the virus attacked the system file of antivirus then make sever copies (replicates)
in terms of spreading it begans with philipines on 4th may 2000 and spread whole world causing a major crisis
it was estimated tht 10 percent of the world computers with internet connection was effected
tonly wiNDOW PLATform was effected
his worm program is believed to have been written by Michael Buen. The Barok trojan used by the worm is believed to have been written by Onel de Guzman, a Filipino student of AMA Computer University in Makati, Philippines.
the worm infected computer and replace *.JPG, *.JPEG, *.VBS, *.VBE, *.JS, *.JSE, *.CSS, *.WSH, *.SCT, *.DOC *.HTA mp3 mp2 files changing it into vbs ext
Re: stories about how hacking started an approach by gym
great info gym/. thanx
enigma_1- super moderator
-
Number of posts : 1240
Age : 114
Location : India
mig33 username : enigma_1
Registration date : 2007-09-22
Re: stories about how hacking started an approach by gym
lush nyc information soo nyc i love hacking and i also hacks sme web u tke intrest in it gym nyc story telling thaks ...................... gud gob keep it up .
AWARAPAN_-_1- Valued Member
-
Number of posts : 323
Age : 34
Location : SAUDIA ARABIA
mig33 username : AWARAPAN_-_
I\'m from :
Registration date : 2007-08-20
Re: stories about how hacking started an approach by gym
ya hacking is a fun but i dnt want go go behind bars because its risky now a daysAWARAPAN_-_1 wrote:lush nyc information soo nyc i love hacking and i also hacks sme web u tke intrest in it gym nyc story telling thaks ...................... gud gob keep it up .
for hacking many software are avaible
i suppose boards are easy to crack down but involve risk even with proxies and hiding ur ips because they will find out the original ip and they will knock ur doors
since i can locate any ones adress to his atrea they stay so imagine what tech they must have
gym say say no to hack a website
Similar topics
» Share your funny Stories here
» how to approach whom u love
» How Tsunami started....
» finding serial number in google( a simple approach)
» how to approach whom u love
» How Tsunami started....
» finding serial number in google( a simple approach)
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum