{"id":1394,"date":"2010-01-06T17:26:18","date_gmt":"2010-01-07T00:26:18","guid":{"rendered":"http:\/\/www.bspcn.com\/?p=1394"},"modified":"2010-01-06T17:41:27","modified_gmt":"2010-01-07T00:41:27","slug":"20-things-you-didnt-know-about-computer-hacking","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2010\/01\/06\/20-things-you-didnt-know-about-computer-hacking\/","title":{"rendered":"20 Things You Didn’t Know About… Computer Hacking"},"content":{"rendered":"

Written by Rebecca Coffey<\/a><\/p>\n

\"\"1<\/strong> Hacker <\/em>originally meant \u201cone who makes furniture with an ax.\u201d Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.<\/p>\n

2<\/strong> Computer hacking was born in the late 1950s, when members of MIT\u2019s Tech Model Railroad Club<\/a>, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe<\/a>.<\/p>\n

3<\/strong> One of the club\u2019s early programs: code that illuminated lights on the mainframe\u2019s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voil\u00e0: computer Ping-Pong!<\/p>\n

4<\/strong> By the early 1970s, hacker \u201cCap\u2019n Crunch\u201d<\/a> (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T\u2019s long-distance switching system. This gave him access to call routing (and brief access to jail).<\/p>\n

5<\/strong> Before they struck it rich, Apple founders Steve Wozniak<\/a> and Steve Jobs<\/a> made and sold \u201cblue boxes,\u201d electronic versions of Draper\u2019s whistle.<\/p>\n

6<\/strong> Using a blue box, Wozniak crank-called the Pope\u2019s residence in Vatican City and pretended to be Henry Kissinger.<\/p>\n

7<\/strong> Hacking went Hollywood in the 1983 movie WarGames<\/em><\/a>, about a whiz kid who breaks into a Defense Department computer and, at one point, hi\u00adjacks a pay phone by hot-wiring it with a soda can pull-ring.<\/p>\n

8<\/strong> That same year, six Milwaukee teens hacked into Los Alamos National Lab<\/a>, which develops nuclear weapons.<\/p>\n

9<\/strong> In 1988 Robert T. Morris<\/a> created a worm, or self-replicating program, purportedly to evaluate Internet security.<\/p>\n

10<\/strong> The worm reproduced too well, however. The multi\u00admillion-dollar havoc that ensued led to Morris\u2019s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF<\/a>).<\/p>\n

11<\/strong> They all come home eventually. Morris now researches computer science<\/a> at…MIT.<\/p>\n

12<\/strong> British hacker Gary McKinnon<\/a> broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.<\/p>\n

13<\/strong> McKinnon\u2019s defense: He wasn\u2019t hunting military secrets; he was only seeking suppressed government files about space aliens.<\/p>\n

14<\/strong> According to rumor, agents of China\u2019s People\u2019s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.<\/p>\n

15<\/strong> It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: \u201cI thought, \u2018Gosh, this is a big problem.\u2019\u201d<\/p>\n

16 <\/strong>Unclear on the concept: When West Point holds its annual cyberwar games<\/a>, the troops wear full fatigues while fighting an enemy online.<\/p>\n

17<\/strong> Think your Mac is hackproof? At this year\u2019s CanSecWest conference<\/a>, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.<\/p>\n

18<\/strong> Cyborgs beware: Tadayoshi Kohno<\/a> at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.<\/p>\n

19<\/strong> This does not bode well for patients receiving wireless deep-brain stimulators.<\/p>\n

20<\/strong> The greatest kludge of all? Roger Angel<\/a> of the University of Arizona has proposed building a giant sunscreen in space to hack the planet\u2019s climate.<\/p>\n

Bonus: 5 Seasons Of LOST in 8 minutes<\/strong><\/p>\n

<\/param><\/param><\/param><\/embed><\/object><\/p>\n","protected":false},"excerpt":{"rendered":"

Written by Rebecca Coffey 1 Hacker originally meant \u201cone who makes furniture with an ax.\u201d Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle. 2 Computer hacking was born in the late 1950s, when members of MIT\u2019s Tech […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1394"}],"collection":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/comments?post=1394"}],"version-history":[{"count":3,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":1396,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1394\/revisions\/1396"}],"wp:attachment":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/media?parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/categories?post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/tags?post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}