Okay boys and girls, children of all ages...Here's a revolutionary idear....The announcements foist!
The file we released on smashing up cop cars and getting away, ya know? Well, don't try it unless you got half a ton of cocaine in the back seat, and a billion bucks on the dash! The cops are wise, and are liable to open fire on you once you start pulling backwards, so, don't attempt it unless you have no other options. Another thing - now they're air bags are quicker-draining, so they can start the chase almost as soon as you are off.
-> And Now, On With The Show! <-
Okay, folks...First of all, I wrote this because, well, a lot of you fellow hacker/phreakers out there do all yer stuff, but don't know your roots. Hacking and phreaking have been around for over 20 years now. So, without further adue, I present, the History Of Hacking, and Phreaking!
-=- The History Of Hacking & Phreaking -=-
Believe it or not, but hacking and phreaking have been around since the '60s. Yep. Hacking is a legacy! Phreaking came around some time about 10 years later.
-The 60's Hacker-
These were back in the days when a teenager couldn't even buy a computer (because of price), much less fit it in his house. The 'hackers' were the people the sysop's of lamer PD boards would have you believe - people who spent lots of time with their computer (hacking away at the keyboard).
The true hackers came about when Massachusetts Institute of Technology employed some nerds to do some artificial intelligence and computer work for them. These guys actually created the models for the terminal your working on right now. They were the true and original programmers and engineers.
Anyhow, these guys were working on a project called MAC (Multiple-Access Computer, Machine-Aided Cognition, or Man Against Computers...Take yer pick). All goes well as these guys write some basic programs, build operation systems, and play 4 color chess games, until the MAC programmers go public with a computer time sharing program. The first BBS, and it even had over 100 nodes!
Of course, only other guys with main frames could access this thing (i.e. - the government, other big schools, and big companies). These sysops who worked at MIT did their best to control the badly maintained MAC system, but the hoards of users cluttered up everything.
Then, something magical happened. A man called John McCarthy, Ph.D., crashed the MAC system. Soon, others took sport in crashing this international network. Companies were able to take place in a crude form of industrial espionage on the MAC buy 'eavesdropping' on rival's E-Mail, and those cheap cardboard punch cards (the first computer disks) were always being corrupted by batch-file viruses. Hacking is born.
However, crashing the system and all other 'evil' activities were encouraged. From them, sysops learned from mistakes, and the hackers took place in the hackers' obsession - the desire to learn as much as possible about a system.
-The 70's Hacker/Phreaker-
The 70's were a magical decade, and a flying leap for phone fraud. The first half of the 70's was like the 60's in respect to hacking. In the second half, hacking escalated into 80's hacking (see below).
Besides hacking, though, the 70's produced the phone phreaks. Phreaking was born from the non-existent womb of a blind child from Tennessee named Joe Engressia. Joe was one of the rare people born with perfect pitch. Because of that gift, Joe was able to manipulate some of the most sophisticated and widespread technology in the world. Joe enjoyed the phone system. Being a curious 8 year old, he called recorded messages all over the world, because it was free, and is was a good past time. One day, he was listening to a message and whistling. When he hit a certain tone, the message clicked off. You or I might have hung up, but curious 8 year olds don't.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.