College Papers

Hacking computing for 40 years •The first computer

Hacking

 

   Contents

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

·     History of hacking

·     What is hacking ?

·     Who is hacker ?

·     Famous hackers in history

·     Why do hackers hack ?

·     Types of hacking

·     What should do after hacked

·     How to secure our data

·     Advantages of hacking

·     Disadvantages of hacking

·     Conclusion

·     References

 

 

 

History of hacking

•Hacking has been a part of computing for 40 years

•The first computer hacker emerged at MIT

•Hacking is began in 1960s at MIT ,origin of the term  “hacker”

•The truth hacker amongst our societies have thirst for the
knowledge

•Boredom is never an object of challenge for the hacker

Big hackings in history

1990: Operation Sundevil starts: The Secret Service, in
conjunction with Arizona’s sorted out wrongdoing unit, discloses Operation
Sundevil, an across the country venture against 42 PCs and seizing 23,000
floppy circles. They in the long run seize PC hardware in 14 urban communities,
including Tucson, Miami and Los Angeles

1995: Kevin Mitnick is captured. One of America’s most
acclaimed programmers Kevin Mitnick is at long last gotten and was condemned to
five years in prison.

2015: Catastrophic eBay hack: One of the biggest individual
hacks ever, eBay had more than 145,000,000 records stolen from their database.

2003: Anonymous is framed. The hacktivist assemble is
framedthrough a site.

2015: Catastrophic eBay hack: One of the biggest individual
hacks ever, eBay had more than 145,000,000 records stolen from their database.

What is hacking ?

In general, penetration
is the ability to reach a target illegally through gaps in the protection
system of the target and of course is a bad feature characterized by the hacker
ability to enter the organs of others and without the will of them and without
knowledge of them, regardless of the serious damage that may occur either Their
personal devices or their souls when dragging files and pictures of their own.
What is the difference here between the hacker and the personal devices and
penetrated safe houses safe?

And the penetration of devices is like any
other breakthrough has ways and foundations through which the hacker intrusion
on the devices of others through the gaps in that system … This means that
you are vulnerable to penetrate at any time and in any way was targeted by one
of hackers – hackers – for some reason or random as This way, the best way is not
to put your important and special data inside your device such as your bank
card number or your numbers and passwords, and to take the possible protection
methods and take the precaution and caution on an ongoing basis

And the penetration of devices is like any other breakthrough has ways and foundations through which the hacker intrusion on the devices of others through the gaps in that system … This means that you are vulnerable to penetrate at any time and in any way was targeted by one of hackers – hackers – for some reason or random as This way, the best way is not to put your important and special data inside your device such as your bank card number or your numbers and passwords, and to take the possible protection methods and take the precaution and caution on an ongoing basis