Know Hackers and Their Tricks
Most that own a computer have had the unfortunate opportunity of having a virus destroy their operating system or permanently screw up a program on their PC. Others may have had a more serious problem when their social security Levitra number, credit card numbers, or even their personal identity is stolen from their own computer.
For all of those that have been affected, this can be extremely frustrating. The problem seems to come out of nowhere and sometimes it seems like it will be impossible to solve it.
Where do all these viruses and computer problems come from? Sometimes they are the product of websites or foreign programs dumping corrupt files onto your computer, but other times it is an actual human that does the damage.
Another human being intentionally destroying another’s computer? Why would they do such a thing?
You think they would probably get a pretty hefty sum of money for their services, right? Sometimes they might, but most of the time they do it because they are bored or they get pleasure out of it.
These pesky people are called “hackers” and they can range from being highly trained and professional to being a teenage kid in their mom’s basement that messes around with other people’s PCs while they’re chugging Mountain Dew and eating Domino’s Pizza.
Let’s delve into the history of these mischievous criminals and how they came to be. You might be surprised to know that they started to exist even in the 1960s.
At first, “hacker” was actually a positive term. It was a term adopted by the MIT Artificial Intelligence Lab to describe workers that had a precise mastery of all things computers and could do things with programs that have never been done before.
The first “hack” was actually not done on a PC, but through a phone. A man named John Draper figured out that he could whistle a certain tone into a phone receiver and receive free long-distance calls.
This petty crime turned into an ever-growing fad, until there were whole groups of phone hackers that sprang up throughout the world. Many called these hackers “phreaks”.
Then, in the 1980s, the crime eventually turned to computers. One of the first cyber-hacking arrests took place in Milwaukee, Minnesota.
Authorities arrested a group of PC criminals called “the 414s”. They had hacked into over 60 cyber databases to tamper with information, ranging from high-tech medical systems to nuclear laboratories.
This is about the time that the government and started enacting laws and forming anti-hacking organizations. The Computer Fraud and Abuse Act was founded, and a group of U.S. agencies founded the Computer Emergency Response Team, which was involved in the investigation of certain hacks.
At about the same time that the government pulled together Kamagra Soft to fight this problem, the network of hackers around the world became stronger also. A new magazine intended to educate hackers was created and distributed.
This magazine, called 2600: The Hacker Quarterly, was started by a criminal named Eric Corley. It brought current information to all around the world about the latest hacking techniques.
The government then made a new law that made it illegal to gain access to an interstate PC system for criminal purposes. The first person ever to be arrested and sentenced under this new law was a generic cialis forum man named Kevin Mitnick.
Mitnick, who was 25 at the time and a very accomplished PC criminal, had secretly broken into the e-mail systems of MCI and Digital Equipment. When he was caught, he was convicted of damaging and stealing online property and was sentenced to one year in prison.
He was eventually released but was sent right back to jail years later when he was accused of stealing thousands of credit card numbers. He spent another five years in jail.
He was only one of the hackers in a global group that spanned for thousands of people. Hundreds have been arrested and prosecuted for the damage that they have done online.
Higher-security systems have been invented and more precautions have been taken, but at the same criminals have been getting smarter and find ways around these new security measures.
Author Bio: Ignacio Lopez worked in the information technology business for the last 31 years and written hundreds of articles about computer support. Hebusiness server support charlotte recommends using business server support charlotte for your IT needs.
Contact Info:
Ignacio Lopez
Ignaciolopez@gmail.com
http://www.sbtpartners.com/
Category: Computers/Security
Keywords: business server support charlotte