1 / 7

The History of the Hacker

The History of the Hacker. By: Aaron Tuma. Definition. A microcomputer user who attempts to gain unauthorized access to proprietary computer systems.

sydney
Télécharger la présentation

The History of the Hacker

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The History of the Hacker By: Aaron Tuma

  2. Definition • A microcomputer user who attempts to gain unauthorized access to proprietary computer systems. • Hackers have been here since the 1950s. They were from MIT. They studied in the Phone Switching Network. Also, they did their work in the lab of MIT Artificial Intelligence Lab which was run by Marvin Minsky.

  3. Top 5 Best Computer Hackers of All Time • 1: Kevin Mitnick. Today, the Department of Justice thinks that he is the most wanted hacker in history. He is now a speaker, a computer security author and a consultant. • 2: Adrian Lamo. His nickname is “The Homeless Hacker”. When he was caught, he was forced to pay $65,000. One of his crimes included Yahoo. He is now a public speaker. • 3:Jonathon James. He hacked NASA. He is now wanting to start his own computer security company.

  4. 4: Robert Tappan Morris. He created a worm that shut down many computers. He was put on three years of probation, a fine of $10,500, and he needed 400 hours of community service. He is now a professor for the MIT computer Science and Artificial Intelligence laboratory. • 5: Kevin Poulsen. He hacked the FBI federal computers and databases. He is now a journalist.

  5. Examples of What Hackers Do • Inside job: Hacking that involves stealing passwords, obligate misuse, and cause harm. They usually come from within the place being harassed. • Back Doors: They go in through by taking advantage of errors. • Viruses and Worms: Programs that put themselves onto other ones, which put fake travel in so it can be flooded.

  6. How the government deals with hackers • 1: Banning them from recreational computer usage. • 2: Give a fine • 3: Arresting them • 4: Getting captured • 5: putting up anti spy software.

  7. How hacking can be used for good • It can be used for good by hacking bombs from terrorists, or just hacking their computer for information. • I bet that most agencies use hacking when dealing with a situation involving terrorists and computers.

More Related