Question:

How did computer hacking start?

Hackers and Computer Security

At 25, legendary hacker Kevin Mitnick secretly compromised theinternet security and email security of MCI and Digital Equipment and monitored the email of their security officials. He was convicted of damaging computers and stealing software and was sentenced to one year in prison. Now out of prison, he runs his own computer security consulting company.

Hackers and Computer Security

Before the internet and the attendant problems of internet security, there was another type of hacker. In the early 70's hackers were "phone phreaks", who found ways to manipulate the phone system. One of the first phreaks was John Draper who figured out how to make a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earned the handle "Captain Crunch," was arrested repeatedly for phone tampering throughout the 1970s.

Hackers and Computer Security

Some of the leaders of the personal computer industry began as hackers. Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to compromise the online security of the phone system. The members, who adopted the handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later went on to found Apple Computer.

Hackers and Computer Security

One reason why the internet security is so vulnerable to hackers and information security problems is because the foundations of the internet were created by scientists who placed a premium on ethical behavior. An early critic of internet security, Cliff Stoll, famously stated that "if we built buildings the way we programmed computers, the first woodpecker to come along would destroy civilization."

Internet Safety Frequently Asked Questions

What is an internet filter?

Can I filter internet content about drugs and alcohol?

Can I filter content about hate and criminal behavior?

What are some of the filtering criteria offered by internet filtering?

Can internet filtering block good or informational websites?

What can an internet report show me?

What are features I should look for in a spam filter?

Why should I use a porn blocker?

Why is a porn blocker so important?

How did computer hacking start?

What can you tell me about hackers?

What are computer viruses and how do they work?

What is a Trojan Horse program and how does it work?

How can I protect myself from viruses and Trojan horse programs?

How can I protect my computer's data?

What should I do if I think my computer is infected by a virus?

How can a firewall protect my computer?

How do I stop unauthorized access to my computer?

How have computer viruses evolved?

How do I make sure my password is secure?

What are computer viruses and how do they work?

How can I protect myself from viruses and Trojan horse programs?

What organizations exist to help combat computer crime?

How can a firewall protect my computer?

How can I protect myself from viruses and Trojan horse programs?

How can a firewall protect my computer?

How did computer hacking start?

What organizations exist to help combat computer crime?

How can I protect myself from viruses and Trojan horse programs?

How have computer viruses evolved?

What can you tell me about hackers?

How do I get rid of pop-ups?

How can I keep spam out of my mailbox?

What anti-spam laws exist?

What is spyware and how do I stop it?

How do I get rid of pop-ups?

How can a firewall protect my computer?





Not finding the advice and tips you need on this Internet Safety Tip Site? Request a Tip Now!


Guru Spotlight
Carma Spence-Pothitt