Black

zhaozj2021-02-16  64

"Hacker" was originally a commendation, referring to computer elites that excavated computer program potential. In the early 1960s, university computer facilities with giant computer became a stage of hackers. The 1983 US Federal Investigation was first arrested 6 teenage hackers, and the six teenage hackers were charged more than 60 computers, including the Slun Katelin Cancer Memorial Center and the Los Alamos National Laboratory. In 1984, IRik was founded in New York. The magazine immediately became an important place for hacker exchange information. In 1985, the underground reporter "Tarran King" and "Lightning Knight" were founded in Shengluo "Frick" (Phrack), specifically introduced the knowledge of the attack computer. In 1987, the US Federal Law Enforcement Department accused 17-year-old high school drop out of Helbert Qi En (the law enforcement authorities called "Shadow Eagle") into the internal network and center exchange system of the US Telephone Telegraph. Qi En is the first person who was judged after the "Computer Fraud and Abuse Act" in 1986. In 1988, Cornell University graduate Robert Morris (22 years old) made a "worm" program to the Internet, this program is designed for the defect of the UNIX system, it can enter other computers in the network and self-reproduction . "Worm" quickly spreads more than 6,000 systems after Internet access --- almost one tenth of the Internet at the time. It takes up a lot of system resources to get the network into a paralysis. Morris quickly arrested, experts said that his "worm" program has caused 15 million economic losses, but he denied that he had such motives. In the end, Morris was only sentenced to 3 years to probation, do 400 hours of community service and a fine of $ 10,000. In 1988, after discovering a networked computer with a hacker intrusion military network (Milnet), the US Department of Defense cut off the physical connection between the non-confidential military network and Apa.com - the physicocal connection between the earlier Internet. In 1989, 5 West German Computer Spies invaded the US government and university computer network. University of California, California, Berkeley, Berkeley Branch, Berkeley, Sith, discovered five Siede computer spy activities and conducted an in-depth investigation. These five Siders eventually arrested for the espionage. Sentol later published the book of "Bai Valbophilic eggs" detailed about the story of his tracked hacker. 4 members of the "One Hundreds of Mission in the United States) were arrested by the three technical secrets of the Southern Bell's 911 emergency telephone network. During the Gulin Total Auditor, the National Audit Office announced during the Gulf War, the Netherlands had invaded the Department of Defense, revisit or replicate some non-confidential sensitive intelligence, including military personnel, military equipment and important weapons that were transported to the bay. Equipment development situation, etc. "Deception Master" in 1992 (a teenage hacker organization in New York) invaded the US Telephone Telegraph, Bank of America and TRW and the National Security Administration computer system. In 1994, Griffith Air Force Base and the US ASAC were attacked by two hackers. The Scottish field has arrested the 16-year-old British hacker of the code "data flow". Another hacking Kuji has been unhappy. In the same year, a hacker found a password that the British Queen, Meijie Prime Minister and other senior officials were discovered by a password. All of these numbers are disclosed on the Internet. 1995 Martnik was arrested. He was accused of breaking into many computer networks, stealing 20,000 credit card number and replication software. In 1995, Russia was arrested in the UK. He was charged with a laptop from the New York Citibank, which was illegally transferred to at least $ 3.7 million to the world from him and his with his associated account. In 1996, Haike Johnny sent an email bomb to approximately 40 politicians, corporate leaders, etc., which made up to 20,000 spammented a weekend. Johnny has so far be happy. In 1997, the network solution company managed the Internet of INTERNIC domain registration networks attacked by competitors. Later, ALTERNIC company's administrator acknowledged that he designed a destructive procedure and "hijacking" the visitors of the INTERNIC website to its own website.

转载请注明原文地址:https://www.9cbs.com/read-18993.html

New Post(0)