mig33 GEMISTARS community
silahkan login atau reg sebagai member untuk jelajah lebih lanjut...thanks.
mig33 GEMISTARS community
silahkan login atau reg sebagai member untuk jelajah lebih lanjut...thanks.
mig33 GEMISTARS community
Would you like to react to this message? Create an account in a few clicks or log in to continue.


-
 
IndeksPortalGalleryPencarianLatest imagesPendaftaranLogin
Login
Username:
Password:
Login otomatis: 
:: Lupa password?
Similar topics
    PROGRAMMER CITY
    Keywords
    LINK PARTNERS
    CHAT/PESAN-PESAN

    ShoutMix chat widget
    Top posters
    raja_kuin
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    xaw
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    achun
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    a_imam
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    dan0105
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    yuasa
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    aji_slankers
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    alv_69
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    goes3
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    satriapegasus
    History of Hacking Vote_lcapHistory of Hacking Voting_barHistory of Hacking Vote_rcap 
    Latest topics
    »  download ALL.OCX
    History of Hacking EmptyWed Jul 08, 2015 9:58 pm by carllenz88

    » flooder by choman new
    History of Hacking EmptyMon Dec 02, 2013 1:47 am by barcool

    » Mpc arpegios + keygen
    History of Hacking EmptyFri Nov 15, 2013 1:48 am by spifjets

    » Sockmix Messenger v1.4
    History of Hacking EmptyThu Feb 21, 2013 10:01 pm by jani

    » gelglory MPC Vx.4 (Cracked)
    History of Hacking EmptyTue Feb 12, 2013 3:58 pm by fatwua

    » ploder .c.k unlimitid log
    History of Hacking EmptySat Jun 09, 2012 7:22 pm by riky ramdan

    » Xpeed Mig33 Center v2.0.0
    History of Hacking EmptyFri May 25, 2012 11:19 pm by fajar

    » B4d Admin Caller With Admin Room Detector
    History of Hacking EmptyThu May 10, 2012 11:37 pm by pilot46

    » Mengenal Visual Basic 6 alias VB6
    History of Hacking EmptyFri Apr 27, 2012 2:14 pm by bacokecil


     

     History of Hacking

    Go down 
    5 posters
    PengirimMessage
    yuasa
    KOMBESPOL
    KOMBESPOL
    yuasa


    Male Jumlah posting : 94
    Age : 37
    Lokasi : Makassar, tanjung(kal-sel)
    Registration date : 26.02.09

    History of Hacking Empty
    PostSubyek: History of Hacking   History of Hacking EmptySun Mar 01, 2009 12:45 am

    Mungkin udah ada yang pernah liat artikel ini...

    History of Hacking

    Semua orang sering memperkatakan tentang Hackers,hacking,phreaking dan perkara-perkara yang sewaktu dengannya. Tetapi, adakah kita tahu tentang sejarah hacking ini? Saya berpeluang untuk melihat video tentang sejarah permulaan hacking ni dlm kelas saya. Dimana saya rasa cukup menarik. Sejarah in bermula dengan phone phreak:
    A history of hacking
    Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
    Early 1960s
    University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers.At first, "hacker"was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.
    Early 1970s
    John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open aline. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch,"is arrested repeatedly for phone tampering throughout the 1970s.
    Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.
    Two members of California's Homebrew Computer Club begin making "blue boxes,"devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue"(Steve Jobs) and "Oak Toebark"(Steve Wozniak), later go on to found Apple Computer.
    Early 1980s
    Author William Gibson coins the term "cyberspace"in a science fiction novel called Neuromancer.
    In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.
    Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.
    Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.
    2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.
    Late 1980s
    The Computer Fraud and Abuse Act gives more clout to federal authorities.
    Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.
    At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.
    First National Bank of Chicago is the victim of a $70-million computer heist.
    An Indiana hacker known as "Fry Guy"-- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet,""Leftist"and "Urvile."
    Early 1990s
    After AT&Tlong-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning"and in New York grab Masters of Deception trio "Phiber Optik,""Acid Phreak"and "Scorpion."Fellow hacker "Eric Bloodaxe"is picked up in Austin, Texas.
    Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.
    A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
    Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream,"a 16-year-old British teenager who curls up in the fetal position when seized.
    A Texas A&Mprofessor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.
    Late 1990s
    Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
    Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.
    A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars."Family's own 15-year-old son eventually is identified as stalking culprit.
    Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.
    Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb"will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus,"Yahoo! spokeswoman Diane Hunt said.
    1998
    Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker.
    Kembali Ke Atas Go down
    yuasa
    KOMBESPOL
    KOMBESPOL
    yuasa


    Male Jumlah posting : 94
    Age : 37
    Lokasi : Makassar, tanjung(kal-sel)
    Registration date : 26.02.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptySun Mar 01, 2009 12:47 am

    They decide to blow up the world anyway.
    In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."
    Hackers break into United Nation's Children Fund Web site, threatening a "holocaust"if Kevin Mitnick is not freed.
    Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
    The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology andtransportation systems from hackers.
    Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

    Semoga secuil article ini dapat membuka mata kita tentang hacking.
    Kembali Ke Atas Go down
    raja_kuin
    Master Administrators
    Master Administrators
    raja_kuin


    Male Jumlah posting : 473
    Age : 40
    Lokasi : TABALONG
    NICK MIG33 : rj.k
    NICK MIG33 : raja_kuin
    NO HP : raja.kuin@gmail.com ( on FB )
    FRIENDSTER : -
    Registration date : 25.02.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptySun Mar 01, 2009 10:14 am

    Wew gw rada rada paham dkit neh bro ,mhon bimbingan nya ya .thx 4 u share
    Kembali Ke Atas Go down
    http://mig33gemistars.forumotion.com
    dan0105
    BRIGJEND
    BRIGJEND
    dan0105


    Male Jumlah posting : 104
    Age : 36
    Lokasi : pekanbaru
    Registration date : 26.02.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptyMon Mar 02, 2009 3:05 am

    sayang w g da paham2 nya bro . . .
    maklum dudul Very Happy
    dapet sumber darimana bro . . . . .
    tq 4 share
    Kembali Ke Atas Go down
    http://dan0105.blogspot.com
    adienda_pegasus
    IRJEND
    IRJEND
    adienda_pegasus


    Female Jumlah posting : 9
    Age : 31
    Lokasi : the dream of theater(old trafford)
    NICK MIG33 : nietsa.dc
    NICK MIG33 : adienda_pegasus
    NO HP : 085726510274
    FRIENDSTER : nietza_glad@devil.com
    Registration date : 26.02.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptyTue Mar 10, 2009 3:01 pm

    lol! bozzzzzzzzzzzzzzzzz kok englishnya byk bget zaaaaaaaaaaaaaaa,kualahan mw translete haruse ada yg bntu lg
    Kembali Ke Atas Go down
    http://www.cyber-kicker.forumsmotion.com/
    raja_kuin
    Master Administrators
    Master Administrators
    raja_kuin


    Male Jumlah posting : 473
    Age : 40
    Lokasi : TABALONG
    NICK MIG33 : rj.k
    NICK MIG33 : raja_kuin
    NO HP : raja.kuin@gmail.com ( on FB )
    FRIENDSTER : -
    Registration date : 25.02.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptyWed Mar 11, 2009 8:08 pm

    Wew dinda kewalahan neh . .monggo dinda lanjutin tgsx ntr staf forum akan ikut bntu jg dmn tgkt kesulitanx. . .trims 4 u dinda
    Kembali Ke Atas Go down
    http://mig33gemistars.forumotion.com
    brewox
    IPDA
    IPDA



    Male Jumlah posting : 35
    Lokasi : brebes
    NICK MIG33 : brewox_
    NICK MIG33 : brewox_
    NO HP : 081902568806
    FRIENDSTER : haniswety_yahoo.co.id
    Registration date : 08.09.09

    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking EmptySat Sep 19, 2009 1:18 am

    wulah bhs linggis,binun au History of Hacking 380268
    Kembali Ke Atas Go down
    Sponsored content





    History of Hacking Empty
    PostSubyek: Re: History of Hacking   History of Hacking Empty

    Kembali Ke Atas Go down
     
    History of Hacking
    Kembali Ke Atas 
    Halaman 1 dari 1
     Similar topics
    -
    » History of windows

    Permissions in this forum:Anda tidak dapat menjawab topik
    mig33 GEMISTARS community :: ZONA COMPUTER :: TIPS DAN TRIK KOMPUTER-
    Navigasi: