• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
The History of Hacking
 

The History of Hacking

on

  • 521 views

Navneet's Pecha Kucha

Navneet's Pecha Kucha

Statistics

Views

Total Views
521
Views on SlideShare
521
Embed Views
0

Actions

Likes
1
Downloads
25
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The History of Hacking The History of Hacking Presentation Transcript

    • A Pecha Kucha  By:  ……
    • Whistle at precisely 2600 Hz nch Captain Cru Route a new call in AT & T long Lines r Drape John 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980
    • Blue Boxes Esquire magazine publishes  "Secrets of the Li-le Blue Box" 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980
    • ing  Ph reak hmm…HOTDOG  Phone  May I speak to  ??? Pope. ss? Gue 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980
    • Steve Jobs home industry making  and selling   Blue Boxes Steve Wozniak 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980
    • The 414s 6 teenagers $1,500 worth of damage Los alamos laboratories 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990
    •  Morris worm Worm released from MIT. Now Prof. at MIT Robe rt Ta ppan Stud ent , Morr Corn is ell U niver sit y 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990
    •  DEFCON  hacking conference  1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • Kevin Mitnik stole 20,000 credit card numbers DEC spent $160,000 in cleanup costs 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • $10 million from Ci[bank Recover all but $400,000   Don’t ask me where  Vladimir Levin is $400,000.  1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • logic bomb and worm will go off if Mitnick is not  released from prison!! 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • CULT OF THE DEAD COW releases Back Orifice at DEFCON 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • ILOVEYOU a.k.a. LoveLeder subject : ILOVEYOU AMachment : LOVE‐LETTER‐FOR‐YOU.TXT.vbs EsTmated  damage: $5.5 billion Infected : 50 million 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
    • Gary McKinnon 97 United States military  and NASA computers over a 13‐month  period Feb,2001 and Mar, 2002 Gary McKinnon 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    • 300 computers inoperable a9er the 9/11 Washington network of 2,000 computers    for 24 hours tracking cost : $800,000 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    •  Microso] announced $ 250,000 Reward 2000   2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    • 300 pages of confiden[al twider documents   Domino Effect François Cousteix a.k.a Hacker Croll 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    • Opera[on Aurora  Targets:  Adobe Systems  Juniper Networks  Rack Space Google China's headquarters a]er its announcement it may leave the country 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    • Mr. “X” Last known locaTon: India Hacking paMern : Pecha‐Kucha Next predicted vicTm: Thought*****  Inc. 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
    • A Pecha Kucha  By: X