Facebook Twitter Instagram
    Thursday, March 23
    Trending
    • This Day in History on March 23rd
    • R.I.P. Lance Reddick (1962-2023)
    • This Day in History on March 22nd
    • This Day in History on March 21st
    • Animated Map of the 2022 Russian Invasion of Ukraine (through March 20th, 2023)
    • This Day in History on March 20th
    • April 4, 2023: Your Chance to Preview Air
    • This Day in History on March 19th
    History and Headlines
    • Arts & Entertainment
      • Cinema & TV
      • Games
      • Literature
      • Music
      • Sports
      • Video Games
    • Bizarre Bulletin
      • Misconceptions
      • The Bizarre
      • The Paranormal
      • The Unexplained
    • Lifestyle
      • Animals/Pets
      • Fashion
      • Food
      • Health/Medicine
      • Home Improvement
      • Horoscopes
      • Travel
    • Science & Tech
      • Inventions
      • Nature
      • Vehicles
    • Society
      • Business and Economics
      • Crime
      • Military
      • Politics
      • Religion
      • Society
    • About
      • Welcome to Our Site!
      • This Day in History
      • Table of Contents: A History of the World
      • Online History Textbooks
      • A Guide to Some of Our Favorite Scholars and Educators
      • Advance Screenings and Movie Reviews Archive
      • Schedule of Video Adaptations of Our Articles
    • Friends
      • Armchair History TV
      • Fact Fiend
      • RealClearHistory
      • Simply Charly
      • TopTenz
      • ​Unique Interpretations
    History and Headlines
    You are at:Home»April»April 8»From UNIX to Ethical Hacks: A Brief History of Hacking
    April 8

    From UNIX to Ethical Hacks: A Brief History of Hacking

    Anonymous AuthorBy Anonymous AuthorApril 8, 2019Updated:March 5, 2020No Comments5 Mins Read
    Email Facebook LinkedIn Pinterest Reddit Telegram Tumblr Twitter VKontakte WhatsApp
    hacking

    A Brief History

    On April 8, 2019, we take a look at the history of hacking.  Nowadays, hacking is considered one of the most serious threats faced by governments, organizations, and individuals alike. As more and more aspects of our daily lives are conducted online or thanks to the help of internet-connected devices, the fear that someone might gain unauthorized access to our personal information or gain control of our systems is one of our biggest concerns. But hacking is not always about the bad guys – and it certainly did not start out as such a nefarious undertaking.

    Digging Deeper

    The Origins of Hacking

    With cyber-crime on the rise and ransomware attacks that have brought even multinational conglomerates on their knees, hacking is widely perceived as an illegal activity – even though it can serve different purposes. According to recent research published on Statista, only 16% of respondents believed that hacktivism – that is, hacking in order to promote a political or social cause – should be punished by the most severe penalty. By contrast, 30% stated that hacking for personal profit should be punished the harshest and a whopping 44% believed that espionage is the least forgivable type of hacking. As hackers have evolved in their methods and ability to inflict damage, so have IT professionals come up with more and more sophisticated protections. These include a wide array of solutions, from simple anti-virus software to data masking, which helps manage critical data relationships within and across databases.

    Infographic: Espionage Is the Least Forgivable Form of Hacking | Statista
    You will find more infographics at Statista

    Even though we have buffed up our defenses, hacking wasn’t always such a solemn matter. In fact, a brief history of hacking reveals some interesting information about its origins. The first hack took place in 1878, when a handful of teenagers that were hired to work at the switchboard of Bell Telephone did their best to disconnect or falsely connect incoming calls. When it comes to computing, the first recorded hacking incident happened during the 1960s, as more people – usually researchers and programmers – began to have access to that era’s computers. These were mainly bulky mainframes that were kept under lock and key only for those who were granted authorized albeit limited access. Some programmers grew restless and tried to come up with programming shortcuts to make the most of their time with the computer. These shortcuts were called “hacks” and were often considered better than the original.

    From Phreaking to Ethical Hacking

    In 1969, two Bell Lab employees, Dennis Ritchie and Ken Thompson, came up with such a “hack”, which consisted of an open set of rules in order to run devices quicker. The hack’s name was UNIX and it soon became one of the most popular operating systems around the globe. In the 1970s, a Vietnam veteran by the name of John Draper took hacking to another level when he came up with a way to make free phone calls. The practice was called phreaking and was soon endorsed by a large number of people – including future Apple founders, Steve Jobs and Steve Wozniak. With the advent of the personal computer and an early version of today’s internet in the 1980s, a new generation of tech-savvy users meant more opportunities for exploring hacking. It was around that time that the first movie about hacking came out: War Games, which was released in 1983 and holds a 93% score on Rotten Tomatoes, tells the story of a young hacker who inadvertently accesses the US military computer system that was designed to deal with nuclear war.

    As computer use became more and more widespread in the 1990s and the 2000s, hacking also increased – and hackers grew interested in the potential for profit. Yet not all hacking nowadays is carried out in favor of the dark side. Many people that were once malicious hackers have crossed over to join the forces of good and become “ethical” hackers. Ethical hacking is a process authorized by the intended victim and serves as a test in order to determine possible weaknesses that should be taken care of. In essence, ethical hackers work to improve the defenses of the system they are attacking. Although they may be allowed to use the tools that any proper hacker would use, they mean no actual harm, but instead, contribute greatly to improved cybersecurity across businesses. Their work is extremely important since the impact that a potential data breach could have on a company could well prove devastating.

    Hacking has always been closely connected with excellent IT and programming skills, as well as a clear vision of what the hacker wants to achieve. And fittingly to its humble and playful origins, ethical hacking has once again put a new spin on the practice.

    Question for students (and subscribers): Have you ever been the victim of hacking?  Please let us know in the comments section below this article.

    If you liked this article and would like to receive notification of new articles, please feel welcome to subscribe to History and Headlines by liking us on Facebook and becoming one of our patrons!

    Your readership is much appreciated!

    Historical Evidence

    For more information, please see…

    Menn, Joseph.  Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World.  PublicAffairs, 2019.

    The featured image in this article, a photograph by User:Colin of a backlit laptop computer keyboard, is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.

    Share. Email Facebook LinkedIn Pinterest Reddit Telegram Twitter Tumblr
    Previous ArticleApril 7, 1868: Former Irish Freedom Fighter Assassinated by Irish Fenians
    Next Article April 16, 2019: Your Chance to Preview The Curse of La Llorona
    Anonymous Author

    "Anonymous Author" is used for articles in which the author requested anonymity or if an article was submitted to this site on behalf of an author without revealing that author's information.

    Related Posts

    History Short: Napoleon Bonaparte Learns a Hard Lesson!

    March 7, 2023

    History Short: Whatever Happened to “Good King Wenceslas?”

    March 4, 2023

    Headline: US DOE Says COVID-19 Came from Wuhan Lab After All!

    February 26, 2023
    Follow Us!
    • Facebook
    • Twitter
    • YouTube
    • Patreon
    Sign Up For Our Newsletter!
    Most Recent

    This Day in History on March 23rd

    March 23, 2023

    R.I.P. Lance Reddick (1962-2023)

    March 23, 2023

    This Day in History on March 22nd

    March 22, 2023

    This Day in History on March 21st

    March 21, 2023

    Animated Map of the 2022 Russian Invasion of Ukraine (through March 20th, 2023)

    March 20, 2023
    This Day in History Video

    Advertisements




    Amazon Affiliate Disclosure Statement

    As an Amazon Associate, I earn from qualifying purchases via links in the “Historical Evidence” sections of articles.

    About HistoryAndHeadlines.com

    Thanks for visiting History and Headlines!  This site exists primarily for educational purposes and is intended as a resource for Dr. Zar’s students.  Articles are mostly written by either Dr. Zar or his dad (Major Dan).  To any guest readers, please keep that in mind when commenting on articles.   Thank you!

    We try to present our students with historical topics that are both diverse and a bit out of the ordinary.  Our motto is “We try until we succeed!”

    Contact us at admin@historyandheadlines.com

    Guidelines and Policies for Images used on This Site, as well as for Guest and Sponsored Articles, and Other Terms of Use

    Privacy Statement

    © 2023 History and Headlines

    All-Time Most Commented

    July 28, 1866: 18 Year Old Girl Wins Commission to Sculpt Statue of Lincoln (A Truly Great American Woman)

    July 28, 2014

    December 24, 1865: Birth of the Ku Klux Klan

    December 24, 2015

    December 25, 1868: President Johnson Pardons all Confederate Veterans

    December 25, 2015

    February 5, 1909: First Plastic Invented was called Bakelite!

    February 5, 2014

    November 23, 1876: “Boss” Tweed Turned Over to Authorities

    November 23, 2013
    Recommended Book
    © 2023 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    We are using cookies to give you the best experience on our website.

    You can find out more about which cookies we are using or switch them off in settings.

    History and Headlines
    Powered by  GDPR Cookie Compliance
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

    Strictly Necessary Cookies

    Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

    If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.