what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Brief History Of Hacking In The 1960s

Brief History Of Hacking In The 1960s
Posted Aug 17, 1999

Brief History Of Hacking In The 1960s

tags | paper
SHA-256 | 4c65baf118a354ce761154249b8458d9e8ac21f0e9df6f86ab4f1c5c2c336ead

Brief History Of Hacking In The 1960s

Change Mirror Download
<HTML>
<HEAD><TITLE>HISTORICAL HACKER TIMELINE</TITLE>
</HEAD>
<BODY>
<H1>Prehistory (before 1969)</H1>
<FONT SIZE=+1><B><P>
In the beginning there was the phone company -- the brand-new Bell Telephone, to be precise. And there were nascent hackers. Of course in 1878 they weren't called hackers yet. Just practical jokers, teenage boys hired to run the switchboards who had an
unfortunate predilection for disconnecting and misdirecting calls ("You're not my Cousin Mabel?! Operator! Who's that snickering on the line? Hello?"). Now you know why the first transcontinental communications network hired female operators.
<P>
Flash forward to the first authentic computer hackers, circa the 1960s. Like the earlier generation of phone pranksters, MIT geeks had an insatiable curiosity about how things worked. In those days computers were mainframes, locked away in temperature-c
ontrolled, glassed-in lairs. It cost megabucks to run those slow-moving hunks of metal; programmers had limited access to the dinosaurs. So the smarter ones created what they called "hacks" -programming shortcuts -- to complete computing tasks more quic
kly. Sometimes their shortcuts were more elegant than the original program.
<P>
Maybe the best hack of all time was created in 1969, when two employees at Bell Labs'think tank came up with an open set of rules to run machines on the computer frontier. Dennis Ritchie and Ken Thompson called their new standard operating system UNIX.
It was a thing of beauty.</B></FONT>
<P>
</BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close