Тёмный

Hacking: An Early History 

The History Guy: History Deserves to Be Remembered
Подписаться 1,3 млн
Просмотров 95 тыс.
50% 1

In 2020 Cybercrime magazine wrote that “If it were measured as a country, then cybercrime - which is predicted to inflict damages totaling $6 trillion USD globally in 2021 - would be the world’s third-largest economy after the U.S. and China.” Insider magazine noted in 2017 that Billionaire Warren Buffet “sees cyber attacks as a bigger threat to humanity than nuclear weapons.” Yet cybercrime came from humble origins.
Support The History Guy on Patreon: / thehistoryguy
This is original content based on research by The History Guy. Images in the Public Domain are carefully selected and provide illustration. As very few images of the actual event are available in the Public Domain, images of similar objects and events are used for illustration.
You can purchase the bow tie worn in this episode at The Tie Bar:
www.thetiebar.com/?...
All events are portrayed in historical context and for educational purposes. No images or content are primarily intended to shock and disgust. Those who do not learn from history are doomed to repeat it. Non censuram.
Facebook: / thehistoryguyyt
Please send suggestions for future episodes: Suggestions@TheHistoryGuy.net
The History Guy: History Deserves to Be Remembered is the place to find short snippets of forgotten history from five to fifteen minutes long. If you like history too, this is the channel for you.
Subscribe for more forgotten history: / @thehistoryguychannel .
Awesome The History Guy merchandise is available at:
thehistoryguy-shop.fourthwall...
Script by THG
#history #thehistoryguy #computers

Опубликовано:

 

30 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 489   
@TheHistoryGuyChannel
@TheHistoryGuyChannel Год назад
Thanks so much to iolo for sponsoring today’s video! Visit iolo.com/thehistoryguy and use code THEHISTORYGUY to save 60% on System Mechanic Ultimate Defense and get 30 days of Live Tech Support free!
@ronniewall492
@ronniewall492 Год назад
DO SHOW ON ORGIN OF 420.
@Dumb_Killjoy
@Dumb_Killjoy Год назад
No offense mate, but from what I can tell, Iolo is bloatware. There are many other better antivirus tools, even for free. Along with that, registry cleaners and other things like that are unnecessary, and can even damage performance and if severe enough, can trash your entire operating system install. I'd be careful with them.
@wargodsix
@wargodsix Год назад
You got hackers posing as you using your pics
@17.koutilya87
@17.koutilya87 11 месяцев назад
Yes origin of shit comes from London cause they live London
@wackowacko8931
@wackowacko8931 Год назад
There was a lot of overlap between the telephone phreakers and the first hackers in the late 70s and early 80s, with people who were doing both hacking and phreaking (telephone network hacking). I was surprised I didn't see a mention of it here. Maybe a full topic for another time.
@lydiarose5212
@lydiarose5212 Год назад
This reminds me of the movie "Hackers." The characters were involved in both phreaking and computer hacking. Yes, I realize the movie is unrealistic, but if you suspend disbelief it's a fun movie. One of my favorites. 😀
@Istandby666
@Istandby666 Год назад
@@lydiarose5212 I think it's Angelie Jolie's first movie. I watched that cast go on to other good movie's as well.
@CraftAero
@CraftAero Год назад
Such a huge story on it's own, and such a gaping hole in this (hi)story. Definitions change over time but I wouldn't consider spreading viruses as "hacking". Back in the day, "hacking" often required a soldering iron.
@poindextertunes
@poindextertunes Год назад
@@Istandby666 not at all. Cyborg 2 my dude
@RunDub
@RunDub Год назад
I, too, expected to hear about phone phreakers in this.
@RedJax69
@RedJax69 Год назад
Fear of hacker existed long before 1988. The film Wargames (1983) was used as an argument for the anti-hacking law used against Morris.
@navret1707
@navret1707 Год назад
Shall we play a game?
@x808drifter
@x808drifter Год назад
Was about to say this.
@korbell1089
@korbell1089 Год назад
@@navret1707 “The only winning move is not to play.”
@Peter_S_
@Peter_S_ Год назад
How about a nice game of chess?
@Istandby666
@Istandby666 Год назад
How about a game of Global Thermo Nuclear War.....😁
@glendady8879
@glendady8879 Год назад
Read "The Cuckoo's Egg" by Cliff Stoll. It is Computer History that deserves to be remembered.
@TypoKnig
@TypoKnig Год назад
I was going to recommend that as well! Like this video it’s a great guide to computer security for the general public, that explains things simply and accurately.
@jessepollard7132
@jessepollard7132 Год назад
Another book recommendation - "Shockwave Rider" by James Brunner (1975). The book that defined the use of "worm" for this. en.wikipedia.org/wiki/The_Shockwave_Rider
@lancerevell5979
@lancerevell5979 Год назад
Steven Levy's book, "Hackers", is a superb history on computer hacking. It started with the MIT Model Railroad Club. Back then in the 1960s, hacking was a good thing. The model railroaders would constantly work on the RR layout, "hacking" things apart and rebuilding it. Those RR layouts used a system of switches, relays, etc. that inspired similar systems in early computers.
@nerdnalist
@nerdnalist Год назад
That’s the way I’ve always heard explained as well.
@sn1000k
@sn1000k Год назад
Great book.
@c1ph3rpunk
@c1ph3rpunk Год назад
+1 for him to read this, maybe he’ll get a clue about the topic.
@johnstevenson9956
@johnstevenson9956 Год назад
I remember an Email that came out, telling you how to look in a specific place in the Windows registry and if you found this odd looking line, you were infected an had to remove it immediately. Of course, the line was a critical part of the Windows registry and removing it wrecked Windows. The Email effectively told you how to wreck your own computer, and a lot of people fell for it.
@jeffwalther
@jeffwalther Год назад
The PBS NOVA special "The KGB, the Computer, and Me" with Cliff Stoll from 1988 is on RU-vid. A great story of international hacking.
@Peter_S_
@Peter_S_ Год назад
Cliff came to my office a couple times in 1993 for meetings and he was so excited at one point that he stepped up onto the CEO's desk and walked back and forth a couple steps as he was speaking. Everybody in a suit just looked at him and gave a weird contented look as if to say, "We don't care. Let him do whatever he wants."
@louiskeser9255
@louiskeser9255 Год назад
If you haven't had a chance to read the book ( The Cuckoo's Egg), you really should. My dad gave me a copy when I first started getting into computers in the early 90's. Was an amazing tale of not only the hunt, but of the interesting life in and around Berkeley at the time.
@RetiredSailor60
@RetiredSailor60 Год назад
Good morning from Ft Worth TX to everyone watching. Have a safe holiday weekend. I remember when a computer required DOS commands, Dot Matrix printer, and calling to a main frame.
@vet-7174
@vet-7174 Год назад
You as well be safe!
@Peter_S_
@Peter_S_ Год назад
Good morning from Boulder, Colorado. I remember when you called into the mainframe at 300 baud from a dumb terminal because there were no floppy disks or home computers yet. Long live the LSI ADM-3A.
@RetiredSailor60
@RetiredSailor60 Год назад
@@Peter_S_ I used to live in Brighton CO.
@Peter_S_
@Peter_S_ Год назад
@@RetiredSailor60 Cheers from the land of (temporary) ice and snow. I was in Thornton yesterday.
@51WCDodge
@51WCDodge Год назад
And! Don't forget the joy of twenty minutes of squealing cassette tape ! Just as you got your hopes up. The tape slipped and , you started all over again, and again and again.
@robertnelson3179
@robertnelson3179 Год назад
I remember years ago late 70’s early 80’s there was a Scientific American article that talked about computer logic bombs and thought how far this could be taken. Thank you for the deep dive here.
@jackiemowery5243
@jackiemowery5243 Год назад
In fact, I remember SA discussing worm contests where the winner was the worm with the most copies of itself in memory after a given number of clock cycles. The article discussed techniques for writing better worms.
@robertnelson3179
@robertnelson3179 Год назад
@@jackiemowery5243 I do believe I remember that now. It was just a few years ago so bit of a reach back in the cobwebs....🤣
@cjc363636
@cjc363636 Год назад
I remember hearing about the Morris Worm in the Cliff Stoll book, The Cuckoo's Egg. I think Stoll's book was also the first time I learned the word "internet." Thanks for reminding me of all this, History Guy!
@kevindown1592
@kevindown1592 Год назад
I’m happy to see you brought up this book. It is not only a great read but a fascinating look at how law enforcement knows so little about the internet crime curve.
@SkyWriter25
@SkyWriter25 Год назад
@@kevindown1592 I always liked the "if you didn't right it down, it didn't happen".
@wcheswick
@wcheswick Год назад
@@kevindown1592 Very much not true any more.
@MisterPersuasion
@MisterPersuasion Год назад
I'm really surprised you didn't mention Phone Phreaking in your computer hacking history, as Phone Phreakers were really the first true Hackers of electronic media. A really great book on the topic is "Exploding The Phone" by Phil Lapsley. Maybe you could do another video on the history of Phone Phreaking after reading Mr. Lapsley's book?
@nedludd7622
@nedludd7622 Год назад
I am old. I first learned FORTRAN in the 60's and used punch-cards. When BASIC came around, it made things easier.
@kennethobrien6537
@kennethobrien6537 Год назад
I remember the 88 Princeton hack well. My grandfather worked for them and ran their press and for an old guy was well ahead of his time. Our first "home computer " he built in our garage was half the size of it used drives that were the size of full sized 12 inch lp and each one weighed about 10 lbs. I still have my old Tandy TSR 80 that I learned DOS on and live just writing useless things like having programs run power commands to switches in my house. Back then code was fun. Now it's so deep I won't even bother. Not like I get paid like a hack for any of it. This was a fun episode. Thanks for the memories.
@korbell1089
@korbell1089 Год назад
Mine was a Tandy 1000 and I would laugh at all my friends with my 16 color integrated graphics while they had 4 color RGBs.😂 I still regale my grandkids with the days of dip switches and typing every line of code. Windows 95 made everyone lazy!😋
@lapurta22
@lapurta22 Год назад
You knew you had a bad ass Tandy system when your doubled your RAM by soldering a second IC piggyback on the motherboard RAM chip.
@ghowell13
@ghowell13 Год назад
​​@@lapurta22 now we're in here talking about the grand old days, lol. Real hardware hacking, and DOS programs a mile long on a TRASH-80 to turn a light off. Or the first time I sat down in front of the Tandy 1000 my mother brought home. Thank God she was an early adopter of tech. She wasn't as happy when she saw what it looked like on the inside, but she did enjoy the extra RAM set... There were other adventures, too, but that's enough for here. Suffice it to say, the old modem I scrounged from high school because no one knew what to do with it was nice to have around... I'm almost sad those days are gone. But in retrospect, seeing how far everything's come, and how far it could still go is certainly entertaining. It's like daydreaming in elementary school, without being scolded, and scared out of the futuristic thoughts of what's to come, and the what has been of the past. Thanks to everyone in this thread for the memory jog. Its still amazing to me, when I stop and really think about it. I'm currently tapping this out on a mobile phone, from North Carolina, sat at my daughter's swim meet. Dick Tracy's phone watch doesnt have anything on us now!
@jameshisself9324
@jameshisself9324 Год назад
Plot twist: Iolo pirates have hacked The History Guy. Social Engineering that deserves to be remembered.
@petepal55
@petepal55 Год назад
In the late 80s, I was working on hospital communications systems at military hospitals, changing their analog communication systems to digital ones. The worm was a hot topic for a while and I was asked if I could fix things so that their systems wouldn't be vulnerable. I remember laughing and telling them not to worry, all their systems were standalone so weren't going to even be exposed. But that got me thinking, I'd learned the assembly languages for the Intel 8086 and Motorola 6800 CPU families in tech school, so I thought I'd see what I could make happen. I hacked some of the first computer games just for fun, instead of a broadsword, I'd have an M60 LMG, for instance. I soon realized this tended to destroy the game's appeal to me so I stopped doing it, then the internet came about... and I plead the 5th for what happened next.
@untamedzer0
@untamedzer0 Год назад
I'm really surprised he got all the way through this without ever mentioning Kevin Mitnick.
@20chocsaday
@20chocsaday Год назад
You will know that Robert TAP IN Morris was spoken a lot at his trial.
@MR-nl8xr
@MR-nl8xr Год назад
Who
@MakerInMotion
@MakerInMotion Год назад
The feds were scared that Mitnick could launch nuclear missiles by whistling into a telephone.
@mar4kl
@mar4kl Год назад
Kevin Mitnick was more a case of hubris than of hacking/cracking, IMO. There was no shortage of clever hackers during Mitnick's heyday. Mitnick's problem was that he thought he was smarter than everyone else, so used the same exploits repeatedly and never made more than cursory attempts to cover his tracks, even after he got caught again and again and again. And, naturally, each time authorities caught him, they exposed what he had done. This made him appear to be a brilliant hacker - although I don't know how many of his exploits he actually found or devised himself - but also a criminal with no horse sense.
@donmclean1220
@donmclean1220 Год назад
Captain Crunch showed Steve Wozniak how to build a “blue box” to make long distance phone calls for free. A pioneer hacker.
@zaraak323i
@zaraak323i Год назад
Robert Morris' father was chief scientist at the NSA's cybercrime laboratory.
@trevinbeattie4888
@trevinbeattie4888 Год назад
There seems to be a big etymological disconnect between a “hack” in the sense of someone who produces high-volume, low-quality work and a “hacker” in the sense of someone who enjoys technical challenges and skillfully solves them.
@filanfyretracker
@filanfyretracker Год назад
and in the computer accessing world there is a preference to split between those exploring and those doing harm. usually a preference is those exploring(not taking or damaging data) are hackers and those doing the accessing for malicious intent as crackers. Or maybe that was just a long time ago.
@ChrisHilgenberg
@ChrisHilgenberg Год назад
A lot of the early applications to 'hacking' can be traced to MIT in the mid to late 50s, later spreading to Caltech in the 60s. Most 'hacks' were basically either pranks or the purist pursuit to do cool things on the machines available then, the PDP-1, 7, and 9 respectively. That, and the principle that information should be free and programs were regularly shared and improved. This later aspect would be the early seeds of the Free and Open Source Software movement, which revolutionized how we live and work as much of what runs technology now is under FOSS and/or GNU licensing
@JesusisJesus
@JesusisJesus Год назад
I would disagree, because during WW2, the German Enigma had to be “Hacked” in order to de-code messages.
@BobSmith-dk8nw
@BobSmith-dk8nw Год назад
@@JesusisJesus But was the term "Hacked" used THEN - or is it being used NOW to describe what was done then? .
@JesusisJesus
@JesusisJesus Год назад
@@BobSmith-dk8nw Yes
@ddrhero
@ddrhero Год назад
I'm a bit surprised that you didn't go more into phreaking but the subjects covered were still significant and interesting.
@Squirrelmind66
@Squirrelmind66 Год назад
I still remember a quote from a business leader I read in an article in 1992: “why do people make computer viruses? I don’t know- why do people throw bricks through windows?
@Khorsathedark
@Khorsathedark Год назад
Im surprised that phone phreaking (hacking) wasn't mentioned. That computerized network predates the web.
@lapurta22
@lapurta22 Год назад
While in it's latter days some phreakers used modems and computers to generate tones, the original phreaks made custom circuits and circuit boards to generate the tones used to bypass the phone system's long distance security.
@sauceboss2367
@sauceboss2367 Год назад
Thank you again History Guy!
@wcheswick
@wcheswick Год назад
Wow, a THG episode on my area of expertise. He did a great job of covering it. One nit, though: at MIT, the term “hacker” is better defined as “tinker” than bad guy. You don’t have to break into someone’s computer to come up with a good hack. There’s an annual invitation-only conference called Hackers that is attended by a couple hundred movers and shakers, people coming up with amazing new ideas. Occasionally, RU-vidr Scott Manley can be seen wearing a tee shirt from this conference.
@wich1
@wich1 Год назад
This. It always irks me when hacking is defined solely as maliciously breaking into computers and their networks.
@goofyfish
@goofyfish Год назад
1976, Indiana University. Some of us would often break into the computer lab during the night and try to get into other systems in the country solely for the personal props. It never even occurred to us to try something malicious.
@Bear-cm1vl
@Bear-cm1vl Год назад
In the 70's and 80's, when I first experimented in electronics, the hackers and phone phreakers often referred to ourselves as "white hat", "black hat and "grey hats", mixing our cowboy hats (seeing ourselves on a new frontier) mixed with the colors of wizard predisposition from role playing games like Dungeons and Dragons. A "white hat" used their skills to benefit rather than harm, a "black hat" didn't care about the harm they caused and the "grey hat" had mixed ethics about the effects they caused.
@wcheswick
@wcheswick Год назад
@@Bear-cm1vl All true. But I believe the MIT version of the word predated the 70s. Certainly, the Hackers conference goes back to the mid-70s. Of course, there were phone hackers busy at the time.
@edwardallan197
@edwardallan197 Год назад
A great topic focus.. thank you History Guy.
@BasicDrumming
@BasicDrumming Год назад
I appreciate you, thank you for making content.
@seanvinsick5271
@seanvinsick5271 Год назад
A hacker was a talented dev who could quickly hack together code on the fly
@20chocsaday
@20chocsaday Год назад
There might still be competitions to see who can write the code that performs the job with the least code.
@seanvinsick5271
@seanvinsick5271 Год назад
@@20chocsaday yes, all the time.
@Javaman92
@Javaman92 Год назад
I got my first computer in 1981, a TRS-80 Model 1. It had a cassette tape for storage. 🤣
@g.p.b.
@g.p.b. Год назад
My first computer was a commodore vic-20 with tape drive memory
@Peter_S_
@Peter_S_ Год назад
My first machine was an Apple ][ in 1978 and disk drives for them didn't exist yet. Tape was all we had.
@andyevans2336
@andyevans2336 Год назад
As a Radio Shack employee, I sold the first TRS-80 computer West of the Mississippi. To my boss.
@lancerevell5979
@lancerevell5979 Год назад
I started in 1984 with an Atari 800XL. I paid around $350 for the 64k computer, a disk drive and small printer. My Navy shipmate who inspired me had paid over $1,000 for a similar system the year before, but only 48k. The gear got better and prices dropped quickly. Got my Commodore C64 a couple years later.
@FourthRoot
@FourthRoot Год назад
The greatest early hack ever was Apollo 14 hacking their flight computer to ignore their abort switch.
@20chocsaday
@20chocsaday Год назад
How was that done? More than sticky tape over a sensor I expect.?
@FourthRoot
@FourthRoot Год назад
@@20chocsaday No, they litterally hacked it. They reprogrammed it. Scott Manley has a video about it.
@michaelmanning5379
@michaelmanning5379 Год назад
THIS is why we can't have nice things.
@scottmaher6938
@scottmaher6938 Год назад
Great work, many thanks.
@MotoGiant
@MotoGiant Год назад
genius ad placement - good job !! Nice topic too !!
@richb313
@richb313 Год назад
Thanks for this.
@finieous198
@finieous198 Год назад
I was a hacker in high school in the mid 80's. There was an extra programming class that met at JPL (Jet Propulsion Laboratory) on Saturdays. 1/3 of the class were hackers and we all shared information on what we were learning, what we could do, and where we could go. 2 months after I graduated, I was hired by JPL and worked there for 10 years as a programmer.
@deetrvl4life875
@deetrvl4life875 Год назад
Loved this one!
@erikrick
@erikrick Год назад
This was a great one. It's a slice of history that I just don't get exposed to much
@Peter_S_
@Peter_S_ Год назад
Anybody interested in this history MUST watch Douglas Engelbart's infamous 'Mother of All Demos' from 1969 which introduced the world to the paradigm of the modern computer. Doug's lab at SRI was 1/2 of the first link in ARPANet. The first message on ARPANet was 'LO' because the predictive code at the receiving end that would have completed the 'GIN' portion automatically had a bug and crashed. It took about 15 minutes to correct and recompile the code and then it worked. Fun fact: one of the 10 original nodes of ARPANet was located in a pizza restaurant in Silicon valley near SRI which was frequented by the SRI researchers.
@Marin3r101
@Marin3r101 Год назад
No.
@jaex9617
@jaex9617 Год назад
Infamous? No.
@alancranford3398
@alancranford3398 Год назад
I enjoyed this presentation. The year 1964 was when I first got to play with a computer--a networked computer. It was new equipment for a remote air defense radar station and the off-line training counsel needed an eight-year old's attention to see if it was airman-proof. Then in 1973 my high school's science lab I was on-line with another school for a lesson. In those days there were no CRT for the computer--it was a teletype for the linked computers and a printer for stand-alone computers. CRTs made things more efficient. So I'm bragging that I lived with the later developments and the need to constantly update anti-virus software.
@Peter_S_
@Peter_S_ Год назад
Remember when terminals were called "glass teletypes"? Long live the ADM-3A.
@alancranford3398
@alancranford3398 Год назад
@@Peter_S_ Hadn't heard of glass teletypes before and I worked in commo centers with teletypes. Does make sense. Thanks.
@jamesbond_007
@jamesbond_007 Год назад
@@Peter_S_ Yep, I sure do. Wasn't very long that that term was in use tho.
@Rhaspun
@Rhaspun Год назад
@@Peter_S_ I remember the large hard drives they had for storage at the local community college. By large I mean a physically large contraption about the size of a water heater. Each unit had 120megabytes of space. They had four of them. It was nice to see the newer equipment showing up. Before we had to use computer cards for batch programming.
@johnbenson4672
@johnbenson4672 Год назад
Early hacking was about exploring. Trying things out just to see what would work. Wargames remains the best movie about hacking. Looking up information about a system. Reading, testing out weaknesses and exploring are the heart of hacking. Banging keys really fast are not and unplugging a monitor is not going to stop a virus. Oh, and viruses written on bones will not make your computer explode!
@snapdragon6601
@snapdragon6601 Год назад
Phreaking ☎️ 🙂
@NozomuYume
@NozomuYume Год назад
The media gets it so bad, that Wargames was still the most realistic depiction of network security for decades. That finally changed with the release of Mr. Robot -- which gained great fandom among the network security community for its realistic depictions of what systems intrusion actually entails. It's all sped up for drama -- looking at a terminal for hours would be boring -- but the tools and techniques are very real. The irony is that AI technology is only, in current year, able to replicate the core conceit of Wargames -- an independent AI that can be reasoned with.
@evensgrey
@evensgrey Год назад
@@NozomuYume There's a very realistic hacking scene in, of all places, The Matrix Reloaded. There's a scene where Trinity, inside The Matrix, uses a real attack program to exploit a real system vulnerability. The only thing that's fake is the invalid IPv4 address she targets.
@filanfyretracker
@filanfyretracker Год назад
@@snapdragon6601 He had to be a phreaker too, When his GF in the movie wargames makes a comment about the phone calls being expensive he drops a quick line about there being ways around that. Looking back knowing what I know of history now, he clearly knew how to mess with the phones, aka a phreaker. Ive heard rumors War Games is where the term wardriving came from for looking for open WiFi, A modern version of his randomly dialing around looking for open modems setup to answer.
@filanfyretracker
@filanfyretracker Год назад
@@evensgrey That is very likely deliberate. Movies are known to use deliberately invalid IPv4 or use local addresses (ie 192.168.x.x) for the same reason that telephones in films are 555-xxxx.
@dezznutz3743
@dezznutz3743 Год назад
Unfortunately Hack Writers havent gone anywhere. They are all over corporate news sites.
@WinterInTheForest
@WinterInTheForest Год назад
Believe me, everything they write is fully calculated and executed with precision to influence public opinion. They are propagandists- there is nothing hack about it.
@robertthompson3447
@robertthompson3447 Год назад
Amen. 😔
@mattigator600
@mattigator600 Год назад
I think they use an app now
@LindseyLouWho
@LindseyLouWho Год назад
Heck, there are hack writer AIs now. How far we've come... :(
@shawnj921
@shawnj921 Год назад
Robot Journalism sucks
@punditgi
@punditgi Год назад
Another fascinating history lesson!
@jaex9617
@jaex9617 Год назад
Love THG's topics and presentations. Big fist bump for seamless inclusion of references in the body of the script. 🏆
@bloodwrage
@bloodwrage Год назад
I do like your ad tie-ins. It's nice that they're relevant.
@bryankirk3567
@bryankirk3567 Год назад
Thank you again Sir.
@shawnr771
@shawnr771 Год назад
Thank you for the lesson.
@keithtorgersen9664
@keithtorgersen9664 Год назад
Dear History Guy, I have binging your series over the past few days, and it’s hard to get enough of it. I am sure you have dozens of requests for topics, but I’d be much obliged if you considered discussing any of these subjects: A history of fruit: the “other” king of fruits- durian; A history of fruit: peaches One of the noted non-European explorers of the world, Chinese mariner Zheng He. The case of Mark James Robert Essex and the retired marine who literally stole a helicopter to take him down.
@stew6662
@stew6662 Год назад
I read somewhere yesterday that for the first time, streaming has taken over traditional TV in usage. The younger generation prefers to watch RU-vid than regular television
@TheBoatPirate
@TheBoatPirate Год назад
so glad to see THG do a video on this.
@prestongivens3594
@prestongivens3594 Год назад
Good video! you presented the Morris Worm story as well as I have ever seen it done. I've been in the computer biz since 1974, now retired but still tinkering away at them. Another classic story is "A Cuckoo's Egg". Keep up the fine work, but don't forget to RTFM!
@jrobiii1
@jrobiii1 Год назад
@"The History Guy: History Deserves to Be Remembered", This is an incredible story and will surprise you if you haven't heard it already. "A Cuckoo's Egg" is a good read also
@cvkline
@cvkline Год назад
I was a computer network researcher at the University of Illinois in 1988, and the Morris Worm is still a strong memory of mine. I’d never been called by the press before, which was a wild experience. It did get me a short quote on the front page of the Chicago Tribune (above the fold!). It boggles the mind how those first early, possibly even innocent experiments have grown into a multi-trillion dollar crime empire.
@chrisnemec5644
@chrisnemec5644 Год назад
Well, it is nice, but seems a bit incomplete; you only go up to a certain point. Perhaps a sequel outlining some of the more prominent viruses that plagued us all in the 2000's and 2010s would be in order for a part II. Things like the Melissa virus and the like.
@Mabon-sz9nz
@Mabon-sz9nz Год назад
Excellent video!
@robertw.anderson6102
@robertw.anderson6102 Год назад
In a word; facinating!
@gerardtrigo380
@gerardtrigo380 Год назад
Many hackers in the early 80's started out as Phone Phreaks. People who developed equipment and skills that allowed them to make free phone calls. If memory serves, you are describing the first internet worm, but worm type viruses existed from the early 80's. First worms were a type of virus program that before activating the primary program, usually on a certain date, they copied themselves first to all writable media attached to the computer and later to all bulletin boards and other compatible computer systems connected to by modem. Remember, before the internet, there were networks in existence besides Arpanet and its successors. I got my first 100 Baud modem for $500 in 81 or 82. AOL was originally Applelink, before they parted ways in 83.
@Peter_S_
@Peter_S_ Год назад
Very few knew and ever fewer remembered that Applelink Personal Edition got an infusion from G.E. Investment Capital to create AOL. Those were the days.... I met the infamous Cap'n Crunch at a party and hung out a bit at his place before I started to wonder if he had a thing for young boys, which is turns out he did.
@20chocsaday
@20chocsaday Год назад
You probably know the story about a woman in a locked room who got a General's private data simply by demanding it. "The General needs it now!". It is always a human who doesn't follow rules that lets something slip past.
@filanfyretracker
@filanfyretracker Год назад
@@20chocsaday social engineering, Your firewall may be strong but your meat wall is weak. Even physical layer access is possible with good social engineering, I mean we have even had training videos about it where I work and that is a supermarket. As naturally there are likely people who have bad intents who would want access to our communications room which has the phone lines, VOIP boxes, and of course the switches and routers that drive the store network including the POS terminals. Now yes CCs and Debit are encrypted at the pin pad so odds are a MITM upstairs is useless but with computer security if you give the bad guys a bit they will take a whole byte.
@MR-nl8xr
@MR-nl8xr Год назад
" a generation lost in space "
@williamdonnelly224
@williamdonnelly224 Год назад
Thanks!
@larryjohnson1966
@larryjohnson1966 Год назад
That was a great story. Thank You.
@douglasiram7937
@douglasiram7937 Год назад
Thanks for reminding me to be careful!
@TheHistoryGuyChannel
@TheHistoryGuyChannel Год назад
Thank you!
@JAF30
@JAF30 Год назад
Hacking the word has transformed its own meaning in recent years. Now hacking does not just mean trying to find weaknesses in computer systems. But also in trying to figure out anything and then trying to find ways to change that thing into something more useful to you. Modifying your car to gain more horsepower, is a form of hacking. Repairing something you bought that ends up broken after the warranty, is hacking. Heck repairing something that would just cost too much to take somewhere and have it done, is hacking.
@evensgrey
@evensgrey Год назад
That's not even all that new a usage. That usage of the term 'hacking' goes back over 50 years, and directly connects to the 'phone phreaking' subculture of the 1970's. There's a certain sort of person who, before and above anything else, wants to get into the guts of the system and understand how it works and how to control it, and then uses that knowledge to make things do things they weren't intended to. A classic trick was how you could make a certain model of early hard disk unit literally walk across the floor by using the right combination of seeks. If you were clever and the machine was originally installed in the right place in the machine room, there were instances of people actually blocking the door to the room shut. In at least once instance, they ended up cutting through the concrete block wall to get into the machine room because nobody could make the damn thing move away from the door again. (As to why the walls were built so sturdily, these were typically 14 in steel platters spinning at 10 000 RPM. If a head crashed and nobody was there to manually shut down the drive, it might develop a wobble. At 10 0000 RPM and 14 inches in diameter. There was at least one instance of such a platter embedding itself half it's diameter into a concrete block wall. While machine rooms were built secure to keep the contents from being stolen, they were mainly built that way to make sure the contents stayed inside if there was a mechanical failure.)
@wich1
@wich1 Год назад
That is pretty much the original use. Hacker/hacking used to, and sometimes still refers to, people who explore systems, finding undocumented behavior, coming up with novel approaches to accomplish something, etc. Part of that was finding ways around security measures, not really out of malicious intent, but simply as a challenge and to get to know how things work. It is the media in the 80s and 90s that caused the general public to take hacker/hacking to mean malicious attacks on computer systems and networks.
@kellybogues
@kellybogues Год назад
#1980s: To mind comes the #MaxHeadroom #Television Broadcast Signal Intrusion / Hack / Hijacking incident from November of 1987.
@GraemePayne1967Marine
@GraemePayne1967Marine Год назад
Thanks! A part of computer networking history I had forgotten about!
@mr.outalonet23
@mr.outalonet23 Год назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-8ZIzaQwglv0.html
@TheHistoryGuyChannel
@TheHistoryGuyChannel Год назад
Thank you!
@johnkling3537
@johnkling3537 Год назад
Interesting history of hacking. Thought the story of “The Cuckoo’s Egg” may be included but after listening I realized the honeypot setup used by Clifford Stoll is regarded as cyber detection and your story is hacking.
@ggalloway1
@ggalloway1 Год назад
Yes, but he was was starting early computer/network security against the first serious Soviet hackers.
@pamr.429
@pamr.429 Год назад
Great book! Stolll stumbled into detecting the farming scheme, but did a bang up job of setting up the honey pot.
@finieous198
@finieous198 Год назад
This was a fascinating read and I recommend it.
@vet-7174
@vet-7174 Год назад
Good Morning!
@flashwashington2735
@flashwashington2735 Год назад
Thank you.
@pamr.429
@pamr.429 Год назад
Another cool fact is that Morris' father was also a cryptographer and computer scientist at the NSA.
@TomPauls007
@TomPauls007 Год назад
I used to work for Control Data. I spotted the old pics of the Cyber series computer. Brought back memories (got my first genuine ulcer working for them!)
@cpklapper
@cpklapper Год назад
As an early computer programmer -my first computer programming job starting in the fall semester of my senior year of high school in 1974 - I can tell you that “hacking” had a much different derivation among programming than what you describe. “Hacking” came from the process of clearing underbrush, as with a machete, to form a path not delineated as a trail. It thus referred to using machine code to accomplish results not obtainable within the constraints of standard interpreted or compiled programming languages. Thus, while at CMU, I was called a “LISP hacker” for using LISP macros (in MacLISP) as an end run around the constraints of standard LISP code. I was also witness to the criminalization of “hacking”, while my group at Odyssey Research Associates was finishing work on its “Romulus” computer security modeling system, for which key deliverables were sent to the Computer Security Center, then headed by Bob Morris, Sr. At the same time, Cornell University, across the lake from Odyssey Research Associates, was given administration responsibility for sendmail - the protocol for e-mail on UNIX systems - and this duty devolved to Bob Morris, Sr.’s son, Bob Morris, Jr., then a first-year graduate student at Cornell. The younger Bob Morris wrote an updating program for sendmail which used an AI password-guessing program to infiltrate the computer systems and then to update the sendmail program. This was how “hacking” became a crime and how Romulus, a provably correct computer security modeling system, based on a theorem prover applied to the “hook-up secure” assertion, was scuttled by lower-level computer security analysts to protect their jobs, threatened by “Romulus”, while Bob Morris, Sr. was defending his son from the trumped-up charges on what was clearly a mistake. Of course, having their manual, tedious, and error-prone jobs replaced by an automated and correct computer security modeling system would not be so grievous if not for the mortgage evil trashing their family estates and creating unnecessary want in a land of plenty. #AbolishTheMortgage
@reallyseriously7020
@reallyseriously7020 Год назад
Your mention of floppy disks made me smile. Anybody else remember when you could load a program onto an Apple 2c by plugging in a standard cassette tape player and playing a cassette tape containing the program?
@mpetersen6
@mpetersen6 Год назад
Hacking as in terms of gaining unauthorized access to systems can also be traced to people hacking phone systems after touch tone phones came into use. Thus was done by playing back sequences of tones each corresponding to 0 through 9. The purpose to make free long distance phone calls. Also at MIT computer students used the schools computers to control the MIT Model Railroad Club's layout in the 50s.
@lapurta22
@lapurta22 Год назад
Except that practice was known as phreaking, not hacking. But very often if a person was a member of the one community they were also a member of the other.
@LaikaLycanthrope
@LaikaLycanthrope Год назад
Clifford Stoll's _The Cuckoo's Egg_ is a fun read on an early hacking attempt at Berkeley. Starts with a simple accounting error of 75 cents.
@cypherian9821
@cypherian9821 Год назад
Great story , only one tidbit to add look up who Robert Morris's dad was and where he worked when this occurred lol
@TheCleric42
@TheCleric42 Год назад
The Caltech Rose Bowl prank was recreated by Yale, who got the Harvard student body to hold up cards that read “WE SUCK” during the Harvard-Yale game.
@terlinguabay
@terlinguabay Год назад
Houston enjoyed our antics from the late '70s through the mid '90s.
@danm18835
@danm18835 Год назад
Hello Dave,Can I ask you a question?
@XAirForce
@XAirForce Год назад
I was watching HBO at Grand Forks AFB in 1986 when Captain Midnight broke into their system. The CALTECH hack is darn cool that they pulled it off
@XAirForce
@XAirForce Год назад
By the way, Lance they’re actively doing everything they can to block my communications illegally. I can’t post anything new to RU-vid even. They suspended Facebook suspended Instagram, suspended Twitter for me telling the world that they have abused me. I hope none of you want a military because I am out here putting comments into RU-vid videos related to join the military.
@johnsmith99997
@johnsmith99997 Год назад
Hacking is also a term for horse riding done for pleasure (opposed to for work), may be etymologically relevant
@51WCDodge
@51WCDodge Год назад
Yes, as a Hacquenee, was an old French term for a Horse for Hire, used for travelling. Also a high actioned horse! Of the type favoured to draw horse drawn cabs. PS if you don't know it the London Bourough of Hackney--- dosen't have the highest of reputations.
@HemlockRidge
@HemlockRidge Год назад
I was enthralled by Lyndon Hardy's "magic" trilogy. Especially the first one, "Master of the Five Magics".
@WhaleGold
@WhaleGold Год назад
I live in Washington State and I remember that Rose Bowl card stunt. I didn't actually see in, but I do remember other students talking about it and seeing news stories about it.
@MR-nl8xr
@MR-nl8xr Год назад
ha.
@davewoods177
@davewoods177 Год назад
Dear history guy I enjoy your channel very much . I have learned a great deal about many things thank you Recently I saw your program about the history of hacking. I recommend that you do a prequel to that episode. Telephone hacking. I recommend a book called ghost in the wires.
@DisasterDude2010
@DisasterDude2010 Год назад
Check out a SF book titled "Shockwave Rider" from the 70s about a hacker. It foretold online universities, banking, and many things we take for granted today. The hero is a hacker savant. Excellent reading.
@fourtyfivefudd
@fourtyfivefudd Год назад
I’m surprised there was no mention of the phone hackers who would try to make long distance calls on the land lines. The phone would listen for a specific tone which would indicate that it was making a long distance call after inserting the specific amount of money, but some people were able to make that sound with their voice and trick the system into giving them a free long distance call
@urlton
@urlton Год назад
Great overall, plus I'm happy to hear an explanation of "hackney"
@MarshOakDojoTimPruitt
@MarshOakDojoTimPruitt Год назад
thanks
@HeyMJ.
@HeyMJ. Год назад
The Rose Bowl Caltech card debacle and ARPANET stories were perfect for this episode. Thanks for another excellent episode!
@bigsarge2085
@bigsarge2085 Год назад
Interesting!
@jnzkngs
@jnzkngs Год назад
I was hoping that Cliff Stoll and the Russian spying he exposed would be mentioned. Awesom episode nonetheless.
@MadelonWilson
@MadelonWilson Год назад
I was working at Yale University on November 2, 1988. The Yale mainframe was unaffected by the Morris Worm because the operating system was older than that needed for the worm to work.
@AbbyNormL
@AbbyNormL Год назад
I purchased my first computer in 1984. It was an Apple //e with 64K RAM. The first add-on was an "80 Column Card" which increased RAM to 128K and doubled the 40 column display built into the motherboard to 80 columns. Also connected to the computer were two 180K RAM, single sided, 5.25" floppy disc drives, an external 10MB hard drive, an 80 column dot matrix printer, a 300 baud internal dial-up modem and serial cabled joystick. To top it off I added a sound card w/ speakers and a serial cabled steering wheel/pedal combination. Not only was the internet not invented yet, neither was plug-n-play. Simply connecting a new component could make one or more components stop working.
@Turrican
@Turrican Год назад
The net had been invented years before. The web hadn't.
@jimlocke9320
@jimlocke9320 10 месяцев назад
I owned a Laser 128, which was a clone of the Apple//e. It came with 128K of memory and ran programs written for the //e. However, it had its own BIOS, not a copy of the Apple BIOS. I felt that its built in disassembler was superior to the one built into the //e. Each time a program loaded into the //e from floppy disk, all the code was loaded from scratch. There was no way for a virus to reside in memory and pass from one program to another. Apple made the operating system available to software companies to be freely copied onto their disks, so most software loaded a fresh copy each time. IBM PCs typically had the DOS loaded into memory first, and it would read the commercial disks. The Apple //e commercial software disks usually came with copy protection. Unlike the IBM PC, reading the disk was heavily done in software. The IBM PC had hardware to read sectors, where for the Apple //e that task was done in software. The software writers had to rely on a piece of hard coded software in BIOS to read track 0, sector 0 into memory. Then code in track 0 sector 0 executed. Usually, the code read in a few more sectors, with help form the BIOS, until enough code was loaded to take over. There were several flavors of copy protection. One was to have the disk formatted the standard Apple way and have a nonstandard data pattern somewhere on the disk. A subroutine would read the nonstandard pattern and decide if the disk was genuine. It could return a 1 for yes or 0 for no. If you tried to copy the disk with normal Apple copy software, the nonstandard pattern would not copy and the subroutine would reject the copied disk. Programs like Locksmith attempted to copy disks bit by bit. There was a "war" between software developers and disk copy developers. It was legal to make backup copies of software that you had purchased, so Locksmith had a legitimate use. A much better way was to find the subroutine in the machine code and patch it to bypass the disk read and return "success". There was a disk editor program which could be used to patch the code on a copy of the commercial disk. Patched disks used standard format and could be copied with Apple copy software. A second copy protection method was to use a nonstandard method of writing the program on the commercial disk. One hack was to modify their loader to read the entire program into the computer memory and then jump to code written by the hacker. This code would pull the program from memory and write it back in standard format to a blank disk equipped with a standard loader. Now, the computer could boot from the standard disk and jump to the memory address where the program normally commenced execution. The hacker's disk could be copied with standard programs. There was one popular program where the copy protection prevented it from running on the Apple IIGS. The software development company refused to fix the problem. So, a hacker's copy made its way into the hands of IIGS owners and ran on IIGS machines, something that the original disks did not do. The hacked copies also found a legitimate home in schools. Many times the standard disk drives didn't read the nonstandard data patterns well. Furthermore, students often damaged disks and replacement meant buying new copies of the software. The schools could store the original copies of the software in a safe place and let the students use copies which could be readily duplicated. In many cases, the copies worked better than the original disks.
@leftcoastdrifter
@leftcoastdrifter Год назад
loved it.
@cx3268
@cx3268 Год назад
Also NEVER forget about doing backups!!!
@darrenchapman7203
@darrenchapman7203 Год назад
Back in the late 1980s, I was into home built z80 computers, mainly the Australian designed TEC 1B by talking electronics magazine. It was a simple machine coding system on an A4-ish sized pcb designed for education , I also had a cheap radio shack cordless phone that contained a simple channel/security selection chip , I managed to get the z80 to talk to the phone chip and scan through the channels as I drove around town , each time a base station connected the computer would store the code, almost had my own cellar network for out going calls, except for one call sitting at my kitchen table to see if my home phone would ring, it did and I proved to myself that it worked and no more calls were made.
@mrsnow61
@mrsnow61 Год назад
Early systems thru early 80s had little to no digital or physical security procedures… I remember while freshman at university having access to punch card programs that contained access to research level resources on CDC Cyber 175 super-computer… also system resource management had little validation of programs access to core resources such as CPU, memory, and batch queue resources. I was able to crash system in < 15 secs by submitting a batch job that resubmitted itself twice (we called a “rabbit job”) 😊
@20chocsaday
@20chocsaday Год назад
There were lots of holes and there are probably more now. I remember trying to find the prices for about 6 materials I was using to keep the price down. Access Denied. But I could print off, and did, print everything about every item in the entire factory.
@evensgrey
@evensgrey Год назад
Actually, a lot of early machines had a substantial degree of physical security, to the extent system security was generally considered pointless. If you were able to physically access the thing, it was assumed you were allowed to use it and knew what you were doing.
@-jeff-
@-jeff- Год назад
Though a bit hankneyed, how hacking got it's start as modern form of piracy deserves to be remembered.
@lapurta22
@lapurta22 Год назад
Hacking and piracy are two totally exclusive things.
@rustyshimstock8653
@rustyshimstock8653 Год назад
I attended MIT in the late 80s. At that time people used the verb Hacking to refer to a problem-solving strategy that is comparable to a person with a machete, who keeps hacking through the dark jungle until he/she creates a pathway to the light. In this sense, the problem is not solved by skill but by tireless, obsessive persistence. A hack in computer code is a modification that gets the job done through a minimal understanding of the comprehensive design or theory. In this sense, Hacking is associated with unauthorized brute force penetration and escape, as one would accomplish with dogged use of a machete. I'm not saying that this is the "right" meaning or etymology of the word, but this is the way I learned to use it at MIT. In any case, thank you History Guy, for another scintillating episode.
@scottstoddard7956
@scottstoddard7956 Год назад
Genius!
@Jasonwolf1495
@Jasonwolf1495 Год назад
Fun fact: Hacking is also a term used for raising wild birds for repopulation. You can still find articles about the "Eagle hacking program" for New York state.
@woopimagpie
@woopimagpie Год назад
Back in the 486 and early Pentium days a friend of mine succeeded in building what he called a "co-math processor", which was basically code that engaged the CPU into a never ending series of ever increasing complexity calculations that eventually would cause the CPU to overheat and "let the smoke out". He never sent it to anyone (as far as I know), it was just a little thing he had up his sleeve. Of course in these days of thermal protection and multi-core CPUs it would never work, but back then things were simpler. Imagine having a CPU that was unable to monitor its own temperature - those were the days. Those early 486s didn't even have heatsinks, let alone fans.
@evensgrey
@evensgrey Год назад
No x86 architecture processor after the 486 came without a working math core anyway. Technically, the 486sx DID have a math core, but those were the dies where the math core didn't work. The so-called 487 'math co-processor' was actually a full-fledged 486 with working math core that fit a different socket, and disabled the 486sx entirely when installed.
@ChiefMac59
@ChiefMac59 Год назад
I remember as a county employee hacking into what became the internet in the late 80s through the county library which had the only access in the county
@AnonMedic
@AnonMedic Год назад
The first use of the word hacker we know of today for pranksters came out of MIT model railroad club in the 60s. Hacks they did include measuring a bridge with units of mark or Michael (whatever the name of the man they used as a measuring device) and at night they placed a car on the dome of the school building. There's a documentary called "we are legion, origin of the hacktivist" that goes into detail about the MIT community.
@burney-m
@burney-m Год назад
In my childhood days, we used the term "clocking", for when we reached the highest scores on the original space invaders arcade games, and the numbers returned back to "0". The games would then return back to level 1. If you were a good player, you could keep playing the same 10p game all day. This evolved into the aim of defeating every arcade game or gadget ever invented. Not for the intention of breaking the law, but simply for the challenge. We used the term "Hacking" for getting passed "doorways", which is the same term used by firefighters when they "hack" passed a locked door of a blazing building, with their axes in order to rescue the people inside. The "doorways" we're talking about is being passwords, cheats, or any method to get passed a gadget or program. I didn't invent the term but "we" adopted the term as it seem to be widly used during that time and made sense. By the time I started progamming, every programmer I knew recognised the term as "hacking" into a program. This is how I understood where the term come from.
@ggalloway1
@ggalloway1 Год назад
You should have included Clifford Stoll's accidental Cold War hacking adventures. But still a great video, thanks!
@JohnRalsten
@JohnRalsten Год назад
Loved the "unlimited defense for up to 10 devices" part of the ad read. 🤣
@troynewly
@troynewly Год назад
Hard to accept that 1988 is indeed history. Feels like yesterday, perhaps even current events, notes this born in 1949 man. You illustrat hacking in language a child can understand, always with an impassioned tone. Thank you. Funny, twenty-first century hackers traced to a medieval township - comprehensive.
Далее
Where People Go When They Want to Hack You
34:40
Просмотров 1,2 млн
Why Hacking is the Future of War
31:45
Просмотров 2,3 млн
Клип Уже На Канале #янгер #shorts
00:15
1964 Vale, S.D. Minuteman Missile Accident
16:52
Просмотров 450 тыс.
A History of NASA's Supercomputers
15:38
Просмотров 145 тыс.
Grote Mandrenke: The Great Drowning of Men
20:10
Просмотров 151 тыс.
Shootin' Balloons: A History
20:16
Просмотров 128 тыс.
The Illegal World of Chinese Bootleg Games | Xplay
27:03
Mustard: A Spicy History
16:56
Просмотров 235 тыс.
A Brief History of Recording Sound
18:50
Просмотров 54 тыс.
Клип Уже На Канале #янгер #shorts
00:15