Ø 1945 : rear admiral grace
murray hopper discovers a moth trapped between relays utilizing a navy pc.
She calls it a bug, a term used since the late 19th century to refer to issues with
electrical devices. Murray hopper conjointly coined the notion of debugging to
explain efforts to set pc issues.
Ø 1949 : hungarian scientist
john von neumann ( 1903-1957 ) devises the theory of self-replicating
programs, providing the theoretical foundation for computers that hold data with
their memory.
Ø 1960 : at&t introduces
its dataphone, the very first few industrial modem.
Ø 1963 : programmers develop
the american standard code for information interchange ( ascii ), a
straightforward pc language that allows machines
created by completely different manufacturers to exchange information.
created by completely different manufacturers to exchange information.
Ø 1964 : at&t begins
monitoring telephone calls attempt to'>to attempt to discover
the identities of phone freaks, or phreakers, who use blue boxes as tone
generators to build free messages or calls. The groups surveillance
chief tells newsweek magazine in 1975 that the corporate monitored
33 million toll calls to look for phreakers. At&t scores 200
convictions from the time the investigation ends in 1970.
Ø 1969 : programmers at
at&ts bell laboratories develop the unix operating system, the
very first few multi-tasking operating system.
Ø 1969 : the advanced research comes agency
launches arpanet, an early network used by government research teams and
universities, and the forerunner on your internet.
Ø 1972 : john draper, soon as
being referred to actually as captain crunch, discovers
that the plastic whistle utilizing a box of breakfast cereal
reproduces a 2600-hertz tone. With a blue box, the whistle unlocks at&ts
phone network, allowing free calls and manipulation on your network.
Among different phreakers on your nineteen seventies is
famous future hacker kevin mitnick.
Ø 1972 : future apple pc co-founder
steve wozniak builds his own blue box. Wozniak sells the device to fellow
university of california-berkeley students.
Ø 1974 : telenet, a industrial version
of arpanet, debuts.
Ø 1979 : engineers at xerox
palo alto research center discover the pc worm, a quick program
that scours a network for idle processors. Designed to produce additional efficient pc use,
the worm will be the ancestor of modern worms -- destructive pc viruses
that alter or erase information on computers, typically leaving
files irretrievably corrupted.
Ø 1983 : the fbi busts the
414s, a gaggle of young hackers who break into many u.
S. Government networks, in a few cases using only an apple ii+ pc as
well as a modem.
Ø 1983 : university of
southern california doctoral candidate fred cohen coins the term pc virus to
explain a pc program that will affect different pc programs
by modifying them in this sort of method as to embrace a
( possibly evolved ) copy of itself. Anti-virus makers later capitalize on
cohens research on virus defense techniques.
Ø 1984 : in her novel,
neuromancer, author william gibson popularizes the notion of cyberspace, a
little bit of advice he designed to describe the network of
computers through that characters in her futuristic
novels travel.
Ø 1986 : one of the many 1st pc
viruses ever created, the brain, is released by programmers in pakistan.
Ø 1988 : twenty-three-year-old
programmer robert morris unleashes a worm that invades arpanet computers.
The small program disables roughly 6, 000 computers inside the network
by flooding their memory banks with copies of itself. Morris confesses to
making the worm away from boredom. He's fined $10, 000
and sentenced to 3 years probation.
Ø 1991 : programmer philip
zimmerman releases pretty sensible privacy ( pgp ), a free,
powerful data-encryption tool. The u. S. Government begins a three-year
criminal investigation on zimmerman, alleging he broke u. S. Encryption laws once his
program spread rapidly along the globe. The government later
drops the charges.
Ø 1991 : symantec releases the
norton anti-virus software.
Ø 1994 : inexperienced e-mail
users dutifully forward an e-mail warning folks to not open any
message in the phrase sensible times within the whole subject line.
The missive, that warns associated with a virus with the
facility to erase a recipients onerous drive, demonstrates the
self-replicating power of e-mail virus hoaxes that proceed to circulate in
numerous forms these days.
Ø 1995 : microsoft corp. Releases
windows 95. Anti-virus corporations worry that the operating
system will certainly be resistant to viruses. Later within the
whole year, but, evolved macro viruses seem which can
be found able to corrupt the new windows operating system.
Ø 1998 : intruders infiltrate
and take management of more often 500 military, government
and private sector pc systems. The incidents -- dubbed solar sunrise once the
well-known vulnerabilities in computers run inside the sun solaris
operating system -- were thought to possess originated from
operatives in iraq. Investigators later learn that 2 california
teenagers were behind the attacks. The experience provides the
defense department its initial style of what hostile
adversaries with bigger skills and resources might possibly be able to
try and do to the nations command and management center, significantly if utilized
in tandem with physical attacks.
Ø 1999 : the infamous melissa
virus infects a large number of computers with alarming speed, inflicting an
estimated $80 million in harm and prompting record sales of anti-virus merchandise.
The virus starts a program that sends copies of itself to
the very first 50 names listed within the whole recipients outlook e-mail address book. It too infects microsoft word documents inside the users onerous drive, and mails them out through outlook to a similar 50 recipients.
the very first 50 names listed within the whole recipients outlook e-mail address book. It too infects microsoft word documents inside the users onerous drive, and mails them out through outlook to a similar 50 recipients.
Ø Might 2000 : the i
like you virus infects legion computers virtually overnight, employing
a technique similar onto the melissa virus. The virus also sends
passwords and usernames stored on infected computers returning to the viruss
author. Authorities trace the virus to your young filipino pc student, other
then he goes free as a result of the philippines has no laws against
hacking and spreading pc viruses. This spurs the creation on
your european unions world cybercrime treaty.
Ø 2000 : yahoo, ebay, amazon,
datek and dozens of different high-profile websites are knocked
offline for up to many hours indulging in series of
so-called distributed denial-of-service attacks. Investigators later find
that the ddos attacks -- during which a target system is disabled
by a flood of traffic from countless computers simultaneously --
were orchestrated as soon as the hackers co-opted powerful computers along
at the university of california-santa barbara.
Ø 2001 : the anna kournikova
virus, promising digital pictures of the young tennis star, mails itself
to each person listed within the whole victims microsoft
outlook address book. This relatively benign virus frightens pc security
analysts, who believe finally it was written using a software
toolkit that allows even the foremost inexperienced programmer to build
a pc virus.
Ø July 2001 : the code red
worm infects tens of a large number of systems running microsoft
windows nt and windows 2000 server software, inflicting an estimated
$2 billion in damages. The worm is programmed to work with the power
of all infected machines against the white house web web site at a predetermined
date. Enduring an ad hoc partnership with virus hunters and technology corporations,
the white house deciphers the viruss code and blocks traffic clearly
as the worm begins its attack.
Ø 2001 : debuting simply days once the
sept. 11 attacks, the nimda virus infects countless a large number of computers
around the globe. The virus is taken into account one among the
foremost subtle, with up to 5 methods of infecting systems
and replicating itself.
Ø 2001 : president bush
appoints richard clarke to function americas initial cybersecurity
czar.
Ø 2002 : melissa virus author
david l. Smith, 33, is sentenced to 20 months in federal prison.
Ø 2002 : the klez worm -- a
bug that sends copies of itself to all of the e-mail addresses within
the whole victims microsoft outlook directory -- begins its march
across the net. The worm overwrites files and creates hidden copies of the
originals. The worm too makes an attempt to disable a few common
anti-virus merchandise and possesses a payload that fills
files with all zeroes. Variants of the klez worm stay the
foremost active on the net.
Ø 2002 : a denial-of-service
attack hits all 13 on your root servers that give the
primary roadmap for nearly all internet communications. Internet
users experience no slowdowns or outages due to safeguards built directly
into internets design. Other then the attack -- referred
to as largest ever -- raises queries relating out to the security on
your core internet infrastructure.
Ø Jan. 2003 : the slammer worm
infects countless thousands of computers in under 3 hours.
The fastest-spreading worm ever wreaks havoc on businesses worldwide,
knocking money machines offline and delaying airline flights.
Tidak ada komentar:
Posting Komentar