Hacking (computer Security) - History

History

Further information: Timeline of computer security hacker history

Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter. TAP was a phone phreaking newsletter that taught the techniques necessary for the unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.

Read more about this topic:  Hacking (computer Security)

Famous quotes containing the word history:

    This above all makes history useful and desirable: it unfolds before our eyes a glorious record of exemplary actions.
    Titus Livius (Livy)

    The history is always the same the product is always different and the history interests more than the product. More, that is, more. Yes. But if the product was not different the history which is the same would not be more interesting.
    Gertrude Stein (1874–1946)

    Books of natural history aim commonly to be hasty schedules, or inventories of God’s property, by some clerk. They do not in the least teach the divine view of nature, but the popular view, or rather the popular method of studying nature, and make haste to conduct the persevering pupil only into that dilemma where the professors always dwell.
    Henry David Thoreau (1817–1862)