SlideShare a Scribd company logo
1 of 19
Download to read offline
The world’s most famous hackers 
& 
How they embarrassed technology
1876 - Alexander Graham Bell invents telephone 
Let’s Start
Exactly two years later, a group of teenage boys were hired to 
operate the switchboard but they were more interested in 
knowing how the system works rather than operating. They 
tried to hack the system and got kicked out. The word ‘Hack’ 
gained prominence thereafter. 
First attempt to hack a system
Companies used main frame computers which were 
huge, costly and slow. 
1950 -1960’s
Programmers had to literally fight for the access time due to 
cost involved. The brightest among them discovered what they 
called ‘Hacks’ (Shortcuts) to improve the performance of 
machine. 
1950 -1960’s
In 1970’s John Draper discovers phreaking tool allowing users 
to make long distance calls without the financial charges. John 
admits calling White House during President Nixon’s adminis-tration 
and gave them president’s secret code ‘OLYMPUS’. 
Hacker Spotted
We have always been shameless 
about stealing great ideas 
- Steve Jobs 
Steve Wozniak and Steve Jobs made ‘Blue Boxes’ based on 
Drape discovery to help people hack in to phone system for 
distance calling. 
Following hacker’s footstep
Not until 1980’s, the word ‘Hacker’ earns disregard when 
hackers used technology for questionable gains. 
1986: US Congress passes the Computer Fraud and Abuse Act, The Electronic 
Communications Privacy Act to bring hackers under the law for cybercrime. 
Hacker = Evil
Designed self replicating worm to exploit security loophole in 
UNIX security system. The worm eventually affected one tenth 
of entire internet computers at that time (1988). 
Robert Tappan Morris
Poster child of hacking world, accused of stealing 20,000 credit 
card details and computer software’s. Convicted of stealing 
long distance codes from two telecommunication companies. 
Kevin Mitnick
He is the first juvenile to be sent to prison for hacking. He gained 
lot of attention by hacking in to government agencies such as 
Department of defense, USA and NASA systems. 
Jonathan James
Russian hacker, broke in to Citibank’s network and transferred 
funds worth $3 - $10 million dollars to various accounts around 
world 
Vladimir Levin
Famous for hacking phone systems, particularly radio stations. 
His iconic hack on Los Angeles radio station to ensure that he 
be the 102nd caller to win Porsche 944 S2 sent him behind the 
bars. 
Kevin Poulsen
Also known as ‘Mafia Boy’, he launched ‘Denial of Service’ 
attacks on major internet giants including e-bay, Amazon and 
Yahoo which brought their services to total halt. 
Yan Romanowski
After going through all the taglines, 
should we hate them? 
The Decisive point
Yes, for what they did! 
No, for what they taught! 
The Desicion
We may not agree with their methods, but we have to 
respect their talent in exposing the flaws in system. 
Without them internet wouldn’t have improved/expanded. 
Let’s Stop
Thank you 
www.triconinfotech.com 
Tricon Infotech 
Partnering with Success
Reference: 
http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/ 
http://www.telegraph.co.uk/technology/internet-security/9942462/Five-of-the-biggest-hacking-attacks.html 
http://list25.com/25-most-notorious-hackers-to-ever-get-caught/ 
http://en.wikipedia.org/wiki/Robert_Tappan_Morris 
http://www.techrepublic.com/blog/10-things/the-top-10-hackers-of-all-time/ 
http://www.computerworlduk.com/slideshow/it-business/3278948/a-potted-history-of-the-it-industry-25-years-of-milestones/11/ 
http://www.dynamicchiropractic.com/mpacms/dc/article.php?id=18078 
http://www.sptimes.com/Hackers/history.hacking.html 
http://pixabay.com 
https://www.flickr.com/commons/ 
https://www.apple.com/

More Related Content

What's hot

How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)Felipe Prado
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Lesson 1
Lesson 1Lesson 1
Lesson 1MrsNunn
 
Different IT Inventors
Different IT InventorsDifferent IT Inventors
Different IT InventorsYash Karanke
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackersMohsinHusenManasiya
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v04 n01 (january 1987)
2600 v04 n01 (january 1987)2600 v04 n01 (january 1987)
2600 v04 n01 (january 1987)Felipe Prado
 
How the Internet Started
How the Internet StartedHow the Internet Started
How the Internet Startedlindy23
 
History of the Internet
History of the InternetHistory of the Internet
History of the InternetKc Bunagan
 
Famouscomputerpeople
FamouscomputerpeopleFamouscomputerpeople
FamouscomputerpeopleArun Gupta
 
E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web rardthebeast
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & TechnologyMathias Klang
 

What's hot (20)

How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Polinter11
Polinter11Polinter11
Polinter11
 
Tech quiz prelims
Tech quiz prelimsTech quiz prelims
Tech quiz prelims
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Polinter03
Polinter03Polinter03
Polinter03
 
Different IT Inventors
Different IT InventorsDifferent IT Inventors
Different IT Inventors
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v04 n01 (january 1987)
2600 v04 n01 (january 1987)2600 v04 n01 (january 1987)
2600 v04 n01 (january 1987)
 
Hacking
HackingHacking
Hacking
 
How the Internet Started
How the Internet StartedHow the Internet Started
How the Internet Started
 
History of the Internet
History of the InternetHistory of the Internet
History of the Internet
 
Famouscomputerpeople
FamouscomputerpeopleFamouscomputerpeople
Famouscomputerpeople
 
E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 

Viewers also liked

Simulations chapter 7
Simulations chapter 7Simulations chapter 7
Simulations chapter 7ottoperezumg
 
A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)Bob Garrett
 
Gamification, Serious Games and Simulations
Gamification, Serious Games and SimulationsGamification, Serious Games and Simulations
Gamification, Serious Games and SimulationsViplav Baxi
 
Games & Simulations as Learning Technology Tools
Games & Simulations as Learning Technology ToolsGames & Simulations as Learning Technology Tools
Games & Simulations as Learning Technology ToolsDiana Focht
 
REALITY THE SIMULATION
REALITY THE SIMULATIONREALITY THE SIMULATION
REALITY THE SIMULATIONJeni Joe
 
Transform your training with simulations speaker deck - march 2011
Transform your training with simulations   speaker deck - march 2011Transform your training with simulations   speaker deck - march 2011
Transform your training with simulations speaker deck - march 2011The Blockchain Academy
 
Transform Your Training Projects with Games and Simulations
Transform Your Training Projects with Games and SimulationsTransform Your Training Projects with Games and Simulations
Transform Your Training Projects with Games and SimulationsAndy Petroski
 
Chap 7 binary threaded tree
Chap 7 binary threaded treeChap 7 binary threaded tree
Chap 7 binary threaded treeRaj Sarode
 
Some Interesting Email Marketing Facts
Some Interesting Email Marketing FactsSome Interesting Email Marketing Facts
Some Interesting Email Marketing FactsPawan Kumar
 
Ppp Of Simulation Development2
Ppp Of Simulation Development2Ppp Of Simulation Development2
Ppp Of Simulation Development2guestf51d8f
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 

Viewers also liked (14)

Introduction to Games and Simulations
Introduction to Games and SimulationsIntroduction to Games and Simulations
Introduction to Games and Simulations
 
Simulations chapter 7
Simulations chapter 7Simulations chapter 7
Simulations chapter 7
 
Simulations and Games
Simulations and GamesSimulations and Games
Simulations and Games
 
Applying Game Concepts To Learning
Applying Game Concepts To LearningApplying Game Concepts To Learning
Applying Game Concepts To Learning
 
A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)
 
Gamification, Serious Games and Simulations
Gamification, Serious Games and SimulationsGamification, Serious Games and Simulations
Gamification, Serious Games and Simulations
 
Games & Simulations as Learning Technology Tools
Games & Simulations as Learning Technology ToolsGames & Simulations as Learning Technology Tools
Games & Simulations as Learning Technology Tools
 
REALITY THE SIMULATION
REALITY THE SIMULATIONREALITY THE SIMULATION
REALITY THE SIMULATION
 
Transform your training with simulations speaker deck - march 2011
Transform your training with simulations   speaker deck - march 2011Transform your training with simulations   speaker deck - march 2011
Transform your training with simulations speaker deck - march 2011
 
Transform Your Training Projects with Games and Simulations
Transform Your Training Projects with Games and SimulationsTransform Your Training Projects with Games and Simulations
Transform Your Training Projects with Games and Simulations
 
Chap 7 binary threaded tree
Chap 7 binary threaded treeChap 7 binary threaded tree
Chap 7 binary threaded tree
 
Some Interesting Email Marketing Facts
Some Interesting Email Marketing FactsSome Interesting Email Marketing Facts
Some Interesting Email Marketing Facts
 
Ppp Of Simulation Development2
Ppp Of Simulation Development2Ppp Of Simulation Development2
Ppp Of Simulation Development2
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 

Similar to How hackers embarrassed technology

History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Hacking
HackingHacking
HackingVirus
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all timePRESENTATIONSFORESL
 
Network security history
Network security historyNetwork security history
Network security historyshahab ali
 

Similar to How hackers embarrassed technology (20)

Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Hackers
HackersHackers
Hackers
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Network security history
Network security historyNetwork security history
Network security history
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 

More from Tricon Infotech

Art and Design will be your best story tellers
Art and Design will be your best story tellers Art and Design will be your best story tellers
Art and Design will be your best story tellers Tricon Infotech
 
Gadgets they use are no longer fiction
Gadgets they use are no longer fictionGadgets they use are no longer fiction
Gadgets they use are no longer fictionTricon Infotech
 
How to save taxes FY 2014-15
How to save taxes FY 2014-15How to save taxes FY 2014-15
How to save taxes FY 2014-15Tricon Infotech
 

More from Tricon Infotech (8)

Small is Big
Small is BigSmall is Big
Small is Big
 
Art and Design will be your best story tellers
Art and Design will be your best story tellers Art and Design will be your best story tellers
Art and Design will be your best story tellers
 
Gadgets they use are no longer fiction
Gadgets they use are no longer fictionGadgets they use are no longer fiction
Gadgets they use are no longer fiction
 
Big Data for Big Sports
Big Data for Big SportsBig Data for Big Sports
Big Data for Big Sports
 
How to save taxes FY 2014-15
How to save taxes FY 2014-15How to save taxes FY 2014-15
How to save taxes FY 2014-15
 
Tester vs Developer
Tester vs DeveloperTester vs Developer
Tester vs Developer
 
The big story (BIG DATA)
The big story (BIG DATA)The big story (BIG DATA)
The big story (BIG DATA)
 
Going Mobile - Smart Move
Going Mobile - Smart MoveGoing Mobile - Smart Move
Going Mobile - Smart Move
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

How hackers embarrassed technology

  • 1. The world’s most famous hackers & How they embarrassed technology
  • 2. 1876 - Alexander Graham Bell invents telephone Let’s Start
  • 3. Exactly two years later, a group of teenage boys were hired to operate the switchboard but they were more interested in knowing how the system works rather than operating. They tried to hack the system and got kicked out. The word ‘Hack’ gained prominence thereafter. First attempt to hack a system
  • 4. Companies used main frame computers which were huge, costly and slow. 1950 -1960’s
  • 5. Programmers had to literally fight for the access time due to cost involved. The brightest among them discovered what they called ‘Hacks’ (Shortcuts) to improve the performance of machine. 1950 -1960’s
  • 6. In 1970’s John Draper discovers phreaking tool allowing users to make long distance calls without the financial charges. John admits calling White House during President Nixon’s adminis-tration and gave them president’s secret code ‘OLYMPUS’. Hacker Spotted
  • 7. We have always been shameless about stealing great ideas - Steve Jobs Steve Wozniak and Steve Jobs made ‘Blue Boxes’ based on Drape discovery to help people hack in to phone system for distance calling. Following hacker’s footstep
  • 8. Not until 1980’s, the word ‘Hacker’ earns disregard when hackers used technology for questionable gains. 1986: US Congress passes the Computer Fraud and Abuse Act, The Electronic Communications Privacy Act to bring hackers under the law for cybercrime. Hacker = Evil
  • 9. Designed self replicating worm to exploit security loophole in UNIX security system. The worm eventually affected one tenth of entire internet computers at that time (1988). Robert Tappan Morris
  • 10. Poster child of hacking world, accused of stealing 20,000 credit card details and computer software’s. Convicted of stealing long distance codes from two telecommunication companies. Kevin Mitnick
  • 11. He is the first juvenile to be sent to prison for hacking. He gained lot of attention by hacking in to government agencies such as Department of defense, USA and NASA systems. Jonathan James
  • 12. Russian hacker, broke in to Citibank’s network and transferred funds worth $3 - $10 million dollars to various accounts around world Vladimir Levin
  • 13. Famous for hacking phone systems, particularly radio stations. His iconic hack on Los Angeles radio station to ensure that he be the 102nd caller to win Porsche 944 S2 sent him behind the bars. Kevin Poulsen
  • 14. Also known as ‘Mafia Boy’, he launched ‘Denial of Service’ attacks on major internet giants including e-bay, Amazon and Yahoo which brought their services to total halt. Yan Romanowski
  • 15. After going through all the taglines, should we hate them? The Decisive point
  • 16. Yes, for what they did! No, for what they taught! The Desicion
  • 17. We may not agree with their methods, but we have to respect their talent in exposing the flaws in system. Without them internet wouldn’t have improved/expanded. Let’s Stop
  • 18. Thank you www.triconinfotech.com Tricon Infotech Partnering with Success
  • 19. Reference: http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/ http://www.telegraph.co.uk/technology/internet-security/9942462/Five-of-the-biggest-hacking-attacks.html http://list25.com/25-most-notorious-hackers-to-ever-get-caught/ http://en.wikipedia.org/wiki/Robert_Tappan_Morris http://www.techrepublic.com/blog/10-things/the-top-10-hackers-of-all-time/ http://www.computerworlduk.com/slideshow/it-business/3278948/a-potted-history-of-the-it-industry-25-years-of-milestones/11/ http://www.dynamicchiropractic.com/mpacms/dc/article.php?id=18078 http://www.sptimes.com/Hackers/history.hacking.html http://pixabay.com https://www.flickr.com/commons/ https://www.apple.com/