Wednesday, May 27, 2020

How To "Block Any Website Through Firewall" & Also Ping Any Website to...


Block any website by Firewall with easy steps:-

https://7t5.in/CollegeHacker-Subscribe


#CollegeHacker  #collegehacker   #hackercollege .

Must Watch

Change Mac Address:-  https://youtu.be/b1a9o1OfKRM

Fix Corrupted Pendrive :- https://youtu.be/iI-JvaORqTs

IP Configuration :- https://youtu.be/OSVt-maZN7w

WiFi Password Hacking :- https://youtu.be/k7DrQqDzUfQ

________________________________________________
SUBSCRIBE  -  SHARE  -  LIKE  -  COMMENT .
________________________________________________










-------------------------------
Important Links :-
-------------------------------
1. Instagram  :-  https://www.instagram.com/hacker_college

2. Twitter :-  https://www.twitter.com/hacker_college

3. Blogs :-  https://college-hacker.blogspot.com/

4. Tumblr :- https://www.tumblr.com/blog/collegeha...

5. Pinterest :- https://in.pinterest.com/collegehacker/

   #collegehacker  ,  #CollegeHacker  ,  #hackercollege
____________________________________________
SUBSCRIBE  -  SHARE  -  LIKE  -  COMMENT .
____________________________________________

Labels:

Friday, May 22, 2020

How to "Fix a corrupted Pendrive/SD Card"?All errors have been solved by...

How to fix any problem in pendrive/sd card... :-

Must Visit :-

SUBSCRIBE "COLLEGE HACKER" ON YOUTUBE :- https://7t5.in/CollegeHacker-Subscribe


Change Mac Address :- https://7t5.in/collegehacker-Mac_Changer

Fix Corrupted Pendrive :- https://7t5.in/collegehacker-fix

IP Configuration :- https://7t5.in/collegehacker-IP

WiFi Password Hacking :- https://7t5.in/collegehacker-Hack_WiFi

Block Any site By Firewall :- https://7t5.in/collegehacker-firewall

Kali Linux Live Installation :- https://7t5.in/collegehacker-kali

Thank You.





-------------------------------
Important Links :-
-------------------------------
1. Instagram  :-  https://www.instagram.com/hacker_college

2. Twitter :-  https://www.twitter.com/hacker_college

3. Blogs :-  https://college-hacker.blogspot.com/

4. Tumblr :- https://www.tumblr.com/blog/collegeha...

5. Pinterest :- https://in.pinterest.com/collegehacker/

   #collegehacker  ,  #CollegeHacker  ,  #hackercollege
____________________________________________
SUBSCRIBE  -  SHARE  -  LIKE  -  COMMENT .
____________________________________________

Labels:

Tuesday, May 19, 2020

"Various Methods Of IP Address Configure" ( How Change/Assign Static And...

"Various Methods Of IP Address Configure" ( How Change/Assign Static And Dynamic ip)


https://youtu.be/OSVt-maZN7w 




IP configure by Command Prompt Then copy & Past this and Save as " #CollegeHacker.bat " then Run As Administrator.


_________________________________________________________________________


@echo off
echo Choose:
echo [A] Set Static IP
echo [B] Set DHCP
echo.
:choice
SET /P C=[A,B]?
for %%? in (A) do if /I "%C%"=="%%?" goto A
for %%? in (B) do if /I "%C%"=="%%?" goto B
goto choice
:A
@echo off
echo "Please enter Static IP Address Information"
echo "Static IP Address:"
set /p IP_Addr=

echo "Default Gateway:"
set /p D_Gate=

echo "Subnet Mask:"
set /p Sub_Mask=

echo "Setting Static IP Information"
netsh interface ip set address "Wi-Fi" static %IP_Addr% %D_Gate% %Sub_Mask% 1
netsh int ip show config
pause
goto end

:B
@ECHO OFF
ECHO Resetting IP Address and Subnet Mask For DHCP
netsh int ip set address name = "Wi-Fi" source = dhcp

ipconfig /renew

ECHO Here are the new settings for %hacker%:
netsh int ip show config

pause
goto end
:end

__________________________________________________________________________

Must Visit :-

SUBSCRIBE "COLLEGE HACKER" ON YOUTUBE :- https://7t5.in/CollegeHacker-Subscribe


Change Mac Address :- https://7t5.in/collegehacker-Mac_Changer

Fix Corrupted Pendrive :- https://7t5.in/collegehacker-fix

IP Configuration :- https://7t5.in/collegehacker-IP

WiFi Password Hacking :- https://7t5.in/collegehacker-Hack_WiFi

Block Any site By Firewall :- https://7t5.in/collegehacker-firewall

Kali Linux Live Installation :- https://7t5.in/collegehacker-kali

Thank You.

Labels:

Monday, May 18, 2020

How To "Hack/Crack Wifi Network Password" Or "Security Testing Of Your W...

Learn about hack the wifi with easy steps:-


Must Visit :-

SUBSCRIBE "COLLEGE HACKER" ON YOUTUBE :- https://7t5.in/CollegeHacker-Subscribe

Change Mac Address :- https://7t5.in/collegehacker-Mac_Changer

Fix Corrupted Pendrive :- https://7t5.in/collegehacker-fix

IP Configuration :- https://7t5.in/collegehacker-IP

WiFi Password Hacking :- https://7t5.in/collegehacker-Hack_WiFi

Block Any site By Firewall :- https://7t5.in/collegehacker-firewall

Kali Linux Live Installation :- https://7t5.in/collegehacker-kali




-------------------------------
Important Links :-
-------------------------------
1. Instagram  :-  https://www.instagram.com/hacker_college

2. Twitter :-  https://www.twitter.com/hacker_college

3. Blogs :-  https://college-hacker.blogspot.com/

4. Tumblr :- https://www.tumblr.com/blog/collegeha...

5. Pinterest :- https://in.pinterest.com/collegehacker/

   #collegehacker  ,  #CollegeHacker  ,  #hackercollege
____________________________________________
SUBSCRIBE  -  SHARE  -  LIKE  -  COMMENT .
____________________________________________

Labels:

Friday, May 15, 2020

How to Change your "MAC Address" ! Or "Spooof Your MAC Address" ! #C...


Change your Mac address with easy steps:-

https://7t5.in/CollegeHacker-Subscribe


Must Visit :-

SUBSCRIBE "COLLEGE HACKER" ON YOUTUBE :- https://7t5.in/CollegeHacker-Subscribe


Change Mac Address :- https://7t5.in/collegehacker-Mac_Changer

Fix Corrupted Pendrive :- https://7t5.in/collegehacker-fix

IP Configuration :- https://7t5.in/collegehacker-IP

WiFi Password Hacking :- https://7t5.in/collegehacker-Hack_WiFi

Block Any site By Firewall :- https://7t5.in/collegehacker-firewall

Kali Linux Live Installation :- https://7t5.in/collegehacker-kali

Thank You.





-------------------------------
Important Links :-
-------------------------------
1. Instagram  :-  https://www.instagram.com/hacker_college

2. Twitter :-  https://www.twitter.com/hacker_college

3. Blogs :-  https://college-hacker.blogspot.com/

4. Tumblr :- https://www.tumblr.com/blog/collegeha...

5. Pinterest :- https://in.pinterest.com/collegehacker/

   #collegehacker  ,  #CollegeHacker  ,  #hackercollege
____________________________________________
SUBSCRIBE  -  SHARE  -  LIKE  -  COMMENT .
____________________________________________

Labels:

Wednesday, May 13, 2020

Types Of Hackers :-

Main Types of Hackers :-

There are two main factors that determine what type of hacker an individual is: their motives and legality of their actions. Hackers are divided into three types—white, black, and grey hat, a naming system that was derived from old western films, where the protagonists would always wear white hats and vice versa for villain characters.
1. Black Hat
Black hat hackers are normally responsible for creating malware, which is frequently used to infiltrate computerized networks and systems. They’re usually motivated by personal or financial gain, but can also participate in espionage, protests, or merely enjoy the thrill. Black hat hackers can be anyone from amateurs to highly experienced and knowledgeable individuals looking to spread malware, steal private data, like login credentials, along with financial and personal information. Upon accessing their targets and depending on their motives, black hat hackers can either steal, manipulate, or destroy system data.
2. White Hat
Also known as “ethical hackers,” they’re often employed or contracted by companies and governmental entities, working as security specialists looking for vulnerabilities. While they employ the same methods as black hat hackers, they always have permission from the system’s owner, making their actions completely legal. White hat hackers implement strategies like penetration tests, monitor in-place security systems, along with vulnerability assessments. Ethical hacking, the term used to describe the nature of a white hat hackers’ actions, can even be learned through independent sources, training, conferences, and certifications.
3. Grey Hat
As the name suggests, these individuals utilize aspects from black and white hat hackers, but will usually seek out vulnerabilities in a system without an owner’s permission or knowledge. While they’ll report any issues they encounter to the owner, they’ll also request some sort of compensation or incentive. Should the owner not respond or reject their proposition, a grey hat hacker might exploit the newfound flaws. Grey hat hackers aren’t malicious by nature, but do seek to have their efforts rewarded. Since grey hat hackers don’t have permission to access the system by its owner, their actions are ultimately considered illegal, despite any alarming findings they might reveal.

Some Another Types Of Hackers :-

  • Green Hat Hackers: They are also amateurs in the world of hacking but they are bit different from script kiddies. They care about hacking and strive to become full-blown hackers. They are inspired by the hackers and ask them few questions about. While hackers are answering their question they will listen to its novelty.
  • Red Hat Hackers: They are also known as the eagle-eyed hackers. Like white hat hackers, red hat hackers also aims to halt the black hat hackers. There is a major difference in the way they operate. They become ruthless while dealing with malware actions of the black hat hackers. Red hat hacker will keep on attacking the hacker aggressively that the hacker may know it as well have to replace the whole system.

  • Blue Hat Hackers: They are much like the script kiddies; are beginners in the field of hacking. If anyone makes angry a script kiddie and he/she may take revenge, then they are considered as the blue hat hackers. Blue Hat hackers payback to those who have challenged them or angry them. Like the Script Kiddies, Blue hat hackers also have no desire to learn.

  • Hacktivist: These are also called the online versions of the activists. Hacktivist is a hacker or a group of anonymous hackers who gain unauthorized access to government’s computer files and networks for further social or political ends.

  • Malicious Insider or Whistleblower: A malicious insider or a whistleblower could be an employee of a company or a government agency with a grudge or a strategic employee who becomes aware of any illegal activities happening within the organization and can blackmail the organization for his/her personal gain.

  • State/Nation Sponsored Hackers: State or Nation sponsored hackers are those who are appointed by the government to provide them cybersecurity and to gain confidential information from other countries to stay at the top or to avoid any kind of danger to the country. They are highly paid government workers.

  • Script Kiddies: They are the most dangerous people in terms of hackers. A Script kiddie is an unskilled person who uses scripts or downloads tools available for hacking provided by other hackers. They attempt to attack computer systems and networks and deface websites. Their main purpose is to impress their friends and society. Generally, Script Kiddies are juveniles who are unskilled about hacking.

All information is only for the study purpose.  

                                                               College hacker

Labels:

Who Is Hacker ? & History.

Who is a Hacker? 

Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
A computer hacker is a skilled computer expert who uses their technical knowledge to overcome a problem. Although the term “hacker” can basically refer to any skilled computer programmer, it has however become more synonymous with the idea of a security hacker; that is, a person who, with their technical knowledge, uses bugs or exploits to break into computer systems.The definition of a hacker is therefore “someone who is able to subvertcomputer security. If the reasons are based on ulterior motives, the person can also be called a “cracker”.Now that you know who a hacker is, you may be wondering: “why do they do what they do?” Primarily, there are about four motives behind the actions of hackers attempt to break into computer systems.
The first motive  is monetary gain, especially when it involves breaking into systems with the specific purpose of stealing credit card numbers or manipulating banking systems.
Secondsome hackers act for egoistic motives; to increase their reputation within the hacker subculture, leaving their signatures on the system or network after a breach.
Third, corporate spies allow organizations to possess information on services and products that may be hijacked or used as a leverage within the marketplace.
Lastly, some hackers do it for patriotic reasons; as in state-sponsored cyber attacks during wartime.

The History of Hackers :-

During the early 90s, the US government decided to crack down on criminal computer crimes in a series of raids dubbed Operation Sundevil. The raids were carried out by the US Secret Service working alongside local police and telecoms engineers and targeted “bulletin boards” (now more often called forums) that were engaged in blatant and open credit card fraud and telephone code abuse.
The people involved in such illicit activity mostly fitted a very narrow subset of society: teenagers and young adults from middle-class suburban homes. They had the disposable income to acquire what was at the time cutting-edge general purpose computing technology and had access to modems (extremely slow in the age of today’s broadband, but life-changing technology at the time).
The modems allowed them to connect to the internet and the fledging World Wide Web and form cliques on those bulletin boards to engage in a range of activities – not all of them legal.
Although Sundevil was far from the only anti-hacking law enforcement activity of the time, it is interesting because it went on to create much of the image of the hacker in popular culture. The 1995 film Hackers features a teenage character targeted in an investigation by doughnut-munching federal agents. His suburban bedroom, where one of his floppy disks was hidden, was raided.
That film also captured many other aspects of hacker culture, such as the hacking of old analogue telephone networks, known as “phreaking”, to gain free calls, and the habit of hackers to study, and share, treasure troves of technical information from large companies, such as the so-called “Crayola Books” shown off by the characters.
Now, many of the hackers of yesteryear are today’s information security (or cyber security) professionals, who work to protect information. The dated cultural view of the elite criminal hacker has fallen in to stereotype and myth over the decades and been overtaken by leaps of technological progress, where general purpose computing is in every home, and smartphones bring connectivity to people of every background, culture, and age.
In this new landscape, newer generations of hackers are often cutting their teeth against hardened computer systems, now armed with antivirus, firewalls, and more sophisticated protections, rather than the hapless, insecure, networks of the 80s.
At the same time, the hacker community (the majority of whom have no criminal intentions) has developed its capabilities, with techniques and tools previously the domain of skilled hackers now open-sourced to those with merely an inclination, not necessarily a desire to master and exploit technologies in the way hackers do.
The UK’s focus on a “code economy” has resulted in an army of citizens with coding skills of various levels, capable of taking these tools and repurposing them for novel uses.
This has manifested in the emergence of hacktivists, who rely on volume and PR over technical excellence. They are not hardened criminals, but motivated by political ideologies. As protestors, they tend to not worry greatly about concealing their actions. Those who associate with the Anonymous group of hacktivists are of this type, and some of them have ended up with criminal records as a result of the damage their actions have caused in the same way as protestors involved in vandalising real-world institutions.
On the other end of the spectrum, the wider prevalence of coding skills has also resulted in “project-managed crime” – criminal enterprises that shadow conventional IT business practices, but develop software for criminal use by others. Ransomware, that holds a user’s sensitive data on that computer to ransom by withholding an encryption code, are often designed by teams of professional criminals, including developers, testers, and project management staff.
The now infamous ransomware WannaCry, which hit the NHS in May 2017, is an example of this sort of software, with variants often sold alongside commercial licenses. WannaCry was developed from the tools of an intelligence agency, the US National Security Agency, that were intended to protect national security, but repurposed for other uses, rather than the tools of the hacking community.

Personal motivations :-


Less so than a hacker mindset, the drivers for computer criminality now come more from the personal motivations of all people with access to technology (that is, almost everybody in our digital society). In higher education in the UK, we have observed that the primary motivator is not necessarily a drive for technical excellence, but more typical motivators of crimes such as revenge.
Two typical cases illustrate this: in one, a student committed an attack against an institution because he did not like the way they responded to his reports of a mugging on campus, while in another, a member of staff attacked their institution based on their previous dismissalIT crime is now an outlet for criminal intent of all stripes; no longer the preserve of a technical elite.
There has been a transition from the black hat hackers, technical wizards, and studious technophiles, of older decades, to anyone who simply has the inclination to abuse the digital ecosystem. A security professional’s view on criminal hacking has shifted away from the traditional stereotype of the hacker, towards a much more diverse cross-section of wider society.
As with all forecasting, outdated or prejudiced thinking will ultimately lead to poor outcomes. Understanding criminal activities (the business of threat intelligence) is a mandatory practice in effective information security services.
By pooling the combined knowledge of our members (universities, colleges and research centres), we can develop intelligence that is both unique to academia’s problems and comprehensive in scope, evolving and adapting to the ever-changing landscape of criminal activities to not only better understand how it has changed, but also to proactively meet future threats as efficiently and effectively as possible.
One of the many challenges we have at Jisc, a not-for-profit that provides UK universities and colleges with shared digital infrastructure and services, is developing intelligence from our data to understand the motivations of those who bring harm upon the UK’s educational institutions.
With every new attempted attack, we gain a better understanding of tools used, can observe trends in malicious behaviour, and can better identify areas in the community where we work that are most vulnerable. 
All information is only for the study purpose.  

                                                               College hacker



Twitter Link :-      

Instagram Link :- 

Labels:

Wednesday, May 6, 2020

ADVANTAGES & DISADVANTAGES OF HACKING



Advantages of Hacking:-

  • To perform penetration testing to strengthen computer and network security.
  • To put adequate preventative measures in place to prevent security breaches.
  • To have a computer system that prevents malicious hackers from gaining access.
  • To recover lost information, especially in case you lost your password.

Disadvantages of Hacking:-

  • Denial of service attacks.
  • Massive security breach.
  • Privacy violation.
  • Unauthorized system access on private information.
  • Hampering system operation.
  • Malicious attack on the system.


All information is only for the study purpose.  

                                                               College hacker



Twitter Link :-      

Instagram Link :- 

Labels:

PURPOSE OF HACKING

Why Hacking:-



1. Steal/Leak Information:-
I am sure you guessed this. One of the most common reasons for hackers to hack is to steal or leak information. This could be data and information about your customers, your internal employees or even private data specific to your business. These are cases where hackers typically go after big targets in order to get the most attention.
Some of the biggest examples are the Ashley Madison hack or the Starbucks app hack. In the Ashley Madison hack, hackers were able to break into the customer database and get access to all the information including many private pictures of popular celebrities. This incident was a big shakeup in the Internet world which also affected private lives of many people.
A lot of times, hackers also steal information in order to assume your personal identity and then use it for something else like transferring money, taking a loan, etc. Such incidents have increased after Internet banking and mobile banking have started to become more popular. With the growth of smartphones and mobile devices, the potential for monetary gain through hacking has also increased.
Many big businesses have fallen prey to this - Sony, Target, Yahoo, Equifax, eBay, HomeDepot, Adobe, to just name a few. Even though there has been a lot of media attention about all the above companies being hacked, most businesses still believe this won't happen to them. By not being proactive about security, you are only putting your data at risk.

2. Disrupt Services:-

Hackers just love to take something down. And then also leave a statement on the website - more on that later. But hackers have successfully taken down many services by creating bots that overwhelm a server with traffic, thus, leading to a crash. It is known as a DoS (Denial of Service) attack and can put a company’s website out of service for a while. These days, there's also DDoS or Distributed Denial of Service attacks which use multiple infected systems to take down a single major system leading to a denial of service.
There are other ways also, like infecting a large network with malicious software inserted onto one computer either through email or otherwise which leads to a chain reaction affecting the whole network.
Server disruption attacks usually have their own personal motive. Mainly, it is to render a service or website useless. Sometimes it can also be to make a point.

3. Make a Point:-


The hackers who fall into this category are very interesting. They don't care about money or data. They seem to feel that they have a higher purpose in life. They want to steal information or disrupt your network in order to make a point.
Again, going back to the Ashley Madison hack, the hackers had access to account details of 32 million users but before they made this public, the hackers left a message on the website to inform everyone on what they are done. They also mentioned what they thought about the website and why they thought a service like this was immoral. 

4. Money:-


This is what everyone usually fears about. We've seen many businesses reach out to us at the stage when they have already been hacked and a hacker is demanding money. Hackers not only hack businesses and ask for ransom but they also try hacking into regular user accounts and try to take advantage of things like online banking, online retail, etc. where financial transactions are involved.
Last year also saw the biggest ransomware attack called WannaCry where millions of computers around the world were hacked and users had to pay a ransom to get back access to their computers.

5. Driven by Purpose - Hacktivism, Idealism, Political Motives:-


Many hackers are also drive by a specific purpose. Sometimes, this comes out only when they get caught. Some of them aim to be idealists and take it upon themselves to expose injustice, some have political motives, some simple target the government, and so on. A major example is a hacktivist group called Anonymous who have been popular around the world for challenging and taking down many governments. These hackers can target religious groups, governments, movements, to promote a particular agenda.
Another example of a politically driven agenda was when France was having an election last year. In fact, at the beginning of May, we all got to know that Emmanuel Macron, President-elect for France, had his presidential campaign emails leaked following a hack. Giving the timing of the hack, many speculate that it was done with a purpose – to sway the votes  And so are the speculations about the US presidential elections when Donald Trump became President.

In The Short Way :-


There could be various positive and negative intentions behind performing hacking activities. Here is a list of some probable reasons why people indulge in hacking activities −
  • System security testing
  • Steal important information
  • Show-off
  • Damaging the system
  • Just for fun
  • Hampering privacy
  • Money extortion
  • To break policy compliance.


All information is only for the study purpose.  

                                                                  College hacker




Twitter Link :-      

Instagram Link :- 


Labels:

VARIOUS HACKING


Types of Hacking:-

 Following are the main types :-
  • Website Hacking − Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.

  • Network Hacking − Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.

  • Email Hacking − It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.

  • Ethical Hacking − Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.

  • Password Hacking − This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

  • Computer Hacking − This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.

 In Another word:-

   One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups or individuals opposed to them. It is also not uncommon to see governmental or national information website being hacked. Some of the well-known methods in website hacking are:

· Phishing

This implies replicating the original website so that the unsuspecting user enters the information like account password, credit card details, which the hacker seizes and misuses. The banking websites are the frequent target for this.

· Virus

These are released by the hacker into the files of the website once they enter into it. The purpose is to corrupt the information or resources on the website.

· UI redress

In this method the hacker creates a fake user interface and when the user clicks with the intent of going to a certain website, they are directed to another site altogether.

· Cookie theft

Hackers accesses the website using malicious codes and steal cookies which contain confidential information, login passwords etc.

· DNS spoofing

This basically uses the cache data of a website or domain that the user might have forgotten about. It then directs the data to another malicious website.



All information is only for the study purpose.  

                                                                  College hacker



Twitter Link :-      

Instagram Link :- 

Labels:

Monday, May 4, 2020

History Of Hacking

History of hacking.


In its current usage, the term dates back to the 1970s. In 1980, an article in Psychology Today used the term “hacker” in its title: “The Hacker Papers,” which discussed the addictive nature of computer use.
Then there's the 1982 American science fiction film, Tron, in which the protagonist describes his intentions to break into a company's computer system as hacking into it. The plot of another movie released the next year, WarGames, centered on a teenager's computer intrusion into the North American Aerospace Defense Command (NORAD). It was a fiction that introduced the specter of hackers as a threat to national security.

A gang of teenage hackers broke into computer systems throughout the United States and Canada.

Turns out, art was prologue to reality in that same year when a gang of teenage hackers broke into computer systems throughout the United States and Canada, including those of Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank. Soon afterward, a Newsweek article with a cover shot of one of the young hackers was the first to use the term “hacker” in the pejorative sense in the mainstream media.
Thereafter, Congress got into the act, passing a number of bills concerning computer crime. After that, throughout the rest of the 1980s, any number of hacker groups and publications formed in America and abroad, attracting hacking enthusiasts in pursuit of diverse missions—some benign, others not so much. There were spectacular attacks and break-ins into government and corporate computers, more anti-hacking legislation, and many noteworthy arrests and convictions. All the while, popular culture kept hacking and hackers in the public consciousness with a parade of movies, books, and magazines that are dedicated to the activity.

    Promotions Of Hacking :-

  • December 1947 – William Shockley invents the transistor and demonstrates its use for the first time. The first transistor consisted of a messy collection of wires, insulators and germanium. According to a recent poll on CNN’s website, the transistor is believed to be the most important discovery in the past 100 years.
  • 1964 – Thomas Kurtz and John Kemeny create BASIC, one of the most popular programming languages even nowadays.
  • 1965 -it’s estimated that approximately 20,000 computer systems are in use in the United States. Most of these are manufactured by International Business Machines (IBM).
  • 1968 – Intel is founded.
  • 1969 – AMD is founded.
  • 1969 – The Advanced Research Projects Agency (ARPA) create the ARPANET, the forerunner of the Internet. The first four nodes (networks) of ARPANET consisted of the University of California Los Angeles, University of California Santa Barbara, University of Utah and the Stanford Research Institute.
  • 1969 – Intel announces 1K (1024 bytes) RAM modules.
  • 1969 – Ken Thompson and Dennis Ritchies begin work on UNICS. Thompson writes the first version of UNICS in one month on a machine with 4KB of 18 bit words. UNICS is later renamed ‘UNIX’.
  • 1969 – MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster.
  • 1969 – Linus Torvalds born in Helsinki.
  • 1970 – DEC introduces the PDP-11, one of the most popular computer designs ever. Some are still in use as today.
  • 1971 – John Draper, aka as ‘Cap’n Crunch’ hacks phone systems using a toy whistle from a cereal box.
  • 1971 – The first email program is released for the Arpanet. The author is Ray Tomlinson, who decides to use the ‘@’ character to separate the user name from the domain address.
  • 1972 – Ritchie and Kerningham rewrite UNIX in C, a programming language designed with portability in mind.
  • 1972 – NCSA develops the ‘telnet’ tool.
  • 1973 – Gordon Moore, Intel’s chairman postulates the famous ‘Moore Law’, which states the number of transistors in CPUs will double every 18 months, a law which will stay true for more than 20 years.
  • 1973 – FTP is introduced.
  • 1974 – Stephen Bourne develops the first major UNIX shell, the ‘bourne’ shell.
  • 1975 – Bill Gates and Paul Allen found Microsoft.
  • 1976 – A 21-year old Bill Gates writes ‘An Open Letter to Hobbyists’, a document in which he condemns open source and software piracy.
  • April 1st, 1976 – Apple Computers is founded.
  • 1977 – Billy Joy authors BSD, another UNIX-like operating system.
  • 1979 – Microsoft licenses the UNIX source code from AT&T and creates their own implementation, ‘Xenix’.
  • 1981 – The Domain Name System (DNS) is created.
  • 1981 – Microsoft acquires the intellectual property rights for DOS and renames it MS-DOS.
  • 1982 – Sun Microsystems is founded. Sun will become famous for its SPARC microprocessors, Solaris, the Network File System (NFS) and Java.
  • 1982 – Richard Stallman begins to develop a free version of UNIX which he calls ‘GNU’, a recursive definition meaning ‘GNU’s Not UNIX’.
  • 1982 – William Gibson invents the term ‘cyberspace’.
  • 1982 – SMTP, the ‘simple mail transfer protocol’ is published. SMTP is currently the most widespread method for exchanging messages on the Internet.
  • 1982 – Scott Fahlman invents the first emoticon, ‘:)’.
  • 1983 – The Internet is founded by splitting the Arpanet into separate military and civilian networks.
  • 1983 – FidoNet is developed by Tom Jennings. FidoNet will become the most widespread information exchange network in the world for the next 10 years, until the Internet takes over.
  • 1983 – Kevin Poulsen, aka ‘Dark Dante’ is arrested for breaking into the Arpanet.
  • 1984 – CISCO Systems is founded.
  • 1984 – Fred Cohen develops the first PC viruses and comes up with the now-standard term ‘computer virus’.
  • 1984 – Andrew Tannenbaum creates Minix, a free UNIX clone based on a modular microkernel architecture.
  • 1984 – Bill Landreth, aka ‘The Cracker’, is convicted of hacking computer systems and accessing NASA and Department of Defense computer data.
  • 1984 – Apple introduces Macintosh System 1.0.
  • 1985 – Richard Stallman founds the Free Software Foundation.
  • March 15, 1985 – ‘Symbolics.com’ is registered as the first Internet domain name.
  • November 1985 – Microsoft releases ‘Windows 1.0’, which sells for $100.
  • 1986 – The Computer Fraud and Abuse Act in US adopted.
  • 1986 – ‘Legion of Doom’ member Loyd Blankenship, aka ‘The Mentor’, is arrested and publishes the now famous ‘Hacker’s Manifesto’.
  • 1988 – The CD-ROM is invented.
  • 1988 – IRC is established.
  • November 1988 – Robert Morris launches an Internet worm which infects several thousand systems and clogs computers around the country due to a programming error. This worm is now knows as the Morris worm.
  • 1989 – the WWW is developed at CERN labs, in Switzerland.
  • 1990 – The Arpanet is dismantled.
  • 1990 – Kevin Poulsen hacks a phone system in LA making himself the winner of a Porsche 944 in a radio phone-in.
  • 1991 – PGP (Pretty Good Privacy), a powerful, free encryption tool is released by Philip Zimmerman. The software quickly becomes the most popular encryption package in the world.
  • 1991 – Rumours appear regarding the computer virus ‘Michaelangelo’, coded to launch its destructive payload on March 6th.
  • September 17, 1991 – Linus Torvalds releases the first version of Linux.
  • 1992 – The ‘Masters of Deception’ phone phreaking group is arrested due to evidence obtained via wiretaps.
  • 1993 – The Mosaic web browser is released.
  • 1993 – Microsoft releases Windows NT.
  • 1993 – First version of FreeBSD is released.
  • March 23, 1994 – 16-year-old Richard Pryce, aka ‘Datastream Cowboy’, is arrested and charged with unauthorized computer access.
  • 1994 – Vladimir Levin, a Russian mathematician, hacks into Citibank and steals $10 million.
  • 1995 – Dan Farmer and Wietse Venema release SATAN, an automated vulnerability scanner, which becomes a popular hacking tool.
  • 1995 – Chris Lamprecht, aka ‘Minor Threat’, is the first person to be ever banned from the Internet.
  • 1995 – Sun launches Java, a computer programming language designed to be portable across different platforms in compiled form.
  • August 1995 – Microsoft Internet Explorer (IE) released. IE will become the most exploited web browser in history and a favourite target for virus writers and hackers.
  • August 1995 – Windows 95 is launched.
  • 1996 – IBM releases OS/2 Warp version 4, a powerful multi-tasking operating system with a new user interface, as a counter to Microsoft’s recently released Windows 95. Despite being more reliable and stable, OS/2 will slowly lose ground and be discontinued a few years later.
  • 1996 – ICQ, the first IM, is released.
  • 1996 – Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of USD $12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail.
  • 1997 – DVD format specifications published.
  • 1998 -Two Chinese hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank’s computer network and stealing 720’000 yuan ($87’000).
  • March 18, 1998 – Ehud Tenebaum, a prolific hacker aka ‘The Analyzer’, is arrested in Israel for hacking into many high profile computer networks in US.
  • 1998 – CIH virus released. CIH was the first virus to include a payload which wipes the FLASH BIOS memory, rendering computer systems unbootable and invalidating the myth that ‘viruses cannot damage hardware’.
  • March 26, 1999 – Melissa virus released.
  • 2000 – A Canadian teenage hacker known as ‘Mafiaboy’ conducts a DoS attack and renders Yahoo, eBay, Amazon.com, CNN and a few other web sites inaccessible. He is later sentenced to eight months in a youth detention center.
  • 2000 – Microsoft Corporation admits its computer network was breached and the code for several upcoming versions of Windows were stolen.
  • 2000 – FBI arrests two Russian hackers, Alexei V. Ivanov and Vasiliy Gorshkov. The arrests took place after a long and complex operation which involved bringing the hackers to the US for a ‘hacking skills demonstration’.
  • July 2001 – CodeRed worm released. It spreads quickly around the world, infecting a hundred thousand computers in a matter of hours.
  • 2001 – Microsoft releases Windows XP.
  • July 18th, 2002 – Bill Gates announces the ‘Trustworthy Computing’ initiative, a new direction in Microsoft’s software development strategy aimed at increasing security.
  • October 2002 – A massive attack against 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net.
  • 2003 – Microsoft releases Windows Server 2003.
  • April 29th, 2003 – New Scotland Yard arrest Lynn Htun at a London’s InfoSecurity Europe 2003 computer fair. Lynn Htun is believed to have gained unauthorized access to many major computer systems such as Symantec and SecurityFocus.
  • November 6th, 2003 – Microsoft announces a USD 5 million reward fund. The money will be given to those who help track down hackers targeting the software giant’s applications.
  • May 7th, 2004 – Sven Jaschan, the author of the Netsky and Sasser Internet worms, is arrested in northern Germany.
  • September 2004 – IBM presents a supercomputer which is the fastest machine in the world. Its sustained speed is 36 trillion operations per second.
  • 24 June 2005 – Robert Lyttle (one half of the ‘Synamic Duo’) was sentenced to four months in prison (followed by three years probation) and given a fine of $72,000 for hacking into US government computer systems and defacing web sites.
  • 17 August 2005 – former AOL software engineer Jason Smathers given a 15 month prison sentence for stealing 92 million screen names from an AOL database and selling them to a spammer. The spammers then used the e-mail addresses to send out 7 billion spam messages.
  • 24 August 2005 – Chinese hacker arrested in Japan for virtual ‘theft’ of online game goods.
  • 6 January 2006 – Sean Galvez indicted in Massachusetts on one count of larceny and 10 counts of unauthorized access to a computer and identity fraud for breaking into more than 40 eBay accounts and accumulating charges totaling $32,000.
  • 3 October 2006 – three men sentenced to eight years each in Russia for a spree of extortion attacks in 2003: the hackers stole up to $4 million from UK companies.
  • 23 August 2007 – UK man arrested for unauthorised use of a wireless connection in Chiswick, London.
  • 18 December 2007 – Hario Tandiwidjojo, a former computer consultant, pleads guilty in the US to unauthorized access to a protected computer, after breaking in to more than 60 business kiosks at hotels and stealing credit card information.
  • 11 June 2008 – Robert Matthew Bentley sentenced in the US to 41 months in prison, and ordered to pay $65,000 restitution, for breaking into corporate computer systems in Europe (including those of Rubbermaid) and using them as part of a botnet.
  • 11 July 2008 – Yang Litao receives two years in prison in China for hacking into a Red Cross web site and attempting to divert relief donations to a bank account under his control (following the Sichuan earthquake).
  • 5 November 2008 – Ivan Biltse, Angelina Kitaeva and Yuriy Rakushchynets (aka Yuriy Ryabinin) plead guilty in the US to conspiracy and access device fraud for their part in a scheme that used stolen Citibank card information to steal $2 million. The group, that included seven others charged earlier in the year, allegedly broke into a server that processes ATM transactions from 7-eleven cash machines.
  • 5 March 2009 – the gang behind the failed attempt to steal $229 million from the London office of the Sumitomo Bank in 2004 are sent to prison. Hackers were smuggled into the bank by an insider and used commercial keylogging software to capture login credentials and transfer money to overseas accounts. The two hackers, Jan van Osselaer and Gilles Poelvoorde, were given sentences of three and a half years and four years respectively. The insider, Kevin O’Donoghue, O’Donoghue was ordered to serve four years and four months in prison. Hugh Rodley and David Nash, who set up the international bank accounts, received sentences of eight years and three years respectively.
  • 28 August 2009 – Albert Gonzalez agrees to plead guilty to 19 counts of wire fraud, conspiracy, aggravated identity theft and money laundering related to the theft of more than 170 million credit and debit card accounts from TJX, Barnes & Noble, Office Max and others. Under the terms of the deal, Gonzalez will spend 15 to 25 years in prison and will forfeit more than $2.8 million.
  • 17 February 2010 – hacker replaces commercial video with porn on a Moscow billboard.
  • 24 February 2010 – hacker leaks data about the finances of Latvian banks and state-owned firms to Latvian TV.

All information is only for the study purpose.  

                                                                  College hacker





Twitter Link :-       https://www.twitter.com/hacker_college

Labels: