Changes

From Security Weekly Wiki
Jump to navigationJump to search
586 bytes added ,  02:14, 5 December 2019
== Description ==
# 1903 - [https://listverse.com/2018/05/14/10-early-hackers-from-before-the-invention-of-the-home-computer/ Nevil Maskelyne Hacked A Wireless Telegraph Demonstration] - ''The second it became physically possible to hack into something, somebody did it. That somebody’s name was Nevil Maskleyne, history’s first hacker, and he was around a lot earlier than you might expect. He hacked into a live telegraph demonstration in 1903.'' - [Dot-dash-diss: The gentleman hacker's 1903 lulz https://www.newscientist.com/article/mg21228440-700-dot-dash-diss-the-gentleman-hackers-1903-lulz/]
# 1939-1940 - [https://www.cryptomuseum.com/crypto/bombe/ Breaking the Enigma cipher] - ''BOMBE was the name of an electro-mechanical machine, developed during WWII by Alan Turing and Gordon Welchman, whilst working as codebreakers at Bletchley Park. It was used to help breaking the German Enigma codes and was (partly) based on the so-called BOMBA, an earlier machine developed by Polish mathematicians in 1938. From 1943 onwards, an improved version of the British BOMBE was built in the US by the US Navy and — independently — by the US Army.''
# 1966 - [https://www.wired.com/2012/01/computer-password/ The World's First Computer Password? It Was Useless Too] - Fernando Corbató implements passwords on CTSS on an IBM 7090. ''CTSS may also have been the first system to experience a data breach. One day in 1966, a software bug jumbled up the system's welcome message and its master password file so that anyone who logged in was presented with the entire list of CTSS passwords. But that's not the good story. Twenty-five years after the fact, Allan Scherr, a Ph.D. researcher at MIT in the early '60s, came clean about the earliest documented case of password theft. In the spring of 1962, Scherr was looking for a way to bump up his usage time on CTSS. He had been allotted four hours per week, but it wasn't nearly enough time to run the detailed performance simulations he'd designed for the new computer system. So he simply printed out all of the passwords stored on the system.''
6,509

edits

Navigation menu