A History of Hacking Essay

A History of Hacking Essay

Length: 1326 words (3.8 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Hackers have a very rich history, despite being most commonly linked to the latest outburst of technology. They've helped excel many of the everyday gadgets a majority of the population owns and uses today. Not only have they established a very well known name today when it comes to computers, but nearly every piece of technology we know today can be linked back to them. They have advanced greatly in both their knowledge of computers as well as their morality concerning what to do with their information, causing a split of both righteous and sinister behavior among their groups. Throughout history, as their knowledge for the working mechanisms continued to grow, hackers have positively advanced entire societies in gigantic leaps with their gift for understanding and utilizing electronics to their max capacities which allowed them to continue to expand on the ways people can use them even to this day.
With the definition of a hack, according to Joe Grand's article, being "A new and novel creation or method of solving a problem, typically in an unorthodox fashion." almost every invention even before the digital era can be considered a hack if looked at like this, which means that ever since the creation of the electronic based technology we know today like televisions, radios, and telephones that hackers have helped shape them into what they are today. Without hackers all of these gadgets would look exactly the same as the day they were made or not even exsist at all because there was no need to expand on them and to push them. Television may never have been invented or developed from silent movies, because the technology to capture moving pictures would have never been advanced and the desire to easily broadcast films in homes w...

... middle of paper ...

...ue to have a impact far into the future.

Works Cited

Ezekiel, Alan W. "Hackers, Spies, And Stolen Secrets: Protecting Law Firms From Data Theft." Harvard Journal Of Law & Technology 26.2 (2013): 649-668. Academic Search Complete. Web. 28 April 2014.
Gold, Steve. "Get Your Head Around Hacker Psychology." Engineering & Technology (17509637) 9.1 (2014): 76-80. Academic Search Complete. Web. 1 May 2014.
Grand, Joe. "A Brief History Of Hardware Hacking." Communications Of The ACM 49.6 (2006): 49. Academic Search Complete. Web. 30 Apr. 2014.
"Internet History From ARPANET To Broadband." Congressional Digest 86.2 (2007): 35-64. Academic Search Complete. Web. 30 Apr. 2014.
Pultarova, Tereza, James Hayes, and Aasha Bodhani. "Is Contact Less A Soft Touch For Hackers?." Engineering & Technology (17509637) 8.11 (2013): 48-50. Academic Search Complete. Web. 29 April 2014.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Key Events in The History of Computer Hacking Essay

- When the public hears the term hacking, they often think of theft, defacement, crime, and other illegal activities. Nowadays, this view is correct to some degree. It is appropriate to say that multitudes of hackers are malevolent; however, this is the 21st century. We are the most technologically advanced generation. Everyone either has a smartphone, computer, or a tablet – frequently even all three. The view of hackers has changed drastically over time; hackers are now viewed as criminals, but that has not always been the case, countless hackers are in-fact harmless, curious individuals looking to make a difference....   [tags: technology, computers, operating system]

Strong Essays
1359 words (3.9 pages)

Hacking: Past, Present, and Future Essay

- Hacking has been in existence for more than a century. It all began when a group of teenage boys who were interested in knowing how the telephone worked than in making proper connections and directing calls to the correct place. Originally, hacking was not even seen as a negative connotation with which we associate the term with in today’s world. The term "hack" is a shortcut that would modify and improve the performance of a computer's operating system that would take less time to complete. (http://findarticles.com) This all started way back in 1971 where people began to hack into everything from phones, to bank accounts and then to computers....   [tags: Hacking Technology]

Strong Essays
2488 words (7.1 pages)

Cyber Hacking and Types of Hackers Essay

- The FED or Federal Reserve Bank is the central banking system of the United States of America. It was created on December 23, 1913, after the enactment of the Federal Reserve Act, because of a series of financial panics from the America public referring to the panic of 1907. Recently the FED is celebrated it 100th anniversary. Which makes people wonder, “What will the FED look like 100 years from now?”. This is a very interesting question to ask. There are many different challenges/outcomes for the FED’s future....   [tags: Federal Reserve Bank, Privacy, Information]

Strong Essays
673 words (1.9 pages)

Cyber Ethics: Principles to Combat Hacking Essay

- Introduction Issues of ethics and professionalism had been touch frequently in our current society lately. Experts from a particular field usually and logically should behave professionally or show their expertise to the civilian. However, in fact they are working oppositely and crime their expertise with their knowledge. This actually brought troubles to the outsider or victim and causes them to loss their property or reputation. In information technology field, issue regarding to ethics and professionalism had been given name as cyber ethics....   [tags: ethics, professionalism, computers]

Strong Essays
2190 words (6.3 pages)

Hacking Essay

- Hacking Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it. Abstract Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects. Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found....   [tags: science]

Free Essays
4248 words (12.1 pages)

From Hacking to Cyber Terrorism Essay

- From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes....   [tags: Computers Software Hackers Essays]

Strong Essays
3979 words (11.4 pages)

Essay about Hacking In the Business Society

- Hacking In the Business Society From history we can observer that "human society" is easily influenced, and often mislead. There is a near endless amount of examples for this, ranging from the Suicidal Sect leaders (David Koresh http://www.rickross.com/reference/waco/waco321.html ), to mad dictators, with aspirations of taking over the world. This human susceptibility of being easily mislead, is clearly apparent when dealing with the issue of "Hacking", and "Hacking In the Business Society"....   [tags: Papers]

Strong Essays
1177 words (3.4 pages)

Becoming an Individual in Rewriting the Soul by Ian Hacking Essay

- ... This concept he names the “looping effect of human kinds”(21), which is explained with the MPD example being that “the doctors’ vision was different because the patients were different; but the patients were different because the doctors’ expectations were different”(21). The doctors influence the patients only to be later influenced in return by the patients thus there will never be a concrete definition of MPD nor will there be a fixed prototype of the disorder as both are being constantly mutually altered....   [tags: human, personality, influences]

Strong Essays
1385 words (4 pages)

Is Ethical Hacking Truly Ethical? Essay

- From the macro/micro perspective, the world of the electron, despite its extraordinarily minuscule size, is the foundation of society. Computers have not only brought us electronic shopping, email, and online banking, but now control our cars, how we board a plane, our MP3 players, and almost every other aspect of our lives. With any great advancement in civilization, there are always those souls who seek to capitalize on the misfortune of others by finding some way to exploit a weakness in the newest technology available; the computer industry is no exception....   [tags: Ethics ]

Strong Essays
2683 words (7.7 pages)

The Russian State Sponsored Hacking Of The Democratic National Convention And Democratic Congressional Campaign Committee

- In response to the alleged Russian state-sponsored hacking of the Democratic National Convention and Democratic Congressional Campaign Committee servers the United States should take concrete actions to prevent future hackings. This would include increasing both the speed and scope of the Federal move to adopt Cloud-based storage, establishing firm protocols of how to respond to future attacks, and increasing the number of training exercises for ethical hackers to find vulnerabilities in federal agency systems....   [tags: Federal government of the United States]

Strong Essays
975 words (2.8 pages)