Tổng hợp tài liệu các thể loại, đầy đủ nhất tại (http://123doc.org/trang-ca-nhan-2087988-tong-hop-abc-xyz.htm)
Thứ Ba, 24 tháng 5, 2016
Websters new hacker dictionary
ix
Introduction
high-speed network built by the U.S. Defense Department as a computer communications experiment.
By linking hundreds of universities, defense contractors, and research laboratories, ARPANET allowed
researchers around the globe to exchange information with impressive speed.1 This capability of working collaboratively advanced the field of Information Technology and was the beginnings of what is now
the Internet.
In hackerdom history, the 1970s decade is affectionately known as the Elder Days. Back then, many
of the hackers (as with the hippies of that era) had shoulder-length hair and wore blue jeans. And while
the Beatles were making it to the top of music charts with their creative songs, hackers were busy with
their high-tech inventions. At the start of this decade, only an estimated 100,000 computers were in use.
By the mid-1970s, Bill Gates started the Microsoft Corporation, and Intel’s chairman, Gordon
Moore, publicly revealed his infamous prediction that the number of transistors on a microchip would
double every year and a half.This prediction has since become known as Moore’s Law.
As for other creative outputs of the 1970s, one of the most frequently mentioned is a new programming language called “C.” As was UNIX in the operating system world, C was designed to be
pleasant, nonconstraining, and flexible. Though for years operating systems had been written in tight
assembler language to extract the highest efficiency from their host machines, hackers Ken Thompson
and Dennis Ritchie were among the innovators who determined that both compiler technology and
computer hardware had advanced to the point that an entire operating system could be written in C.
By the late 1970s, the whole environment had successfully been ported to several machines of different types, and the ramifications were huge. If UNIX could present the same capabilities on
computers of varying types, it could also act as a common software environment for them all. Users
would not have to pay for new software designs every time a machine became obsolete. Rather, users
could tote software “toolkits” between different machines.
The primary advantage to both C and UNIX was that they were user-friendly.They were based on
the KISS, or Keep It Simple, Stupid, model.Thus, a programmer could hold the complete logical structure of C in his or her head without too much hassle. No cumbersome manual was needed.
The darker side of hacking also evolved during the Elder Days. Phreaker John Draper wound up in
prison for using a cereal box whistle to get free long-distance telephone calls, and counterculture
Yippie guru Abbie Hoffman started The Youth International Party Line newsletter, a vehicle for letting others know the trade secrets of getting free telephone calls. Hoffman’s publishing partner Al Bell
amended the name of the newsletter to TAP, meaning Technical Assistance Program.The pair argued
that phreaking was not a crime. It did not cause harm to anybody, for telephone calls emanated from
an unlimited reservoir.
The benefits to society and to cybercriminals continued with more advances in Information
Technology in the 1980s.This decade became known as the Golden Age, in part because many of the
high-tech entrepreneurs became some of the world’s richest people. For example, in 1982, a group of
talented UNIX hackers from Stanford University and Berkeley founded Sun Microsystems
Incorporated on the assumption that UNIX running on relatively low-cost hardware would prove to
be a highly positive combination for a broad range of applications. These visionaries were right.
Although still priced beyond most individuals’ budgets, the Sun Microsystem networks increasingly
replaced older computer systems such as the VAX and other time-sharing systems in corporations and
in universities across North America. Also, in 1984 a small group of scientists at Stanford University
started Cisco Systems, Inc., a company that today remains committed to developing Internet Protocol
(IP)–based networking technologies, particularly in the core areas of routing and switches.
Introduction
x
The 1980s also had their darker moments. Clouds began to settle over the MIT Artificial
Intelligence (AI) Lab. Not only was the PDP technology in the AI Lab aging, but the Lab itself split
into factions by some initial attempts to commercialize Artificial Intelligence. In the end, some of the
AI Lab’s most talented White Hats were attracted to high-salary jobs at commercial startup companies.
In 1983, the movie War Games was produced to expose to the public the hidden faces of Black Hat
hackers in general and the media-exposed faces of the 414-gang, a cracker gang, in particular. Ronald
Mark Austin and his 414-gang from Milwaukee started cracking remote computers as early as 1980.
In 1983, after they entered a New York cancer hospital’s computer system without authorization, the
gang accidentally erased the contents of a certain hospital file as they were removing traces of their
intrusion into the system. As a result of this exploit, that New York hospital and other industry and
government agencies began to fear that confidential or top-secret files could be at risk of erasure or
alteration. After the 414-gang became famous, hackers developed a penchant for putting numbers
before or after their proper names, or for using a completely new moniker or “handle” (such as
“Mafiaboy”).
Besides movies about the dark side of hacking in the 1980s, the U.S. and the U.K. governments
passed laws to curb cracking activities. For example, in Britain, the Forgery and Counterfeiting Act of
1981 was passed to help authorities convict criminals involved in these activities, and in the United
States in 1986, Congress approved the Computer Fraud and Abuse Act to curb such criminal acts.
Some of the world’s most famous crackers stole media headlines during 1988. It was then that Kevin
Poulsen took over all the telephone lines going into Los Angeles radio station KIIS-FM, making sure
that he would be the 102nd caller for a contest and the winner of a Porsche 944 S2. Also, on
November 3, 1988, Robert Morris Jr. became known to the world when as a graduate student at
Cornell University, he accidentally unleashed an Internet worm that he had developed. The worm,
later known as “the Morris worm,” infected and subsequently crashed thousands of computers. Finally,
in 1988, cracker Kevin Mitnick secretly monitored the email of both MCI and DEC security officials.
For these exploits, he was convicted of causing damage to computers and of software theft and was
sentenced to one year in prison—a cracking-followed-by-prison story for Mitnick that was to repeat
over the next few years.
The years from 1990 through 2000 are known as the Great Hacker Wars and Hacker Activism Era
because during this time, cyberwars became a media story spinner. For example, the early 1990s
brought in the “Hacker War” between two hacker clubhouses in the United States—the Legion of
Doom (LoD) and the Masters of Deception (MoD). LoD was founded by Lex Luthor in 1984; MoD
was founded by Phiber Optik. Named after a Saturday morning cartoon, LoD was known for attracting the best hackers in existence until one of the club’s brightest members, Phiber Optik (a.k.a. Mark
Abene) feuded with Legion of Doomer Erik Bloodaxe. After the battle, Phiber Optik was removed
from the club. He and his talented clan then formed their own rival club, MoD. LoD and MoD
engaged in online warfare for almost two years. They jammed telephone lines, monitored telephone
lines and telephone calls, and trespassed into each others’ computers.
Then the U.S. federal agents moved in. Phiber Optik got a one-year jail sentence for his exploits.
After his release from federal prison, hundreds of individuals attended a “welcome home” party in his
honor at an elite Manhattan club, and a popular magazine labeled Phiber Optik “one of the city’s 100
smartest people.”2
Political activism—such as that seen on U.S. big-city streets pushing for civil rights for minorities
and equal rights for women during the 1960s and 1970s—moved to the computer screen in the 1990s.
xi
Introduction
For example, in 1994 and 1995, White Hat hacktivists—the combining of hacking and activism—
squashed the Clipper proposal, one that would have put strong encryption (the process of scrambling
data into something that is seemingly unintelligible) under United States government control.
By 1995, many “golden” achievements were under way. In 1995, the CyberAngels, the world’s oldest and largest online safety organization, was founded. Its mission was and continues to be the tracking
of cyberstalkers, cyberharassers, and cyberpornographers. Also, the Apache Software Foundation, a
nonprofit corporation, evolved after the Apache Group convened in 1995. The Apache Software
Foundation eventually developed the now-popular Apache HTTP Server, which runs on virtually all
major operating systems.
Also in 1995, the SATAN (Security Administrator Tool for Analyzing Networks) was released on
the Internet by Dan Farmer and Wietse Venema, an action that caused a major uproar about security
auditing tools being made public. In this same year, Sun Microsystems launched the popular programming language Java, created by James Gosling, and the first online bookstore, Amazon.com, was
launched by Jeffrey Bezos.Tatu Ylonen released the first SSH (Secure SHell) login program, a protocol for secure remote logins and other secure network services over a network deemed to be
nonsecure. Finally, in 1995, the Microsoft Corporation released Windows 95. It sold more than a million copies in fewer than five days.
By the year 2000, society was becoming more fearful of the dark side of hacking. For example, in
February 2000, John Serabian, the CIA’s information issue manager, said in written testimony to the
United States Joint Economic Committee that the CIA was detecting with increasing frequency the
appearance of government-sponsored cyberwarfare programs in other countries. Moreover, on May
23, 2000, Dr. Dorothy Denning, a cybercrime expert who at the time was at Georgetown University,
gave testimony before the United States Special Oversight Panel on Terrorism. She said that cyberspace was constantly under assault, making it a fertile place for cyber attacks against targeted individuals,
companies, and governments—a point repeated often by White Hat hackers over the past 20 years. She
warned that unless critical computer systems were secured, conducting a computer operation that physically harms individuals or societies may become as easy in the not-too-distant-future as penetrating a
Website is today.
During 2000, the high-profile case of a Canadian cracker with the moniker Mafiaboy (his identity
was not disclosed because he was only 15 years old at the time) raised concerns in North America and
elsewhere about Internet security following a series of Denial of Service (DoS) attacks on several highprofile Websites, including Amazon.com, eBay, and Yahoo!. On January 18, 2001, Mafiaboy pleaded
guilty to charges that he cracked into Internet servers and used them as starting points for launching
DoS attacks. In September 2001, he was sentenced to eight months in a detention center for minors
and was fined $250 Canadian.
The year 2001 and beyond has become known as an era marked by fears of an Apocalypse—
brought about by terrorists in the actual world in combination with cyberterrorists in cyberspace. In
just five years, citizens at home and at work have become bombarded by cyber worms and cyber
viruses that have cute names such as the Love Bug, Melissa, and Slammer but that have caused billions
of dollars in lost productivity and damage to computer networks worldwide. Even worse, many experts
fear that the evolution of devastating viruses and worms is occurring at such a rapid rate that the
potential for a cyber Apocalypse could occur any time now.
In an attempt to halt cybercriminals, the U.S. government and other governments around the globe
have passed legislation that is tougher and more controversial than ever before. For example, in the spring
Introduction
xii
of 2002, U.S. Representatives Saxby Chambliss, R-GA, and Jane Harman, D-CA, introduced the
Homeland Security Information Sharing Act to provide for the sharing of security information by U.S.
Federal intelligence and law enforcement parties with state and local law enforcement agents.This Act,
requiring the President to direct coordination among the various intelligence agencies, was sent to the
Senate Committee on Intelligence and to the Committee on the Judiciary on April 25, 2002. On May
6, 2002, it was sent to the Subcommittee on Crime,Terrorism, and Homeland Security, and on June 13,
2002, it was reported with an amendment by the House Judiciary. It lapsed without passage.
Moreover, on July 10 and 11, 2002, a United States Bill on Homeland Security was introduced by
Representative Richard Armey, R-TX, to the Standing Committees in the House. It was heavily
amended by the Committee on Homeland Security on July 24, 2002, and was passed by the House
on July 26, 2002.The bill was received in the Senate on November 19, 2002 and passed by the Senate
on November 25, 2002. The Homeland Security Act of 2002 was signed by the President of the
United States as Public Law 107-296. It was meant to establish the Department of Homeland Security,
and Section 225 was known as the Cyber Security Enhancement Act of 2002.
On January 24, 2003, President George W. Bush swore in Tom Ridge as the first Secretary of the
Department of Homeland Security, and one month later, a storm was brewing over the proposed
Domestic Security Enhancement Act of 2003, also known as Patriot Act II.William Safire, a journalist with The New York Times, described the first draft of the Patriot II’s powers by suggesting that the
U.S. President was exercising dictatorial control. Then, on February 7, 2003, the storm intensified
when the Center for Public Integrity, a public-interest think-tank in Washington, D.C., disclosed the
entire content of the Act. The classified document allegedly had been given to the Center by someone in the federal government.3 The Act ultimately did not become law.
Governments and legal analysts were not the only ones motivated by cyber fears in the early 2000s.
In August 2003, three crippling worms and viruses caused considerable cyber damage and increased the
stress levels of business leaders and citizens alike about a possible “cyber Apocalypse.”The Blaster worm
surfaced on August 11, 2003, exploiting security holes found in Microsoft Windows XP. Only a few days
later, on August 18, the Welchia worm appeared on the scene, targeting active computers. It went to
Microsoft’s Website, downloaded a program that fixes the Windows holes (known as a “do-gooder”), and
then deleted itself.The most damaging of the three cyber pests was the email-borne SoBigF virus, the
fifth variant of a “bug” that initially invaded computers in January 2003 and resurfaced with a vengeance
also on August 18, 2003.The damages for lost production and economic losses caused by these worms
and viruses were reportedly in excess of $2 billion for just an eight-day period.
About this time, John McAfee, the developer of the McAfee anti-virus software company, claimed
that there were more than 58,000 virus threats, and the anti-virus software company Symantec further
estimated that 10 to 15 new viruses are discovered daily.
By November 5, 2003, the media reported that a cracker had broken into one of the computers on
which the sources of the Linux operating systems are stored and from which they are distributed
worldwide. One day later, Microsoft Corporation took the unusual step of creating a $5 million fund
to track down crackers targeting Microsoft’s Windows operating systems. That fund included a
$500,000 reward for information that would lead to an arrest of the crackers who designed and
unleashed the Blaster and SoBigF. This Wild West–like bounty underscored the perceived threat posed
xiii
Introduction
by viruses and worms in an interlinked world, as well as the problems associated with finding their creators. However, some cynical security critics said that the reward had more to do with Microsoft’s
public relations than with crime and punishment.
By the end of 2003, the Computer Security Institute/FBI survey on computer crime, enlisting the
responses of 530 computer security professionals in U.S. corporations, universities, government agencies, and financial and medical institutions, revealed that more than half of the respondents said that
their organizations had experienced some kind of unauthorized computer use or intrusion during the
previous 12 months. An overwhelming 99 percent of the companies whose security practitioners
responded to the survey thought that they had adequate protection against cyber intruders because
their systems had anti-virus software, firewalls, access controls, and other security measures. As in previous years, theft of proprietary information was reported to have caused the greatest financial losses.4
Also at the end of 2003, a survey released by Deloitte & Touche LLP indicated that chief operating
officers (COOs) of companies around the world were more nervous about terrorist attacks adversely
impacting on business than were their American peers.The economist Carl Steidtmann, for example,
suggested that U.S. executives might be less concerned and more complacent about terrorist and
cyberterrorist attacks because they felt that their country had taken more overt steps to combat terrorism, such as introducing the Homeland Security Act of 2002.
Besides intrusions and terrorism, spam was a major topic for action in November 2003.The United
States Federal Trade Commission (FTC) had earlier set up a national spam database and encouraged
people to forward to them all the email spam they received.The FTC noted that in 2002, informants
had reported more than 17 million complaints about spam messages to the federal agents for investigation, and the FTC said that it received nearly 110,000 complaints daily. To control spam, on
November 25, 2003, the United States Senate passed the CAN-SPAM Act of 2003, also known as the
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003. It was to regulate
interstate commerce in the United States by imposing limitations and penalties on the distributors of
spam (that is, the transmission of unsolicited email through the Internet). Penalties included fines as
high as $1 million and imprisonment for not more than five years for those found guilty of infringing
the Act.The Act took effect on January 1, 2004.
Moreover, on April 8, 2005, a landmark legal case concluded that involved spammer Jeremy Jaynes
of Raleigh, North Carolina. This spammer—who went by the name “Gaven Stubberfield” and was
described by prosecutors as being among the top 10 spammers in the world—was sentenced to nine
years in U.S. prison.This case is considered to be important because it was the United States’ first successful felony prosecution for transmitting spam over the Internet.A Virginia jury sentenced Jaynes for
transmitting 10 million emails a day using 16 high-speed lines. Jaynes allegedly earned as much as
$750,000 a month on this spamming operation. The sentence has been postponed while the case is
being appealed.5
In closing, little doubt exists that the cyber challenges facing governments, industry, universities,
medical institutions, and individuals are enormous. Because cybercrime appears in many guises, is multifaceted, and involves jurisdictions around the world, there is no single solution to the problem.This
book was written to detail the many cyber challenges that security professionals, businesses, governments, individuals, and legal experts face and to present some useful answers for staying a few steps
ahead of the “dark side”—those in the cracking and cyberterrorist communities.
Introduction
xiv
Chronology of Selected Hacker-Related Events
Prehistory (1800s–1969)
1815–mid-1800s
Ada Byron, the daughter of the famous poet Lord Byron, was born in 1815. During a dinner party at
Mary Somerville’s home in 1834, Ada was introduced to a researcher named Babbage, who spoke of
a “new calculating machine.” By 1841, he reported on its development at a seminar in Italy. Ada and
Babbage continued developing this concept, and by 1843,Ada published her own paper predicting that
a machine could be developed to not only compose complex music and produce graphics but also be
used for a variety of scientific and practical uses. Ada also suggested that Babbage should write a plan
for how the Analytical Engine might calculate Bernoulli numbers.This plan was completed and is now
recognized as the initial “computer program.” In modern days, the popular programming language
ADA was named in Ada Byron’s honor.
1920s–1950s
Kay McNulty Mauchly Antonelli, born in 1921, was recruited by the U.S. army in the summer of 1942
to calculate by hand the firing trajectories of artillery. She was sort of a “human computer.” Later, Kay
met John Mauchly, a professor and co-inventor with Presper Eckert of the first electronic computer
in (known as the ENIAC or Electrical Numerical Integrator and Calculator) in 1935. In 1948, Kay
married John, and two years later they, along with Presper Eckert, started their own company. The
three-person team developed a new, faster computer called the Univac or Universal Automatic
Computer. One of its assets was its use of magnetic tape storage to replace awkward and clumsy
punched data cards and printers. At this time, the computer industry was only four years old.
In the 1940s and 1950s, computer were made with 10,000 vacuum tubes and occupied more than
93 square meters of space, about the size of a spacious 3-bedroom apartment.There was a limit to how
big computers could be because they could overheat and explode. Major improvements came in computer hardware technology with the development of transistors in 1947 and 1948 that replaced the
much larger and power-hungry vacuum tubes. Computers developed even more with the development of integrated circuits in 1958 and 1959—putting initially only a few transistors on one chip.
1960s
During the 1960s, the infamous MIT computer geeks did their hacking exploits. Computers looked
quite different back then.They were not small or portable, as they are today. Instead, they were huge,
and capable of overheating if they were not stored in temperature-controlled spaces.They were known
as the PDP series, and their processing time was considerably slower than that of today.The computer
geeks created what they called “hacks” or “programming shortcuts” to enable them to complete their
computing tasks more quickly. Many times, these shortcuts were more elegant than the original program.These creative individuals became known (in a positive sense) as “hackers.” Some of these men
became the center of MIT’s Artificial Intelligence (AI) Lab.
Since the 1960s, the number of transistors per unit area has been doubling every one and a half
years, thus increasing computing power tremendously.This amazing progression of circuit fabrication
is called Moore’s Law and has remained valid since then.
Đăng ký:
Đăng Nhận xét (Atom)
Không có nhận xét nào:
Đăng nhận xét