📄 evolution of hacking.htm
字号:
<html xmlns:v="urn:schemas-microsoft-com:vml"
xmlns:o="urn:schemas-microsoft-com:office:office"
xmlns:w="urn:schemas-microsoft-com:office:word"
xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=windows-1252">
<meta name=ProgId content=Word.Document>
<meta name=Generator content="Microsoft Word 11">
<meta name=Originator content="Microsoft Word 11">
<link rel=File-List href="Evolution%20of%20Hacking_files/filelist.xml">
<title>Evolution of Hacking</title>
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:SpellingState>Clean</w:SpellingState>
<w:GrammarState>Clean</w:GrammarState>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
</w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" LatentStyleCount="156">
</w:LatentStyles>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:536871559 0 0 0 415 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:Verdana;
mso-fareast-font-family:"Times New Roman";
mso-bidi-font-family:"Times New Roman";
color:#383838;}
span.SpellE
{mso-style-name:"";
mso-spl-e:yes;}
span.GramE
{mso-style-name:"";
mso-gram-e:yes;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.Section1
{page:Section1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman";
mso-ansi-language:#0400;
mso-fareast-language:#0400;
mso-bidi-language:#0400;}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="3074"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1"/>
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=black lang=EN-US style='tab-interval:.5in'>
<div class=Section1>
<p class=MsoNormal align=center style='text-align:center;line-height:150%'><a
name=EVO><b><u><span style='font-size:36.0pt;line-height:150%;font-family:"Times New Roman";
color:gray'>Evolution of Hacking</span></u></b></a></p>
<p class=MsoNormal style='text-align:justify;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:#FF6600'> </span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'>Astonishingly, hacking did not instigate as an <span class=SpellE>antisociety</span>
activity. The entire story of hacking started with the belief that there is
always more than one way to solve a problem. People also wanted to admittance
the information free of cost at any time. </span></p>
<p class=MsoNormal style='text-align:justify;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'> </span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'>Computer hacking started in the late 1950s. Before that, computers
and programming languages were not easily <span class=SpellE>easily</span>
reached. Problems were solved by repeating known and successful computing
methods. To Work on computers, people needed formal problems and <span
class=SpellE>predesigned</span> solutions. Computers were allotted to
professionals based on priority of their requirements. The restricted use of
computer resources reduced the chances for any experiments with early
computers.</span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'> </span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'>The authorities of Massachusetts Institute of Technology (MIT)
allowed people to access their TX-0 resources without any restrictions after
official hours. That was the first time when computer users got a chance to
experiment with different methods for solving problems. In other words, that
was the beginning of the hacker community. However, the prime aim of those
hackers was to experiment with new solutions without any malevolent intent. The
earlier hackers performed their activities with a strong belief that there is
always a space for enhancement. They performed their activities without any predefined
structure and time schedules.</span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'>In parallel to the computers hacking activities, a new type of
hackers, <span class=SpellE>phreaks</span>, came into existence. Phreaks first
accessed telephone networks by using handheld electronic devices. Phreaks used
those devices to make modifications to pay telephones to make free telephone
calls. To try to be like payments in pay telephones, they used devices, such as
red boxes. </span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'> </span></p>
<p class=MsoNormal style='text-align:justify;text-indent:.5in;line-height:150%'><span
style='font-size:14.0pt;line-height:150%;font-family:"Times New Roman";
color:white'>In the early 1980s, a new computing era started by connecting
computers and telephone networks with the help of modems. Personal computers
became popular. Users started to use modems and telephone networks to connect
personal computers and mainframe computers. The access to the computers
connected to the internet opened the entire world of computers to the <span
class=GramE>hackers</span> community. The rapid gro wth of the internet
technologies changed the profile of hackers. </span></p>
<p class=MsoNormal><span style='font-size:14.0pt'> </span></p>
<a href="C:\Documents and Settings\user\Desktop\project\How To Become A Hacker.htm">What is Hacking<a/>
</div>
</body>
</html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -