How Computer Hacking started

An IBM Mainframe

Computer hacking started as an "outgrowth" from "phone phreaking". The latter was the practice of, essentially, hacking the phone system. For example, getting long distance or even international calls at local call rates or even for free. It also involved being able to get at private phone calls, play around with company electronic switchboards and other mostly unsavoury games. Most such activities required a reasonable amount of technical knowledge of how the phone system worked and usually some electronic equipment, some of which had to be home built or at least adjusted - one could say "hacked".

A Friden Flexowriter - an early remote terminal!

The first computer systems that were hackable were those which had some kind of remote terminal (i.e. not in the big hall that housed the huge mainframe computer). These systems had rudimentary time-sharing facilities which were not always too secure. Although hacking attempts probably did occur in commercial installations, it wasn't until such computers started to be installed in universities that such hacking really got underway.

Things got more serious when terminals could be connected to the computer by a telephone line with a modem at each end. Now the phone phreaking community found that some of the numbers on their "unused/unlisted and therefore worth exploring" lists answered with a weird sound that was a bit like a fax machine but different. It didn't take anyone long to realise there was a computer at the other end of the phone line and try to connect to it - either from pure curiosity or to see if there was money to be made here.

Even getting started in this could be expensive as the teletype terminals needed for this weren't cheap. However, old telex machines could be (and were) converted in home workshops. Getting a modem was another matter as they were originally outrageously expensive. But even there the price eventually came down and amateur electronics magazines published projects for building your own. Equipment installed in universities and companies for perfectly legal use were also temporarily re-connected to be used for hacking. The rest, as the say, is history.

I'm sure there will be people who will give a different version of events but no-one knows the whole story - only what they encountered. And, of course, many of the original hackers are no longer with us. The use of the of the term "hacker" has changed in recent years: these days it is often used to refer to someone who creates or modifies software. However, when I first came across the term, in the context of a classified government communications project, that was not what it meant!


Comments 3 comments

SNOTHANDO KASI BICTH 5 years ago

I PERSONAL ENJOY HACKING.ITS FUN BUT ALSO ILIGAL


Murray B from Canada 5 years ago

Great article Dave.

I have a Ferrari red Ferarri but since it is a bottle washer the car snobs won't let me join the club.

A friend of ours is a divorced single mother who has two jobs to make ends meet. Despite paying $100/year for malicious software protection she has had to pay an additional $800 in the last three years to remove serious infections. The last attack almost caused her to have a nervous breakdown because it came at the same time as her hours at one job had been cut back. Both of her jobs pay the minimum and she had no buffer.

The crime committed against this woman is akin to rape. It is high time there was mandatory minimum prison sentences for the terrorists that commit these crimes.

Anyway, keep up with the good articles.


siomn 15 months ago

I really love your write-ups guys continue the good work. http://testedhacks.com

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working