Professional Documents
Culture Documents
Hackers can create the program then search for unprotecting pathways into networking systems and
computers
7What damage can hackers do?
They can steal money open credit card and bank accounts of your name
8.What are the different types of hacking?
In 1960s during the first time the mainframe computers were locked away in tempaerature
controlled,glass in areas.The MIT students were using a computer. The name of employers in Bell Labs in
1969 are Dennis M.Ritche and Ken Thompson. The hackers was called UNIX.The In 1970s the world was
primed and ready from hackers. The first major hacking came in 1971 by the Vietnam vet name John
Draper. They was later called “Phreaking”.Abbie Hoffman followed by John Draper. He interested in
phreaking fight in American Telephone and Telegraph Company. In 1980s hacking reached the peak of
seriousness. The IBM announce a personal computers in 1981. Tim Berner’s Lee was called an
ARPANET. Starting in 1990s LOD and MOD are involved online warfare for almost two years.