Hacking 101
Hacking 101
Hacking 101
ENC 1101
Geller Offiong
1|Page
HACKING – An Art or a Menace??
In the modern world, where technology reigns supreme; with ever evolving
prone to acts of indiscipline, sub-verting the law for personal gain, and pushing the
legal boundaries just to stay “ahead of the pack” -- a trait which behooves the question
“Where did it all go wrong?”. Now the average man walking down the street is wired
mentally only to recognize the good in technology; the increasing emphasis on “what
a device can do” is quite the devil in the fine detail. We look beyond the downsides
purchase. But then, collapsing in despair and pondering the pleasures all forgone, we
ask ourselves… how did this happen? How did I get maligned off $3000? Surely no
for another digital piece of hardware. These ever-increasing instances and the
frightening effects they have on modern society, beg the question… where did it all go
wrong?? And for those mildly alert to the dangers or possibly intuitive thinkers… is
hacking real?? But then going beyond that and examining the consequences and the
enticing thoughts of the dark side of computing and modern technology, we can also
hacking is an intricate art, which requires other-worldly flexibility of the human mind
to accurately comprehend.
2|Page
Taking a little peek into history, we find that hacking was around as early as the
late 1800s!!! Quite astonishing really that the world was oblivious to the possible threats
of such a trend. But more so alarming is the fact that hacking is encouraged by the
same people who promise you gadgets to assure your privacy. Flip a parenthesis on
the right side, or simply ignore the fact that the topsides are always open; seemingly
to relate to the following scenario which is quite common in Urban areas. You walk
into a building with a friend, fresh off a million-dollar transaction, which to your
surprise was conducted with the traditional “brief-case exchange”. You proceed to
have drinks and celebrate your new found financial gait; not considering you booked
a hotel room adjacent to where the deal was to be made – for security reasons. Now
while this may seem like a common pituitary storyline, it is quite apparent that your
little party is getting crashed – albeit by the other party in your seemingly “safe business
next generation technology, akin to the hotels who promise safety, privacy and even
possibly “pre-dawn services”. Now, if you are seriously invested in your personal safety
and the potential earnings, you would opt for a fortress, distant from any possible
mishaps. But then again, where is better to hide than in plain sight? Somehow, the
ever so savvy criminals get their hands on a backway into the hotel room systems,
3|Page
which is after they made several incriminating phone calls through “un-traceable lines”
and are able to setup an access hatch that leads them right to the target, YOU! Now if
we quickly examine this now so developed scenario, we can observe a rather glaring
likeness – your hotel room was hacked! With the use of hacked and hackable
and your “home”. Now further examining this event, we find that access latches are
then if we really do our research, we realize that 1 in 14 hotels get attacked or bypassed
in any major metropolis (hotelsafety.org). And the chances of a hotel being prone to
an extreme natural disaster are quite low. This only goes to show that a supposed asset,
can become a liability, when in the wrong hands. That, my dear novitiate is the art of
hacking.
After considering the former scenario, one may seek answers to rather obvious
questions regarding hackers and what they do. Who are hackers? What do they do?
Why exactly do they do that they do? To emphasize the process, we can attack each
question and reverse engineer our answers to explain its predecessor. Assuming you
actively considered every possibility in the above crime scene concept, one thing would
be rather clear; hackers find problems from solutions. It is quite often, modern day
tech giants such as Microsoft, employ these guys to go head-to-head with the very best
of their creations. Hackers find a way from a destination and create the illusion of
4|Page
proper logic, to achieve their goals. For some, such as Adrian Lamo, the goal is to
maximize human want through excessive financial gain. Plowing at public systems in
a bid to divert funds from unsuspecting masses. And for others, such as LulzSec,
hacking is a literary relic; a study of the very science that it is and all it stands for.
“Anonymous” whose very life mission is to wreak havoc and strike terror in even the
In employing such queer methods, they equate the positive side of technology
filters to find a perfect fit, hackers employ a lifetime’s worth of resources to seek out
or create weak points in every seemingly perfect medium. In the early 1960s, the term
referred to men with extraordinary knowledge of computer arts; individuals with the
ability to push programs beyond their capabilities. It is only rather clear now what
exactly hackers do. They create technological dissonance, which gives room for their
very existence and makes them thrive. Who better to seek the cure from a werewolf
bite, than the werewolf-vampire hybrid? Hackers employ illegal means to acquire
access to certain loopholes in manufacturing. Think about this; with every internet
browsing software, there is a cache file. The cache file maintains “active memory” on
the rom and keeps the user’s workspace intact, running the program at peak
performance, acting like an airplane’s black box and observing, while saving user
5|Page
preferences. Now, what happens if I were to make a transaction online? I would
avoid repetition on subsequent purchases. Now, if you connect the dots, like a real
hacker would, you can see the very possibility of remotely “accessing” the cache.
Considering it holds vital information -- being the Central Nervous System of your
active browsing. This pretty much explains my earlier implication; the hacker pretty
much has his work cut out… step one “gain access to victim’s system”, step two
“acquire cache file” … and voila! my life’s work, information, private files, and
working system.
Examining the first and primary question, creates a sense of intrigue; we want
to know who hackers are, and exactly how their minds work. But the former carries
more importance. Who is a hacker? Or who are hackers? A brief timeline from
technological fronts.
Early 1960s - University facilities with huge mainframe computers, like MIT's artificial
intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive
term for a person with a mastery of computers who could push programs beyond what
6|Page
Early 1970s - John Draper makes a long-distance call for free by blowing a precise
tone into a telephone that tells the phone system to open a line. Draper discovered
Early 1980s - Author William Gibson coins the term "cyberspace" in a science fiction
novel called Neuromancer AND Two hacker groups form, the Legion of Doomin
Late 1980s - The Computer Fraud and Abuse Act gives more clout to federal
authorities.
Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided
by law enforcement.
Early 1990s - Operation Sundevil, a special team of Secret Service agents and
including Miami. Also Kevin Lee Poulsen ("Dark Dante"), is indicted for stealing
military documents..
Late 1990s - Hackers break into and deface federal Web sites, including the U.S.
weaknesses.
It is therefore apparent that hackers are individuals who do not seek solace only
itself, and everyone who has taken a shorter and more resourceful route to anything
in a digital sense can be considered a hacker. We have a solid idea of what hackers
are capable of and the general “dark” effect associated with the term. It is only
imperative that society recognizes it for the artistic aspect, especially at a remotely
individual level equip and educate ourselves with information to utilize it to our
“For Hacking is poetry, and poetry is magic, and magic is power to those who can tap
8|Page
Sources Cited
techniques-infograph
(Gatech.edu)
• Sptime.com
9|Page