Internet
Corbina Telecom, the Russian universal telecom operator, has launched the Internet2 project in Moscow, which will result in the union of Corbina Telecom customers - both those already working with…

Continue reading →

What is a CTR page? and how does it affect earnings?
Well, for starters, let's answer the question "What is CTR?" Ctr is an indicator of clickthrough rate, the ratio of the number of clicks to the number of impressions. The…

Continue reading →

What is a NAS?
There is never much disk space. Probably, everyone faced the choice of what to delete and free valuable megabytes for new photos or music. And the constant recording of films…

Continue reading →

Fifteen of the most famous hacker attacks.

The advent of personal computers had a huge impact on society in the late 70s – early 80s .; just at this time, computer technology has decreased sufficiently in size to fit comfortably in homes and called “personal computers” or PCs.
With the increase in the number of users of personal computers, a rather mysterious and peculiar group appeared in society: hackers. The term “hackers”, popularized in 1983 by Newsweek magazine, describes users who prefer to penetrate the “inside” of a computer rather than just use it. Such people are distinguished by mischief and an inquiring mind, individuality and quick wit, as well as a passion for computers and networks. But besides, hackers are a nightmare for network administrators, security services, and even the FBI.
Some hackers have left their mark on the history of computers, becoming idols for a whole class of new users. Let’s look into history and look at these “computer gods” who were able to break into any protection and even challenge the powers that be.
Famous hackers
Adrian Lamo, Kevin Mitnick and Kevin Poulsen Kevin Mitnick The most famous and undoubtedly the most gifted hacker in history – Kevin Mitnick – created his name in 1981 at an early age, as a seventeen-year-old teenager. He became famous for hacking telephone networks, redirecting calls of his own volition. In 1983, Mitnik achieved his first great success – he obtained illegal access to the Pentagon’s computer, for which he was first arrested. Repeatedly committed crimes forced the FBI to start a “hunt” for him. In the 90s, Kevin Mitnik was sentenced to five years in prison, and today he is a security specialist and the owner of his own company, Mitnick Security Consulting. Kevin Poulsen Kevin Poulsen is currently the chief editor of a technical journal “Wired News”, but before it was known for completely different activities. In 1983, when he was also only 17 years old, he began hacking into various networks, which led to several “skirmishes” with the US legal system. Poulsen continued to engage in illegal activities until in April 1991 he was arrested by FBI officers. In 1994, Kevin Poulsen was sentenced to four years in prison.
Adrian Lamo Adrian Lamo certainly drove the largest number of network administrators crazy. Major corporations such as Microsoft, the New York Times, AOL, Sun Microsystems, Yahoo !, MacDonald’s and Cingular have been affected by his activities. He is credited with all types of attacks and violations of the protection of corporate security systems. Lamo circumvented defensive systems with discouraging simplicity. So, during the nightly news broadcast of the NBC television company, the journalist invited Adrian to prove his talent right in front of the camera lens, and then the hacker entered the internal network of the television company in less than five minutes. Lamo is currently a security specialist and enjoys complete freedom of movement after being under the supervision of US authorities for many years.
John Draper Better known as Cap’n Crunch, John Draper was one of the first hackers in history. Such a nickname came from a box of oatmeal under the same name, inside which John once discovered a toy whistle, put there as a gift to lure customers. Draper noticed that the whistle emits a sound with a frequency that matches the frequency of the electric signal accessing the long-distance telephone network. So he decided to use the whistle to crack telephone lines to make free calls. John Draper was arrested in 1976 and sentenced to two months in prison.

Phreaking, the first movement, John Draper. The magic whistle …- John Draper began his “hacking” activity in the late 60s, after he discovered a toy whistle in a box of Cap’n Crunch oatmeal. He found out that such whistles are capable of making a sound with a frequency of 2,600 Hz, exactly the same frequency was used in telephone networks and signaled the activity of the line. Draper was one of the first to master this technique, which was quickly dubbed “phreaking” (from the English. “Phreaking”).
Draper’s method was pretty simple. First, he dialed the long-distance number and, while the call was on, using the whistle sent a signal with a frequency of 2 600 Hz. This signal was similar to that used in telephone networks to report the status of the line. By imitating this signal, Draper let the telephone station know that he had hung up and that the line was free, although in reality the telephone station did not receive a signal corresponding to the hung up telephone.

The instigator of the new movement is Draper’s Whistle. Draper’s criminal activity was uncovered when his telephone company suspected something was wrong with his phone bills. As a result of the investigation, the case was opened, and in 1972, John Draper was arrested.

Computer jargon - a malignant tumor
Without language, communication between people would be impossible. Regardless of what first comes to mind when mentioning the word "language", the first and second meanings will be true. But certainly…

...

How to launch your site? Hosting and domain
So, you have already chosen the method by which your Internet resource will be created, and suppose that your site is already ready to become seen by all Internet users.…

...

All possible benefits from your own web site.
Let's talk about the benefits that your own website gives you. Why is this topic so important? Most likely, you already know that the Western Internet has overtaken Runet by…

...

What is a NAS?
There is never much disk space. Probably, everyone faced the choice of what to delete and free valuable megabytes for new photos or music. And the constant recording of films…

...