Experts can use their knowledge for good or for bad. Knowledge is power and man can use it, his own way.
In reference to technical experts, they can use their technical computer based knowledge for hacking. With word, "Hacking", only the impressions of those bad people came to mind who have created havoc by hacking bank sites or created terror by hacking security sites. But hacking can also be done for good, for instance to explore the unexplored usage of the device which manufacturers have even missed. It can be used to take an exciting tour of uncultivated technology segments, for which it was never meant.
The article will make you familiar with certain hacking instances which are brilliant in history and have turned the outlook of technology advancements.
Starting with our list, the first hacking case discussed is "Hacking of OS x86."Apple's Operating Systems are considered to be very secure, and there are very less instances of hacking this operating system. But, it is also not untouched by intended hackers and was successfully hacked in 2005.
Mac is designed in such a way that it will run only on Mac compatible hardware. Cross-functioning of this operating system say with Windows requires additional hardware, either physically clunky coprocessors or logically clunky emulators. To crack this security wall of Apple, hackers took the challenge and made it possible to run Mac on PC. They tossed out software patches to create versions of OS X that will run on standard, homebrew machines constructed from parts which can be bought at any PC retailer.
Indeed, hacking of Macintosh needs lot of code fiddling and superior coding abilities, yet it is a thrilling project to try hands on.
The next entry on the list is made by Cell phone, key gadget of the time. Enter the back flash and roll your memory few decades back, remember that classic midcentury rotary dial. Hackers are keen to bring that classic look into the cell-phone age, most notably Hulger, which sells a line of rotary-phone-style handsets for standard mobile phones. But, it was made possible by the Sparkfun's Port-O-Rotary in 2007 that puts a full GSM mobile phone inside an authentic old rotary phone, with the dial, ringer, and even the dial tone still functional.
Then making it to the list is fighting between good and bad; good for users and bad for creators. Creators are fighting against piracy especially, music industry but it seems people just love it. DRM fights against piracy and does not allow you to run same DVD over and over again on multiple devices. But, you say that you've bought a DVD and should be able to play it on any device you own.
To help you, programmer Jon Lech Johansen took the initiative and wrote DeCSS in 1999. DeCSS decrypts DVDs so that you can play them anywhere you like. He has written all sorts of other un-DRMing code, including many to blow the protection off purchased Apple iTunes Music Store files.
NASA is famous for its hacking actions. But, it always hacks automated systems to juice out that extra bit of performance. So, discussing hack of Apllo-13 makes a point here as it was done to save lives of astronauts. After a fuel tank explosion severely damaged Apollo 13's command module, ground control and astronauts hacked a system for removing carbon dioxide from the lunar module, and made it back to earth safely.
In 1961, computer gaming was pretty much unknown concept and that too using mainframes. Mainframes remind of those bulky machines spread across a room with underlying coolers to cool them. In 1961, Steve Russell designed the first action-packed, graphics-based, shoot-‘em-up game, which was controlled by the mainframe's front-panel switches. It was a hacking program and, using the PDP-1 mainframe to process a function for which it was not intended.
For more information click here
.
Blog Archive
-
▼
2011
(40)
-
▼
August
(22)
- Cell Phone Forensic Software
- Inventions that Changed the World
- Inventors And Their Inventions
- The Latest Inventions - Four Examples
- Buying an iPod on Craigslist: Tips for Success
- How to remove password from iPod touch?
- How to trace Cell Phone Calls And SMS Text Message...
- Cell Phone Radiation: Top 10 Least Radiation-Emitt...
- Advantages and Disadvantages of Camera Cell Phones
- Using VOIP with Your Cell Phone
- Wireless Technology History: The Vast Importance o...
- How to unlock your Android Phone
- Best Hacking Attempts ever
- How to Transfer Pictures from iPad to PC?
- The Start of a Non Profit
- What You Should Remember When Starting Copywriting
- How To Get Rid Of My Security Shield Antivirus Rog...
- iPhones, Droids, iPads, and Apps:
- Customize Your iPhone Ringtones to Personalize You...
- How to Convert MIDI Ringtones to iPhone for Free i...
- How to Extend the Battery Life of an iPhone and iP...
- How to make cash developing cell phone application...
-
▼
August
(22)