网络犯罪和网络安全的简史—— 1940 - 2020

注:机翻,未校对。


The History Of Cybercrime And Cybersecurity, 1940-2020

From phone phreaks to next generation cyberattacks

从电话攻击到下一代网络攻击

– Katie Chadd

Prague, Czech Republic – Nov. 30, 2020

From the 1940s to the present, discover how cybercrime and cybersecurity have developed to become what we know today.
从 1940 年代到现在,了解网络犯罪和网络安全如何发展成为我们今天所知道的。

Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point.
许多物种并行进化,每个物种都寻求优于其他物种的竞争优势。随着网络安全和技术的发展,犯罪分子和 “不良行为者” 也越来越多,他们试图利用系统中的弱点谋取私利,或者只是为了证明一个观点。

This arms race has been going on since the 1950s, and this article explains the evolution of cyberattacks and security solutions.
这场军备竞赛自 1950 年代以来一直在进行,本文解释了网络攻击和安全解决方案的演变。

1940s: The time before crime

For nearly two decades after the creation of the world’s first digital computer in [1943](https://www.computerhistory.org/timeline/computers/#:~:text=Started in 1943%2C the ENIAC,faster than any previous computer.), carrying out cyberattacks was tricky. Access to the giant electronic machines was limited to small numbers of people and they weren’t networked – only a few people knew how to work them so the threat was almost non-existent.
自 1943 年世界上第一台数字计算机问世以来的近二十年里,进行网络攻击一直很棘手。巨型电子机器的访问仅限于少数人,而且它们没有联网 —— 只有少数人知道如何操作它们,因此威胁几乎不存在。

Interestingly, the theory underlying computer viruses was first made public in 1949 when computer pioneer John von Neumann speculated that computer programs could reproduce.
有趣的是,计算机病毒背后的理论是在 1949 年首次公开的,当时计算机先驱约翰・冯・诺依曼(John von Neumann)推测计算机程序可以复制。

1950s: The phone phreaks

The technological and subcultural roots of hacking are as much related to early telephones as they are to computers.
黑客攻击的技术和文化根源与早期的电话有关,就像它们与计算机一样。

In the late 1950s, ‘phone phreaking’ emerged. The term captures several methods that ‘phreaks’ – people with a particular interest in the workings of phones – used to hijack the protocols that allowed telecoms engineers to work on the network remotely to make free calls and avoid long-distance tolls. Sadly for the phone companies, there was no way of stopping the phreaks, although the practice eventually died out in the 1980s.
在 1950 年代后期,“电话盗窃” 出现了。该术语涵盖了 “phreaks”(对手机工作特别感兴趣的人)用来劫持协议的几种方法,这些协议允许电信工程师在网络上远程工作以拨打免费电话并避免长途收费。可悲的是,对于电话公司来说,尽管这种做法最终在 1980 年代消失了,但无法阻止这些恶作剧。

The phreaks had become a community, even issuing newsletters, and included technological trailblazers like Apple’s founders Steve Wozniak and Steve Jobs. The mold was set for digital technology.
这些人已经成为一个社区,甚至发布时事通讯,其中包括苹果创始人史蒂夫・沃兹尼亚克(Steve Wozniak)和史蒂夫・乔布斯(Steve Jobs)等技术开拓者。模具是为数字技术设定的。

Igor Golovniov / Shutterstock.com
伊戈尔・戈洛夫尼奥夫 / Shutterstock.com

1960s: All quiet on the Western Front

The first-ever reference to malicious hacking was in the Massachusetts Institute of Technology’s student newspaper.
有史以来第一次提到恶意黑客攻击是在麻省理工学院的学生报纸上。

Even by the mid-1960s, most computers were huge mainframes, locked away in secure temperature-controlled rooms. These machines were very costly, so access – even to programmers – remained limited.
即使在 1960 年代中期,大多数计算机都是巨大的主机,被锁在安全的温控室中。这些机器非常昂贵,因此即使是程序员也能获得这些机器。

However, there were early forays into hacking by some of those with access, often students. At this stage, the attacks had no commercial or geopolitical benefits. Most hackers were curious mischief-makers or those who sought to improve existing systems by making them work more quickly or efficiently.
然而,一些有访问权限的人(通常是学生)很早就开始尝试黑客攻击。在这个阶段,这些攻击没有商业或地缘政治利益。大多数黑客都是好奇的恶作剧制造者,或者是那些试图通过使现有系统更快或更有效地工作来改进现有系统的人。

In 1967, IBM invited school kids to try out their new computer. After exploring the accessible parts of the system, the students worked to probe deeper, learning the system’s language, and gaining access to other parts of the system.
1967 年,IBM 邀请学童试用他们的新计算机。在探索了系统的可访问部分之后,学生们努力进行更深入的探索,学习系统的语言,并获得对系统其他部分的访问权。

This was a valuable lesson to the company and they acknowledged their gratitude to “a number of high school students for their compulsion to bomb the system”, which resulted in the development of defensive measures – and possibly the defensive mindset that would prove essential to developers from then on. Ethical hacking is still practiced today.
这对公司来说是一个宝贵的教训,他们承认对 “一些高中生强迫轰炸系统” 表示感谢,这导致了防御措施的发展 —— 可能还有从那时起对开发人员至关重要的防御思维方式。道德黑客攻击至今仍在进行。

As computers started to reduce in size and cost, many large companies invested in technologies to store and manage data and systems. Storing them under lock and key became redundant as more people needed access to them and passwords began to be used.
随着计算机的尺寸和成本开始减小,许多大公司投资于存储和管理数据和系统的技术。随着越来越多的人需要访问它们并且开始使用密码,将它们存储在锁和钥匙下变得多余。

Roman Belogorodov / Shutterstock.com
罗曼・别洛戈罗多夫 / Shutterstock.com

内容概要:本文全面介绍了数据流图(DFD)的概念、构成元素及其重要性。数据流图是从数据传递加工的角度,以图形方式表达系统逻辑功能、数据流向变换过程的工具。文章详细解释了数据流图的四个基本元素:数据流、加工、数据存储外部实体,并通过实例说明了这些元素在实际场景中的应用。文中强调了数据流图在软件开发需求分析业务流程优化中的关键作用,通过绘制顶层、中层底层数据流图,逐步细化系统功能,确保数据流向处理逻辑的清晰性。此外,文章还指出了常见绘制误区及解决方法,并以在线购物系统为例进行了实战分析,展示了从需求分析到数据流图绘制的全过程。 适合人群:软件工程师、业务分析师、系统设计师以及对系统分析与设计感兴趣的初学者。 使用场景及目标:①帮助开发团队在需求分析阶段清晰展示数据流动处理过程,避免理解偏差;②辅助企业梳理优化业务流程,识别效率低下的环节,提升运营效率;③为系统设计开发提供详细的逻辑框架,确保各模块的功能明确,减少开发错误。 阅读建议:本文内容详实,涵盖了从理论到实践的各个方面。建议读者在学习过程中结合实际项目背景,逐步掌握数据流图的绘制技巧,并通过反复练习优化,加深对系统分析与设计的理解。
资源下载链接为: https://pan.quark.cn/s/5c50e6120579 《CoffeeTime_0.99.rar:主板BIOS修改工具详述》 在计算机硬件领域,BIOS(基本输入输出系统)是计算机启动时最先加载的软件,它负责初始化硬件设备,并为操作系统提供基本的交互功能。不过,随着处理器技术的持续进步,部分主板可能无法原生支持更新的CPU型号。为解决这一问题,一些技术爱好者专业人士会通过修改主板BIOS,也就是俗称的“魔改”,来提升其兼容性。本文将深入剖析名为“CoffeeTime_0.99.rar”的工具,它是一款专门用于主板BIOS修改,以实现对第6、7、8、9代英特尔CPU支持的工具。 我们先来看“CoffeeTime.exe”,这是该工具的主程序文件。通常情况下,它会配备一套直观易用的用户界面,方便用户对BIOS进行修改操作。不过,在使用该工具之前,用户必须具备一定的电脑硬件知识,因为一旦操作失误,就可能导致系统运行不稳定,甚至无法启动。对于初学者而言,谨慎操作至关重要,否则可能会造成不可挽回的损失。 “readme.txt”是软件包中常见的文档,一般会包含使用指南、注意事项以及开发者提供的其他重要信息。在使用CoffeeTime之前,用户务必要仔细阅读该文件,因为里面可能包含了如何正确运行程序、避免错误操作以及解压后具体步骤等关键内容。 “bin”“data”是两个文件夹,它们可能包含了用于BIOS修改的各种二进制文件数据。“bin”文件夹通常会包含特定版本的BIOS固件或用于修改的工具,而“data”文件夹则可能包含更新CPU微码、识别信息等必要的数据文件。在进行BIOS修改的过程中,这些文件会被程序调用,从而实现对原有BIOS的扩展或修正。 BIOS的修改过程一般包含以下步骤:首先,备份原始BIOS,这是在进行任何修改前的必要步骤,以便
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值