The Greatest Hacks of All Time

    Date06 Feb 2001
    CategoryHacks/Cracks
    3282
    Posted ByAnthony Pell
    The recent spate of security breaches and e-mail invasions including Monday's news trilogy -- the World Economic Forum hack, the JavaScript email wiretapping scare, and the hole discovered in the protocol that is supposed to secure data transmitted wirelessly -- recalls . . . The recent spate of security breaches and e-mail invasions including Monday's news trilogy -- the World Economic Forum hack, the JavaScript email wiretapping scare, and the hole discovered in the protocol that is supposed to secure data transmitted wirelessly -- recalls some of the most infamous exploits of the past. Here, then, is one observer's list of The Greatest Hacks of All Time.

    The Morris Worm: On Nov. 2, 1988, Robert Tappan Morris released a worm that brought down one-tenth of the Internet -- which back then meant he crippled more than 6,000 computer systems. Named the Morris Worm, this exploit inspired the founding of a governmental anticyber-terrorism team, CERT (Computer Emergency Response Team), to deal with future Morris worms. Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down.

    Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act, but he only had to perform community service and pay a fine, since the argument was made that the worm didn't destroy the contents of affected computers.

    Morris said it was just a stunt, and added that he truly regretted wreaking $15 million worth of damage. That's what it cost to de-worm the machines his critter had penetrated. Morris's father, Robert Morris Sr., was at the time a computer security expert with the National Security Agency.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.