Pages

Tuesday, August 24, 2010

Hacking and hackers history




The original meaning of the word "hack" was born at MIT, and originally meant an elegant, witty or inspired way of doing almost anything.


Prehistory (before 1969)
In the beginning there was the phone company — the brand-new Bell Telephone, to be precise. And there were nascent hackers. Of course in 1878 they weren't called hackers yet. Just practical jokers, teenage boys hired to run the switchboards who had an unfortunate predilection for disconnecting and misdirecting calls ("You're not my Cousin Mabel?! Operator! Who's that snickering on the line? Hello?").

Flash forward to the first authentic computer hackers, circa the 1960s. Like the earlier generation of phone pranksters, MIT geeks had an insatiable curiosity about how things worked. In those days computers were mainframes, locked away in temperature-controlled, glassed-in lairs. It cost megabucks to run those slow-moving hunks of metal; programmers had limited access to the dinosaurs. So the smarter ones created what they called "hacks" — programming shortcuts — to complete computing tasks more quickly. Sometimes their shortcuts were more elegant than the original program.

Maybe the best hack of all time was created in 1969, when two employees at Bell Labs' think tank came up with an open set of rules to run machines on the computer frontier. Dennis Ritchie and Ken Thompson called their new standard operating system UNIX. It was a thing of beauty.

1969 - Arpanet, the forerunner of the internet, is founded. The first network has only four nodes.


John Draper, Abbie Hoffman


Elder Days (1970-1979)
In the 1970s the cyber frontier was wide open. Hacking was all about exploring and figuring out how the wired world worked. John Draper, a Vietnam vet, makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.

1971 - First e-mail program written by Ray Tomlinson

Counterculture guru Abbie Hoffman followed the captain's lead. His Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) newsletter helps phone hackers (called "phreaks") make free long-distance calls. "Phreaking" didn't hurt anybody, the argument went, because phone calls emanated from an unlimited reservoir. Hoffman's publishing partner, Al Bell, eventually changed the newsletter's name to TAP, for Technical Assistance Program. True believers have hoarded the mind-numbingly complex technical articles and worshipped them for two decades.

The only thing missing from the hacking scene was a virtual clubhouse. How would the best hackers ever meet? In 1978 two guys from Chicago, Randy Seuss and Ward Christiansen, created the first personal-computer bulletin-board system. It's still in operation today.

Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.


Robert Morris

The Golden Age (1980's)
1980 - In October, Arpanet comes to a crashing halt thanks to the accidental distribution of a virus.

Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.

In 1981 IBM announced a new model — a stand-alone machine, fully loaded with a CPU, software, memory, utilities, storage. They called it the "personal computer." You could go anywhere and do anything with one of these hot rods. Soon kids abandoned their Chevys to explore the guts of a "Commie 64" or a "Trash-80."

1983 - The internet is formed when Arpanet is split into military and civilian sections.

In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.

The 1983 movie War Games shone a flashlight onto the hidden face of hacking, and warned audiences nationwide that hackers could get into any computer system. Hackers gleaned a different message from the film. It implied that hacking could get you girls. Cute girls.

Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.

Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.

2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.

At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes.

First National Bank of Chicago is the victim of a $70-million computer heist.

An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."

The territory was changing. More settlers were moving into the online world. In Milwaukee a group of hackers calling themselves the 414's (their area code) broke into systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan-Kettering Cancer Center. Then the cops put the arm on them.

1986 - In August, while following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers responsible.

The Great Hacker War Occurs - To pinpoint the start of the "Great Hacker War," you'd probably have to go back to 1984, when a guy calling himself Lex Luthor founded the Legion of Doom. Named after a Saturday morning cartoon, the LOD had the reputation of attracting the best of the best — until one of the gang's brightest young acolytes, a kid named Phiber Optik, feuded with Legion of Doomer Erik Bloodaxe and got tossed out of the clubhouse. Phiber's friends formed a rival group, the Masters of Deception. Starting in 1990, LOD and MOD engaged in almost two years of online warfare — jamming phone lines, monitoring calls, trespassing in each other's private computers. Then the Feds cracked down. For Phiber and friends, that meant jail. It was the end of an era. Operation Sundevil was the name the government gave to its 1990 attempt to crack down on hackers across the country, including the Legion of Doom. It didn't work. But the following year Crackdown Redux resulted in jail sentences for four members of the Masters of Deception. Phiber Optik spent a year in federal prison.


Mitnick - Wanted Poster


Crackdown (1988-1995)
At the Cern laboratory for research in high-energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the world wide web.

Robert Morris appears with his Internet worm in 1988. Crashing 6,000 Net-linked computers earned Morris the distinction of being the first person convicted under the Act's computer-crime provision. Is punished by being fined $10,000, sentenced to three years on probation, and ordered to do 400 hours of community service.

Kevin #2 — Kevin Poulsen — was indicted on phone-tampering charges. Kevin #2 went on the lam and avoided the long arm of the law for 17 months. He, Ronald Austin and Justin Peterson are charged with conspiring to rig a radio phone-in competition to win prizes. The trio seized control of phone lines to the radio station ensuring only their calls got through. The group allegedly netted two Porsches, $20,000 in cash and holidays in Hawaii.

After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers.

Hackers break into Griffith Air Force Base, then computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old music student named Richard Pryce. The british teenager curls up in the fetal position when seized. His online mentor, "Kuji", is never found

A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.

Kevin Mitnick was arrested again after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. This time the FBI accused him of stealing 20,000 credit card numbers. He sat in jail for more than a year before pleading guilty in April 1996 to illegal use of stolen cellular telephone numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.

On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail.

The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995.


I Love You Virus

Zero Tolerance (1995-1998)
Seeing Mitnick being led off in chains on national TV soured the public's romance with online outlaws. Net users were terrified of hackers using tools like "password sniffers" to ferret out private information, or "spoofing," which tricked a machine into giving a hacker access. Call it the end of anarchy, the death of the frontier. Hackers were no longer considered romantic antiheroes, kooky eccentrics who just wanted to learn things. A burgeoning online economy with the promise of conducting the world's business over the Net needed protection. Suddenly hackers were crooks.

In the summer of 1994 a gang masterminded by a Russian hacker broke into Citibank's computers and made unauthorized transfers totaling more than $10 million from customers' accounts. Citibank recovered all but about $400,000, but the scare sealed the deal. The hackers' arrests created a fraud vacuum out there in cyberspace.

Popular websites are attacked and defaced in an attempt to protest about the treatment of Kevin Mitnick.

A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.

The internet now has over 16 million hosts and is growing rapidly.

Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.

Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.

In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."

Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.

Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.

The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.

Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.


Spread Virus, Spread...

New Milennium (1999 On)
As the millenium approached, general cyber-hysteria over the infamous Y2K bug was further inflamed by several serious hacker attacks. Well-documented by the media, these invasions were experienced directly (perhaps for the first time) by the growing masses of casual web surfers. In the second week of February 2000 some of the most popular Internet sites (CNN, Yahoo, E-Bay and Datek) were subject to "denial of service" attacks. Their networks clogged with false requests sent by multiple computers under the control of a single hacker, these commercial sites crashed and lost untold millions in sales.

Recent attacks on seemingly "secure" sites such as The White House, FBI and Microsoft.com have proven that despite massive public and private investment in cyber defense technology and methodology, hackers continue to pose a serious threat to the "information infrastructure."

2000 - In May, a new virus appeared that spread rapidly around the globe. The "I Love You" virus infected image and sound files and spread quickly by causing copies of itself to be sent to all individuals in an address book. In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith.

In October 2000, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen.

Since 2001, viruses and attacks have only snowballed - almost too many to mention. See the timeline (our pages) and also check out the comprehensive timeline (off-site link) for more detailed information on specific hacks.


Kevin Mitnick - Captured...Free

CPU Temperature

CPU Temps

All electronic devices, when at work, produce a lot of heat. This heat can be easily described as a necessary evil. When the electronic devices work, there is a conversion of energy and this causes the generation of the heat. It is what we know as the Joule Effect. The heat that is formed is generally very high and should be checked specifically in computers which are used for a longer time or computers that are under heavy load. The heat that is produced needs to properly dissipated. Heat has a damaging effect on the circuits of hardware and causes depreciation in the performance of the system and causes it to slow down.

One needs to understand why the heat builds up. There are many reasons that play an important role in the heating up of the system. The computers of yore needed to be placed in air conditioned rooms. The ones used today do not need air conditioning, but in spite of the fact, they need an amiable room temperature to work in. A proper heat transfer system also has to be in place. Heat transfer in the CPU is generally related to the internal workings, but even the improper placement of the CPU which might block the fan can be the cause of a less efficient heat transfer procedure. Besides this, a dusty environment also adds to the heating up of the system because the dust tends to clog up the important CPU parts and thus adding to prevention of proper heat transfer. There is a special kind of problem especially with the techies that they have a tendency to add additional software and applications (overclocking) in order to make the computer run faster than it was actually designed to run. This puts additional stress on the system.

Monitoring CPU Temperature

Heat sensors are generally added to systems that are most prone to getting heated up. For example, most CPUs, video cards, and hard drives will have heat sensors. Often times you can find the temps of your hardware in the BIOS. However, it is usually helpful to be able to see the temperatures when you are in Windows. For this, you can download a 3rd party software such as Core Temp or Real Temp. These both work well.

Lowering CPU Temperature

The easiest and cheapest thing to do is to make sure that your computer case is clean and organized. Making sure that all fans are clean and running well can solve many overheating problems and can lower temperatures even if you don't have an overheating problem. You can check out our article on cleaning a computer case for more help. Another easy tip is to turn off the computer when it is not in use. This can prevent overheating when you are not around to monitor the PC. There are many cooling techniques that are used besides the ones that the system comes inherently with. You can add fans to the computer case to increase airflow. You can also place the PC in a cooler part of your house. If you still need more cooling power, you can upgrade your computer case to a case which is better designed for cooling. Last, you can upgrade your CPU fan and heatsink to a bigger and more powerful cooler.

Maximum CPU Temperature

Below is a table from CPU-Temp.com that shows some of the top processors available in the market and the maximum temperature under which they can work efficiently. Please keep in mind that you want your processor to be running well BELOW these temperatures.

Intel CPU Model Maximum Temp AMD CPU Model Maximum Temp
Core Duo Models 100 Degree Celsius Athlon 64 65 – 71 Deg. Celsius
Core Solo Models 100 Degree Celsius Athlon 64 FX 56 – 63 Deg. Celsius
Pentium M Models 100 Degree Celsius Athlon 64 X2 63 – 75 Deg. Celsius
Core 2 Duo Models 60 – 72 Degree Celsius Sempron Soquete 462 90 Degree Celsius
Core 2 Quad Models 62.2 Degree Celsius Sempron Soquete AM2 55 – 69 Deg. Celsius
Core 2 Extreme 64 – 100 Degree Celsius Opteron 1XX 65 – 70 Deg. Celsius
Pentium Dual Core 73 – 100 Degree Celsius Opteron 2XX 67 – 71 Deg. Celsius


Overall, keeping an eye on processor temperature is important because a cooler processor is a faster processor. Also, if a processor heats up too much, it can be damaged.

How to Fix an Overheating Computer

Overheating Computer/Laptop

Like every other machine, a computer heats up a little while you use it. The heat produced is blown away through the air vents by natural convention, or forced convention, depending if the electric powered fan is off or not. Electric components are mounted on innovative fin designs that help with dissipating heat energy. Transistors in computer and video chips also add to the heat your computer emits. If you have been using a computer for a long time you should be able to tell when your computer is overheating.


Causes of overheating

Overheating may be due to bad cooling design—this rarely occur nowadays. Gaming also triggers overheating. Severely multi-tasking the computer makes the CPU operate at high capacity and this generates a huge amount of heat in the process. Using your computer in a high temperature environment adds up to the heat energy an average computer produces already and can lead to overheating as well.


Signs of overheating

At high temperature, fail safe software, shuts down your computer to prevent damage. Blue Screen and frequent memory errors are some of other symptoms of an overheating computer. A simple sign to look out for is constant or frequent fan operation. You can also use a program like HWMonitor to monitor your CPU and video card temperatures.

How to Fix an Overheating Computer

The best way to fix an overheating computer is by reporting such problem to the manufacturer. That is, if you're still under a warranty. A warranty is suppose to protect you, the costumer, from any problem you may encounter while making good use of your computer over a given period of time. In severe cases, your computer manufacturer will either fix the problem or get you a new machine.

If you're using a laptop, a laptop cooler may serve a good purpose. Laptop coolers are electrically powered devices that consist of a fan and seat for your laptop. For desktops, some people prefer removing the cover of the casing. While this might improve ventilation, it's not a good way to fight computer overheating as it exposes the internal components of your computer to dust.

You can also disassemble and clean up clogged air vents and pathways of your computer. This is delicate, especially to people of less computer experience, as this exercise may affect the functionality of a computer. You can check out our guide on how to clean your computer for help with this. The best thing to do, if you're under a warranty, is to report to the nearest manufacturer's servicing centre around you. It's important to note, disassembling your computer or any other electronic product, under warranty, could terminate the warranty agreement.

Before you disassemble your computer, here're some few useful tips: First, try reducing screen brightness. This may help. In addition, there're software programs that can be of help too. If you're using DELL, you may want to control the thermal management by using precision fan control utility. Other free software programs are also available online. It's important to add, these software programs are written by people who have no link whatsoever to any computer manufacturer in the world, so it makes common sense to exercise caution with these and only used highly trusted and recommended software.


Dangers of Overheating

Overheating can damage your motherboard or any other vital system components such as your cpu or your video card. Also, a hot computer usually runs slower than a cooler computer. Keeping your computer from overheating can also keep the computer from slowing down.

Sunday, August 22, 2010

How to assemble and disassemble v3000 laptop?



























Assembling and disassembling a laptop is quiet easy. But for a beginner, maybe it will take much time to assembling and disassembling a laptop. By doing this, you can save more on your money such as:


1. Solve your overheat laptop.
2. Clean all dust inside the laptop.
3. Change your faulty keyboard.
4. Clean your keyboard.
5. Change broken LCD and much more profit when you assembling your laptop by yourself.


How to check laptop temperature?

there are many tools you can download check your laptop temperature. HWMonitor is one of the best tool to check your laptop temperature. Click link below to download the software.

Download:

HWMonitor 1.16_setup.exe - installation
HWMonitor 1.16_32bit.zip - no installation
HWMonitor 1.16_64bit.zip - no instalation

note: Important to check your laptop temperature. Run this application while playing some game such as DOTA or any game to check your high level temperature. If you see the temperature going up to 80-100 Celsius, you need to clean your heatsink and apply new thermal paste on your processor..


Before you assembling your laptop, make sure you keep your screws properly because you have to faces with many screws.


Tools Required...
1. Thermal Paste
2. Brush
3. Cotton bud
4. Phillips screw driver
5. Small Phillips screw driver






STEP 1



1. Remove battery, HDisk case, RAM case, and Wireless card case.
2. Remove all the backbone screws, keyboard screws, speaker cover panel's screws
3. Remove HDisk and screws under hardisk







STEP 2

1. Remove your DVDRom
2. Remove Wireless NIC



STEP 3

1. Remove Keyboard
2. Remove all cable as on the circle below







STEP 4

1. Remove the Speaker cover panel
2. Remove LCD





STEP 5

1. Remove the front laptop Casing.
2. To open the casing, start at the top by following pictures below.





STEP 6

1. Remove all cable wire as shown on picture below.
2. Remove mother board screw.
3. Remove Motherboard.




STEP 7

1. Remove Heatsink.
2. Clean processor using cotton bud or any soft cloth or you can use an alcohol that you can find it in computer shop.







STEP 8

1. Remove fan
2. Clean the fan
3. CLean Heatsink




STEP 9

1. Apply a small amount of thermal paste on the processor
2. Put back the heatsink
3. Assemble back the laptop by referring to the step above.