Talk:Timeline of computer security hacker history

From Wikipedia, the free encyclopedia

Contents

[edit] Move?

This should be moved to something more in line with naming conventions. I suggest history of hacking. Tuf-Kat 23:45, Jan 8, 2004 (UTC)

In agree, i also think it is too verbose. perhaps it should only include landmark hacks of computers - such as the first attack of any type, such as when Denial of service beacame popular, then web defacement then DDoS etc
19xx First Buffer Overflow exploit. Known as the ...
19xx First Distributed Denial of Service [DDoS] attack. xxxx was the target
jy
IMO whe way as it is, it is not verbose, it is precisely in the "Timeline of..." wikipedia format.

See List of themed timelines.

Hence in a week I'm going to move the page to "Timeline of hacker history". The history itself remains to be written. Mikkalai 00:25, 10 Jan 2004 (UTC)
Sounds good. Tuf-Kat 08:30, Jan 10, 2004 (UTC)

[edit] Editing

This really needs some editing. I'm trying, but in some cases, I'm not entirely sure what is trying to be said. Some work needs to be done by a person familiar with the subject matter. A maybe a little fact-checking. ike9898 19:42, 21 Jan 2004 (UTC)

Talking of fact-checking, according to `The watchman' by J. Littman, Kevin Poulsen won a Porsche on a radio contest on June 1, 1900, not in 1993

[edit] Timeline of {something}

This page is purely about the history of cracking, as the history of the hackers is the history of the computer industry itself, i think this page should be renamed to the history of the crackers, or the history of computer security.

Hi ?? if no one comments i'm going to rename it to "history of computer security"
I prefer timeline, and there aren't just computer systems at play I think. Also, if you plan on doing any "renaming", please get an account and use "Move this page" that way the edit history of the article is not lost. Dori | Talk 17:10, Apr 5, 2004 (UTC)

I came here to make the exact same comment. There is nothing about hackers - in the original computer-related meaning of the word - here. The title is thus quite misleading, and "Timeline of cracking" or some-such would be much more appropriate. Noel (talk) 21:33, 11 Nov 2004 (UTC)

[edit] Needs some 2005 work

I think this article needs some work to catch up on the events of 2004/05. Any volunteers? :-)

[edit] Tagged for clean up

As I read this article, I found it lack consistency, as well as having numerous grammatical, spelling, and formatting errors. Furthermore, some of the language is not very encyclopedic in nature. I am working on cleaning it up, but if anyone else wants to take a stab at it, feel free. – Mipadi 21:04, 6 December 2005 (UTC)

Fixed some of the formatting and grammar, killed a bunch of entries obviously made by boasting script kiddies and uninformative entries taken from newspaper headlines. The article still needs more work. Peter Vasiljev 05:21, 6 December 2006 (UTC)

[edit] Merge

This article is tagged for a merge, I think it's structure is fine, with a bit of clean up needed, as far as making it coherent and consistent is concerned. The different events need to be validated with at least one external reference though, and not lumped into a single line, if they all occured in the same month, add the date for each event. If they occur on the same day, then an unsorted list under the date will do.
The article that this timeline is intended to be merged with is just a list of people will various notability in the hacking/computer security industry. If merged, these persons most notable events should simply be added to the timeline, but the timeline should remain intact.
As far as calls for name changes, mostly due to the nuances between the words hacking and cracking, perhaps the nuance should be explained at the top of the article and more articles not specific to breaches, but more general to security, should be added. I agree that "hacking" is not the best label, but this should not become another [www.zone-h.org] for cracker kiddies to vanity-list themselves. If you feel the article is too cracking related, add more hacking articles. It is a free-to-edit community. I feel that a title similar to "Timeline of Information Security History" is a bit long-winded, and there are many broad points of interest in the article which extend beyond Information Security. Satur9 15:50, 3 May 2006 (UTC)

[edit] Formatting suggestion

Further editting of this page should be steered towards a cohesive standard that provides conformity and ease of reading, below is the format for additional events that I propose should be used by all future author as well as maintainers of this page. Please give any comments / suggestions regarding this below and I will try edit and incorporate any feasable suggestions into this post.

[edit] 2010s This is a decade header

[edit] 2012 This is the year sub-heading

  • April 1 — This is a specific, day based entry, detailing an even that has happened on this day, and is of enough importance to include in this timeline. I will also be adding references from reputable sources for EACH event [1] [2] [3]
  • April 2 — This is another day based entry, for another date, see, it also has references! [4] [5]
  • April 2 — This entry happened on the same day as above, linking a second time to the date would be redundant, but have a date as the first part of the entry, to help future editors insert other events into the timeline. Oops, I almost forgot, at least ONE reference for EACH entry! [6]

[edit] 2013 A blank line between each year and decade heading keeps the article readable

  • August 13 — The dash to the left is created by inserting a — to the line. [7]

[edit] 2020s Another decade header follows neatly on from the last

[edit] 2020 This will be the vision of readers thanks to the readability of the timeline! :)

  • [October 31] — I don't have to warn you about the horde of nasty ghouls waiting to come eat you if you fail to follow proper "Wikiquette" [8]



I for one will make a commitment now that any entry that fails to link a decent reference will simply be removed by me, as the timeline has become almost unmanageable now due to numerous entries without references and the maintainers being forced to google ad nauseum in order to validate and find a valid date for entries. If you are thinking of adding an entry, please at least just add a reference at the end, a simple full path URL (copying the whole text out of your title bar is best) to a new article, between []s, at the end of the entry will suffice!
Satur9 13:10, 8 May 2006 (UTC)

[edit] quick note

I don't think we need to be renaming it or moving it. Most people who do a search looking for a hacking timeline will get exactly what they expect. Moving it or renaming it will only cause somebody to start a new topic thinking it hadn't been done yet, and then we have a mess. I fully agree with the formatting ideas however, and I also think all further entries should include a reference or be deleted.

[edit] No Excuse

There is no excuse for the number of uncited and undocumented entries. I've just tagged a lot of entries stating "facts" I've never heard of. So they need to be cited. Others, which I know from memory were real, I went to the trouble to google citations myself. I intend to continue tagging any entries which are uncited and undocumented. The 70s, 80s, 90s don't look too bad, but from 2000 on it's a mess! Let's clean it up! -Sue Rangell

I added a few references for entries related to the late 1980's. Also a few books of that period in the Further Reading section. Sv1xv (talk) 09:44, 23 January 2008 (UTC)

[edit] The Rabbithole

There seems to be a concerted campaign to add reference to a hacker group called "The Rabbithole", with a website rabbithole.ws. As far as I can see, this group is completely non-notable, and has no place in here. Can anyone see a reason to mention this group? A newspaper article perhaps, or something in WIRED? That said, in blanket reverting all attempts to include this site, I notice that the pattern tends to be multiple edits, where edits, say, 1-3 include rabbithole, and then edit 4 actually fixes something with the article. I haven't yet gone back to try to re-introduce any of the fixes, although most are fairly easy to take care of, so if someone else wants to beat me to the punch go ahead. Confusing Manifestation(Say hi!) 07:55, 21 April 2008 (UTC)

[edit] contested statements removed

  1. February: As part of its Trustworthy Computing initiative, Microsoft shuts down all Windows development, sending more than 8,000 programmers to security training. {{Fact|date=March 2007}}
  2. April: The U.S. Army initiates the "Mannheim Project", an effort to better consolidate and secure the military's IT assets from cyber-war. {{Fact|date=March 2007}}
  3. fare July: An Information Security survey finds that most security practitioners favor full disclosure because it helps them defend against hacker exploits and puts pressure on software vendors to improve their products. {{Fact|date=March 2007}}
  4. September: The White House's Office of Homeland Security releases a draft of the "National Strategy to Secure Cyberspace", which many criticize as being too weak. {{Fact|date=March 2007}}
  5. August 23: Jesus Oquendo "sil" of AntiOffline releases "BRAT" Border Router Attack Tool as part of "Theories in Denials of Service in an effort to make administrators aware of the possibility of a worm attack tool capable of breaking backbone routes on the Internet {{Fact|date=March 2007}}
  6. FBI agents find explosives and biological weapons in the course of the raid. {{Fact|date=March 2007}}
  7. It turned out this teen was also responsible for breaking into data broker LexisNexis' system in January. {{Fact|date=March 2007}}
  8. He will be on supervised release for three years with limited access to computers and the Internet as he works on repaying those agencies. {{Fact|date=March 2007}}
  9. U.S. Deputy Defense Secretary John Hamre called it "the most organized and systematic attack" on U.S. military systems to date {{Fact|date=February 2007}}.
  10. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days. {{Fact|date=March 2007}}
  11. January: Port7Alliance is born. {{Fact|date=March 2007}}
  12. March: FBI agent Robert P. Hanssen is charged with using his computer skills and FBI access to spy for the Russians. {{Fact|date=March 2007}}
  13. March: The L10n worm is discovered in the wild attacking older versions of BIND DNS. {{Fact|date=March 2007}}
  14. Hackers begin using "pulsing" zombies, a new DDoS method that has zombie machines send random pings to targets rather than flooding them, making it hard to stop attacks. {{Fact|date=March 2007}}
  15. AV experts identify Sadmind, a new cross-platform worm that uses compromised Sun Solaris boxes to attack Windows NT servers.{{Fact|date=March 2007}}
  16. September: The World Trade Center and Pentagon terrorist attacks spark lawmakers to pass a barrage of anti terrorism laws many of which group hackers as terrorists. {{Fact|date=March 2007}}
  17. September: Nimda, a new memory-only worm, wreaks havoc on the Internet, quickly eclipsing Code Red's infection rate and recovery cost. {{Fact|date=March 2007}}
  18. Microsoft, other major software vendors, and commercial security research organizations propose "responsible disclosure" guidelines as an alternative to "full disclosure" of security vulnerabilities. {{Fact|date=March 2007}}
  19. The European Union adopts the controversial cybercrime treaty, which makes the possession and use of hacking tools illegal. {{Fact|date=March 2007}}

Please do not return this information to the article without a citation.--BirgitteSB 14:26, 9 June 2008 (UTC)