        ĳ
                                +-+-+-+-+-+-+-+-+
         ۲|O|u|t|b|r|e|a|k|𰰰
                                +-+-+-+-+-+-+-+-+
                             Issue #2 - Page 6 of 12 
        ĳ 


Oneth by LAN twoeth by C:\
--------------------------
By:  Prodigal|Son



Ever wonder, or even cared about the history of computer hacking?  I have, but
then again, I'm a computer geek, but there's nothing wrong with that :). Here
is a very, very brief history of hacking.  Hacking did not start with the
computer, but with the telephone.  2 years after the phone was invented, a
group of guys hired to work the switch bored got knocked off for not working
the switch bored, and were more fascinated with the interworkings of the
telephone system.  So i guess you could call them "hackers" for trying to hack
in and try to see how it worked.

But as you would probably guess, the term "hacker" did not always have a bad
name.  In the early days of computing, the computers were big and bulky, and
the programmers had a hard time getting work time to program, and not to
mention they were slow.  The programmers made shortcuts called "hacks" which
would change and improve the operating system and allowed applications and
other tasks to be completed in a shorter amount of time.

The term "hacker" didn't get its bad wrap until the early 80's when people
started using computers to break in to other computers.  With all of that
boring stuff said, hackers proved a necessary service, and always remember,
don't hate the hacker, hate his game.

