西西河

主题:【文摘】“完整的”INTERNET 历史 2) -- 仙八

共:💬1 🌺1 新:
分页树展主题 · 全看首页 上页
/ 1
下页 末页
  • 家园 【文摘】“完整的”INTERNET 历史 2)

    1970s

    --------------------------------------------------------------------------------

    [1970] An estimated 100,000 computer systems are in use in the United States.

    [1970] Digital Equipment Corporation (DEC) introduces the famous PDP-11 (Programmed Data Processor), which is considered to be one of the best designed minicomputers ever, and many of the machines are still used today. Some of the best computer hackers in the world cut their teeth on -11's.

    [1971] Vietnam vet John Draper (Cap'n Crunch) learns that a toy whistle given away inside Cap'n Crunch cereal generates a 2600-hertz signal, the same high-pitched tone that accesses AT&T's long-distance switching system. Draper builds a blue box, that when used in conjunction with the whistle and sounded into a phone receiver, allows phreakers to make free calls.

    [1971] The first email program written by Ray Tomlinson and used on Arpanet, which now has 64 nodes, is released. Tomlinson of Bolt Beranek and Newman, contracted by the Advanced Research Projects Agency (ARPA) to create the Arpanet, selects the @ symbol to separate user names in email as the first email messages are sent between computers.

    [1971 Sep] The first personal computer, the Kenback, is advertised in Scientific American.

    [1971 Oct] Esquire magazine publishes the article Secrets of the Little Blue Box with instructions for making a blue box and wire fraud in the United States escalates. Among the perpetrators: college kids Steve Wozniak and Steve Jobs, future founders of Apple Computer, who launch a home industry making and selling blue boxes.

    [1972] UNIX computer operating system is rewritten in C programming language which opens the door for porting.

    [1972] The National Center for Supercomputing Applications (NCSA) developed the telnet application for remote login, making it easier to connect to a remote computer.

    [1973] Number of Arpanet users is estimated at 2,000.

    [1973] Intel?s chairman, Gordon Moore, publicly reveals the prophecy that the number of transistors on a microchip will double every year and a half. This revelation will later be known as Moore?s Law and will hold true for more than twenty years.

    [1973 Feb 7] File Transfer Protocol (FTP) is introduced, standardizing the transfer of files between networked computers.

    [1974] The first major shell was the Bourne shell (sh) which was named after its inventor, Stephen Bourne. The shell is a program that presents an interface to various operating system functions and services. The shell is so called because it is an outer layer of interface between the user and the kernel of the operating system.

    [1975] About 13,000 cash dispensing Automatic Teller Machines (ATMs) are installed.

    [1975] Bill Joy (Sun Microsystems founder) develops the C shell (csh) and Vi text editor. The shell is a program that presents an interface to various operating system functions and services. The shell is so called because it is an outer layer of interface between the user and the kernel of the operating system.

    [1975] Atari, Inc.?s home version of PONG begins selling at Sears and Roebuck stores.

    [1975 Aug] William Henry Gates, III (Bill Gates) and Paul Allen found Microsoft.

    [1976] David Boggs and Robert Metcalfe invent Ethernet at Xerox in Palo Alto, California.

    [1976 Feb 3] Bill Gates, 21, writes a letter titled An Open Letter to Hobbyists which essentially condemns open source and software piracy.

    [1976 Apr 1] Stephen Wozniak, Steve Jobs and Ron Wayne sign an agreement that founds Apple Computer on April 1.

    [1976 Nov] The paper New Directions in Cryptography published by Whitfield Diffie and Martin Hellman. It introduced a radically new method of distributing cryptographic keys, which went far toward solving one of the fundamental problems of cryptography, key distribution. Public-key cryptography is a form of modern cryptography which allows users to communicate securely without previously agreeing on a shared secret key. For most of the history of cryptography, a key had to be kept absolutely secret and would be agreed upon beforehand using a secure, but non-cryptographic, method; for example, a face-to-face meeting or a trusted courier. There are a number of significant practical difficulties in this approach to distributing keys. Public-key cryptography was invented to address these drawbacks ?with public-key cryptography, users can communicate securely over an insecure channel without having to agree upon a key beforehand. Public-key algorithms typically use a pair of two related keys ?one key is private and must be kept secret, while the other is made public and can be widely distributed; it should not be possible to deduce one key of a pair given the other.

    [1977] Bill Joy produces the computer operating system called Berkeley Software Distribution (BSD). Bell Laboratories permitted UC Berkeley and other universities to use and extend the source code to their UNIX operating system in its infancy. Berkeley used the software as a research base for investigations into operating system design through the 1970s and 1980s.

    [1977 Aug 3] The TRS-80 Model I (Trash-80) is offered to the public and becomes the first desktop computer which was made available with a 4 kilobyte tiny BASIC in ROM, and either 4 or 16 kilobytes of RAM. The CPU board of the computer was contained in the keyboard unit, and it used a separate black and white monitor. The operating systems that ran on the TRS-80 Model I were TRSDOS from Radio Shack and CP/M 1.4.

    [1977 Dec] The Atari 2600 is selling for $199.95 and includes one game and two controllers.

    [1978] The first Computerized Bulletin Board System (CBBS) is started by Ward Christensen and Randy Suess.

    [1978] There are an estimated 5,000 desktop computers in use within the United States.

    [1978 Mar] TCP split into TCP (Transmission Control Protocol) and IP (Internet Protocol).

    [1979] Doug and Larry Michels founded Santa Cruz Operation (SCO) as a Unix porting and consulting company.

    [1979] Microsoft licenses UNIX source code from AT&T and announces Xenix, which is soon overshadowed by MS-DOS. Microsoft called it Xenix because it could not license the UNIX name.

    [1979] Usenet is born, networking UNIX machines over slow phone lines. Usenet eventually overruns Arpanet as the virtual bulletin board of choice for the emerging hacker nation.

    [1979] The C programming language by Brian Kernighan and Dennis Ritchie is published.

    [1979 Jun] The Apple II+ with 48K RAM is introduced by Apple Computer for $1,195.

    --------------------------------------------------------------------------------

    1980s

    --------------------------------------------------------------------------------

    [1980] There is an estimated 350,000 computer terminals networked with larger host computers.

    [1980] Nintendo releases Donkey Kong as a coin-operated arcade game.

    [1981] The first computer virus is found in the wild. The virus was named Elk Cloner, and it was spread on Apple II floppy disks (which contained the operating system) and reputed to have spread from Texas A&M.

    [1981] The Sinclair ZX81 computer is released, the first computer I cut my teeth (fingers) on. The base system as supplied for approximately $100 had 1KB (1024 bytes) of RAM. This RAM was used to hold the computer's system variables, the screen image, and any programs and data. The screen was text only, 32 characters wide by 24 high; limited, blocky graphics were possible via a set of 16 graphics characters.

    [1981] Domain Name System (DNS) is conceived by Dr. David Mills. Dr. Mills would later invent the Network Time Protocol (NTP). DNS is a system that stores information about host names and domain names on networks, such as the Internet. Most importantly, it provides an IP address for each host name.

    [1981] Commodore Business Machines starts shipping the VIC-20 home computer. It features a 6502 microprocessor, 8 colors and a 61-key keyboard. Screen columns are limited to 22 characters. The product is manufactured in West Germany and sells in the U.S. for just under $300.

    [1981 May 28] The first mention of Microsoft is posted to Usenet.

    [1981 Jul] Microsoft acquires complete rights to Seattle Computer Product?s DOS (Disk Operating System) and names it MS-DOS.

    [1982] Hewlett-Packard introduces their version of UNIX, HP-UX 1.0. HP-UX is largely based on System V.

    [1982] There are an estimated number of 5 million desktop computers in use within the United States. More than 100 companies make personal computers.

    [1982] Sun Microsystems is founded by four 27-year-old men; Andreas von Bechtolsheim, Vinod Khosla, Scott McNealy and Bill Joy. Sun Microsystems is a Silicon Valley-based computer, semiconductor and software manufacturer. Sun's products include computer servers and workstations based on the SPARC processor, the SunOS and Solaris computer operating systems, the NFS network file system and the Java platform. The company name SUN originally stood for Stanford University Network.

    [1982] As the hacker culture begins to erode, losing some of its brightest minds to commercial PC and software start-ups, Richard Stallman starts to develop a free clone of UNIX written in C programming language, that he calls GNU (GNU is a recursive acronym for "GNU's Not UNIX").

    [1982] Book author William Gibson coins the term "cyberspace."

    [1982] '414 Gang' phreakers raided. 414 Private Bulletin Board System (BBS) was where the '414 Gang' would exchange information while breaking into systems of Sloan-Kettering Cancer Center and Los Alamos military computers.

    [1982 Aug] Commodore ships the Commodore 64 computer and enters more than one million homes during this first year. The C-64 was the first home computer with a standard 64K RAM. With an suggested retail price of $595, it was considered a huge value. It included a keyboard, CPU, graphics and sound chips.

    [1982 Aug] Simple Mail Transfer Protocol (SMTP) is published. SMTP is a TCP/IP protocol used in the transmission of email across the Internet.

    [1982 Sep 19] Research Professor of Computer Science, Scott Fahlman types the first online smiley, :-)

    [1983] The Internet is formed when Arpanet is split into military and civilian sections.

    [1983] The movie WarGames is released, Matthew Broderick plays a computer whiz kid who inadvertently initiates the countdown to World War III.

    [1983] The Korn shell (ksh) released by its inventor David Korn of AT&T Bell Laboratories. The shell is a program that presents an interface to various operating system functions and services. The shell is so called because it is an outer layer of interface between the user and the kernel of the operating system.

    [1983] FidoNet is developed by Tom Jennings. FidoNet will later consist of approximately 10,000 systems world-wide which comprise a network which exchanges mail and files via modems using a proprietary protocol. They are connected for the purposes of exchanging emai over the Internet thru a series of gateway systems which interact with the Internet via Unix to Unix Copy Protocol (UUCP) with cooperating UNIX-based smart-hosts which act as their MX-receivers.

    [1983] Plovernet Bulletin Board System (BBS) was a powerful East Coast pirate board that operated in both New York and Florida. Owned and operated by teenage hacker 'Quasi Moto', Plovernet attracted five hundred eager users. Eric Corley (Emmanuel Goldstein) was one-time co-sysop of Plovernet, along with 'Lex Luthor', who would later found the phreaker/hacker group, Legion of Doom.

    [1983 May] Telnet protocol is published. Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers.

    [1983 Sep 27] Richard Stallman makes the first Usenet announcement about GNU.

    [1983 Nov] Paul Mockapetris posts RFC 882, which outlines how the Domain Name System (DNS) will work. DNS is a system that stores information about host names and domain names on networks, such as the Internet. Most importantly, it provides an IP address for each host name.

    [1983 Nov 12] First mention of Microsoft Windows is posted to Usenet.

    [1984] Computer scientists Len Bosack and Sandy Lerner from Stanford University co-found Cisco Systems (cisco is not C.I.S.C.O. but is short for San Francisco).

    [1984] Antivirus software developer Fred Cohen introduces the term "computer virus".

    [1984] Andrew Tanenbaum writes the first version of Minix, a free UNIX clone intended for educational purposes. Minix later gave Linus Torvalds the inspiration to start writing Linux. Minix is designed around a microkernel.

    [1984] The University of California at Berkeley releases version 4.2BSD which included a complete implementation of the TCP/IP networking protocols. Systems based on this and later BSD (Berkeley Software Distribution) releases provided a multi-vendor networking capability based on Ethernet networking.

    [1984] Bill Landreth (The Cracker) is convicted of breaking into some of the most secure computer systems in the United States, including GTE Telemail's electronic mail network, where he peeped at NASA and Department of Defense computer correspondence. In 1987 Landreth violated his probation and was back in jail finishing his sentence. Landreth also authored an interesting read titled Out of the Inner Circle.

    [1984] Sony Corp v. Universal City Studios also known as the "Betamax case" is heared. The Supreme Court of the United States found that the making of individual copies of complete television shows for home use is considered fair use, and that the manufacture of devices, such as Betamax or VCRs, to facilitate that is legal. A court case that is still being used to justify the use of DVD copying software and P2P networks.

    [1984] Legion of Doom formed. The Legion of Doom is a hacker/phreaker group which operated in the United States in the late 1980's. The group's wide ranging activities included diversion of telephone networks, copying proprietary information from companies and distributing hacking tutorials. Members included: 'Lex Luther' (founder), Chris Goggans (Erik Bloodaxe), Mark Abene (Phiber Optik), Adam Grant (The Urvile), Franklin Darden (The Leftist), Robert Riggs (The Prophet), Loyd Blankenship (The Mentor), Todd Lawrence (The Marauder), Scott Chasin (Doc Holiday), Bruce Fancher (Death Lord), Patrick K. Kroupa (Lord Digital), James Salsman (Karl Marx), Steven Steinberg (Frank Drake), Corey Lindsly (Mark Tabas), Peter Jay Salzman (Thomas Covenant), 'Agrajag The Prolonged', 'King Blotto', 'Blue Archer', 'The Dragyn', 'Unknown Soldier', 'Sharp Razor', 'Doctor Who', 'Paul Muad'Dib', 'Phucked Agent 04', 'X-man', 'Randy Smith', 'Steve Dahl, 'The Warlock', 'Terminal Man', 'Silver Spy', 'The Videosmith', 'Kerrang Khan', 'Gary Seven', 'Bill From RNOC', 'Carrier Culprit', 'Master of Impact', 'Phantom Phreaker', 'Doom Prophet', 'Phase Jitter', 'Prime Suspect', 'Skinny Puppy' and 'Professor Falken'.

    [1984] 2600: The Hacker Quarterly is founded by Eric Corley (Emmanuel Goldstein).

    [1984 Jan] Apple introduces Macintosh System 1.0.

    [1984 Jun 19] The X Window System (commonly X11 or X) is released by Robert W. Scheifler. X Windows is the standard graphical interface on Unix and Unix-like operating systems, and is available for most other modern operating systems. X provides the basic framework for a graphical user interface (GUI) environment: drawing and moving windows on the screen and interacting with a mouse and keyboard.

    [1985] The Free Software Foundation (FSF) is founded.

    [1985] The National Science Foundation began deploying its new T1 lines (T-carrier), which would be finished by 1988. The T1 (or T-1) carrier is the most commonly used digital line in the United States, Canada, and Japan. In these countries, it carries 24 pulse code modulation (PCM) signals using time-division multiplexing (TDM) at an overall rate of 1.544 million bits per second (Mbps). T1 lines use copper wire and span distances within and between major metropolitan areas.

    [1985] Hacker 'zine Phrack is first published by Craig Neidorf (Knight Lightning) and Randy Tischler (Taran King).

    [1985 Mar 15] Symbolics.com is assigned and becomes the first registered domain name.

    [1985 Apr] Apple introduces Macintosh System 2.0.

    [1985 May 24] Date of incorporation under original founding name, Quantum Computer Services (America Online).

    [1985 Nov] Microsoft releases Windows 1.0 and is initially sold for $100.00.

    [1986] Advanced Interactive eXecutive (AIX) is released by IBM. AIX is IBM's version of UNIX and is based on AT&T's UNIX System V with Berkeley extensions. AIX is designed around the microkernel.

    [1986] The Fraunhofer Institut in Erlangen, Germany, begin work on a high quality, low bit-rate audio coding with the help of Karlheinz Brandenburg and Dieter Seitzer. In 1989, the Fraunhofer Institut was granted a patent for MPEG Audio Layer III (MP3) in Germany and a few years later it was submitted to the International Standards Organization (ISO), and integrated into the MPEG-1 specification.

    [1986] The Internet Engineering Task Force (IETF) was created to serve as a forum for technical coordination by contractors for DARPA working on Arpanet, U.S. Defense Data Network (DDN) and the Internet core gateway system. IETF is an open, all-volunteer organization, with no formal membership nor membership requirements.

    [1986] The U.S. Congress passes the Computer Fraud and Abuse Act. The law, however, does not cover juveniles.

    [1986 Jan] Apple introduces Macintosh System 3.0.

    [1986 Jan 8] Legion of Doom/H member Loyd Blankenship (The Mentor) is arrested. He publishes a now-famous treatise that comes to be known as the Hacker's Manifesto.

    [1986 Aug] While following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers responsible. Stoll later wrote the book Cukoo's Egg which detailed his hunt for the hackers.

    [1987] Internet service provider CompuServe introduced GIF (Graphics Interchange Format) as a format to transmit images with up to 256 different colors (8 bits per pixel).

    [1987 Mar] Apple introduces Macintosh System 4.0.

    [1987 Oct 18] The first version of Perl, 1.0, was posted to the usenet group comp.sources. Created by Larry Wall, Perl (Practical Extraction and Report Language) is a stable, cross platform programming language.

    [1987 Dec 9] Microsoft releases Windows 2.0 and is initially sold for $100.00.

    [1988] Sony, Philips and Taiyo Yuden co-invent the Compact Disk Recordable (CD-R).

    [1988] Apple introduces Macintosh System 6.0.

    [1988] Internet Relay Chat (IRC) is started from the efforts of Jarkko Oikarinen while attending the University of Oulu, Finland.

    [1988 Nov 2] Robert Morris, Jr., a graduate student at Cornell University and son of a chief scientist at a division of the National Security Agency (NSA), launches a self-replicating worm on the government's Arpanet (precursor to the Internet) to test its effect on UNIX systems. The worm gets out of hand and spreads to some 6,000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years probation and fined $10,000.

    [1988 Nov 3] The first mention of the Morris Worm is posted to Usenet.

    [1988 Dec] Legion of Doom hacker Robert Riggs (The Prophet) hacks into BellSouth AIMSX computer network and downloads E911 document (describes how the 911 emergency phone system works). Riggs sends a copy to Phrack editor Craig Neidorf (Knight Lightning). Both Craig and Robert are raided by federal authorities and later indicted. The indictment said the "computerized text file" was worth $79,449, and a BellSouth security official testified at trial it was worth $24,639. The trial began on July 23, 1990 but the proceedings unexpectedly ended when the government asked the court to dismiss all the charges when it was discovered that the public could call a toll-free number and purchase the same E911 document for less than $20.

    [1989] The Joint Photographic Experts Group (JPEG) standard for image compression is adopted.

    [1989] 22-year-old computer hacker and ex-LOD member Corey Lindsly (Mark Tabas) pleaded guilty to felony charges relating to using a computer to access US West's computer system illegally, which resulted in five years probation. This result does not deter or stop Lindsly from his addiction. [see also 1995 Feb. Phonemasters]

    [1989] At the Cern laboratory for research in high-energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the World Wide Web (WWW).

    [1989 Sep] SunOS 4.0.2 is released by Sun Microsystems.

分页树展主题 · 全看首页 上页
/ 1
下页 末页


有趣有益,互惠互利;开阔视野,博采众长。
虚拟的网络,真实的人。天南地北客,相逢皆朋友

Copyright © cchere 西西河