Hacking or Free-Share ?

 

Introduction

2To the movies, 250Go to music, 400Go games and so on ... thanks to the emergence of the net we have everything to click away.
The flow rates of internet connections becoming increasingly result, users can currently find digital goods in record time, and even what they do not use.
As the user lambda downloading Photoshop CS6, while barely control the software in Windows Paint.
Having that feeling can access any digital tool or know, and free, can increase our curiosity.
Or, online as in real life there are rules and if it is broken it can be heavily punished.
For share or download a digital asset charge (film, music, software, games ...) is an act of hacking.
In effect is considered hacking any intrusions or broadcasts on a computer system, data belonging to natural or legal persons without their permission.
But why and how to hacking he took such magnitude in decades ?
Large inventory on what was and what became of hacking ...

 

Birth of the phenomenon

Everything begins in the years 60, when the most famous and also the first case of intrusion ( We still do not talk about hacking ) is identified.

This is John Draper, passionate telephony, who discovers one day that whistles offered in Cap'n Crunch cereal boxes could reproduce a particular sound frequency. Indeed, these whistles were capable of emitting a frequency of 2600Hz, frequency used at the time by the telephone companies to indicate that a line was active.

Many phone enthusiasts groups then rush in the analysis of telephone lines to know how they work, movement "Phreakers" was born. In 1961, MIT of Cambridge University purchased its first computer, the IBM 704, it will be quickly the student center of attention. They will soon divert its original intended use IBM pushing this technology jewelry (at the time) of millions of dollars into a corner.

The students in the MIT went unnoticed and was described as their exploits of "Hacking" (The word "hash" in English meaning "hack" in French)…it was the birth of the first 'Hacker”. American justice against this new form of crime should react, despite the total absence of specific legislation in the field and it was not until October 1971, after the publication of the article by Ron Rosenbaum in Esquire magazine " Secrets of the Little Blue Box "That of American States took steps to punish such wrongdoing. John Draper arrested 1972 nicknamed Cap'n Crunch ( Name of the cereal box this famous whistle ) after that the public is aware of his prowess ...

 

The world discovers Hackers

The technology continues to evolve, and users, parallel movement of hackers is booming. Two hackers named Ken Thompson and Dennis Ritchie invent a UNIX operating system in C. Their goal is to provide a simple and ergonomic OS, they will integrate even the ability to exchange messages from phone lines. This will facilitate communication between users and hackers ... ! The first personal computers, released in 1976 by Apple, enabled the general public to discover the joys of computer, while a new wave of hacker had appeared in party due to the new BASIC language used in Apple computers.

But with Internet openness to the world and its availability for all, thanks to the WWW (World Wide Web) a new technological era was developing unconsciously ... Indeed, the early 80 is marked by the appearance of the first virus. This is Rich Skrenta an American student 15 years who wanted to scare his friends who 1982 developed the first virus for Apple II. Named "Elk Cloner", he was to send poems explaining how he self-replied. But this joke, inspire a lot of malicious hackers in the future ... Eventually, to contain this crime mounted, by 1986 the US Congress will pass a law "Computer Fraud and Abuse Act" against all types of computer hacking and those who practice ...

 

Evolution hacking thanks to the emergence of the internet

In the early 80, Cybercrime is becoming the scourge of the net, the movement of hackers is no longer taboo and everyone is aware of their actions. Thus the movement is divided and some aspire to totally opposed projects, different types of hacker stand in 3 categories and subcategories : The good ones (Good), those who have no purpose (Fair) & the villains (Bad). BAD HACKERS (BLACK HAT) :

  • Le Black Hat, is a hacker who goes by offense in a computer system to steal or destroy sensitive information.
  • le Lammers, (I JavaScript Kidds) trying to enter with more or less success in computers using pirated software ready.

FAIR HACKERS (GRAY HAT) :

  • Spy Hackers, They are hackers hired by large corporations to steal industrial or technological secrets to their competitors.

GOOD HACKERS (WHITE HAT) :

  • White Hat, their main motto is curiosity ! They enter on computer systems in order to know their faults and correct them.

Like Spy hackers they get hired by companies but to secure their data. Every hacker with very different principles, it is difficult to define which is nice or nasty, otherwise as stated in the CFAA, "An intrusion into a computer system is considered an act of piracy".

In 1987, a person will be prosecuted under the "Computer Fraud and Abuse Act", a barely-old high school student 17 year-old broke into AT computers&T. But it was not until 1989, Kevin Mitnick was the first hacker convicted of stealing software and MIC codes for criminal purposes. This piracy growing power is mostly due in part to the network expansion ARPAnet (Precursor Internet) and accessibility to everyone ...

 

Piracy boosted the democratization of Broadband

In the early 2000, ADSL is being democratized, NAPSTER the famous music-sharing software appeared in August 1999 be a precursor of free shares. Indeed, he was one of the first software that allowed to share in F2f music and free.

But the majors that saw a very dim and embarked on a legal struggle without thank you to preserve the record market in decline. Now internet evolving faster than IT infrastructures necessary that the key stakeholders that find a way to respond to all requests for access to data to prevent network saturation. And this is the 16 September 2000 Jed McCaleb eDonkey2000 launched to meet the growing needs of professionals seeking a quick way to share data so encrypted or not.

But using eDonkey2000 be quickly diverted to illegally share files on P2P network, then it will result in a long lawsuit filed by the RIAA (Recording Industry Association of America) which will lead to the stoppage of the software 28 September 2008. It did no less to stop the evolution of the free sharing, Indeed, the appearance of the hosts file will be one of the scourges of the net. Allowing users drop a file on a server by always making it instantly available and. It was the final straw that broke the camel in the American film industry that decided late November 2011 to tackle the biggest file hoster in the world : Megaupload. After over a month of court fight, This site created by Kim Dotcom, will be closed on 19 January 2012 by the Justice Department of the United States.

 

Conclusion

Today it is difficult to completely eradicate piracy, it was beneficial also because it has created, advanced & improving different technologies. Editors and majors who have been trying for years to curb this phenomenon by lawsuits and other costly procedures will not, without a doubt, change anything this phenomenon rooted in society. Microsoft wants to be more involved in the fight against piracy various files and has set up against-measures directly to the heart of Windows 10. Since the democratization of the Internet, piracy is experiencing a real boom and practice once reserved for a certain category of users has become a daily act for the majority of users. But things could change, not because of the repression of the authorities, but perhaps with Microsoft and a new patent recently filed with the USPTO.

The Redmond company has filed a patent on a technology citing that “The objects in a shared storage system can be marked as integrating the content deemed prohibited”. Clear, Microsoft could clearly identify pirated files stored on a PC, then identify offenders, the source files, their destination, even differentiate users who had access to it within the same system users via employee accounts. The system could even lock the use of files when shared, tags being embedded in files and read by Windows to block the use reception.

A penalty point for Windows ?

The system would create a history within Windows, with good and bad points which then would influence the rights to the user that may be assigned or removed : more users use pirated files, unless it can share its data. Thereafter we imagine that these data can be transmitted to the authorities in case of a massive hacking.

The historic mentioned by Microsoft seems essential in this system. It is from that data contains the rights are thus removed or assigned to the user according to his behavior. A bit like a penalty point : more one pirate and one shares initially, least we will have the right to do then.

The patent also explains that service providers may be required to check whether the missing files such copyrighted. In this precise case, this is not necessarily Microsoft that would thus verify the authenticity of the file. One can then imagine that an online music distributor or a software company could do.

Because for now, Microsoft gave no indication of the use that may be made of this patent. The company may for example only be used for its own software, often pirated, and prevent and sharing among users.
After Windows 10 S and software only available through the Windows Store, this would be an additional way application control, development of their shares through their distribution.

The question is whether this type of system will be restricted only to Microsoft software, patent citing compatibility with music, video and any existing file. Thank you to Jean-Francois RIMBERT for his excellent article.


[site_reviews_summary assigned_to=”post_id”]

Cancel
[site_reviews_form assign_to=”post_id”]
Rate this article

[site_reviews display=10 assigned_to=”post_id”]

1 thought on “Hacking or Free-Share ?

Leave a Reply

Your email address will not be published. Required fields are marked *