Welcome back to another Security Saturdays with Sriker! Technology’s history is packed with wild stories, unsung heroes, and game-changing moments. Think you can uncover them all?
This week, we’re doing something a little different. Think you know your tech history, legendary hackers, and iconic IT milestones? Let’s put your knowledge to the test with a trivia game designed to surprise, challenge, and maybe even teach you a thing or two.
Grab a notebook (or open a text editor) and jot down your answers as you go—solutions and fun explanations are waiting for you at the end!
Tech Trivia: 12 Questions to Test Your Knowledge
Who is credited with pioneering the idea of “hypertext,” which became the foundation of the World Wide Web?
A) Tim Berners-Lee
B) Ted Nelson
C) Douglas Engelbart
D) Vannevar Bush
Which notorious hacking tool, introduced in the late 1990s, became infamous for its ability to remotely control Windows PCs?
A) Sub7
B) NetBus
C) Back Orifice
D) VNC
What was the original name of the Linux operating system before Linus Torvalds settled on “Linux”?
A) Freax
B) OpenUnix
C) LinOS
D) UnixPlus
In 1986, the Computer Fraud and Abuse Act was introduced in the U.S. following which landmark hacking event?
A) The Morris Worm Incident
B) Operation Sundevil
C) The hacking of ARPANET
D) The 414s Break-In
What was the first known piece of ransomware, created in 1989 and distributed via floppy disks?
A) AIDS Trojan
B) CryptoLocker
C) WannaCry
D) Reveton
Which early social media platform, launched in 2003, is considered a precursor to today’s professional networking sites?
A) Friendster
B) LinkedIn
C) MySpace
What open-source encryption software, widely used in the early 2000s, was famously shut down by its creator in 2014, citing security concerns?
A) TrueCrypt
B) OpenSSL
C) VeraCrypt
D) PGP
What is the name of the cybersecurity framework that emphasizes Confidentiality, Integrity, and Availability as its core principles?
A) CIA Triad
B) NIST Framework
C) Zero Trust Model
D) Defense in Depth
What was the first commercial antivirus software, launched in 1987?
A) McAfee VirusScan
B) Norton Antivirus
C) Dr. Solomon’s Toolkit
D) Avast
In 1995, which infamous hacking group defaced the CIA’s website, marking one of the earliest high-profile acts of “hacktivism”?
A) L0pht Heavy Industries
B) Cult of the Dead Cow
C) Milw0rm
D) Omega Group
What programming language, developed in 1991, was named after a British comedy troupe?
A) Ruby
B) Python
C) Perl
D) Java
Which legendary hacker famously demonstrated vulnerabilities in phone systems by using a toy whistle from a cereal box?
A) Kevin Mitnick
B) John Draper (Captain Crunch)
C) Adrian Lamo
D) Robert Tappan Morris
Answers & Fun Facts
If you were overwhelmed by some of the questions/answers, here’s an answer key containing some trivia along with some interesting links for further reading and exploration:
Ted Nelson
Ted Nelson’s concept of “hypertext” in the 1960s was revolutionary and eventually inspired Tim Berners-Lee to develop the World Wide Web.Back Orifice
Created by Cult of the Dead Cow, Back Orifice highlighted vulnerabilities in Windows systems and became a symbol of early hacking ingenuity.Freax
Before it became “Linux,” Linus Torvalds named his project “Freax,” blending “free,” “freak,” and “Unix.” A friend suggested the simpler name “Linux.”The 414s Break-In
This Milwaukee-based hacking group infiltrated dozens of systems, including Los Alamos National Lab, leading to significant public awareness of cybersecurity risks.AIDS Trojan
The AIDS Trojan, distributed via floppy disks, demanded payment to unlock encrypted files, making it the first ransomware.LinkedIn
Launched in 2003, LinkedIn helped professionals connect and build networks, laying the groundwork for modern career-focused platforms.TrueCrypt
TrueCrypt’s sudden shutdown in 2014 shocked the security world, sparking debates about its security and future.CIA Triad
The CIA Triad is a cornerstone of cybersecurity, ensuring data remains secure, accurate, and accessible to authorized users.McAfee VirusScan
McAfee’s software became the first commercial antivirus product, setting the stage for today’s billion-dollar industry.Cult of the Dead Cow
This group’s defacement of the CIA website in 1995 was a pivotal moment in the history of hacktivism.Python
Named after Monty Python’s Flying Circus, Python’s playful name reflects its beginner-friendly and versatile nature.John Draper (Captain Crunch)
Using a whistle from a Cap’n Crunch cereal box, Draper exploited phone system vulnerabilities, pioneering the art of “phreaking.”
How Did You Do?
So, how many did you get right? Whether you aced it or learned something new, I hope this trivia brought a little spark to your weekend. Share your score in the comments or tag a friend who’d enjoy the challenge! Have your own trivia question ideas or topics you’d like to see covered? Let me know—I’d love to collaborate and feature your suggestions in a future post.
Stay curious, stay secure, and I’ll be back next week with another blogpost on Security Saturdays with Sriker!