If you read a poem and feel moved by it, but then find out it was actually written by a computer, would you feel differently about the experience? Would you think. Dear Auntie SparkNotes, When I was a young, naive freshie, I met this guy, 'Alex.' Alex was actually dating my friend when we first met, but we quickly became best. Abelson and Sussman's classic Structure and Interpretation of Computer Programs teaches readers how to program by employing the tools of abstraction and modularity. Discover an endless library of free books, picture books, & poetry or use simple tools to create books in minutes. Storybird is a creative community where readers. Give your writing a home on Writing.Com. Whether you're writing your first poem or your tenth creative writing novel, Writing.Com is write for you! Computer programming (often shortened to programming) is a process that leads from an original formulation of a computing problem to executable computer programs. Examples of Malicious Computer Programs. Copyright 2. 00. 2 by Ronald B. Standler. Table of Contents. Introduction"author did not know" is specious defense. Early Examples. Brain Virus. Lehigh Virus. Chrisma Worm. Morris Worm. MBDF Virus. Pathogen Virus. Melissa Virus. ILOVEYOU Worm. Anna Worm. Three Worms: Code. Red. Sircam. Nimda. Bad. Trans. B Worm. Klezrecent malicious programs. Economic Damage. Sources of Information. Conclusion. Introduction. This essay contains a description of several. It is not my intention to provide information on. You can find information on current threats at. There are three reasons to understand past malicious programs: Learning how past incidents caused damage may help you. I say may, because. Because the law reacts to past events, learning about past harmful incidents. In May 2. 00. 2, the Norton Anti- Virus software for Windows operating systems. Astoundingly, there have been criminal prosecutions and convictions. Morris worm released in 1. MBDF virus,the author of the Pathogen virus,the author of the Melissa virus, andthe author of the Anna worm. I hope that when people read this essay and become aware of. I have not cited a source for each fact mentioned in this essay. I do cite a source for facts that are either not well known or controversial.). Further, this essay is not a formal scholarly document, with numerous. Some general sources are mentioned later. Author did not know ... The most common excuse made by criminal defense attorneys who. Because this excuse occurs in several of the cases presented below. Such an excuse might be plausible to someone who had no understanding. Internet and computer programming. However, it is ridiculous. Students who major in computer science, mathematics, physics. There is a good reason. A good example of a geometric series is the propagation of a computer worm. Consider the following hypothetical example in which. In this hypothetical example, at 2. But this example clearly shows the rapid growth of a geometric. Seen in this context, the criminal defense attorney's statement that. Actually, the defense attorney's statement is ludicrous. Even if one ignores the rapid growth of a geometric series. Chrisma Worm in Dec 1. Morris Worm in Nov 1. There is absolutely no need for another "experiment" of this kind. I put "experiment" in quotation marks, because the design and release. Other examples of specious defenses. Computer Crime. Early Examples. Brain virus. The first computer virus for Microsoft DOS was apparently written in 1. Brain Computer Services, a store in Lahore, Pakistan. This virus infected the boot sector of 5¼ inch. Robert Slade, an expert on computer viruses, believes the Brain virus. Pakistan. A variant of the Brain virus was discovered. University of Delaware in the USA during Oct 1. In November 1. 98. COMMAND. COM file on DOS diskettes at. Lehigh University. When an infected COMMAND. COM. had infected four other copies of COMMAND. COM. (i. e., when copying to a floppy diskette), the virus wrote over. Quick intervention at Lehigh University, including overnight. The data on approximately 5. Lehigh University were lost because of this one virus. To the best of my knowledge, the author. Lehigh Virus was never identified, so there was no punishment for him. A student at a university in Germany created a worm. REXX language. He released his worm in December 1. IBM mainframe computers in Europe. The worm displayed an image of a conifer tree on the user's monitor. This trick would be used again, on a different operating system. March 1. 99. 9 by the Melissa virus.). The Christma worm deleted itself after it functioned once. However, the one copy deleted was replaced by multiple copies sent. The worm itself was relatively harmless: it neither deleted. However, the rapid propagation of the worm. IBM mainframe computers. Dec 1. 98. 7. The author of the Christma worm was identified, by tracing. His computer account was closed, but I can not find any other. On 2 November 1. 98. Robert Tappan Morris, then a first- year graduate student in. Cornell University, released his worm that effectively. Internet for several days. The Morris Worm used four different ways to get unauthorized. Internet: exploit a defect in sendmail when DEBUG was enabled during compile. The worm only infected SUN- 3 and Digital Equipment Corp. VAX. computers running versions of the Berkeley UNIX operating system. The Morris Worm succeeded in infecting approximately 3. Internet at that time. Among the affected computers were those at the University of California. Berkeley, MIT, Stanford, Princeton , Purdue, Harvard, Dartmouth. University of Maryland, University of Utah. Georgia Institute of Technology, and many other universities. When Morris understood that his worm was propagating faster. Harvard University. The friend then sent the following anonymous message. TCP- IP mailing list via the Internet. A possible virus report: There may be a virus loose on the internet. Here is the gist of a message I got: I'm sorry. Here are some steps to prevent further transmission: [three terse suggestions for how to stop the worm omitted here]Hope this helps, but more, I hope it is a hoax. However, because the Internet was already clogged. Internet to avoid infection by the Morris Worm, the message did. Further, the anonymous source, and also the tentative tone. I hope it is a hoax."). If Morris had really been innocent, he could have faxed the source. University of California. Berkeley, MIT, Purdue, University of Utah, etc. And Morris could have given system administrators. Morris apparently never personally explained his intentions. Some of his. defenders have said that Morris did not intend the consequences of. A Cornell University Report by Ted Eisenberg, et al. Appendix 8. [bibliographic citation below]. Morris in his 1. 5 Oct 1. Such comments appear as clear indications of criminal intent by Morris. In a 1. 7 Oct 1. 99. Use. Net posting, Prof. Spafford. Purdue, who has also actually seen the worm's source code at Cornell that. Morris (including the comment lines by Morris that. The comments in the original code strongly suggested that. Robert intended it to behave the way it did – no accidents. Morris was the first person to be arrested, tried, and convicted. He was found guilty on 2. Jan 1. 99. 0. and appealed, but the U. S. Court of Appeals upheld the trial court's decision. The U. S. Supreme Court refused to hear an appeal from Morris. U. S. v. Morris, 9. F. 2d 5. 04, 5. 06 (2d. Cir. 1. 99. 1). cert. denied, 5. U. S. 8. 17 (1. 99. The Court of Appeals noted that. Morris released the worm from a computer at the Massachusetts. Institute of Technology [MIT]. MIT was selected to disguise. Morris at Cornell.". The Court of Appeals also noted that the cost of removing the worm. Internet was estimated to be. Id. There are no precise figures on the amount of damage that Morris did. Clifford Stoll at Harvard is that. Morris Worm is somewhere between. US$ 1. 05 and US$ 1. Despite the severity of this damage. Morris was sentenced in May 1. US$ 1. 00. 50. the US$ 3. In addition to this legal punishment, Cornell University. University for at least one year. When Morris applied for re- admission a few years later. Cornell refused to accept him. Morris earned his Ph. D. at Harvard University in 1. Bibliography on the Morris Worm. There are a number of technical publications that discuss. Morris worm and its effect on computers that constituted the Internet: Peter J. Denning, editor, Computers Under Attack. Addison- Wesley, 1. A collection of reprinted articles. Morris Worm. Mark Eichin and Jon Rochlis, With Microscope and Tweezers. An Analysis of the Internet Virus of November 1. Feb 1. 98. 9. Available from the. MIT website. and published in various places. Ted Eisenberg, David Gries, Juris Hartmanis, Don Holcomb. M. Stuart Lynn, and Thomas Santoro. The Computer Worm. A Report to the Provost of Cornell University on an Investigation. Conducted by The Commission of Preliminary Enquiry. Feb 1. 98. 9. Available from the Office of Information Technologies at Cornell. University. Bob Page, A Report on the Internet Worm. University of Lowell, 5 pp., 7 Nov 1. Available from a. Canada and also from. Donn Seeley, A Tour of the Worm, Computer Science Department. University of Utah, 1. Available from Francis Litterio's. Eugene H. Spafford, The Internet Worm Program: An Analysis. Technical Report CSD- TR- 8. Purdue University, 4. Dec 1. 98. 8. Available from. Purdue University. Eugene H. Spafford, The Internet Worm Incident. Technical Report CSD- TR- 9. Purdue University, 1. Sep 1. 99. 1. Available from. Purdue University. I recommend this report as the best place to start reading. Internet and ethical issues.). The June 1. 98. 9 issue (Vol. Nr. 6) of Communications of the ACM. Morris Worm. I have posted the unpublished Judgment of the. U. S. v. Robert Tappan Morris, as well as the opinion of the. In 1. 99. 2, four undergraduate students at Cornell University. MBDF virus, which attacks Apple Macintosh computers. This virus was released in three shareware programs: Obnoxious Tetris, a computer game. Ten Tile Puzzle, a computer game, and. Tetriscycle, a Trojan Horse program. MBDF virus. David S. Blumenthal wrote the virus and inserted it in the three programs. Blumenthal also created an anonymous account on a Cornell computer. Mark A. Pilgrim used this anonymous account on 1. Feb 1. 99. 2. to upload the three programs to an Internet archive at Stanford University. The initial victims downloaded the programs from Stanford. As these victims shared their infected. The MBDF virus was a relatively benign program that did not directly. However, this virus could cause harm in. The virus caused some programs to crash when the user selected. February 1. 99. 2. When MBDF A infects the system file, it must re- write the. If the user assumes the system has hung, and reboots. Macintosh while this is occurring, the entire system file will. The virus took several seconds to infect each program file. If the victim rebooted the computer. To recover from such problems, the victim first needed to run anti- virus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
September 2016
Categories |