enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Creeper and Reaper - Wikipedia

    en.wikipedia.org/wiki/Creeper_and_Reaper

    Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. [2] Its original iteration was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET , with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move. [ 3 ]

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    August 24: Source code for MegaPanzer is released by its author under GPLv3. [58] and appears to have been apparently detected in the wild. [59] November 27: The virus Kenzero is a virus that spreads online from peer-to-peer networks (P2P) taking browsing history. [60]

  4. Rich Skrenta - Wikipedia

    en.wikipedia.org/wiki/Rich_Skrenta

    In 1982, at age 15, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II computers. It is widely believed to have been one of the first large-scale self-spreading personal computer viruses ever created. [2]

  5. Source code virus - Wikipedia

    en.wikipedia.org/wiki/Source_code_virus

    Source code viruses are rare, partly due to the difficulty of parsing source code programmatically, but have been reported to exist. One such virus (W32/Induc-A) was identified by anti-virus specialist Sophos as capable of injecting itself into the source code of any Delphi program it finds on an infected computer, and then compiles itself into ...

  6. Computer worm - Wikipedia

    en.wikipedia.org/wiki/Computer_worm

    The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks ...

  7. Elk Cloner - Wikipedia

    en.wikipedia.org/wiki/Elk_Cloner

    Elk Cloner was created by Skrenta as a prank in 1982. Skrenta already had a reputation for pranks among his friends. In sharing computer games and software, he would often alter the floppy disks to shut down or display taunting on-screen messages.

  8. Talk:Creeper and Reaper - Wikipedia

    en.wikipedia.org/wiki/Talk:Creeper_and_Reaper

    Creeper's message read: "I'm the CREEPER! try and stop me!" which was a boast at which it spread. The only way to close the message was to restart the computer. --User:SmartyPantsKid 16:01, 25 June 2013 (UTC)The Creeper virus was older than some of the viruses we have today so it wasn't as harmfull

  9. Sasser (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Sasser_(computer_worm)

    An indication of the worm's infection of a given PC is the existence of the files C:\win.log, C:\win2.log or C:\WINDOWS\avserve2.exe on the PC's hard disk, the ftp.exe running randomly and 100% CPU usage, as well as seemingly random crashes with LSA Shell (Export Version) caused by faulty code used in the worm. The most characteristic symptom ...