enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Creeper and Reaper - Wikipedia

    en.wikipedia.org/wiki/Creeper_and_Reaper

    Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. [2] Its original iteration was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET , with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move. [ 3 ]

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. [3] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if ...

  4. Computer virus - Wikipedia

    en.wikipedia.org/wiki/Computer_virus

    The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. [16] Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. [17] Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. [18]

  5. Antivirus software - Wikipedia

    en.wikipedia.org/wiki/Antivirus_software

    The Creeper virus was eventually deleted by a program created by Ray Tomlinson and known as "The Reaper". [5] Some people consider "The Reaper" the first antivirus software ever written – it may be the case, but it is important to note that the Reaper was actually a virus itself specifically designed to remove the Creeper virus.

  6. Comparison of computer viruses - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_computer_viruses

    Creeper virus - The first malware that ran on ARPANET; ILOVEYOU; Leap - Mac OS X Trojan horse; Shamoon a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by Saudi Aramco. Storm Worm - A Windows trojan horse that forms the Storm botnet; Stuxnet First destructive ICS-targeting Trojan which destroyed part of Iran ...

  7. Computer worm - Wikipedia

    en.wikipedia.org/wiki/Computer_worm

    The second ever computer worm was devised to be an anti-virus software. Named Reaper, it was created by Ray Tomlinson to replicate itself across the ARPANET and delete the experimental Creeper program (the first computer worm, 1971).

  8. Creeper - Wikipedia

    en.wikipedia.org/wiki/Creeper

    Creeper , creatures found within the video game Minecraft; Creeper, a fictional hard rock band from 2001 Canadian film Fubar; Creeper, a spirit character in the 2005 video game The Suffering: Ties That Bind; Creepers, mechanical monsters in the Shannara fantasy novels; The Creeper, a character played by Rondo Hatton in several horror movies

  9. Rich Skrenta - Wikipedia

    en.wikipedia.org/wiki/Rich_Skrenta

    In 1982, at age 15, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II computers. It is widely believed to have been one of the first large-scale self-spreading personal computer viruses ever created.