Cybercrime History: Computer Viruses And What Are They?

1977 words - 8 pages

The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
The creeper was not really nasty, the “infected computers would simply display the message, I'm the creeper: catch me if you can” the computers did not suffer any lasting damage (Benford 112, Meltzer, and Phillips). The Creeper virus was an experiment of a self-replicating program, not designed to damage but to demonstrate a mobile application (Dalakov). Self means doing on its shelf (“Self”). Replicating means repeating over and over again in exact the same way (“Replicate”). Both these words are combined as Self–replicate is to copy itself automatically (“Self-replicating”).
A computer program is executable software that runs on a PC or computer system (Christensson). An executable file is a type in a computer file that runs a program when it opens (Christensson). Software is the instructions tell the computer what to do (“Software”). Software is the entire set of programs, procedures, and routines associated with the operation of a computer system, including the operating system (“Software”). It was the first worm in the computer world. It was little more than to an annoyance most sources say (Dalakov).
A worm is a computer program that duplicates but doesn't infect other files: instead, it installs itself on a victim computer and then looks for a way to spread itself to other computers (Worm). The first part of the anti-virus software was created as a straightforward reply to the creeper's test (Dalakov, Meltzer, and Phillips). “The Reaper was also a self-replicating program, which spread through the” computer “system in much the same way as the Creeper had, and it removed the offending virus from infected computers (Meltzer, and Phillips). “Just as quickly as it had spread, the Creeper was caught” (Dalakov, Meltzer, and Phillips).
In 1982, the first personal computer virus, called Elk Cloner, was written by Rich Skrenta, a high school student (May, "A Brief History of Malware"). He developed a boot sector virus. What is a boot sector virus? A boot sector virus works when the computer boots up the infected floppy disk or hard disk (hard drive) it replaces the code from the computer and makes its own code (Jesdanun, Boot sector virus). The computer hard drive is the primary...

Find Another Essay On Cybercrime History: Computer Viruses And What Are They?

Duties and What They Are Essay

775 words - 4 pages All individuals have a role in society, whether it is as a government official or a citizen of a nation. The duties of an individual and the duties of government are very important in order to establish a relationship between the two, especially in times of struggle and despair. An individual's duties are to treat everyone equally, stand up for what is right, and fight together for the good of all . The government's duty is to keep its people

The Virtues, what are they and where are they found?

1326 words - 5 pages I. The VirtuesIn Robin Waterfield's translation of The Republic,Socrates attempts to give a definition of justice. At the end of Book II he began a detailed description of the construction of a good city. The good city is a relation to the human soul, and its four virtues. In the following paper I will discuss the virtues, what they are and where they are found. Also discussed will be the foundation, arrangement, and the interconnectedness with

Synthesizers: What Are They and What Do They Do?

954 words - 4 pages until processor speeds increased. “In 1976, the Synclavier was the first synthesizer with completely digital sound generation” but it was not affordable (“A Brief History”). To fix the affordability, the synthesizer computer peripheral was introduced in the early 1980’s. As processor power increased, software synthesizer came. They used the built-in sound card in the computer produce to the inputs and outputs of sounds. Software synthesizers are

Black Holes: What They Are and Do

2417 words - 10 pages fuse helium into carbon and nuclear fusion resumes (HSWIS). This process continues and repeats up to oxygen, which the star is not large enough to fuse. Because of the exothermic reaction of nuclear fusion is gone, the star’s outer layers are thrown off and core collapses into what is called a white dwarf (UTFC). A white dwarf is a small ball of matter that is very hot and very dense. They can have a temperature of over one hundred thousand

Hackers- Who Are They? And What Do They Do?

989 words - 4 pages minute. You are able to see the hacker bypassing passwords and initiating viruses and it seems absolutely amazing. In real life, hackers do not work this way. They are not like you see them on television. Hackers use programs that are highly accessible over the Internet. Anyone can download programs and use them as they please. The only thing a person has to do is connect to the Internet and type in what they are searching for at a search engine

Genetic Disorders and they become what they are

1424 words - 6 pages In order to understand about genetic disorders one must start from the beginning. Cells are the basis of the human body. In the cell a nucleus is located. The nucleus is what controls the cell and is where most genetic material is located. Each cell is made up of 46 chromosomes. Chromosomes are composed of DNA. Deoxyribonucleic acid is a chemical that carries genetic information. Located on the DNA strand are genes which are inherited from

Parenting Styles: What They Are and Why They Matter

2821 words - 11 pages Berk as citied by, Parenting Style as a Moderator for Students’ Academic Achievement, parenting styles are found to affect the development of self-concept. So these perceptions are shaped through the environment and the parenting they receive. Self-concept is defined as the attributes to which a person would be defining themselves. Therefore, academic self-concept is the qualities on what a child thinks they can and cannot do in school. Examples

What Are GMO’s and How Are They Affecting Consumers?

1141 words - 5 pages what is best for their health and the health of their environment, but the cold, hard truth is that few can afford to make the healthy choice. “Organic” items at the grocery store are drastically higher than those containing genetically modified material. Although consumers may not be realistically able to shell out a few extra bucks to purchase the healthier alternative, they might shell out a little extra effort to produce it on their own

What Are They Thinking?

2225 words - 9 pages all areas of life, there are people who are not aware of the deficit between what they think they can do and their actual ability. Those who are less competent tend to overestimate their abilities while those who are more competent tend to underestimate their abilities. Studies show that bottom performers tend to overestimate their performance by approximately 30% (Hawes, 2010). Unskilled performers are said to have “illusory superiority” which

What are Charter Schools and why are they so unique?

631 words - 3 pages What are Charter Schools and why are they so unique?Since their arrival on the national level in 1991, many papers, studies and analysis have been conducted on the charter school phenomenon: an educational innovation that has skyrocketed from the one school in 1992, to more than 2000 schools operating for the 2001-2002 school year. Charter schools typically have one particular mission; to comply with parent's proposals and demands, whether it's

What are Unions and What do They Do

1538 words - 6 pages Running Head: ASSIGNMENT FOUROntario CanadaAPA StyleWhat are Unions and What do They DoTo understand the need for unions firstly we need to understand the nature of capitalism. Black does an excellent job of summing up what capitalism truly stands for, and what we need to remember, no matter how wonderful capitalism may appear to be: Black does this in his writing, "The raison d'être of these capitalist firms is not to meet human needs

Similar Essays

Trojans,Worms, And Viruses: What Are They And What Can You Do To Stop Them

2339 words - 10 pages viruses, are man-made and most worms are designed to be passive and not destroy anything. This is okay but the problem is that even the most neutral ones are dangerous. They eat up unnecessary bandwidth and slow down the computer so much that even a computer made in the nineties would be faster. Worms that are designed to hurt have a feature called a payload. Payloads are just the instructions telling the worm what to do besides replicate and

Computer Ethics – Are They Keeping Pace With Technology?

1278 words - 5 pages professional practitioners so they understand not only the impact of the work they are doing, but their responsibilities to themselves, their employers, the users of the products they develop, and to society as a whole so they are equipped to make value judgments about what they should and should not do as computer professionals. It seems every professional organization has published a code of ethics and standards but, because computers are no longer only

Computer Viruses And Malware Essay

871 words - 3 pages INTRODUCTION Two of the common known attacks on computing systems are the deployment of computer viruses and malware. Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on

Polymorphic And Cloning Computer Viruses Essay

1832 words - 7 pages flourish. As time passes on, so-called 'viruses' are becoming more and more adaptive and dangerous. No longer are viruses merely a rarity among computer users and no longer are they mere nuisances. Since many people depend on the data in their computer every day to make a living, the risk of catastrophe has increased tenfold. The people who create computer viruses are now becoming much more adept at making them harder to detect and eliminate. These so