26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Viruses that replicate themselves via e-mail or over a computer network cause the subsidiary<br />

problem of increasing the amount of Internet <strong>and</strong> network traffic. These fast-replicating<br />

viruses—called worms—can completely overload a company network, shutting down servers<br />

<strong>and</strong> forcing tens of thous<strong>and</strong>s of users offline. While no individual machines might be<br />

damaged, this type of communications disruption can be quite costly.<br />

As you might suspect, most viruses are designed to deliver their payload when they’re first<br />

executed. However, some viruses won’t attack until specifically prompted, typically on a<br />

predetermined date or day of the week. They stay on your system, hidden from sight like a<br />

sleeper agent in a spy novel, until they’re awoken on a specific date; then they go about the<br />

work they were programmed to do.<br />

In short, viruses are nasty little bits of computer code, designed to inflict as much damage as<br />

possible, <strong>and</strong> to spread to as many computers as possible—a particularly vicious combination.<br />

The History of Computer Viruses<br />

Where, exactly, do computer viruses come from To answer that question, it’s helpful to<br />

examine the history of computer viruses.<br />

Technically, the concept of a computer virus was first imagined in 1949, well before<br />

computers became commonplace. In that year, computer pioneer John von Neumann wrote a<br />

paper titled “Theory <strong>and</strong> Organization of Complicated Automata.” In this paper, von<br />

Neumann postulated that a computer program could be self-replicating—<strong>and</strong> thus predicted<br />

today’s self-replicating virus programs.<br />

The theories of von Neumann came to life in the 1950s, at Bell Labs. Programmers there<br />

developed a game called “Core Wars,” where two players would unleash software<br />

“organisms” into the mainframe computer, <strong>and</strong> watch as the competing programs would vie<br />

for control of the machine—just as viruses do today.<br />

In the real world, computer viruses came to the fore in the early 1980s, coincident with the<br />

rise of the very first personal computers. These early viruses were typically spread by users<br />

sharing programs <strong>and</strong> documents on floppy disks; a shared floppy was the perfect medium for<br />

spreading virus files.<br />

The first virus “in the wild,” as they say, infected Apple II floppy disk in 1981. The virus<br />

went by the name of Elk Cloner, <strong>and</strong> didn’t do any real damage; all it did was display a short<br />

rhyme onscreen:<br />

It will get on all your disks<br />

It will infiltrate your chips<br />

Yes it’s Cloner!<br />

It will stick to you like glue<br />

It will modify ram too<br />

Send in the Cloner!<br />

At the time, Elk Cloner wasn’t identified as a virus, because the phrase “computer virus” had<br />

yet to be coined. That happened in 1983, when programmer Len Adleman designed <strong>and</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!