HOME





Code Red (computer Worm)
Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Internet Information Services, Microsoft's IIS web server. It was the first large-scale, Mixed threat attack, mixed-threat attack to successfully target enterprise networks. The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh when it exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because they were drinking Mountain Dew Code Red at the time of discovery. Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On that day, the number of infected hosts reached 359,000. The worm spread worldwide, becoming particularly prevalent in North America, Europe, and Asia (including China and India). Concept Exploited vulnerability The worm showed a vulnerability in software distributed with IIS, described in Microsoft Security Bullet ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass thro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Pseudo-random
A pseudorandom sequence of numbers is one that appears to be statistically random, despite having been produced by a completely deterministic and repeatable process. Pseudorandom number generators are often used in computer programming, as traditional sources of randomness available to humans (such as rolling dice) rely on physical processes not readily available to computer programs, although developments in hardware random number generator technology have challenged this. Background The generation of random numbers has many uses, such as for random sampling, Monte Carlo methods, board games, or gambling. In physics, however, most processes, such as gravitational acceleration, are deterministic, meaning that they always produce the same outcome from the same starting point. Some notable exceptions are radioactive decay and quantum measurement, which are both modeled as being truly random processes in the underlying physics. Since these processes are not practical sources of r ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Windows Malware
Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sectors of the computing industry – Windows (unqualified) for a consumer or corporate workstation, Windows Server for a server and Windows IoT for an embedded system. Windows is sold as either a consumer retail product or licensed to third-party hardware manufacturers who sell products bundled with Windows. The first version of Windows, Windows 1.0, was released on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). The name "Windows" is a reference to the windowing system in GUIs. The 1990 release of Windows 3.0 catapulted its market success and led to various other product families, including the now-defunct Windows 9x, Windows Mobile, Windows Phone, and Windows CE/Embedded Compact. Windows is the most po ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

July 2001
The year's most prominent event was the September 11 attacks against the United States by al-Qaeda, which killed 2,977 people and instigated the global war on terror. The United States led a multi-national coalition in an invasion of Afghanistan after the Taliban government was unable to extradite Al-Qaeda leader Osama bin Laden within 24 hours. Other international conflicts in 2001 were the standoff between India and Pakistan as well as the Second Intifada between Israel and Palestine. Internal conflicts began in Macedonia, in the Central African Republic, and in Guinea. Political challenges or violent conflicts caused changes in leadership in Argentina, the Democratic Republic of the Congo, Indonesia, Nepal, and the Philippines. 2001 was the second hottest year on record at the time, which was amplified by the end of a years-long La Niña phase. The Atlantic and Pacific tropical storm seasons were both more active than usual. The deadly Bhuj Earthquake took place in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

2001 In Computing
1 (one, unit, unity) is a number, numeral, and glyph. It is the first and smallest positive integer of the infinite sequence of natural numbers. This fundamental property has led to its unique uses in other fields, ranging from science to sports, where it commonly denotes the first, leading, or top thing in a group. 1 is the unit of counting or measurement, a determiner for singular nouns, and a gender-neutral pronoun. Historically, the representation of 1 evolved from ancient Sumerian and Babylonian symbols to the modern Arabic numeral. In mathematics, 1 is the multiplicative identity, meaning that any number multiplied by 1 equals the same number. 1 is by convention not considered a prime number. In digital technology, 1 represents the "on" state in binary code, the foundation of computing. Philosophically, 1 symbolizes the ultimate reality or source of existence in various traditions. In mathematics The number 1 is the first natural number after 0. Each natural number, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Hacking In The 2000s
Hacking may refer to: Places * Hacking, an area within Hietzing, Vienna, Austria People * David Hacking, 3rd Baron Hacking (born 1938), British barrister and peer * Douglas Hewitt Hacking, 1st Baron Hacking (1884–1950), British Conservative politician * Ian Hacking (1936–2023), Canadian philosopher of science * Philip Hacking (1931–2024), English Anglican priest, and itinerant evangelical speaker Sports * Hacking (falconry), the practice of raising falcons in captivity then later releasing into the wild * Hacking (rugby), tripping an opposing player * Pleasure riding, horseback riding for purely recreational purposes, also called hacking * Shin-kicking, an English martial art also called hacking Technology * Hacker, a computer expert with advanced technical knowledge ** Hacker culture, activity within the computer programmer subculture * Security hacker, someone who breaches defenses in a computer system ** Cybercrime, which involves security hacking * Phone hacking ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

UCSD
The University of California, San Diego (UC San Diego in communications material, formerly and colloquially UCSD) is a public land-grant research university in San Diego, California, United States. Established in 1960 near the pre-existing Scripps Institution of Oceanography in La Jolla, UC San Diego is the southernmost of the ten campuses of the University of California. It offers over 200 undergraduate and graduate degree programs, enrolling 33,096 undergraduate and 9,872 graduate students, with the second largest student housing capacity in the nation. The university occupies near the Pacific coast. UC San Diego consists of 12 undergraduate, graduate, and professional schools as well as 8 undergraduate residential colleges. The university operates 19 organized research units as well as 8 School of Medicine research units, 6 research centers at Scripps Institution of Oceanography, and 2 multi-campus initiatives. UC San Diego is also closely affiliated with several reg ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

San Diego Supercomputer Center
The San Diego Supercomputer Center (SDSC) is an organized research unit of the University of California, San Diego. Founded in 1985, it was one of the five original NSF supercomputing centers. Its research pursuits are high performance computing, grid computing, computational biology, geoinformatics, computational physics, computational chemistry, data management, scientific visualization, cyberinfrastructure, and computer networking. SDSC computational biosciences contributions and earth science and genomics computational approaches are internationally recognized. The current SDSC director is Frank Würthwein, Ph.D., UC San Diego physics professor and a founding faculty member of the Halıcıoğlu Data Science Institute of UC San Diego. Würthwein assumed the role in July 2021. He succeeded Michael L. Norman, also a physics professor at UC San Diego, and who was the SDSC director since September 2010. Divisions and projects SDSC roles include creating and maintaining the Pro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Timeline Of Computer Viruses And Worms
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. 1960s * John von Neumann's article on the "Theory of self-reproducing automata" is published in 1966. The article is based on lectures given by von Neumann at the University of Illinois about the "Theory and Organization of Complicated Automata" in 1949. 1970s 1970 * The first story written about a computer virus, ''The Scarred Man'' by Gregory Benford, was published in the May 1970 issue of ''Venture Science Fiction''. 1971 * The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Nimda
The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP and servers running Windows NT and 2000. The worm's name comes from the reversed spelling of " admin". F-Secure found the text "Concept Virus(CV) V.5, Copyright(C)2001 R.P.China" in the Nimda code, suggesting its country of origin. However, they also noted that a computer in Canada was responsible for an October 11, 2001 release of infected emails alleging to be from Mikko Hyppönen and Data Fellows (F-Secure's previous name). Methods of infection Nimda proved effective partially because it—unlike other infamous malware like Code Red—uses five different infections vectors: * Email * Open network shares * Browsing of compromised web sites * Exploitation of various Internet Information Services Microsoft IIS (Internet Informat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ILOVEYOU
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on 4 May 2000 and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". Windows computers often hide the latter file extension (" VBS", a type of interpreted file) by default because it is an extension for a file type that Windows knows, leading unwitting users to think it was a normal text file. Opening the attachment activates the Visual Basic script. First, the worm inflicts damage on the local machine, overwriting random files (including Office files and image files; however, it hides MP3 files instead of deleting them), then, it copies itself to all addresses in the Windows Address Book used by Microsoft Outlook, allowing it to spread much faster than any other previous email worm. Onel de Guzman, a then-24-year-old computer science student at A ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]