Computer Virus Origin

Source: Internet
Author: User

Computer viruses are not a new product recently. In fact, as early as 1949, there were still several years before the appearance of the first commercial computer, John. in his paper [the theory and organization of complex automatic devices], John von norann outlined the blueprint for virus programs. At that time, most computer experts cannot imagine that this self-developed program is possible, but a few scientists have quietly studied the concept proposed by fan Newman until ten years later, in Bell Labs At at&t, these concepts have become in a strange kind of electronic game, this kind of electronic game is called the [Core War] (Core War)

Core wars were created by three young programmers at Bell's lab, who were Douglas McILROY (H, Douglas McILROY. victor vysottsky and rob. morris (Robert T. morris) at that time, all three were in their twenties.

Note: Robert T. Morris is the father of Robert T. Morris Jr, who wrote a worm that turned the Internet upside down. At that time, he was responsible for Arpanet network security.

Computer Virus ancestor:

The core wars are played as follows: the two sides write a program and enter the same computer. Are these two programs on the computer? In the memory system, they chase each other. Sometimes they put down some checkpoints and sometimes stop to repair (re-write) several lines of commands damaged by the other party. When it is trapped, you can also copy yourself once to escape the danger, because they are all in the memory core of the computer, so they get the name of the Core War.

The characteristics of this game, after the program on both sides enters the computer, the players playing the game can only watch the display on the screen, but cannot make any changes, until the program of one party is completely [eaten] by the program of the other party.

The core competition is a general name. In fact, it can be divided into several types. The program written by Mai yaolai is called [Darwin], which contains the meaning of [Resource race, survival of the fittest. its game rules are the closest to the one described above. The two sides write a program in assembly language, called organism. These two organisms are constantly fighting in the computer, until one party kills the other party and replaces it, it is considered a victory or defeat. during the competition, Morris often excludes his opponent.

There is also a creeper program. Every time you read it, it copies a copy. in addition, it will [Crawl] from a computer to another computer with a connection. soon the original information on the computer was squeezed out by the crawlers. crawlers have a unique survival goal of reproduction. to deal with [crawler], someone wrote the [Receiver] (reaper ). its only purpose is to find crawlers and destroy them. after all crawlers are harvested, the receiver executes the last command in the program: destroys himself and disappears from the computer. [dwarf] (dwarf) is not as clever as Darwin and other programs. but it is an extremely dangerous person. it moves forward in the memory system. Every time it goes to the fifth [address] (address), it changes the stored items to zero, which will stop the original program.

The most strange thing is a war program called [impu] (IMP). It has only one line of instructions, that is

MoV 01

MoV indicates [Move], that is, moving. it writes (shifts) the [0] contained in the address to the next address. After the inpu expands, every line of commands in the computer is changed to [mov 01]. in other words, a lot of [mov 01] is left on the fluorescent screen. [Gemini] (germini) is also an interesting guy. it has only one function: copy it by yourself, send it to the next one hundred addresses, and then discard the [original]. A series of programs are derived from Gemini. the [victim] (juggeraut) Copies himself and sends him to the next 10 addresses. The [bigfoot] (Bigfoot) specifies the address between the positive and replica as a large prime number. it is very difficult to catch a snowman. in addition, John. suo Shu (John F. the [Worm] (worm) written by shoch aims to control the computers that intrude into it.

Computer Virus

In those days, computers were not connected, but independent from each other, so there was no virus plague caused by James. if a computer is [infected] out of control, the staff only need to turn it off. but when computer connections gradually become part of the social structure, one or more self-replicated virus programs are likely to bring about? So for a long time, computer workers who know how to play the [Core War] Games strictly abide by an unwritten rule: do not disclose the contents of these war programs to the general public.

This rule was broken in 1983. cohen. ken Thompson was an outstanding computer speaker. at the awards ceremony, he gave a speech that not only publicly confirmed the existence of computer viruses, but also told all the audience how to write their own virus programs. his peers were all frightened, but the secret had been circulated. in 1984, the situation became more complicated. this year, the [Scientific American] Journal (Scientific American) columnist dutney (. k. dewsydney) wrote the first article on the [core wars] In May, and as long as two dollars are sent, any reader can receive a program written by it, open up the battlefield in your home computer.

Official appearance of the word [virus]

In the [scientific Americans] In March 1985, duterte once again discussed [core wars] ----- and viruses. at the beginning of the article, he said: [when an article on [core wars] was printed in last May, I have never thought about a serious problem.] The name of [virus] is mentioned for the first time in this article. he mentioned that robotu from Italy. berto cerrui and Mago. marco morocutti invented a method to destroy software. they want to use viruses instead of worms to infect Apple 2.

Mr. Rudi wrote a letter to dunney, in which he said: [Mago wants to write a program like a [virus] that can be transmitted from an Apple Computer to another Apple Computer, infect it. but we couldn't do it until I thought that the virus would first infect the disk, and the computer was just a medium. in this way, the virus can be transmitted from one disk to another.]

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.