Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
The Great Worm -- an power point presentation script
an all black slide with the giant movie logo "REVENGE OF THE NERDS" (available from http://www.supermanfred.it/nerds.htm -- the image will need to be slightly edited to remove "the website" from it) in the center. Play a section of "She Blinded me with Science!"
Script: [said ominously] "It was the eighties. Anything could have happened. The internet was still a text-based baby and there wasn't even public dial-up access yet. Nonetheless, over 60,000 systems in universities, corporations and government offices were connected in a living system... one that was about to get seriously ill.
The image is an old college picture of Robert T. Morris (available from http://www.rotten.com/library/bio/hackers/robert-morris / ). A list on the side of the image reads:
*Robert T. Morris, JR.
*Cornell Computer Science Graduate Student
*Future founder of Viaweb & MIT professor
Script: "Robert T. Morris [cue first list item] was an innocuous looking graduate student at MIT. [cue second list item] By all reports he was a brilliant fellow from a brilliant line. His father was the chief scientist and the National Computer Security Center and he himself would go on to be an influential part of the development of the Internet with dozens of papers under his belt. Eventually he would found Viaweb, a set of online store tools used by Yahoo! And others, [cue third list item] and be a professor at MIT in the field of computing and artificial intelligence. In the Eighties, [cue last list item] however, little Robert was responsible for releasing the first worm and bringing the fledgling internet to its knees.
Slide #3 -- An image of a huge carnivorous Gobi worm serves as the background for this slide. (http://www.forteantimes.com/articles/182_deathworm1.shtml) On the left the following text reads:
'1975-- A freedom fighter creates the Tapeworm, a computer program forcing his totalitarian government to shut down all operations. Luckily for the U.S., it's only science fiction, part of John Brunner's story SHOCKWAVE."
SCRIPT: (read the text) "Science fiction has long proved to be science-prophesy in the field of computing. Both worms and viruses get their names from science fiction stories that proceeded them. In the story of Shockwave, worms were used both to bring down the system and as a regular part of the computer net's functioning.
Slide #4 -- A picture of clowns riding a Dune-Style sandworm. (http://www.ibiblio.org/Dave/ar00394.htm) Text elements to the right of the worm read:
List #1 -- "1979 -- Xerox's Palo Alto Research Center uses five worms as part of their routine."
List #2 -- "Shortly thereafter -- Xerox's worms started escaping"
SCRIPT: [cue #1] "1979 -- Xerox's Palo Alto Research Center uses five worms as part of their routine. Worms perform various activities, from deliverying messages to deleting defunct accounts or running programs. This proved to be as dangerous as it was useful. " [cue #2] "Shortly thereafter -- Xerox's worms started escaping. One mutated and started crashing computers. Another spread to computers where it was not wanted. As less people read Shockwave, the idea of worms was almost forgotten... Until Morris Jr. came along."
Slide #5 -- As the list appears, two images will appear. The first shows up with the first list element. This is an image of an earthworm wearing a labcoat. The second image comes in with the third slide. It's the image of the same worm having a great idea. Both images are found at: http://www.jmgkids.com/index.k2?did=2440& sectionID=2019
List #1 -- "How big is the internet anyway?"
List #2 -- "If only I could test this by counting them with a program..."
List #3 -- "What about a program that installed itself and sent copies to any connected computer?"
SCRIPT: [cue #1] "Morris claims that the goal of the worm was to measure the size of the Internet and determine how many computers were interconnected. [cue #2] The worm was supposed to infect every computer it could. Upon infecting the computer, this worm sent a single byte of information to Morris' web address. By counting those bytes, Morris would know how many computers there were online using the susceptible systems. [cue #3] The entire function of the worm was to install itself on any computer it infected and use that computer to send out copies of the program to other computers. Unfortunately, Morris made what he claims was a serious coding mistake.
Slide #6 -- an image of a worm packing two shotguns and growling. This image can be found sketched at: http://archives.thedaily.washington.edu/1999/100899/N3.F& N.html. To make it match the previous worms, it can be taken into a paint program and colored in. The text reads:
OOPS -- Instead of only allowing one copy of the worm per computer, each computer was repeatedly infected until the simple worm processes devoured the entire processing power.
SCRIPT: "Morris claims that the original program was supposed to check to see if a server already had a working version of the worm, and if so it should not re-install the program. Instead, the worm installed itself every time it cam in contact with a machine. That meant that if two infected computers were connected to one another, they would trade copies of the worm back and forth until both crashed. Each time they sent out a copy, that copy would install itself and send back a copy -- like two mirrors facing each other and forming an endless reflection. Instead of merely counting the computers it infected, this worm ate them."
Slide #7 -- Image of a worm eating a computer. (availaible from: http://life.wayne.edu/article.php?id=33) The title text reads "She's Gonna Get You!" Cue the music to Ace of Base song "All That She Wants," fading into the first chorus ("She's gonna get you -- all that she wants is another baby, she's gone tomorrow boy....") The following text appears line by line. This text was written by Donn Seely and is available online (http://snowplow.org/tom/worm/what.html).
All the following events occurred on the evening of Nov. 2, 1988.
* 6:00 PM At about this time the Worm is launched.
* 8:49 PM The Worm infects a VAX 8600 at the University of Utah (cs.utah.edu)
* 9:09 PM The Worm initiates the first of its attacks to infect other computers from the infected VAX
* 9:21 PM The load average on the system reaches 5. (Load average is a measure of how hard the computer system is working. At 9:30 at night, the load average of the VAX was usually 1. Any load average higher than 5 causes delays in data processing.)
* 9:41 PM The load average reaches 7
* 10:01 PM The load average reaches 16
* 10:06 PM At this point there are so many worms infecting the system that no new processes can be started. No users can use the system anymore.
* 10:20 PM The system administrator kills off the worms
* 10:41 PM The system is reinfected and the load average reaches 27
* 10:49 PM The system administrator shuts down the system. The system is subsequently restarted
* 11:21 PM Reinfestation causes the load average to reach 37.
-- Don Seely, A Tour of the Worm
SCRIPT: [cue line 1] "On November second, 1988, the election wasn't the only thing making news. On this evening, the great internet worm was released at 6 PM on the MIT colege system." [cue line 2] "Within hours it had spread nation wide." [cue line 3] "This is a timeline of the effects on just one system as the administrators tried to survive the worm... when all that it wanted was to reproduce it was definately out to get them." [cue line 4] "Within twenty minutes of infection of the server, the worm began to spread." [cue line 5] "The system was quickly reinfected and began to overload and was soon working five times harder than usual." [cue line 6] "Then seven times faster...." [line 7] "Then sixteen times faster." [line 8] "Eventually the system couldn't function at all. After only one hour and 17 minutes, the computer has gone from infection to standstill. At this point there are so many worms infecting the system that no new processes can be started. No users can use the system anymore." [line 9] "The administrators go through and kill the worms manually." [line 10] "However, within minutes the computer is reinfected and brought to a complete halt once more" [line 11] "The administrators try restarting the system..." [line 12] "But within half an hour the reinfection has once more reached terminal levels. Until the worm was actually defeated, this was the situation for every vulnerable computer."
SLIDE #8 -- Image on the right shows a worm wearing a graduate cap with a pointing stick (availaible from: http://www.nrcs.usda.gov/feature/education/squirm/skworm.html -- crop image to edit out text). Text at top of page reads: "WHY DID THE WORM WORK SO WELL?"
The following list answers that question.
#1 -- It targets common systems: DEC VAX machines running Sun 3 & BSD 4…[continue]
"Internet Fact And Fantasy" (2005, June 12) Retrieved December 9, 2016, from http://www.paperdue.com/essay/internet-fact-and-fantasy-66388
"Internet Fact And Fantasy" 12 June 2005. Web.9 December. 2016. <http://www.paperdue.com/essay/internet-fact-and-fantasy-66388>
"Internet Fact And Fantasy", 12 June 2005, Accessed.9 December. 2016, http://www.paperdue.com/essay/internet-fact-and-fantasy-66388
Internet started way back 3 to 4 decades, but it really took the world by storm through the 90's and till now it has become one of the main assets of modern day computer user. More people get the information through Internet, especially those who use it than by any other means. The world has become a cyber village where simply anyone from anywhere can communicate with other person living
How often do you lose sleep due to late-night log-ins? 15. How often do you feel preoccupied with the Internet when off-line, or fantasize about being online? 16. How often do you find yourself saying "just a few more minutes" when on- line? 17. How often do you try to cut down the amount of time you spend online and fail? 18. How often do you try to hide how long you've been online? 19.
Internet & Electronic Marketing Website & Business Model Target Market & Consumer Behavior Building & Maintaining Customer Relationships F. Recommendations for Website Improvement G. Conclusion H. References Pace University is a comprehensive non-profit university that offers its educational services to online students and to the more traditional brick-and-mortar student. As the university competes with global universities, the web presence must convey the value and quality of the education as well as enable the student to make an
In fact, Eijnden at al (2008) found that shy or socially anxious youth did not use instant messaging to foster friendships and instead used the Internet and their computers mainly for games and other non-social activities. When used judiciously to promote healthy identity formation and development or to facilitate human communications, the Internet can be a boon for society. However, the Internet has quickly become an emblem of deep-rooted social
) "Sonnet 130" by Shakespeare and "Sonnet 23" by Louis Labe both talk about love, as so many sonnets do. Their respective techniques however, differentiate them from each other. Shakespeare uses a rhyme scheme that became known as Shakespearean rhyme scheme or English rhyme. He writes about love in a sarcastic manner though. He is mocking the traditional love poems and the usual expressive manner in which women are often compared
Computers and the Internet The Naked Mind When Roszak refers to the "naked mind," he means to speak about the capacity and ability of the human mind as compared to the capabilities that the computer machines can do. According to Roszak, how the human mind works has vital differences from how computers process information. Roszak praises the human mind because according to him, the human mind is more dynamic and more independent
Foucault (1981) suggested that modern social life is bound up with the rise of "disciplinary power," which could be controlled and regulated (Giddens, 1992). Foucault termed sexuality "an especially dense transfer point for relations of power," a point which can become a focus of social control. We might see internet sexuality as reflecting a change in the locus of power, where the internet has become a dense transfer medium for