X hits on this document

Powerpoint document

Technology Infrastructure for Electronic Commerce - page 30 / 41

100 views

0 shares

0 downloads

0 comments

30 / 41

Untrusted Computer Systems (then) Malware Example: The Internet Worm Shut down 6,000 machines, Nov 1988

Tried three techniques in parallel to spread

Guess passwords

Exploit a bug in the finger program

Use a trapdoor in the sendmail program

Effects

serious degradation in performance of affected machines

affected machines had to be shut down or disconnected from the internet

Criminal justice

Perpetrator convicted January 1990 under 1986 Computer Fraud and Abuse Act; sentenced to 3 years probation, $10,000 fine, and 400 hours of community service

25300

Document info
Document views100
Page views100
Page last viewedFri Dec 09 13:55:36 UTC 2016
Pages41
Paragraphs550
Words1942

Comments