ПЕРЕЛІК ДИСЦИПЛІН:
  • Адміністративне право
  • Арбітражний процес
  • Архітектура
  • Астрологія
  • Астрономія
  • Банківська справа
  • Безпека життєдіяльності
  • Біографії
  • Біологія
  • Біологія і хімія
  • Ботаніка та сільське гос-во
  • Бухгалтерський облік і аудит
  • Валютні відносини
  • Ветеринарія
  • Військова кафедра
  • Географія
  • Геодезія
  • Геологія
  • Етика
  • Держава і право
  • Цивільне право і процес
  • Діловодство
  • Гроші та кредит
  • Природничі науки
  • Журналістика
  • Екологія
  • Видавнича справа та поліграфія
  • Інвестиції
  • Іноземна мова
  • Інформатика
  • Інформатика, програмування
  • Юрист по наследству
  • Історичні особистості
  • Історія
  • Історія техніки
  • Кибернетика
  • Комунікації і зв'язок
  • Комп'ютерні науки
  • Косметологія
  • Короткий зміст творів
  • Криміналістика
  • Кримінологія
  • Криптология
  • Кулінарія
  • Культура і мистецтво
  • Культурологія
  • Російська література
  • Література і російська мова
  • Логіка
  • Логістика
  • Маркетинг
  • Математика
  • Медицина, здоров'я
  • Медичні науки
  • Міжнародне публічне право
  • Міжнародне приватне право
  • Міжнародні відносини
  • Менеджмент
  • Металургія
  • Москвоведение
  • Мовознавство
  • Музика
  • Муніципальне право
  • Податки, оподаткування
  •  
    Бесплатные рефераты
     

     

     

     

     

     

         
     
    Computer viruses
         

     

    Інформатика, програмування

    Chuvash State University

    Economic faculty

    Report

    COMPUTER VIRUSES

    Author:

    student of EC-13-98

    Eugene Ivanov

    Cheboxary - 2001

    CONTENTS


    A bit of history 3


    What is a computer virus? 4


    Who writes computer viruses? 5


    To whose advantage computer viruses are written? 6


    A legal notice. Penal Code of Russian Federation 7


    Synopsis 8


    SOURCES 9


    Appendix 10

    A bit of history

    2 November 1988 Robert Morris younger (Robert Morris), graduate studentof informatics faculty of Cornwall University (USA) infected a great amountof computers, connected to Internet network. This network unites machinesof university centres, private companies and governmental agents, including
    National Aeronautics Space Administration, as well as some militaryscientific centres and labs.
    Network worm has struck 6200 machines that formed 7,3% computers tonetwork, and has shown, that UNIX not okay too. Amongst damaged were NASA,
    LosAlamos National Lab, exploratory centre VMS USA, California Technology
    Institute, and Wisconsin University (200 from 300 systems). Spread onnetworks ApraNet, MilNet, Science Internet, NSF Net it practically hasremoved these network from building. According to "Wall Street Journal",virus has infiltrated networks in Europe and Australia, where there werealso registered events of blocking the computers.
    Here are some recalls of the event participants:
    Symptom: hundreds or thousands of jobs start running on a Unix systembringing response to zero.
    Systems attacked: Unix systems, 4.3BSD Unix & variants (eg: SUNs) anysendmail compiled with debug has this problem. This virus is spreading veryquickly over the Milnet. Within the past 4 hours, it has hit> 10 sitesacross the country, both Arpanet and Milnet sites. Well over 50 sites havebeen hit. Most of these are "major" sites and gateways.
    Method: Someone has written a program that uses a hole in SMTP Sendmailutility. This utility can send a message into another program.
    Apparently what the attacker did was this: he or she connected tosendmail (ie, telnet victim.machine 25), issued the appropriate debugcommand, and had a small C program compiled. (We have it. Big deal.) Thisprogram took as an argument a host number, and copied two programs - oneending in VAX.OS and the other ending in SunOS - and tried to load andexecute them. In those cases where the load and execution succeeded, theworm did two things (at least): spawn a lot of shells that did nothing butclog the process table and burn CPU cycles; look in two places - thepassword file and the internet services file - for other sites it couldconnect to (this is hearsay, but I don't doubt it for a minute). It usedboth individual. host files (which it found using the password file), andany other remote hosts it could locate which it had a chance of connectingto. It may have done more; one of our machines had a changed superuserpassword, but because of other factors we're not sure this worm did it.
    All of Vaxen and some of Suns here were infected with the virus. Thevirus forks repeated copies of itself as it tries to spread itself, and theload averages on the infected machines skyrocketed. In fact, it got to thepoint that some of the machines ran out of swap space and kernel tableentries, preventing login to even see what was going on!
    The virus also "cleans" up after itself. If you reboot an infectedmachine (or it crashes), the/tmp directory is normally cleaned up onreboot. The other incriminating files were already deleted by the virusitself.
    4 November the author of the virus - Morris - come to FBI headquarters in
    Washington on his own. FBI has imposed a prohibition on all materialrelating to the Morris virus.
    22 January 1989 a court of jurors has acknowledged Morris guilty. Ifdenunciatory verdict had been approved without modification, Morris wouldhave been sentenced to 5 years of prison and 250 000 dollars of fine.
    However Morris 'attorney Thomas G

         
     
         
    Реферат Банк
     
    Рефераты
     
    Бесплатные рефераты
     

     

     

     

     

     

     

     
     
     
      Все права защищены. Reff.net.ua - українські реферати ! DMCA.com Protection Status