Robert Tappan Morrisgeek

honggarae 11/12/2022 443

Personal introduction

Morris during the University of Cornell, the created worm is to explore how big the Internet is. However, this virus is copied in the uncontrollable manner, causing a few computers. The expert claimed to have 6,000 computers destroyed. Morris was finally sentenced to 3 years probation, 400 hours of community service and a fine of $ 10,500.

Morris is now serving professors in Massachusetts Computer Science and Artificial Intelligence Laboratory, its research direction is an architecture of computer networks.

Learn by

Morris is the first grade of the Computer Science of Cornell University. He has accumulated considerable computer technology and experience experience through undergraduate learning and other work in Harvard University. When I entered Cornell University, he received a computer account of a computer science department. With this account, he can directly use Cornell University's computer. Morris is busy with senior graduate students discuss various computer security issues and the ability to attack into the network.

Worm

In October of the same year, Morris started to write a computer program that was later referred to as Internet "worm" or "virus". The purpose of this program is to use the security defects discovered by Morris to indicate the lack of computer network security measures at that time. The strategy he chosen is to release a worm to the computer network. Morris design procedures will spread in the network after injection into a national computer network. Morris released worms on the Internet, distributed across the country, government agencies and military computers connected to this network. The computer on this network can communicate and transmit information.

Morris attempts to make the Internet worm spread widely on the network and do not pay attention. Assuming that the worm occupies very little computer operating time, it will not affect the normal use of the computer. The worm written by Morris is difficult to discover and read, so other programmers cannot easily terminate the worm. Morris and want to guarantee that there will be no copies on a computer that has a worm. A copy of several worms on a computer will make the worms to discover, and will reduce the performance of the computer, eventually leading to the crash of the computer. Therefore, Morris design is asked if each computer has a copy of a worm. If the computer's answer is NO, the worm will be copied to the computer; if the answer is YES, the worm will not copy to the computer. However, Morris worried that other programmers can write their own programs, for this problem error, to terminate the running of worms. In order to bypass this protection, Morris made the worm replicates yourself after receiving 7 YES. Later, it proved that Morris underestimates the number of times the computer asks this question, and his 1: 7 ratio has caused a copy of the most important copy to the computer than he expected. The worm is also designed to terminate the operation after the computer is closed, and the typical situation is to close one to twice a week. This prevents the accumulation of worms from a computer, and Morris correctly estimates the ratio of infection.

<

Release Worm

Morris Determining four worms can enter the computer

(1) in Send Mail Vulnerabilities or BUG, ​​this is a program that transmits and accepts email on a computer;

(2) Vulnerability through "finger daemon", this is a limited user that allows users to obtain another computer Program of information;

(3) Through the trust host function component, the trusted host allows users who have certain privileges on a computer without passwords to obtain equivalent privileges on another computer; / p>

(4) by guessing the procedure of the password. By quick attempting a variety of letters, you want to guess the password of the authorized user, you can get the same activity permission as the user after entering.

Morris released his worm on the computer of the Massachusetts Institute. The Massachusetts Institute of Technology is to cover the facts of the University of Cornell. Soon, Morris found a worm replication and computer infected than he expected. In the end, it is either distributed in a computer that is either collapsed, or it is suffering from "mental tense." When Morris realized what happened, he and his friends in Harvard were counterprudence. Finally, he sent an anonymous message to the network in Harvard, guiding how the programmer stopped the worm to prevent re-infection. However, this information does not generate due to the blocking of network routing. Countless computers have been affected, including computers such as the most important university, military sites, medical research institutions. Each computer handles the cost of worms from 200 to 53,000.

Morris crimes were discovered, followed by the jury trial, he violated 18 u.s.c.section 1030 (a) (5) (a). He was suspended for three years, 400 hours of community service and $ 10,500 penalty and other regulatory fees.

Latest: Baotianman Eco Tourist Area

Next: Free software