๐History of Malware
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.
Last updated
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.
Last updated
Room Attributes | Value |
---|---|
No answer needed
No answer needed
HINT: It is a form of switching.
HINT: He also created a computer architecture.
HINT: This includes correct grammar.
No answer needed
HINT: This is covered towards the end of the page.
HINT: Google (The resource was given)
No answer needed
HINT: Name of the cartoon.
No answer needed
HINT: Start answer with "The"
No answer needed
No answer needed
HINT: Full Name.
HINT: Full name...
No answer needed
No answer needed
Ray Tomlinson
Packet Switching
John von Neuma
nn
I'm the Creeper, catch me if you can!
Advanced Research Projects Agency Network
Network Working Group
Creeper
Ray Tomlinson
Nematode
Reaper
A resource-sharing capability
Application Programming Interface
Denial of service attack
Y
Looney Tunes Cartoons
1975
Y
UNIVACs
A Trojan
The Greeks
US Navy
7
1982
less
2 Weeks
Apple II
Berkeley r-commands
Robert Tappan Morris
Denial of Service
1988
2000
remote shell
1986 Computer Fraud and Abuse act
Cascade
.COM
40
DOS
IBM
1704
Subscription Required
False [Free]
Type
Walkthrough
Difficulty
Info
Tags
Security, Walkthrough, Malware, History