Bugging out

Watson, Traci
November 1993
U.S. News & World Report;11/15/93, Vol. 115 Issue 19, p17
Focuses on the problem of hackers getting into large computer networks and recent reports about hackers stealing passwords to break into perhaps thousands of computers across the country. Robert Morris who created the Internet worm that slipped into the Internet five years ago; The Defense Department's Computer Emergency Response Team (CERT) that helps computer administrators close security breaches; Number of security crises CERT handled in 1992.


Related Articles

  • Computer hacking goes on trial. Allman, W.F. // U.S. News & World Report;1/22/90, Vol. 108 Issue 3, p25 

    Discusses the court case of Cornell University graduate student Robert Morris who has been charged with deliberately attacking computers and causing them to shut down, thereby triggering a showdown between two cultures in computer science: those whiz-kid hackers who think the best way to improve...

  • Hacker trial under way. Anderson, G. // Nature;1/18/1990, Vol. 343 Issue 6255, p200 

    Reports on the start of the trial of Robert Morris Jr., who is charged with creating the `Cornell virus' that struck thousands of US computers in 1988. First time new law has been tested; Inadequacies of current law.

  • Prank and punishment.  // U.S. News & World Report;2/20/89, Vol. 106 Issue 7, p18 

    Report on the punitive consequences faced by Robert T. Morris, 23, who created a computer virus which affected 6,000 computers and cost an estimated $96 million in repairs and downtime. Edited by C. Fenyvesi

  • Cornell hacker is convicted but free. Anderson, G. // Nature;2/1/1990, Vol. 343 Issue 6257, p398 

    Reports that Robert Morris Jr, who was convicted for writing and releasing a computer virus in 1988 is expected to get a relatively light punishment. Brief details.

  • Terminal case.  // U.S. News & World Report;8/7/89, Vol. 107 Issue 6, p11 

    Reports that last week a grand jury indicted Robert Morris, 24, on charges of gaining unauthorized access to federal computers in November 1988.

  • Hacker's intentions key to court case. Lindley, D. // Nature;8/3/1989, Vol. 340 Issue 6232, p329 

    Reports on criminal charges to be brought against Robert T. Morris Jr., the designer of a computer virus that disabled thousands of computer installations linked by the Internet network nine months ago. Prosecution; Supporters.

  • MORRIS CODE. Hafner, K. // New Republic;2/19/90, Vol. 202 Issue 8, p15 

    Argues that the conviction of computer science graduate student, Robert Tappan Morris, is not a victory for the United States government and the American public's fight against computer crime. Features and capabilities of the computer program written by Morris that caused the disruption of a...

  • The PC corner: Computer viruses. Kratofil, Bruce // Business Economics;Jan1990, Vol. 25 Issue 1, p52 

    Discusses computer viruses. Harmfulness of computer viruses; Ways of transmitting a virus; Preventive measures against computer virus attacks.

  • The virus from e-mail is not what you think. Dyril, Odvard Egil // Tech & Learning;Apr98, Vol. 18 Issue 8, p42 

    Presents information on computer viruses focusing on what the e-mail message virus, `Join the Crew' can do to computer hard drives. How the virus operates; What a computer virus is; Information on e-mail hoaxes; Detailed information on how to protect against such viruses.


Read the Article

Other Topics