issue100:30_ans_de_virus
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue100:30_ans_de_virus [2015/09/03 09:48] – lejimi | issue100:30_ans_de_virus [2015/09/04 10:18] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 5: | Ligne 5: | ||
**What is the age of a computer virus? Who created the first computer virus? Yet these simply crafted programs can cause so much havoc. The idea of the first computer viruses were published in 1966. The article The Theory of Self-Reproducing Automata is a posthumously published work by John Neumann. Apparently, in 1949, self-replicating programs were created to produce viruses. John Neumann is shown below.** | **What is the age of a computer virus? Who created the first computer virus? Yet these simply crafted programs can cause so much havoc. The idea of the first computer viruses were published in 1966. The article The Theory of Self-Reproducing Automata is a posthumously published work by John Neumann. Apparently, in 1949, self-replicating programs were created to produce viruses. John Neumann is shown below.** | ||
- | À quand remontent les premiers virus informatiques ? Qui en est le créateur ? De nos jours ces programmes faciles à élaborer peuvent causer d' | + | À quand remontent les premiers virus informatiques ? Qui en est le créateur ? De nos jours ces programmes faciles à élaborer peuvent causer d' |
**In 1959 Bell Labs created a computer game called Darwin. The creators, Victor Vysottsky, H. Douglas McIlroy and Robert P Morris, designed the game where viruses/ | **In 1959 Bell Labs created a computer game called Darwin. The creators, Victor Vysottsky, H. Douglas McIlroy and Robert P Morris, designed the game where viruses/ | ||
Ligne 11: | Ligne 11: | ||
This is the earliest documented programming game as shown by the picture below. This game eventually stalled when one of the creators developed a virus/ | This is the earliest documented programming game as shown by the picture below. This game eventually stalled when one of the creators developed a virus/ | ||
- | En 1959, les Laboratoires Bell créèrent un programme nommé Darwin. Ses auteurs, Victor Vysottsky, H. Douglas McIlroy et Robert P. Morris, ont mis au point un jeu dans lequel des virus/ | + | En 1959, les Laboratoires Bell créèrent un programme nommé Darwin. Ses auteurs, Victor Vysottsky, H. Douglas McIlroy et Robert P. Morris, ont mis au point un jeu dans lequel des virus/ |
Il s'agit du premier programme de jeu documenté. On peut le voir sur l' | Il s'agit du premier programme de jeu documenté. On peut le voir sur l' | ||
Ligne 17: | Ligne 17: | ||
**In 1971, the first computer virus was created by Bob Thomas. Using ARAPANET, this virus infected computers running the Tenex OS. This virus would only display a message “I’m the creeper, catch me if you can!” Henceforth the name of this virus is Creeper. While it was annoying, this virus was not malicious. In response, Ray Tomlinson wrote a program named Reaper which would delete the Creeper on Tenex OS computers. Consequently the Reaper is the first antivirus program created.** | **In 1971, the first computer virus was created by Bob Thomas. Using ARAPANET, this virus infected computers running the Tenex OS. This virus would only display a message “I’m the creeper, catch me if you can!” Henceforth the name of this virus is Creeper. While it was annoying, this virus was not malicious. In response, Ray Tomlinson wrote a program named Reaper which would delete the Creeper on Tenex OS computers. Consequently the Reaper is the first antivirus program created.** | ||
- | En 1971, le premier virus informatique a été créé par Bob Thomas. Via ARPANET, le virus infectaient | + | En 1971, le premier virus informatique a été créé par Bob Thomas. Via ARPANET, le virus infectait |
**The first malicious virus was created in 1974 called Rabbit. This viral program would clone itself on a computer hard drive. The cloning process would sap the computer’s resources until it eventually crashed. The virus creator is unknown. | **The first malicious virus was created in 1974 called Rabbit. This viral program would clone itself on a computer hard drive. The cloning process would sap the computer’s resources until it eventually crashed. The virus creator is unknown. | ||
Ligne 23: | Ligne 23: | ||
A year later, John Walker created Animal. Animal would infect Univac 1108’s. This program would ask a series of questions to the end user. The computer would attempt to guess what animal the end user liked based on the answers. A simple OS upgrade would neutralize this threat.** | A year later, John Walker created Animal. Animal would infect Univac 1108’s. This program would ask a series of questions to the end user. The computer would attempt to guess what animal the end user liked based on the answers. A simple OS upgrade would neutralize this threat.** | ||
- | Le premier code malicieux a été créé en 1974 et s’appelait Rabbit (Lapin). Ce programme viral pouvait se répliquer | + | Le premier code malicieux a été créé en 1974 et s’appelait Rabbit (Lapin). Ce programme viral pouvait se répliquer |
- | Un an plus tard, John Walker créa Animal qui infectait les Univac 1108’s. Le programme posait une série de questions à l' | + | Un an plus tard, John Walker créa Animal qui infectait les Univac 1108. Le programme posait une série de questions à l' |
**In 1979 Millersville State College experienced the first “sneakernet.” Two random seed instruction cards were placed into the card stack for the Univac computer. The seed instruction cards simply overworked the computer with minimalist outputs. There was no permanent damage to the system. One person took credit for the incident and paid a minor fine for it. Consequently, | **In 1979 Millersville State College experienced the first “sneakernet.” Two random seed instruction cards were placed into the card stack for the Univac computer. The seed instruction cards simply overworked the computer with minimalist outputs. There was no permanent damage to the system. One person took credit for the incident and paid a minor fine for it. Consequently, | ||
Ligne 31: | Ligne 31: | ||
Next month Linux Lookback will finish off the history of computer viruses.** | Next month Linux Lookback will finish off the history of computer viruses.** | ||
- | En 1979, le Millersville State College expérimenta le premier « sneakernet » (transfert de données sans utilisation d'un réseau). Deux cartes d' | + | En 1979, le Millersville State College expérimenta le premier « sneakernet » (transfert de données sans utilisation d'un réseau). Deux cartes d' |
Le mois prochain, cette rétrospective vous racontera la fin de l’histoire des virus informatique. | Le mois prochain, cette rétrospective vous racontera la fin de l’histoire des virus informatique. |
issue100/30_ans_de_virus.1441266489.txt.gz · Dernière modification : 2015/09/03 09:48 de lejimi