Tuesday, August 25, 2020

Characterstics of Laptop

Answer: Portability is generally the primary element referenced in any correlation of PCs versus work area pcs. Physical versatility permits that a PC can be utilized in numerous places† at home and at the workplace, yet in addition during driving and flights, in coffeehouses, In auditoriums and libraries, at customers' area or at a gathering room, and so on. The movability highlight offers a few particular points of interest: a.Productivity: Using a PC in places where a work area PC can't be utilized, and now and again that would some way or another be squandered. For instance, an office specialist Is overseeing beneficiary messages during 60 minutes in length drive via train, or an understudy doing his/her schoolwork at the college coffeehouse throughout a break between addresses. b. Instantaneousness: Carrying a PC implies having moment access to different Information, individual and work records. Instantaneousness permits better joint effort between collaborators or underst udies, as a PC can be flipped open to introduce an issue or an answer whenever, anyplace. . forward-thinking data: If an individual has more than one work area PC, an issue of synchronization emerges: changes made on one PC are not consequently engendered to the others. There are approaches to determine this issue, Including physical exchange of refreshed records (utilizing a USB streak memory stick or cdrs) or utilizing synchronization programming over the Internet. In any case, utilizing a solitary PC at the two areas maintains a strategic distance from the issue completely, as the documents exist in a solitary area and are consistently forward-thinking. d.Connectivity: An expansion of WI-FI remote systems and cell broadband information administrations (HSDPA, EVDO and others) joined with a close omnipresent help by workstations implies that a PC can have simple Internet and neighborhood organize network while staying versatile. Wi-Fi systems and PC programs are particularly idesp read at college grounds. [ Other favorable circumstances of PCs: e. Size: Laptops are littler than work area pcs. This is useful when space is at a higher cost than expected, for instance in little lofts and understudy dorms.When not In use, a PC can be shut and taken care of. f. Low force utilization: Laptops are a few times more force productive than work areas, A run of the mill PC utilizes 20-90 W. contrasted with 100-800 W for work areas. This could De partlcularly DeneTlclal Tor Duslnesses (wnlcn run nunareas 0T PCs, increasing the possible investment funds) and homes where there is a PC running 2417, (for example, a home media server, print server, and so forth g. Calm: Laptops are regularly calmer than work areas, due both to the segments (calmer, more slow 2. - inch hard drives) and to less warmth creation prompting utilization of less and more slow cooling fans. h. Battery: a charged PC can keep on being utilized if there should arise an occurrence of a force blackout and isn't influenced by short force interferences and power outages. A work area PC needs an UPS to deal with short interferences, power outages and spikes; accomplishing on-battery time of more than 20-30 minutes for a work area PC requires a huge and costly UPS. I. Across the board: intended to be versatile, PCs have everything incorporated into the hassis.For work areas (barring in with no reservations ones) this is partitioned into the work area, console, mouse, show, and discretionary peripherals, for example, speakers. 2. Attributes of Super Computer: An) A supercomputer is the quickest sort of PC. Supercomputers are over the top expensive and are utilized for particular applications that require a lot of numerical estimations. The central distinction between a supercomputer and a centralized computer is that a supercomputer channels all its capacity into executing a couple of projects as quick as could be expected under the circumstances, though a centralized server utilizes its capacity to execute numerous projects concurrently.B) Supercomputers are utilized for profoundly figuring serious errands, for example, issues including quantum mechanical material science, climate estimating, atmosphere look into, sub-atomic displaying (processing the structures and properties of concoction mixes, organic macromolecules, polymers, and precious stones), physical recreations, (for example, reproduction of planes in air streams, reenactment of the explosion of atomic weapons, and investigation into atomic combination), cryptanalysis, and numerous others. A few supercomputers have additionally been intended for quite certain capacities like deciphering codes and playing chess; Deep Blue is a well known chess-playing upercomputer.Major colleges, military offices and logical research labs rely upon and utilize supercomputers intensely. C) A supercomputer creates a lot of warmth and subsequently should be cooled with complex cooling frameworks to guarantee that no piece o f the PC comes up short. A large number of these cooling frameworks exploit fluid gases, which can get incredibly cold. D) Another issue is the speed at which data can be moved or kept in touch with a capacity aevlce, as tne speed 0T information transTer wlll Ilmlt tne supercomputers execution. Data can't move quicker than the speed of light between two crafts of a supercomputer.E) Supercomputers expend and produce monstrous measures of information in a brief timeframe. Much work on outside capacity data transmission is expected to guarantee that this data can be moved rapidly and put away/recovered accurately. 3. Characterstics of Main Frame Computer? a. Present day centralized computers can run various examples of working frameworks simultaneously. This procedure of virtual machines permits applications to run as though they were on genuinely particular PCs. In this job, a solitary centralized server can supplant more advanced equipment administrations accessible to traditional se rvers.While centralized computers spearheaded this ability, virtualization is currently accessible on most groups of PC frameworks, however not generally to a similar degree or level of complexity b. Centralized servers can include or hot trade framework limit without upsetting framework work, with explicitness and granularity to a degree of advancement not generally accessible with most server arrangements. c. Present day centralized computers, prominently the IBM zSeries,System z9 and System ZIO servers, offer two degrees of virtualization: coherent parcels (LPARs, through the PRISM office) and virtual machines (by means of the zPv'M working system).Many centralized computer clients run wo machines: one in their essential server farm, and one in their reinforcement server farm †fully dynamic, mostly dynamic, or on standby†in case there is a calamity influencing the main structure. Test, advancement, preparing, and creation remaining task at hand for applications and da tabases can run on a solitary machine, aside from amazingly huge requests where the limit of one machine may be constraining. Such a two-centralized computer establishment can bolster constant business administration, maintaining a strategic distance from both arranged and spontaneous outages.In practice numerous clients utilize different centralized computers connected either by Parallel Sysplex and shared DASD (in IBM's case)[citation eeded], or with shared, topographically scattered capacity gave by EMC or Hitachi. d. Centralized servers are intended to deal with high volume info and yield (1/0) and stress throughput processing. Since the late-1950s, centralized server structures have included auxiliary equipment (called channels or fringe processors) which deal with the 1/0 gadgets, leaving the CPU allowed to manage fast memory. It is normal in centralized server shops to manage monstrous databases and files.Gigabyte to terabyte-size record documents are not surprising. [7] Comp ared to a run of the mill PC, centralized computers ommonly have hundreds to thousands of times as much information stockpiling on the web, and can get to it a lot quicker. [citation needed] Other server families additionally offload 1/0 preparing ana empnaslze tnrougnput computlng. e. Centralized server quantifiable profit (ROI), like some other processing stage, is subject to its capacity to scale, bolster blended outstanding burdens, decrease work costs, convey continuous assistance for basic business applications, and a few other hazard balanced cost factors. . Centralized computers additionally have execution respectability qualities for shortcoming open minded figuring. For instance, z900, z990, System z9, and System ZIO servers ffectively execute result-situated guidelines twice, think about outcomes, referee between any distinctions (through guidance retry and disappointment segregation), at that point move outstanding tasks at hand â€Å"in flight† to working process ors, including saves, with no effect on working frameworks, applications, or users.This equipment level element, likewise found in HP's Nonstop frameworks, is known as lock-venturing, on the grounds that the two processors take their â€Å"steps† (I. e. guidelines) together. Not all applications completely need the guaranteed honesty that these frameworks give, however many do, for example, budgetary exchange preparing.

Saturday, August 22, 2020

Short Story and Dance Pianist Essays

Short Story and Dance Pianist Essays Short Story and Dance Pianist Paper Short Story and Dance Pianist Paper Status in Two Chekhov Stories In the prologue to our release of Chekhovs short stories, by George Pahomov, it is expressed that Chekhovs fiction â€Å"captured the prospering Russian democracy† and that â€Å"in Chekhovs popularity based world view, nobody was excluded† (vii-viii). We see these beliefs being advanced in the two stories by Chekhov that we will examine in this paper. In these two stories, â€Å"The Resurrection† and â€Å"The Dance Pianist,† we can perceive how Chekhov portrays an existence where the creators own vote based beliefs might be at the top of the priority list, however which is in all actuality still especially dependent on the good old ideas of status and rank. We will see that both of these accounts revolve around the idea of societal position, particularly in the way that various sorts of individuals respond to an unexpected change in the economic wellbeing of one specific character in every story. What these two stories share for all intents and purpose is that in the two cases, the focal character is the one enduring the abrupt change in status, and informing the peruser regarding it thereafter. â€Å"The Confession† is an early story of Chekhovs which manages an anonymous, first-individual storyteller who recounts to the peruser the account of how, at some point, he got a little advancement at his work alongside a little raise. He proceeds to portray how this apparently minor change in his life made him experience an abrupt and out of the blue serious move in the manner he was treated by individuals around him, who previously had known him for nearly his entire life. Not exclusively does this unexpected advancement change the manner in which others treat him, it additionally moves the manner in which he sees himself, driving him to face hazardous challenges that will bring about a fiasco for himself. Toward the start of â€Å"The Confession,† the storyteller clarifies that â€Å"I was celebrating over the advancement and the slight pay raise, nothing more† (Chekhov 1). But then, he additionally acknowledges quickly that â€Å"all on the double individuals seemed to have changed† in his psyche. Indeed, even one of his bosses, Kazusov, who he used to think about a haughty monstrosity, begins acting well disposed to him and welcomes him to his home (pp. 1-2). The storytellers mother and father begin spending luxuriously, purchasing better food and garments despite the fact that he cautions them that he is truly not getting considerably more cash: â€Å"you know, my pay wasn’t multiplied. The expansion was trifling,† he lets them know (p. 2). These early occasions give us the clue that others might be abusing the man for their own finishes, and this point will be significant toward the end. A trace of difficulty comes decently fast in this extremely short story. Here, the storyteller clarifies that the requests on him for cash from his loved ones, and for his unexpected wedding, have driven him to take cash from his working environment, despite the fact that he endeavors to legitimize it in his psyche: â€Å"Why not take it, when you realize you are going to returned it when you get your pay? (Chekhov 3). Shockingly, he never really returns the cash and is gotten very quickly, bringing fiasco upon himself. Out of nowhere, nobody needs anything to do with him any longer, and even his newly discovered companions forsake him: â€Å"Yesterday I was regarded and respected on all sides; today I am a fraud and a thief† (p. 4). The purpose of this story is to understand that it isn't about the creation of a criminal, or h ow a man turns unscrupulous because of outward requests on him. Or maybe, the fact is unmistakably about how others see ones unexpected difference in status very quickly, and will attempt to utilize it for their own advantage. The keeps an eye on loved ones have not gotten some distance from him since they are so legitimate themselves, since they profited by his liberality and even urged him to spend too far in the red. It is just his abrupt downturn in societal position, something contrary to his unexpected ascent in status toward the start of the story. The subsequent story likewise manages an abrupt move in a characters status is â€Å"The Dance Pianist. † Like to â€Å"The Confession,† this story likewise revolves around a solitary character, who recounts to the narrative of an occasion that has quite recently occurred in his life. In contrast to the primary story, in any case, the character in this story has a name, Pyotr Rublyov. Additionally as opposed to the primary story, he is recounting to the story not to the perusers straightforwardly, yet to another character, his flat mate who is the main individual storyteller of the story. A third complexity between â€Å"The Dance Pianist† and â€Å"The Confession† is that in the current story the status change is actually a change in different characters impression of the primary characters status, as opposed to a genuine move in his status. In â€Å"The Dance Pianist,† the fact of the matter is focused on a man who is confused with somebody of more significance than he truly is, and how society will in general treat individuals distinctively dependent on impression of status. Toward the start of â€Å"The Dance Pianist,† our principle character, Pyotr, a â€Å"former student,† comes blasting into his room late one night and after some pushing by his flat mate recounts to his account of that night. He had been functioning as a paid piano player for society individuals at a distinguished gathering, and says that he was kicked out for something that he will before long depict in detail (Chekhov 47). He grumbles about the poor way that he is treated by society individuals, which establishes out the framework for what is to follow: â€Å"And what am I, all things considered? A piano player, a household, a server that realizes how to play the piano. In the homes of shippers I’m tended to as a second rate, given a tip, and †no offense intended† (p. 48). He clarifies that a young lady at the gathering started addressing him coolly, and he before long acknowledges (because of a caught discussion) that she has confused him with a welcomed visitor of the gathering, not only a recruited piano player. Pyotr continues playing the piano, attempting to overlook the occurrence, yet it continues bothering him for the duration of the night: â€Å"I initiated thinking what waste I had ended up being; that subsequent to venturing out 2,000 versts to arrive at Moscow, in the expectation of turning into a professional piano player or an author, I presently get myself a move pianist† (Chekhov 50). Pyotr appears to feel awful for his flat mate, a battling author, also. At last the purpose of the story happens to him, and he discloses it to his flat mate, conveniently summarizing the exercise to be realized: What is it in the Russian character, I pondered, that makes it conceivable, as long as you are free, an understudy, or loafing around without an occupation, to drink with a man, slap him on the midsection, play with his girl; however when you are in even a somewhat subordinate connection to him, the shoemaker must adhere to this last! Chekhov 51) because of this abrupt acknowledgment, he finds that he cannot hold his humiliation and disgrace inside any more, and gets set up out of the gathering for losing his levelheadedness. The unmistakable message we can acquire from this long tale is that something as straightforward as a change in different people groups view of ones status is sufficient to incredibly impact the sort of connections that are conceivable or passable for o ne. As we can again peruse from the presentation, we discover a case of the kind of circumstance where â€Å"human connections at that point become vertical, subject to object† (xi-xii). In both of these Chekhov stories, the creator has unmistakably put forth the truth of societal position in the Russia of his own time, yet he has additionally expressed something general about human connections. We can see in the two stories the occasionally unfortunate impacts that can result from either a genuine change in economic wellbeing (as in â€Å"The Confession†) or even an apparent or mixed up one (as in â€Å"The Dance Pianist†). In spite of the fact that Chekhov himself may have held equitable beliefs (as referenced toward the start of this paper), in these accounts he can depict the truth of a general public wherein status jobs and social position are of high significance, and which forces genuine ramifications for infringement. Chekhov, Anton. â€Å"The Confession. † In Anton Chekhov: Selected Stories, pp. 1-4. New York: Signet Classics 1960. . â€Å"The Dance Pianist. † In Anton Chekhov: Selected Stories, pp. 46-52. New York: Signet Classics 1960.

Monday, July 27, 2020

Changing Majors

Changing Majors With a large iced coffee in hand, I am going to be very blunt in this post. What you want to be right now, as a high school senior, will likely change. In fact, 80% of college students change their major. Gif from Giphy.com That being said, there is no reason to be afraid of a major change. Changing a major does not always mean a change in career path. To alleviate  some of the stress, here is a personal anecdote: I came into the University of Illinois majoring in Elementary Education, but have always had a passion for language arts, specifically. At the time I applied, there was no such thing as a Middle Grades Education major. I was enrolled in MATH  1o3, a math class required for Elementary Education majors. The class, to say the least, kicked my butt. I knew I had to drop that class. Gif from Giphy.com So I went to my advisor in a panic, not knowing whether I could pass MATH  103 or even stay in Education. It was then that she introduced me to a new major in the College of Education: Middle Grades Education with wait for it a literacy concentration. I quickly changed my major from Elementary Education to Middle Grades Education with concentrations in both Literacy and Social Sciences. Gif from Giphy.com So there I was, fitting into the 80% statistic. The truth is, though, that I was also in a much more fitting major, too. All in all, do not come into college stressing about majors, minors, etc. Take each class one step at a time, find what interests you, and do not fear change: 80% of people change. Rachel Class of 2020 I am studying Middle Grades Education with concentrations in Social Sciences and Literacy in the College of Education. Although I now reside in Champaign, I am originally from Vernon Hills, a Northwest suburb of Chicago.

Friday, May 22, 2020

Analysis Of Martin Luther King Jr. And Ghandi Essay

Cesar Chavez was a great leader that left a legacy in the United States, just like Martin Luther King Jr. and Ghandi. These great leaders preached for equality and fairness. They were elegant, civilized and thoughtful about their approach against oppression. Cesar Chavez recognized and praised his predecessors. He studied and learned from them and their techniques. He used many of the approaches that MLK and Gandhi used to become successful. Non- violence was crucial to Cesar, among many other principles. Just like in the generations of these great leaders, hostility and oppression still exists in the world. In the United States, there are racial, ethnic, and religious groups that are still being oppressed. There are many ways to go about fighting this oppression, at the moment I believe that many people are doing it wrong. I feel that protestors, activists and other organizations should come together to learn and organize an elegant, smart, and respectful movement that will lead th e affected groups into a better tomorrow. Caesar Chavez was at times addressed to as the â€Å"Mexican Moses’’ as a reference to the biblical story of the Exodus of the Israelites from Egypt. Cesar’s followers saw themselves as the Israelites, because farm workers at the time were being oppressed and exploited by farm owners and other civilians. Even though the affected were Mexicans and Mexican Americans, there was a smaller population of Filipinos who were also affected. Chavez and his family wentShow MoreRelatedPolynices Should Be Buried In Sophocless Antigone1681 Words   |  7 Pages exposed to the elements for the wild dogs and vultures to tear apart his body. The play opens at the end of Polynices’ attempted invasion, which made him a traitor of Thebes, and it is revealed that both Polynices and Eteocles had fallen. The new king of Thebes, Creon, decrees that Eteocles will be buried with honored, but Polynices will be left unburied and exposed to the elements. Antigone tells Ismene, her sister, that Eteocles, they, say, has been given full military honors, rightly so—Creon

Saturday, May 9, 2020

Gangs of New York History vs. Hollywood Essay - 1120 Words

nbsp;nbsp;nbsp;nbsp;nbsp;The movie begins in New York, in 1843, with a gang fight. Bill â€Å"the butcher† Cutting’s gang of â€Å"nativists† have challenged the â€Å"dead rabbits† (a gang of mostly Irish immigrants) to a fight to settle once and for all who is the most powerful gang in the area. After an intense battle the â€Å"nativists† win by killing the leader of the â€Å"dead rabbits†, also Amsterdam’s (the main character’s) father. nbsp;nbsp;nbsp;nbsp;nbsp;Amsterdam is then led into an orphanage where he grows to be a man, all while Bill Cutting runs the Five Points, and most of New York. The Five Points is a district of New York City and obviously the most corrupt. Crime is all to common, and sickness runs rampant in the area.†¦show more content†¦nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp;The movie has so many scenes (it’s two hours and forty-five minutes long) it’s hard to pick a favorite. If I had to it would be the ending scene though, where the Draft Riots are in full force and finally Amsterdam and Jenny visit the graves of Bill Cutting and Amsterdam’s father, followed by a time laps scene of the graveyard and the New York City skyline. The ending scene is important because it puts the whole movie into perspective. You get so caught up in the fighting, and crime that you forget the big picture. With the Union Army’s actions it shows how weak and ridiculous the gangs in New York were. Simply, gangs were (and to some extent still are) nothing but a certain demographic joining in large numbers only to force their ideas on the majority. The scene also touches on the fact that presently no one remembers or cares about the gangs or the riots, furthering the idea of the pointlessness of it. nbsp;nbsp;nbsp;nbsp;nbsp;Historically speaking, the movie relates the United States history poorly. It has many accuracies historically, but the problems far outweigh them. nbsp;nbsp;nbsp;nbsp;nbsp;First though, the accuracies. The movie depicts the Five Points in New York as being poor, pestilent, and ugly. This is true to history. The district was doomed to slumhood from the beginning. It was erected on the filled-in Collect Pond, whichShow MoreRelatedGangs of New York History vs. Hollywood1164 Words   |  5 PagesThe movie begins in New York, in 1843, with a gang fight. Bill the butcher Cuttings gang of nativists have challenged the dead rabbits (a gang of mostly Irish immigrants) to a fight to settle once and for all who is the most powerful gang in the area. After an intense battle the nativists win by killing the leader of the dead rabbits, also Amsterdams (the main characters) father. Amsterdam is then led into an orphanage where he grows to be a man, all while Bill Cutting runs the FiveRead MoreThe Rise and Fall of the Italian Mafia1664 Words   |  7 PagesLa Cosa Nostra and the Five Families of which the surrounding area of New York City is comprised has drastically altered the culture in the region; transforming industries with brute force and attracting much public attention. Hollywood focuses on glamorizing the Mafioso lifestyle, distracting from the true nature of organized crime. Over the past decade, the key opportunities have been utilized by the Italian Mafia, resulting in a powerful behind-the-scenes dominance over many aspects we mayRead MoreTombstone: Fact or Fiction Essay1412 Words   |  6 Pagesas the film portrays. On March 24, 1882, Wyatt Earp was said to have killed Curly Bill during a gunfight, however the claim was very controversial at the time (Johnson). Just as the film depicts, the cowboys caught Wyatt along with the rest of his ga ng off guard along a creek. Wyatt walked straight through a cloud of Curly Bills gunfire, where he was left unharmed. He then went right up to Curly Bill and shot him at point blank range. After killing Curly Bill, he then shoots Johnny Barnes inRead MoreSocial and Political Critique and Commentary in Bonnie and Clyde1952 Words   |  8 Pagesnotoriety for its breakage of traditional cinematic taboos, in that it showed rather explicitly both sex and especially, raw and brutal violence. It greatly surprised both the audience and Hollywood itself, and has since its release been labelled as both a landmark film and as an iconic masterpiece of cinema. [NB on it’s vs. its. It’s = short for â€Å"it is†. Read the sentence through – if â€Å"it is† doesn’t fit then you mean â€Å"its† not â€Å"it’s†] But why did it cause such a stir, and why did it become such a massiveRead MoreThe Studio System Essay14396 Words   |  58 Pagesof the dream factory that is Hollywood is little understood outside the business. The Hollywood Studio System: A History is the first book to describe and analyse the complete development, classic operation, and reinvention of the global corporate entities which produce and distribute most of the films we watch. Starting in 1920, Adolph Zukor, head of Paramount Pictures, over the decade of the 1920s helped to fashion Hollywood into a vertically integrated systemRead More Discontent Expressed through Blues, Jazz, Reggae, and Hip-hop5489 Words   |  22 Pagesmusicologist Rod Gruver, life for the lower-class Negro in America in the early 1900s was completely characterized by a sense of alienation: He had no place to go, no one to turn to. He had no country, no home, no ideology, no art to call his own. History had forced upon him the awful realization that if a black man wanted to have a home of his own in America, he would have to create it himself out of elements of his own culture. (Spencer 61) There was an obvious split between the lower-classes andRead MoreMasculinity in the Philippines12625 Words   |  51 Pagesof male initiation to make military service synonymous with the passage to manhood. Not only did mass conscription produce soldiers, it also shaped gender roles in the whole of society. Modern warfare, as it developed in Europe, was the mother of a new masculinity propagated globally in an age of empire through colonial armies, boys schools, and youth movements. As a colony of Spain and America, the Philippines felt these global cultural currents and provides an apt terrain for exploration of thisRead MoreDissertation Proposal on Managing Diversity of Workforce18916 Words   |  76 Pagesthe two primary groups comprising the new workforce. Lawsson R.D. - Identifying and Managing Diversity of Workforce 216 Business Intelligence Journal January OBJECTIVE The objective of this work is to complete a research proposal on the comparison of work values for gaining of knowledge for management of the multigeneration workforce. The specific focus is upon Generation ‘X’ and the Millennium Generation which are the two primary groups comprising the new workforce. INTRODUCTION The generationRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesShopes, eds., Oral History and Public Memories Tiffany Ruby Patterson, Zora Neale Hurston and a History of Southern Life Lisa M. Fine, The Story of Reo Joe: Work, Kin, and Community in Autotown, U.S.A. Van Gosse and Richard Moser, eds., The World the Sixties Made: Politics and Culture in Recent America Joanne Meyerowitz, ed., History and September 11th John McMillian and Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Read MoreOreo and Pt Danone Biscuit15809 Words   |  64 PagesUnited States. Tight competition has prompted acquisition such as the planned acquisition of global biscuit producer Danone by Kraft Foods Inc. early July 2007. Acquisition is a short cut toward expansion of market shares. Building new factories or establishing new companies will take a long process amid growing competition. Acquisition, therefore, is chosen despite larger investment it will need. Indonesia is a potential market for food products including biscuits. Multinational companies have

Wednesday, May 6, 2020

History of Computer Virus Free Essays

THE HISTORY OF COMPUTER VIRUSES A Bit of Archeology There are lots and lots of opinions on the date of birth of the first computer virus. I know for sure just that there were no viruses on the Babbidge machine, but the Univac 1108 and IBM 360/370 already had them (â€Å"Pervading Animal† and â€Å"Christmas tree†). Therefore the first virus was born in the very beginning of 1970s or even in the end of 1960s, although nobody was calling it a virus then. We will write a custom essay sample on History of Computer Virus or any similar topic only for you Order Now And with that consider the topic of the extinct fossil species closed. Journey’s Start Let’s talk of the latest history: â€Å"Brain†, â€Å"Vienna†, â€Å"Cascade†, etc. Those who started using IBM PCs as far as in mid-80s might still remember the total epidemic of these viruses in 1987-1989. Letters were dropping from displays, crowds of users rushing towards monitor service people (unlike of these days, when hard disk drives die from old age but yet some unknown modern viruses are to blame). Their computers started playing a hymn called â€Å"Yankee Doodle†, but by then people were already clever, and nobody tried to fix their speakers – very soon it became clear that this problem wasn’t with the hardware, it was a virus, and not even a single one, more like a dozen. And so viruses started infecting files. The â€Å"Brain† virus and bouncing ball of the â€Å"Ping-pong† virus marked the victory of viruses over the boot sector. IBM PC users of course didn’t like all that at all. And so there appeared antidotes. Which was the first? I don’t know, there were many of them. Only few of them are still alive, and all of these anti-viruses did grow from single project up to the major software companies playing big roles on the software market. There is also an notable difference in conquering different countries by viruses. The first vastly spread virus in the West was a bootable one called â€Å"Brain†, the â€Å"Vienna† and â€Å"Cascade† file viruses appeared later. Unlike that in East Europe and Russia file viruses came first followed by bootable ones a year later. Time went on, viruses multiplied. They all were all alike in a sense, tried to get to RAM, stuck to files and sectors, periodically killing files, diskettes and hard disks. One of the first â€Å"revelations† was the â€Å"Frodo. 4096† virus, which is far as I know was the first invisible virus (Stealth). This virus intercepted INT 21h, and during DOS calls to the infected files it changed the information so that the file appeared to the user uninfected. But this was just an overhead over MS-DOS. In less than a year electronic bugs attacked the DOS kernel (â€Å"Beast. 512† Stealth virus). The idea of in visibility continued to bear its fruits: in summer of 1991 there was a plague of â€Å"Dir_II†. â€Å"Yeah! â€Å", said everyone who dug into it. But it was pretty easy to fight the Stealth ones: once you clean RAM, you may stop worrying and just search for the beast and cure it to your hearts content. Other, self encrypting viruses, sometimes appearing in software collections, were more troublesome. This is because to identify and delete them it was necessary to write special subroutines, debug them. But then nobody paid attention to it, until †¦ Until the new generation of viruses came, those called polymorphic viruses. These viruses use another approach to invisibility: they encrypt themselves (in most cases), and to decrypt themselves later they use commands which may and may not be repeated in different infected files. Polymorphism – Viral Mutation The first polymorphic virus called â€Å"Chameleon† became known in the early ’90s, but the problem with polymorphic viruses became really serious only a year after that, in April 1991, with the worldwide epidemic of the polymorphic virus â€Å"Tequila† (as far as I know Russia was untouched by the epidemic; the first epidemic in Russia, caused by a polymorphic virus, happened as late as in 1994, in three years, the virus was called â€Å"Phantom1†). The idea of self encrypting polymorphic viruses gained popularity and brought to life generators of polymorphic code – in early 1992 the famous â€Å"Dedicated† virus appears, based on the first known polymorphic generator MtE and the first in a series of MtE-viruses; shortly after that there appears the polymorphic generator itself. It is essentially an object module (OBJ file), and now to get a polymorphic mutant virus from a conventional non-encrypting virus it is sufficient to simply link their object modules together – the polymorphic OBJ file and the virus OBJ file. Now to create a real polymorphic virus one doesn’t have to dwell on the code of his own encryptor/decryptor. He may now connect the polymorphic generator to his virus and call it from the code of the virus when desired. Luckily the first MtE-virus wasn’t spread and did not cause epidemics. In their turn the anti-virus developers had sometime in store to prepare for the new attack. In just a year production of polymorphic viruses becomes a â€Å"trade†, followed by their â€Å"avalanche† in 1993. Among the viruses coming to my collection the volume of polymorphic viruses increases. It seems that one of the main directions in this uneasy job of creating new viruses becomes creation and debugging of polymorphic mechanism, the authors of viruses compete not in creating the toughest virus but the toughest polymorphic mechanism instead. This is a partial list of the viruses that can be called 100 percent polymorphic (late 1993): Bootache, CivilWar (four versions), Crusher, Dudley, Fly, Freddy, Ginger, Grog, Haifa, Moctezuma (two versions), MVF, Necros, Nukehard, PcFly (three versions), Predator, Satanbug, Sandra, Shoker, Todor, Tremor, Trigger, Uruguay (eight versions). These viruses require special methods of detection, including emulation of the viruses executable code, mathematical algorithms of restoring parts of the code and data in virus etc. Ten more new viruses may be considered non-100 percent polymorphic (that is they do encrypt themselves but in decryption routine there always exist some nonchanging bytes): Basilisk, Daemaen, Invisible (two versions), Mirea (several versions), Rasek (three versions), Sarov, Scoundrel, Seat, Silly, Simulation. However to detect them and to restore the infected objects code decrypting is still required, because the length of nonchanging code in the decryption outine of those viruses is too small. Polymorphic generators are also being developed together with polymorphic viruses. Several new ones appear utilizing more complex methods of generating polymorphic code. They become widely spread over the bulletin board systems as archives containing object modules, documentation and examples of use. By the end of 1993 there are seven known generators of polymorphic code. They are: MTE 0. 90 (Mutation Engine), TPE (Trident Polymorphic Engine), four versions NED (Nuke Encryption Device), DAME (Dark Angel’s Multiple Encryptor) Since then every year brought several new polymorphic generators, so there is little sense in publishing the entire lists. Automating Production and Viral Construction Sets Laziness is the moving force of progress (to construct the wheel because that’s too lazy to carry mammoths to the cave). This traditional wisdom needs no comments. But only in the middle of 1992 progress in the form of automating production touched the world of viruses. On the fifth of July 1992 the first viral code construction set for IBM PC compatibles called VCL (Virus Creation Laboratory) version 1. 00 is declared for production and shipping. This set allows to generate well commented source texts of viruses in the form or assembly language texts, object modules and infected files themselves. VCL uses standard windowed interface. With the help of a menu system one can choose virus type, objects to infect (COM or/and EXE), presence or absence of self encryption, measures of protection from debugging, inside text strings, optional 10 additional effects etc. Viruses can use standard method of infecting a file by adding their body to the end of file, or replace files with their body destroying the original content of a file, or become companion viruses. And then it became much easier to do wrong: if you want somebody to have some computer trouble just run VCL and within 10 to 15 minutes you have 30-40 different viruses you may then run on computers of your enemies. A virus to every computer! The further the better. On the 27th of July the first version of PS-MPC (Phalcon/Skism Mass-Produced Code Generator). This set does not have windowed interface, it uses configuration file to generate viral source code. This file contains description of the virus: the type of infected files (COM or EXE); resident capabilities (unlike VCL, PS-MPC can also produce resident viruses); method of installing the resident copy of the virus; self encryption capabilities; the ability to infect COMMAND. COM and lots of other useful information. Another construction set G2 (Phalcon/Skism’s G2 0. 70 beta) has been created. It supported PS-MPC configuration files, however allowing much more options when coding the same functions. The version of G2 I have is dated the first of January 1993. Apparently the authors of G2 spent the New Year’s Eve in front of their computers. They’d better have some champagne instead, this wouldn’t hurt anyway. So in what way did the virus construction sets influence electronic wildlife? In my virus collection there are: †¢ several hundreds of VCL and G2 based viruses; †¢ over a thousand PS-MPC based viruses. So we have another tendency in development of computer viruses: the increasing number of â€Å"construction set† viruses; more unconcealably lazy people join the ranks of virus makers, downgrading a respectable and creative profession of creating viruses to a mundane rough trade. Outside DOS The year 1992 brought more than polymorphic viruses and virus construction sets. The end of the year saw the first virus for Windows, which thus opened a new page in the history of virus making. Being small (less than 1K in size) and absolutely harmless this non resident virus quite proficiently infected executables of new Windows format (NewEXE); a window into the world of Windows was opened with its appearance on the scene. After some time there appeared viruses for OS/2, and January 1996 brought the first Windows95 virus. Presently not a single week goes by without new viruses infecting non-DOS systems; possibly the problem of non-DOS viruses will soon become more important than the problem of DOS viruses. Most likely the process of changing priorities will resemble the process of DOS dying and new operating systems gaining strength together with their specific programs. As soon as all the existing software for DOS will be replaced by their Windows, Windows95 and OS/2 analogues, the problem of DOS viruses becomes nonexistent and purely theoretical for computer society. The first attempt to create a virus working in 386 protected mode was also made in 1993. It was a boot virus â€Å"PMBS† named after a text string in its body. After boot up from infected drive this virus switched to protected mode, made itself supervisor and then loaded DOS in virtual window mode V86. Luckily this virus was born dead – its second generation refused to propagate due to several errors in the code. Besides that the infected system â€Å"hanged† if some of the programs tried to reach outside the V86 mode, for example to determine the presence of extended memory. This unsuccessful attempt to create supervisor virus remained the only one up to spring of 1997, when one Moscow prodigy released â€Å"PM. Wanderer† – a quite successful implementation of a protected mode virus. It is unclear now whether those supervisor viruses might present a real problem for users and anti-virus program developers in the future. Most likely not because such viruses must â€Å"go to sleep† while new operating systems (Windows 3. xx, Windows95/NT, OS/2) are up and running, allowing for easy detection and killing of the virus. But a full-scale stealth supervisor virus may mean a lot of trouble for â€Å"pure† DOS users, because it is absolutely impossible to detect such a stealth virus under pure DOS. Macro Virus Epidemics August 1995. All the progressive humanity, The Microsoft and Bill Gates personally celebrate the release of a new operating system Windows95. With all that noise the message about a new virus using basically new methods of infection came virtually unnoticed. The virus infected Microsoft Word documents. Frankly it wasn’t the first virus infecting Word documents. Earlier before anti-virus companies had the first experimental example of a virus on their hands, which copied itself from one document to another. However nobody paid serious attention to that not quite successful experiment. As a result virtually all the anti-virus companies appeared not ready to what came next – macro virus epidemics – and started to work out quick but inadequate steps in order to put an end to it. For example several companies almost simultaneously released documents- anti-viruses, acting along about the same lines as did the virus, but destroying it instead of propagation. By the way it became necessary to correct anti-virus literature in a hurry because earlier the question, â€Å"Is it possible to infect a computer by simply reading a file† had been answered by a definite â€Å"No way! with lengthy proofs of that. As for the virus which by that time got its name, â€Å"Concept†, continued its ride of victory over the planet. Having most probably been released in some division of Microsoft â€Å"Concept† ran over thousands if not millions of computers in no time it all. It’s not unusual, because text exchange in the format of Microsoft Word became in fact one of the industry standards, and to get infected by the virus it is sufficient just to open the infected document, then all the documents edited by infected copy of Word became infected too. As a result having received an infected file over the Internet and opened it, the unsuspecting user became â€Å"infection peddler†, and if his correspondence was made with the help of MS Word, it also became infected! Therefore the possibility of infecting MS Word multiplied by the speed of Internet became one of the most serious problems in all the history of existence of computer viruses. In less than a year, sometime in summer of 1996, there appeared the â€Å"Laroux† virus, infecting Microsoft Excel spreadsheets. As it had been with â€Å"Concept†, these new virus was discovered almost simultaneously in several companies. The same 1996 witnessed the first macro virus construction sets, then in the beginning of 1997 came the first polymorphic macro viruses for MS Word and the first viruses for Microsoft Office97. The number of various macro viruses also increased steadily reaching several hundreds by the summer of 1997. Macro viruses, which have opened a new page in August 1995, using all the experience in virus making accumulated for almost 10 years of continuous work and enhancements, actually do present the biggest problem for modern virology. Chronology of Events It’s time to give a more detailed description of events. Let’s start from the very beginning. Late 1960s – early 1970s Periodically on the mainframes at that period of time there appeared programs called â€Å"the rabbit†. These programs cloned themselves, occupied system resources, thus lowering the productivity of the system. Most probably â€Å"rabbits† did not copy themselves from system to system and were strictly local phenomena – mistakes or pranks by system programmers servicing these computers. The first incident which may be well called an epidemic of â€Å"a computer virus†, happened on the Univax 1108 system. The virus called â€Å"Pervading Animal† merged itself to the end of executable files – virtually did the same thing as thousands of modern viruses do. The first half of 1970s â€Å"The Creeper† virus created under the Tenex operating system used global computer networks to spread itself. The virus was capable of entering a network by itself by modem and transfer a copy of itself to remote system. â€Å"The Reeper† anti-virus program was created to fight this virus, it was the first known anti-virus program. Early 1980s Computers become more and more popular. An increasing number of program appears written not by software companies but by private persons, moreover, these programs may be freely distributed and exchanged through general access servers – BBS. As a result there appears a huge number of miscellaneous â€Å"Trojan horses†, programs, doing some kind of harm to the system when started. 1981 â€Å"Elk Cloner† bootable virus epidemics started on Apple II computers. The virus attached itself to the boot sector of diskettes to which there were calls. It showed itself in many ways – turned over the display, made text displays blink and showed various messages. 1986 The first IBM PC virus â€Å"Brain† pandemic began. This virus infecting 360 KB diskettes became spread over the world almost momentarily. The secret of a â€Å"success† like this late probably in total unpreparedness of computer society to such a phenomenon as computer virus. The virus was created in Pakistan by brothers Basit and Amjad Farooq Alvi. They left a text message inside the virus with their name, address and telephone number. According to the authors of the virus they were software vendors, and would like to know the extent of piracy in their country. Unfortunately their experiment left the borders of Pakistan. It is also interesting that the â€Å"Brain† virus was the first stealth virus, too – if there was an attempt to read the infected sector, the virus substituted it with a clean original one. Also in 1986 a programmer named Ralph Burger found out that a program can create copies of itself by adding its code to DOS executables. His first virus called â€Å"VirDem† was the demonstration of such a capability. This virus was announced in December 1986 at an underground computer forum, which consisted of hackers, specializing at that time on cracking VAX/VMS systems (Chaos Computer Club in Hamburg). 1987 â€Å"Vienna† virus appears. Ralph Burger, whom we already now, gets a copy of this virus, disassembles it, and publishes the result in his book â€Å"Computer Viruses: a High-tech Disease†. Burger’s book made the idea of writing viruses popular, explained how to do it, and therefore stimulated creating up hundreds and in thousands of computer viruses, in which some of the ideas from his book were implemented. Some more IBM PC viruses are being written independently in the same year. They are: â€Å"Lehigh†, infecting the COMMAND. COM file only; â€Å"Suriv-1† a. k. a. â€Å"April1st†, infecting COM files; â€Å"Suriv-2†, infecting (for the first time ever) EXE files; and â€Å"Suriv-3†, infecting both COM and EXE files. There also appear several boot viruses (â€Å"Yale† in USA, â€Å"Stoned† in New Zealand, â€Å"PingPong† in Italy), and the first self encrypting file virus â€Å"Cascade†. Non-IBM computers are also not forgotten: several viruses for Apple Macintosh, Commodore Amiga and Atari ST have been detected. In December of 1987 there was the first total epidemics of a network virus called â€Å"Christmas Tree†, written in REXX language and spreading itself under the VM/CMS operating environments. On the ninth of December this virus was introduced into the Bitnet network in one of West German universities, then via gateway it got into the European Academic Research Network (EARN) and then into the IBM Vnet. In four days (Dec. 13) the virus paralyzed the network, which was overflowing with copies of it (see the desk clerk example several pages earlier). On start-up the virus output an image of the Christmas tree and then sent copies of itself to all the network users whose addresses were in the corresponding system files NAMES and NETLOG. 1988 On Friday the 13 1988 several companies and universities in many countries of the world â€Å"got acquainted† with the â€Å"Jerusalem† virus. On that day the virus was destroying files which were attempted to be run. Probably this is one of the first MS-DOS viruses which caused a real pandemic, there were news about infected computers from Europe, America and the Middle East. Incidentally the virus got its name after one of the places it stroke – the Jerusalem University. â€Å"Jerusalem† together with several other viruses (â€Å"Cascade†, â€Å"Stoned†, â€Å"Vienna†) infected thousands of computers still being unnoticed – anti-virus programs were not as common then as they are now, many users and even professionals did not believe in the existence of computer viruses. It is notable that in the same year the legendary computer guru Peter Norton announced that computer viruses did not exist. He declared them to be a myth of the same kind as alligators in New York sewers. Nevertheless this delusion did not prevent Symantec from starting its own anti-virus project Norton Anti-virus after some time. Notoriously false messages about new computer viruses started to appear, causing panic among the computer users. One of the first virus hoaxes of this kind belongs to a Mike RoChenle (pronounced very much like â€Å"Microchannel†), who uploaded a lot of messages to the BBS systems, describing the supposed virus copying itself from one BBS to another via modem using speed 2400 baud for that. Funny as it may seem many users gave up 2000 baud standard of that time and lowered the speed of their modems to 1200 baud. Similar hoaxes appeared even now. The most famous of them so far are GoodTimes and Aol4Free. November 1988: a total epidemic of a network virus of Morris (a. k. a. Internet Worm). This virus infected more than 6000 computer systems in USA (including NASA research Institute) and practically paralyzed their work. Because of erratic code of the virus it sent unlimited copies of itself to other network computers, like the â€Å"Christmas Tree† worm virus, and for that reason completely paralyzed all the network resources. Total losses caused by the Morris virus were estimated at 96 millions of dollars. This virus used errors in operating systems Unix for VAX and Sun Microsystems to propagate. Besides the errors in Unix the virus utilized several more original ideas, for example picking up user passwords. A more detailed story of this virus and the corresponding incidents may be found in a rather detailed and interesting articles. December 1988: the season of worm viruses continues this time in DECNet. Worm virus called HI. COM output and image of spruce and informed users that they should â€Å"stop computing and have a good time at home!!! There also appeared new anti-virus programs for example, Doctors Solomon’s Anti-virus Toolkit, being one of the most powerful anti-virus software presently. 1989 New viruses â€Å"Datacrime†, â€Å"FuManchu† appear, as do the whole families like â€Å"Vacsina† and â€Å"Yankee†. The first one acted extremely dangerously – from October 13th to December 31st it formatted hard disks. This virus â€Å"brok e free† and caused total hysteria in the mass media in Holland and Great Britain. September 1989: 1 more anti-virus program begins shipping – IBM Anti-virus. October 1989: one more epidemic in DECNet, this time it was worm virus called â€Å"WANK Worm†. December 1989: an incident with a â€Å"Trojan horse† called â€Å"AIDS†. 20,000 copies were shipped on diskettes marked as â€Å"AIDS Information Diskette Version 2. 0†. After 90 boot-ups the â€Å"Trojan† program encrypted all the filenames on the disk, making them invisible (setting a â€Å"hidden† attribute) and left only one file readable – bill for $189 payable to the address P. O. Box 7, Panama. The author of this program was apprehended and sent to jail. One should note that in 1989 there began total epidemics of computer viruses in Russia, caused by the same â€Å"Cascade†, â€Å"Jerusalem† and â€Å"Vienna†, which besieged the computers of Russian users. Luckily Russian programmers pretty quickly discovered the principles of their work, and virtually immediately there appeared several domestic anti-viruses, and AVP (named â€Å"-V†) those time, was one of them. My first acquaintance with viruses (this was the â€Å"Cascade† virus) replaced in the world 1989 when I found virus on my office computer. This particular fact influenced my decision to change careers and create anti-virus programs. In a month the second incident (â€Å"Vacsina† virus) was closed with a help of the first version of my anti-virus â€Å"-V† (minus-virus), several years later renamed to AVP – AntiViral Toolkit Pro. By the end of 1989 several dozens of viruses herded on Russian lands. They were in order of appearance: two versions of â€Å"Cascade†, several â€Å"Vacsina† and â€Å"Yankee† viruses, â€Å"Jerusalem†, â€Å"Vienna†, â€Å"Eddie†, â€Å"PingPong†. 1990 This year brought several notable events. The first one was the appearance of the first polymorphic viruses â€Å"Chameleon† (a. k. a. â€Å"V2P1†, â€Å"V2P2†, and â€Å"V2P6†). Until then the anti-virus programs used â€Å"masks† – fragments of virus code – to look for viruses. After â€Å"Chameleon†Ã¢â‚¬Ëœs appearance anti-virus program developers had to look for different methods of virus detection. The second event was the appearance of Bulgarian â€Å"virus production factory†: enormous amounts of new viruses were created in Bulgaria. Disease wears the entire families of viruses â€Å"Murphy†, â€Å"Nomenclatura†, â€Å"Beast† (or â€Å"512†, â€Å"Number-of-Beast†), the modifications of the â€Å"Eddie† virus etc. A certain Dark Avenger became extremely active, making several new viruses a year, utilizing fundamentally new algorithms of infecting and covering of the tracks in the system. It was also in Bulgaria that the first BBS opens, dedicated to exchange of virus code and information for virus makers. In July 1990 there was an incident with â€Å"PC Today† computer magazine (Great Britain). It contained a floppy disk infected with â€Å"DiskKiller† virus. More than 50,000 copies were sold. In the second half of 1990 there appeared two Stealth monsters – â€Å"Frodo† and â€Å"Whale†. Both viruses utilized extremely complicated stealth algorithms; on top of that the 9KB â€Å"Whale† used several levels of encrypting and anti-debugging techniques. 1991 Computer virus population grows continuously, reaching several hundreds now. Anti-viruses also show increasing activity: two software monsters at once (Symantec and Central Point) issue their own anti-virus programs – Norton Anti-virus and Central Point Anti-virus. They are followed by less known anti-viruses from Xtree and Fifth Generation. In April a full-scale epidemic broke out, caused by file and boot polymorphic virus called â€Å"Tequila†, and in September the same kind of story happened with â€Å"Amoeba† virus. Summer of 1991: â€Å"Dir_II† epidemic. It was a link virus using fundamentally new methods of infecting files. 1992 Non-IBM PC and non-MS-DOS viruses are virtually forgotten: â€Å"holes† in global access network are closed, errors corrected, and network worm viruses lost the ability to spread themselves. File-, boot- and file-boot viruses for the most widely spread operating system (MS-DOS) on the most popular computer model (IBM PC) are becoming more and more important. The number of viruses increases in geometrical to progression; various virus incidents happen almost every day. Miscellaneous anti-virus programs are being developed, dozens of books and several periodic magazines on anti-viruses are being printed. A few things stand out: Early 1992: the first polymorphic generator MtE, serving as a base for several polymorphic viruses which follow almost immediately. Mte was also the prototype for a few forthcoming polymorphic generators. March 1992: â€Å"Michelangelo† virus epidemics (a. k. a. â€Å"March6†) and the following hysteria took place. Probably this is the first known case when anti-virus companies made fuss about this virus not to protect users from any kind of danger, but attract attention to their product, that is to create profits. One American anti-virus company actually announced that on the 6th of March the information on over five million computers will be destroyed. As a result of the fuss after that the profits of different anti-virus companies jumped several times; in reality only about 10,000 computers suffered from that virus. July 1992: The first virus construction sets were made, VCL and PS-MPC. They made large flow of new viruses even larger. They also stimulated virus makers to create other, more powerful, construction sets, as it was done by MtE in its area. Late 1992: The first Windows virus appears, infecting this OS’s executables, and starts a new page in virus making. 1993 Virus makers are starting to do some serious damage: besides hundreds of mundane viruses which are no different than their counterparts, besides the whole polymorphic generators and construction sets, besides new electronic editions of virus makers there appear more and more viruses, using highly unusual ways of infecting files, introducing themselves into the system etc. The main examples are: â€Å"PMBS†, wording in Intel 80386 protected mode. Strange† (or â€Å"Hmm†) – a â€Å"masterpiece† of Stealth technology, however fulfilled on the level of hardware interrupts INT 0Dh and INT 76h. â€Å"Shadowgard† and â€Å"Carbunkle†, which widened debt range of algorithms of companion viruses. â€Å"Emmie†, â€Å"Metallica†, â€Å"Bomber†, â€Å"Uruguay† and â€Å"Cruncher† – the use of fundamentally new techniques of â€Å"hiding† of its own code inside the infected files. In spring of 1993 Microsoft made its own anti-virus MSAV, based on CPAV by Central Point. 1994 The problem of CD viruses is getting more important. Having quickly gained popularity CD disks became one of the main means of spreading viruses. There are several simultaneous cases when a virus got to the master disk when preparing the batch CDs. As a result of that a fairly large number (tens of thousands) of infected CDs hit the market. Of course they cannot be cured, they just have to be destroyed. Early in the year in Great Britain there popped out two extremely complicated polymorphic viruses, â€Å"SMEG. Pathogen† and â€Å"SMEG. Queeg† (even now not all the anti-virus programs are able to give 100% correct detection of these viruses). Their author placed infected files to a BBS, causing real panic and fear of epidemics in mass media. Another wave of panic was created by a message about a supposed virus called â€Å"GoodTimes†, spreading via the Internet and infecting a computer when receiving E-mail. No such virus really existed, but after some time there appeared a usual DOS virus containing text string â€Å"Good Times†. It was called â€Å"GT-Spoof†. Law enforcement increases its activities: in Summer of 1994 the author of SMEG was â€Å"sorted out† and arrested. Approximately at the same time also in Great Britain there was arrested an entire group of virus makers, who called themselves ARCV (Association for Really Cruel Viruses). Some time later one more author of viruses was arrested in Norway. There appear some new unusual enough viruses: January 1994: â€Å"Shifter† – the first virus infecting object modules (OBJ files). â€Å"Phantom1† – the cause of the first epidemic of polymorphic virus in Moscow. April 1994: â€Å"SrcVir† — the virus family infecting program source code (C and Pascal). June 1994: â€Å"OneHalf† – one of the most popular viruses in Russia so far starts a total epidemics. September 1994: â€Å"3APA3A† – a boot-file virus epidemic. This virus uses a highly unusual way of incorporating into MS-DOS. No anti-virus was ready to meet such kind of a monster. In 1994 (Spring) one of the anti-virus leaders of that time – Central Point – ceased to exist, acquired by Symantec, which by that time managed to â€Å"swallow† several minor companies, working on anti- viruses – Peter Norton Computing, Cetus International and Fifth Generation Systems. 1995 Nothing in particular among DOS viruses happens, although there appear several complicated enough monster viruses like â€Å"NightFall†, â€Å"Nostardamus†, â€Å"Nutcracker†, also some funny viruses like â€Å"bisexual† virus â€Å"RMNS† and BAT virus â€Å"Winstart†. The â€Å"ByWay† and â€Å"DieHard2† viruses become widespread, with news about infected computers coming from all over the world. February 1995: an incident with Microsoft: Windows95 demos disks are infected by â€Å"Form†. Copies of these disks were sent to beta testers by Microsoft; one of the testers was not that lazy and tested the disks for viruses. Spring 1995: two anti-virus companies – ESaSS (ThunderBYTE anti-virus) and Norman Data Defense (Norman Virus Control) announce their alliance. These companies, each making powerful enough anti- viruses, joined efforts and started working on a joint anti-virus system. August 1995: one of the turning points in the history of viruses and anti-viruses: there has actually appeared the first â€Å"alive† virus for Microsoft Word (â€Å"Concept†). In some month the virus â€Å"tripped around the world†, pesting the computers of the MS Word users and becoming a firm No. 1 in statistic research held by various computer titles. 1996 January 1996: two notable events – the appearance of the first Windows95 virus (â€Å"Win95. Boza†) and the epidemics of the extremely complicated polymorphic virus â€Å"Zhengxi† in St. Petersburg (Russia). March 1996: the first Windows 3. virus epidemic. The name of the virus is â€Å"Win. Tentacle†. This virus infected a computer network a hospital and in several other institutions in France. This event is especially interesting because this was the FIRST Windows virus on a spree. Before that time (as far as I know) all the Windows viruses had been living only in collections a nd electronic magazines of virus makers, only boot viruses, DOS viruses and macro viruses were known to ride free. June 1996: â€Å"OS2. AEP† – the first virus for OS/2, correctly infecting EXE files of this operating system. Earlier under OS/2 there existed only the viruses writing themselves instead of file, destroying it or acting as companions. July 1996: â€Å"Laroux† – the first virus for Microsoft Excel caught live (originally at the same time in two oil making companies in Alaska and in southern African Republic). The idea of â€Å"Laroux†, like that of Microsoft Word viruses, was based on the presence of so-called macros (or Basic programs) in the files. Such programs can be included into both electronic spreadsheets of Microsoft Excel and Microsoft Word documents. As it turned out the Basic language built into Microsoft Excel also allows to create viruses. December 1996: â€Å"Win95. Punch† – the first â€Å"memory resident† virus for Windows95. It stays in the Windows memory as a VxD driver, hooks file access and infects Windows EXE files that are opened. In general the year 1996 is the start of widespread virus intervention into the Windows32 operating system (Windows95 and WindowsNT) and into the Microfoft Office applications. During this and the next year several dozens of Windows viruses and several hunsdreds of macro viruses appeared. Many of them used new technologies and methods of infection, including stealth and polymorphic abilities. That was the next round of virus evolution. During two years they repeated the way of improving similar to DOS viruses. Step by step they started to use the same features that DOS viruses did 10 years beforehand, but on next technological level. 1997 February 1997: â€Å"Linux. Bliss† – the first virus for Linux (a Unix clone). This way viruses occupied one more â€Å"biological† niche. February-April 1997: macro viruses migrated to Office97. The first of them turned out to be only â€Å"converted† to the format macro viruses for Microsoft Word 6/7, but also virtually immediately there appeared viruses aimed at Office97 documents exclusively. March 1997: â€Å"ShareFun† – macro-virus hitting Microsoft Word 6/7. It uses is not only standard features of Microsoft Word to propagate but also sends copies of itself via MS-Mail. April 1997: â€Å"Homer† – the first network worm virus, using File Transfer Protocol (FTP) for propagation. June 1997: There appears the first self encrypting virus for Windows95. This virus of Russian origin has been sent to several BBS is in Moscow which caused an epidemic. November 1997: The â€Å"Esperanto† virus. This is the first virus that intends to infect not only DOS and Windows32 executable files, but also spreads into the Mac OS (Macintosh). Fortunately, the virus is not able to spread cross the platforms because of bugs. December 1997: new virus type, the so-called â€Å"mIRC Worms†, came into being. The most popular Windows Internet Relay Chat (IRC) utility known as mIRC proved to be â€Å"hole† allowing virus scripts to transmit themselves along the IRC-channels. The next IRC version blocked the hole and the mIRC Worms vanished. The KAMI ltd. nti-virus department has braked away from the mother company constituting the independent one what, certainly, is considered the main event of 1997. Currently the company known as Kaspersky Labs and proved to be a recognized leader of the anti-virus industry. Since 1994 the AntiViral Toolkit Pro (AVP) anti-virus scanner, main product of the company, constantly shows high results wh ile being tested by various test laboratories of all world. Creation of an independent company gave the chance to the at first small group of developers to gain the lead on the domestic market and prominence on the world one. For short run versions for practically all popular platforms were developed and released, the new anti-virus solutions offered, the international distribution and the product support networks created. October 1997: the agreement on licensing of AVP technologies use in F-Secure Anti-Virus (FSAV) was signed. The F-Secure Anti-Virus (FSAV) package was the DataFellows (Finland) new anti-virus product. Before DataFellows was known as the F-PROT anti-virus package manufacturer. 1997 was also the year of several scandals between the anti-virus main manufacturers in US and Europe. At the year beginning McAfee has announced that its experts have detected a â€Å"feature† in the antivirus programs of Dr. Solomon, one of its main competitors. The McAfee testimony stated that if the Dr. Solomon’s antivirus while scanning detects several virus-types the program switches to the advanced scanning mode. What means that while scanning some uninfected computer the Dr. Solomon’s anti-virus operates in the usual mode and switches to the advanced mode – â€Å"cheat mode† according to McAfee – enabling the application to detect the invisible for the usual mode viruses while testing virus collections. Consequently the Dr. Solomon’s anti-virus shows both good speed while scanning uninfected disks and good virus detection ability while scanning virus collections. A bit later Dr. Solomon stroked back accusing McAfee of the incorrect advertising campaign. The claims were raised to the text – â€Å"The Number One Choice Worldwide. No Wonder The Doctor’s Left Town†. At the same time McAfee was in the court together with Trend Micro, another antivirus software manufacturer, concerning the Internet and e-mail data scanning technology patent violation. Symantec also turned out to be involved in the cause and accused McAfee of using the Symantec codes in the McAfee products. And etc. The year completion by one more noteworthy event related to McAfee-name was marked – McAfee Associates and Network General have declared consolidation into the new born Network Associates company and positioning of their services not only on the anti-virus protection software market, but also on the markets of computer safety universal systems, encryption and network administration. From this the virus and anti-virus history point McAfee would correspond to NAI. 998 The virus attack on MS Windows, MS Office and the network applications does not weaken. There arose new viruses employing still more complex strokes while infecting computers and advanced methods of network-to-computer penetration. Besides numerous the so-called Trojans, stealing Internet access passwords, and several kinds of the latent administration utilities came into the computer world. Several incidents with the infected CDs were revealed – Some computer media publishers distributed CIH and Marburg (the Windows viruses) through CDs attached to the covers of their issues, with infected. The year beginning: Epidemic of the â€Å"Win32. HLLP. DeTroie† virus family, not just infecting Windows32 executed files but also capable to transmit to the â€Å"owner† the information on the computer that was infected, shocked the computer world. As the viruses used specific libraries attached only to the French version of Windows, the epidemic has affected just the French speaking countries. February 1998: One more virus type infecting the Excel tables â€Å"Excel4. Paix† (aka â€Å"Formula. Paix) was detected. This type of a macro virus while rooting into the Excel tables does not employ the usual for the kind of viruses macro area but formulas that proved to be capable of the self-reproduction code accommodation. February – March 1998: â€Å"Win95. HPS† and â€Å"Win95. Marburg† – the first polymorphous Windows32-viruses were detected and furthermore they were â€Å"in-the-wild†. The anti-virus programs developers had nothing to do but rush to adjust the polymorphous viruses detecting technique, designed so far just for DOS-viruses, to the new conditions. March 1998: â€Å"AccessiV† – the first Microsoft Access virus was born. There was no any boom about that (as it was with â€Å"Word. Concept† and â€Å"Excel. Laroux† viruses) as the computer society already got used to that the MS Office applications go down thick and fast. March 1998: The â€Å"Cross† macro-virus, the first virus infecting two different MS Office applications – Access and Word, is detected. Hereupon several more viruses transferring their codes from one MS Office application to the other have emerged. May 1998 – The â€Å"RedTeam† virus infects Windows EXE-files and dispatches the infected files through Eudora e-mail. June 1998 – The â€Å"Win95. CIH† virus epidemic at the beginning was mass, then became global and then turned to a kind of computer holocaust – quantity of messages on computer networks and home personal computers infection came to the value of hundreds if not thousands pierces. The epidemic beginning was registered in Taiwan where some unknown hacker mailed the infected files to local Internet conferences. Therefrom virus has made the way to USA where through the staff oversight infected at once several popular Web servers that started to distribute infected game programs. Most likely these infected files on game servers brought about this computer holocaust that dominated the computer world all the year. According to the â€Å"popularity† ratings the virus pushed â€Å"Word. CAP† and â€Å"Excel. Laroux† to second cabin. One should also pay attention to the virus dangerous manifestation – depending on the current date the virus erased Flash BIOS what in some conditions could kill motherboard. August 1998: Nascence of the sensational â€Å"BackOrifice† (â€Å"Backdoor. BO†) – utility of latent (hacker’s) management of remote computers and networks. After â€Å"BackOrifice† some other similar programs – â€Å"NetBus†, â€Å"Phase† and other – came into being. Also in August the first virus infecting the Java executed files – â€Å"Java. StangeBrew† – was born. The virus was not any danger to the Internet users as there was no way to employ critical for the virus replication functions on any remote computer. However it revealed that even the Web servers browsers could be attacked by viruses. November 1998: â€Å"VBScript. Rabbit† – The Internet expansion of computer parasites proceeded by three viruses infecting VisualBasic scripts (VBS files), which being actively used in Web pages development. As the logical consequence of VBScript-viruses the full value HTML-virus (â€Å"HTML. Internal†) was born to life. Virus-writers obviously turned their efforts to the network applications and to the creation of full value Network Worm-Virus that could employ the MS Windows and Office options, infect remote computers and Web-servers or/and could aggressively replicate itself through e-mail. The anti-virus manufacturers world was also considerably rearranged. In May 1998 Symantec and IBM announced the union of their forces on the anti-virus market. The collective product would be under the Norton Anti-Virus trade mark distributed and the IBM Anti-Virus (IBMAV) program is liquidated. Response of the main competitors, Dr. Solomon and NAI (former McAfee), followed immediately. They issued the press-releases offering the IBM product users to promotionally replace the dead anti-virus with their own products. Less then one month later Dr. Solomon â€Å"committed suicide†. The How to cite History of Computer Virus, Papers

Tuesday, April 28, 2020

Supply Chain discussion questions free essay sample

The first stage of the supply chain is the supplier. Initially, the supplier provides the material necessary for the production of the soda can to the manufacturer, who had previously passed an order for the material. When the material is passed from the supplier to the manufacturer, money is passed from the manufacturer to the supplier. Here, there was a flow of money, information, and material. After this, the distributer passes information to the manufacturer who in turn makes the product and delivers it in return for money. Again, we have a flow of money, information, and the product. Now let’s go back to the retailer sold the soda can to the customer. In order for the retailer to get the soda can, he had to order it from the distributor. In this stage of the supply chain the product is passed from the distributor to the retailer, and money and information is passed from the retailer to the distributor. We will write a custom essay sample on Supply Chain discussion questions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A customer purchasing a can of soda at a convenience store shows the end of the supply chain, which is the fulfilling of the customer request. The flow occurring with this purchase is the can going to the customer and the money and information going to the retailer that sold the soda can to the customer. Why should a firm like Dell take into account total supply chain profitability when making decisions? The objective of any supply chain is to be able to maximize the supply chain surplus, which is the difference between what the value of the final product is to the customer and the costs the supply chain incurs in filling the customer request. Total supply chain profitability is the difference between revenue generated from the customer and the overall cost across the supply chain. A company like Dell needs to take into account total supply chain profitability when making decisions because it is the total profit to be shared across all supply chain stages, and the higher the supply chain profitability, the more successful is the supply chain. For any profit making company, the supply chain surplus means the profit they are making, and a focus on growing the supply chain surplus pushes all the supply chain members towards growing. The success of a company relies mainly on the success of its supply chain and how it will manage to generate supply chain surplus. Dell recently had to change its supply chain due to new market demands. They are making improvements to their supply chain in order to respond to their customer demands in order to achieve supply chain surplus and make enough profits to stay on top. Dell, like any other company needs to keep track of its supply chain and keep improving its performance in order to be profitable. 3. What are some strategic planning and operational decisions that must be made by an apparel retailer like The Gap? Successful supply chain management requires many decisions relating the flow of information, product, and funds. All of the decisions are made for one purpose: the maximize supply chain surplus. Depending on the frequency and time frame of the decisions, they fall under three categories: strategic, planning, and operational. Strategic: During this phase, Gap should decide how to structure the supply chain over the next several years. Some of the strategic decisions that should be made by gap would be the location of the stores and warehouses. They should also make transportations decisions such as if they should take care of it themselves or hire someone for the transportation. Also, long term marketing plans about their brand should be made. Finally, the manufacturing decisions should be made such as where the manufacturing should be done and the choice of their suppliers. Planning: The goal of planning is to maximize the supply chain surplus that can be generated over the planning horizon given the constraints established during the strategic or design phase. The time frame for planning is considered to be 3 months. In this section, Gap should plan their seasonal marketing, as well as the seasonal demands and what clothes to be put on sale for the season. Here, they can also decide on which retailers to use, and the best times for their promotions. Operation: For the operations, the time frame is weekly or even daily, which means decisions made here are regarding individual customer orders. The only goal is to handle customer orders in the best possible way, since all of the other important decisions have been made in the other phases. Gap here would have to make decisions regarding where to allocate their inventory, pass their orders and chose delivery date. They will also have to schedule staff working time and work allocation, as well as replenishment dates. Consider the supply chain involved when a customer purchases a book at a bookstore. Identify cycles in this supply chain and the location of the push/pull boundary. All supply chain processes can be broken down into cycles that fall under four categories. These four categories connect two successive stages of a certain supply chain. Customer order cycle: this occurs when the customer purchases the book from the bookstore and connects the customer with the retailer. Replenishment cycle: this occurs when the retailer needs to pass an order from the distributor in order to have more books to sale. This cycle connects the retailer with the distributor. Manufacturing cycle: this occurs when the distributor’s warehouses start getting empty and they need more books to be made and delivered to them. This cycle connects the distributor to the manufacturer. Procurement cycle: this occurs when the manufacturer needs more supplies in order to make the books. They need the supplier to provide them with the material necessary for the book fabrication. This cycle connects the manufacturer with the supplier. In the case of the bookstore supply chain, the push/pull boundary exists between the customer order cycle and the replenishment cycle. Pull process means a reaction to customer demand, while push processes respond to speculated demands. During the customer order cycle it is the pull process occurring. The bookstore executes all processes in the customer order cycle after the customer order has taken place. All processes done in the other 3 cycles are done in anticipation of demand and therefore are push processes. 5. Consider the supply chain involved when a customer orders a book from Amazon. Identify the push/pull boundary and two processes each in the push and pull phases. Amazon sells books but does not have retail stores. Their books are sold via their Internet website. Amazon has their own warehouses where they store books to be sold, and they order their books directly from the publishers. Here the boundary between the pull and push processes can be different. If the customer orders a book that Amazon has in their warehouse, the customer order cycle is the only cycle using the pull phase and the other cycles are using the push phase because orders are being made speculatively since they are not made after customer order. On the other hand, if Amazon receives a specific customer order which they can not fulfill because they do not have it in their inventory, they will have to order from the publisher or another party making this part of the pull cycle. Push phase: one of the processes in this phase would be the amount of books inventory to be kept in their warehouses and how they should be arranged. The other process would be the replenishment of their inventory from the publishers. Pull phase: one of the processes would be fulfilling customer orders and the other would be the billing and shipping of books to the customers. In what way do supply chain flows affect the success or failure of a firm like Amazon? List two supply chain decisions that have a significant impact on supply chain profitability. Supply chain flows affect greatly the failure or success of a firm like Amazon. Especially for firms like Amazon, the flow of products must be quick and effective in order to satisfy customer demand. When customers make their orders they expect the product to be delivers within a certain period of time, and it is the correct functioning of the supply chain of the firm that will allow for that to happen and for the customer’s demand to be fulfilled. Without that, the company is doomed to fail. With a good flow of information, money, and product from the publisher to the distributor to the customer, and the good coordination of all the members of the supply chain, the success of Amazon is achieved. Two supply chain decisions that would have a significant impact on supply chain profitability would be replenishment orders and sourcing decisions. .