Bad code
Article Abstract:
Computer viruses and malicious computer programs have a deleterious affect on organizations, resulting in the loss of productivity and data. Over 300 types of computer viruses that attack IBM PCs and compatible microcomputers are classified by the Univ of Hamburg Virus Test Center in Germany. The Michelangelo virus that activated on Mar 6, 1992 is a Stoned virus that affects a disk's master boot record and over-writes the hard disk. Malicious computer programs remain benign until a trigger condition occurs, such as access to a particular data file, passage of a given amount of time, or the occurrence of a specific date. Damage includes destruction of data, imitating hardware errors, allowing unauthorized system access, and complete system crash. IBM PCs and compatibles are vulnerable to viruses because they lack memory protection hardware, due to the compatibility of MS-DOS, and the easy access and reconfiguration capability of the interrupt system and Basic Input Output System (BIOS) that are stored in RAM.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1992
User Contributions:
Comment about this article or add new information about this topic:
Breaking the enemy's code
Article Abstract:
The work of Allied cryptanalysts in World War II contributed to victory and success in many battles and operations, such as the sinking of the Bismark and the defeat of Rommel. By 1943, Germany's most secret cipher had still not been broken. Called Tunny, the cipher was produced by a machine made by K. Lorenz Company of Berlin. The design center for the Allied effort to break the German cipher was the Dollis Hill Research Station in Northwest London. The machine, designed there, which broke the Tunny code, was called Colossus; and Colossus is considered by many historians to be the first computer, predating the ENIAC.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Taking Orders. Taking the internet to the people. Taking Temperatures
- Abstracts: Eca marketing trends. Norman's conquest. Collaborative engineering: a case study of Concurrent Engineering in a wider context
- Abstracts: 'That vision thing-' the key to sustainable competitive advantage. Picture-perfect vision
- Abstracts: Reworking the work space. Space-conscious couplings
- Abstracts: Better safe than sorry. Better by design. Some days are better than others