Tag Archives: across

The History of Computer Viruses

Computer viruses have a much longer history that most people would imagine. They predate the modern internet although the first viruses were purely technical excises in computer programing. It is not until the advent of large scale internet use that malicious computer viruses started to appear.

The basic theory that underpins most types of PC virus was outlined in John von Nueman’s scienfic paper published back in 1966. The work titled “The Theory of Self-Reproducing Automata”. Known as the last of great mathematicians von Nueman had also worked on the US nuclear program and instrumental in developing game theory.

This theory was not used until 1971 when the first ever virus was released across the ARPANET network. The virus called Creeper spread across the network and infected DEC PDP-10 computers. When a computer was infected it displayed a message reading “I’m the creeper catch me if you can.” The program was an experiment and the Reaper virus was released to clean up and remove the Creeper.

The first anonymous virus was the Wabbit released in 1974 a self-replicating program that lead to a computer crash. This was followed by ANIMAL in 1975. This virus was attached to a program called PERVADE and it reproduced itself in the background and spread across computers as the program was shared. Although ANIMAL was a non-malicious virus it exploited holes in the OS of the computer and left the name of the Animal selected by PERVADE in all the directories and files that the user had access too.

The Elk Cloner written by 15 year school student Rich Skrenta exploited issue with the Apple II boot system. The virus is widely viewed as the first large scale computer virus in the wild. In the wild referrers the fact that it was not contained with one lab or network.

The virus spread via the boot disk of the computer and every after every 50 infections of the boot disk it displayed a message in the form of a short poem. Skrenta who went onto a successful career in computer programming described Elk Cloner as dumb practical joke.

After the Elk Cloner infected Apple machine virus that infected IBM computers followed. The ARF-ARF virus arrived in 1983 and the Trojan horse wiped out the computers directory by offering to sort it into alphabetical order. Although the Pakistani Flu virus appeared in 1986 it was the following year that saw a rapid increase in the number of computer infections.

In 1987 the Vienna, Lehigh, Jerusalem, SCA and Christmas Tree Exec viruses all first appeared and attacked different aspects of computer operating systems. Other virus occurred in different locations around the globe. These included the Stoned virus in New Zealand, Ping Pong in Italy and the Cascade virus in the IBM offices in Belgium. This explosion in computer attacks resulted in IBM developing it’s own anti-virus software for the public. Before 1987 IBM’s anti-virus software had been for internal use only.

These early computer infections were only the start of the problems created by PC virus. The rate and seriousness of the infections after the end of the 1980’s has resulted in the creation of the computer security industry.

Tony Heywood ©2012

The History of Computer Viruses

Computer viruses have a much longer history that most people would imagine. They predate the modern internet although the first viruses were purely technical excises in computer programing. It is not until the advent of large scale internet use that malicious computer viruses started to appear.

The basic theory that underpins most types of PC virus was outlined in John von Nueman’s scienfic paper published back in 1966. The work titled “The Theory of Self-Reproducing Automata”. Known as the last of great mathematicians von Nueman had also worked on the US nuclear program and instrumental in developing game theory.

This theory was not used until 1971 when the first ever virus was released across the ARPANET network. The virus called Creeper spread across the network and infected DEC PDP-10 computers. When a computer was infected it displayed a message reading “I’m the creeper catch me if you can.” The program was an experiment and the Reaper virus was released to clean up and remove the Creeper.

The first anonymous virus was the Wabbit released in 1974 a self-replicating program that lead to a computer crash. This was followed by ANIMAL in 1975. This virus was attached to a program called PERVADE and it reproduced itself in the background and spread across computers as the program was shared. Although ANIMAL was a non-malicious virus it exploited holes in the OS of the computer and left the name of the Animal selected by PERVADE in all the directories and files that the user had access too.

The Elk Cloner written by 15 year school student Rich Skrenta exploited issue with the Apple II boot system. The virus is widely viewed as the first large scale computer virus in the wild. In the wild referrers the fact that it was not contained with one lab or network.

The virus spread via the boot disk of the computer and every after every 50 infections of the boot disk it displayed a message in the form of a short poem. Skrenta who went onto a successful career in computer programming described Elk Cloner as dumb practical joke.

After the Elk Cloner infected Apple machine virus that infected IBM computers followed. The ARF-ARF virus arrived in 1983 and the Trojan horse wiped out the computers directory by offering to sort it into alphabetical order. Although the Pakistani Flu virus appeared in 1986 it was the following year that saw a rapid increase in the number of computer infections.

In 1987 the Vienna, Lehigh, Jerusalem, SCA and Christmas Tree Exec viruses all first appeared and attacked different aspects of computer operating systems. Other virus occurred in different locations around the globe. These included the Stoned virus in New Zealand, Ping Pong in Italy and the Cascade virus in the IBM offices in Belgium. This explosion in computer attacks resulted in IBM developing it’s own anti-virus software for the public. Before 1987 IBM’s anti-virus software had been for internal use only.

These early computer infections were only the start of the problems created by PC virus. The rate and seriousness of the infections after the end of the 1980’s has resulted in the creation of the computer security industry.

Tony Heywood ©2012

Global Mobile Accessories to Reach Billions in 2025

Mobile Phone Accessories complement the performance and enhance the features of our mobile phones. While we are going deeper into modernity, we slowly embrace these devices as necessity just as we have already accepted that mobile phones are one of the basic requirements for survival. These devices include headsets, chargers, earphones, protective covers and screen guards. Truly, mobile phone accessories represent the changing lifestyle as we are fully into technological advancements, innovations and development.

As we continue to evolve, technology evolves with us. The Peterson Group, wholesaler of mobile phone accessories and laptop peripherals based in Taiwan states that mobile market is also a dynamic advertise as it frequently launches of new features and devices.

The growing scope of mobile accessories has also gained headlines of thousands of researches, reviews and studies. Analysis of its development and sudden growth to present consumption to future impact has already been conducted.

One study stood out. Entitled “Mobile Phone Accessories Market: Global Industry Analysis and Opportunity Assessment, 2015 – 2025”, this research conducted by Future Market Insights (FMI) states that global mobile accessories market is anticipated to expand in CAGR of 6.9% every year. In the next 10 years, it will probably be reaching billions of dollars, surpassing the CAGR rate of 4.2% of the construction industry. This reference does not even include the millions of substandard and fraud mobile accessories which are currently extensive in the market.

On the basis of type, the market has been segmented into protective case, headphone/earphone, charger, memory card, battery, power bank, portable speaker and others. The protective case segment accounted for 20.5% share in the global mobile phone accessories market in 2014, and is expected to expand at a CAGR of 5.9% over the forecast period. The power bank segment is expected to expand at a robust CAGR of 9.0% over the forecast period.

The growing market is caused by increasing urbanization, inclining population and affordable cost of most generalized accessories in the market. Rising adaptation to mobile phone accessories are widespread in developing regions such as Latin America and the Asia Pacific. Adoption of smartphones across countries such as China, Indonesia and Brazil is growing at a rapid pace, linked to inclining Internet penetration and rising social networking in these countries. Increasing trend of mobile shopping and e-banking is strengthening demand for smartphones across these countries’ capital Jakarta and Beijing and across the globe. This, in turn, is supporting growth of the mobile accessories market.