History of Malware

    • Read the above. 

    No Answer.

    • Read the above.

    No Answer, just carefully read the text to answer next questions.

    • Who re-designed the Creeper Virus?

    Answe : Ray Tomlinson

    • How is data transferred through a network?

    Answe : Packet Switching

    • Who created the first concept of a virus?

    Answe : John von Neumann

    • What text did the Creeper program print to the screen?

    Answe : I'm the creeper, catch me if you can!

    • What does ARPANET stand for?

    Answe : Advanced Research Projects Agency Network

    • Which team created the network control program?

    Answe : Network Working Group

    • What is the first virus commonly known as?

    Answe : Creeper

    • Read the above. 

     Read carefully the text.

    • Who created Reaper?

     Answer : Ray Tomlinson

    • What type of malware may Reaper be known as?

     Answer : nematode

    • What was the first ever anti-virus program known as?

     Answer : Reaper

    • What was Bob Thomas' main project to develop?

     Answer : a resource-sharing capability

    • Research: What does API stand for?

     Answer : Application Programming Interface

    • Read the information. 

    No Answer.

    • What is a modern day fork bomb also known as?

    Answer : a denial of service attack

    • Was Rabbit one of the first malicious programs? (Y/N)

    Answer : Y

    • What did the name "Wabbit" derive from?

    Answer :  looney tunes cartoons

    • Read the above. 

    No Answer.

    • When was PERVADE added to ANIMAL?

    Answer : 1975

    • Did John think this was a good idea? (Y/N)

    Answer : Y

    • What computers did the program spread across?

    Answer : UNIVACs

    • What type of malware is ANIMAL also known as?

    Answer : a trojan

    •  Who built the wooden horse?

    Answer : the Greeks

    • Read the above. 

    no Answer.

    • Which US Military regiment caught the virus?

    Answer : US NAVY

    • How many lines long is the Elk Cloner poem?

    Answer : 7

    • When was Elk Cloner written?

    Answer : 1982

    • Is a boot sector virus more or less common in modern technology?

    Answer : less

    • How long did it take Richard to write the program?

    Answer : 2 weeks

    • Which Operating System was affected?

    Answer : Apple II

    • Read the above. 

    No Answer.

    • What commands were a very big way that allowed Morris to access the computers?

    Answer : Berkeley r-commands

    • Who was one the first person prosecuted for the computer misuse act?

    Answer : Robert Tappan Morris

    • What type of attack is a "Fork Bomb"?

    Answer : Denial of services

    • When was this worm released?

    Answer : 1988

    • How many computers did it infect within 15 hours?

    Answer : 2000

    • What does rsh mean?

    Answer : remote shell

    • Under which act was Morris arrested for?

    Answer : 1986 Computer Fraud and Abuse act

    •  Read the above.

    No Answer.

    • What was the name of this virus?

    Answer : Cascade

    • What file extensions would this virus infect?

    Answer : .com

    • How many variants of there virus were possibly found?

    Answer : 40

    • What operating system would the virus run on?

    Answer : DOS

    • Which Operating System/Frame Work would Cascade try to avoid?

    Answer : IBM

    • How many bytes would be added onto your file if it got infected?

    Answer : 1704

    TASK 9 : Thanks for reading! 
    • Thanks! 

    No Answer.