53 lines
3.0 KiB
Prolog
53 lines
3.0 KiB
Prolog
Killer DOS Stalks Software -- by John C. Dvorak
|
||
|
||
From the May 7, 1984 Infoworld
|
||
|
||
|
||
When I was in Arlington Heights, Illinois, recently, I heard a story that at
|
||
first I thought was pretty funny, then I realized that this funny story will
|
||
result in not-so-funny tragedies and maybe some genuine horrors.
|
||
|
||
The story was about how some devilish young programming genius created a
|
||
version of Apple DOS called KILLER DOS. It is reminiscent of a kind of program
|
||
called a worm. Worm code is specialized programming usually found on mainframe
|
||
computers. It is designed to act independently of the operating system and
|
||
somehow worm its way through the system and pop up here and there on various
|
||
terminals with snide messages.
|
||
|
||
If well written, it is impossible to trace and sometimes impossible to get
|
||
rid of. Just as a herpes virus attaches itself to a nerve cell and lies
|
||
dormant for awhile, so too will worm code hide in a backed-up file, ready to
|
||
sneak back into the operating system at any time. Killer DOS works like a
|
||
worm. The contaminated DOS is booted on an unsuspecting computer, then it
|
||
copies itself into RAM and any other DOS found on any other disk.
|
||
|
||
In the case of KILLER DOS, the program waits for a fixed number of disk
|
||
accesses and then (after maybe a whole day's work passes) goes to work. First,
|
||
it locks up the keyboard; second, it erases all disks in the systems; and
|
||
finally, puts a message on the screen: KILLER DOS STRIKES AGAIN!
|
||
|
||
At first glance, this may seem like an innocuous prank. But what happens if
|
||
the disks contain important medical information on someone? Or worse, what if
|
||
the machine is monitoring medical instruments keeping someone alive? While I
|
||
may seem melodramatic about this, lets face it, this is simply a new high tech
|
||
version of juvenile delinquency, and its going to get worse before it gets
|
||
better. I've always suspected that the high tech punks I know urge the
|
||
implementation of the Unix operating system for the simple reason that it is
|
||
easier to sabotage than a more simple, compact operating system.
|
||
|
||
The first worm program was done on the Department of Defense ARPAnet system
|
||
in the late 60's. At the time, the program was called a CREEPER.
|
||
Counter-measures were taken by systems programmers to rid the network of the
|
||
creeper program. The antidote was called a REAPER. The term worm was first
|
||
intoduced in a John Brunner book, Shockwave Rider. It is a story about a
|
||
futuristic fascist society run by a computer network. The hero created a worm
|
||
program to destroy the social structure and bring back democracy.
|
||
|
||
The most notorious real-life worm program was injected into the UCLA system.
|
||
It was called Pinball. It hung around the operating system for months and then
|
||
would pop up with a message on the system console that said, "Let's play
|
||
pinball!". The screen would go crazy as the program took over the computer and
|
||
moved the heads on the hard disks back and forth as fast as they'd go -- all
|
||
the while erasing files.
|
||
|
||
|