The Virus that F***ed us all | Nostalgia Nerd

The Virus that F***ed us all | Nostalgia Nerd

Show Video

way back in 1949 mathematician postulated the idea of computer viruses in fact he went one step further than that and actually came up with a design for a self-replicating computer program which was published in the book theory of self-reproducing automata to that end he is widely considered to be the father of computer biology the problem was in 1949 computer systems were in their very early infancy and neither he nor anyone else could really put this theory into practice indeed it would take another two decades before anyone decided to do it and just screw technology over for the sake of it [Music] although the details are hazy it's claimed one of the first instances of malicious software was at the university of washington computer center in 1969 at the time the center housed a burroughs 5500 produced by the detroit-based burroughs large system group a mammoth 48-bit mainframe that was state-of-the-art and actually ran off disk storage this system was used for a variety of research and experimentation but it was a program called rabbits which stepped outside the normal productive realms and instead caused a problem rabbit burrows yeah i get it we don't know exactly who or why this program was being run but upon each execution rabbits would create two or more instances of itself quickly consuming all the resources of the 5500 and eventually crashing the system although it remained on one system and therefore couldn't be classified as a worm nor a virus given it didn't infect other files or areas this was actually the first instance of a fork bomb really a localized example of what a computer worm could do on a mass scale of course since then computers have changed into a state of almost perpetual connection so it's lucky we have tools like sponsor surf shark around to protect us from the issues that causes surf shark is a vpn a virtual private network and it keeps you safe by securing and keeping all your online activities encrypted imagine a reinforced impenetrable tunnel between your computer and a non-logging server in any of these locations that's what surfshark creates and then conducts your internet activity from the remote server that means that anyone who tries to snoop on you can't anyone that tries to intercept an email through wi-fi cannot it also means that services like netflix or even hotel and travel sites think you're logging on from the country your selected server is in allowing you to access region exclusive content and prices plus you get a lot more security to boot surf shark subscription allows unlimited devices and you can get 83 off and three months extra free using promo code nostalgia nerd at the link below this is core war it's a programming game created in 1984 where two programs battle us out for complete control of a virtual computer each program is written in a type of assembly language called red code you let the code run and see what plays out it's interesting that core war then is actually based on a pair of computer programs created over a decade prior creeper and reaper this really is the battle between a computer worm and an antivirus playing out in front of us and there's only one winner game wise it's actually quite intense with well-known strategies established these strategies such as vampire or imp are based on programming techniques created by the likes of xerox but without creeper and reaper these methods wouldn't exist in fact without creeper and reaper our computing landscape would look very different indeed recently i went to the science museum in london an incredible destination that i recommend everyone should visit it's hard to know where to begin with the sheer amount of technology they have on show but i was mainly drawn by this packets of bits cross the atlantic display here we have a giant hulking machine that in the early 70s sent digital information to another in california this was the first transatlantic link and it ran across the arpanet computer network that's impressive enough alone but nestled next to it is the operator console for a digital equipment pdp-10 now obviously this isn't the entire machine that needed an entire room but this little interface from the university of hertfordshire was manufactured between 1966 and 1970 and had the capability to also connect up to the arpanet [Music] arpanet may be a name resigned to the history books but its significance is immense created in 1969 by the u.s department of defense the arpanet project was the first wide area packet switch network with distributed control over in the uk we had the npl which although faster was less grand in scale arpanet consisted of around 20 sites utilized coast to coast telephone lines running at 64 kilobits per second and even had satellite links to hawaii and london funded by the british post office although the london connection could only muster 9.6 kilobits per second it also utilized the tcpip protocol very foundation of our modern internet but at its core was the potential ability to share data and access remote computers after all this was an era when computing power was heavy and cumbersome as we've seen so if that couldn't come to you physically it would have to virtually [Music] one of the programmers working on this remote functionality was bob thomas at bbn technologies bbn stood for bolt baroneck and newman and still exists today as a raytheon bbn but in the 70s were at the forefront of developing packet switching networks for arpanet they were actually responsible for providing the interface message processor which allowed differing machines and operating systems to interface on the network so in 1971 bob found himself tasked with engineering a resource sharing capability allowing users to develop applications which could move to and execute on a different computer the motive behind this was simple if a computer in one part of the world was overloaded by daytime users a task could be sent to a computer on the other side of the world or country at night and execute with much greater speed it also meant that a program could be developed on one machine and then ported to another much more efficient than moving vast amounts of unprocessed data from machine to machine the resource sharing program that bob thomas created was written in pdp 10 assembly language and designed to run on 10x machines it was given the functional name of rs exec resource sharing executive however rs exec was far from a full-blown utility if anything it was a lightweight application with one tenet in mind proof proof that what was impossible before was now possible [Music] the coined name for this pioneering worm was creeper because it crept around the network there was nothing malicious behind creeper the program exposed what we would call an application programming interface which allowed a secondary program to package itself and ship to another computer to unpack and then run out of a box it did this with a database maintenance program which ran a few tasks on each machine it didn't even replicate itself like a traditional virus it didn't subvert an existing mechanism it simply moved or crept if you will of its own accord and when it did so it left no trace it had been there other than this simple on-screen or printed out message but it did what it needed to it proved a theory and in doing so laid out a path for others to follow [Music] the first of those was ray tomlinson a colleague of bob's also working at bbn technologies and programming for the 10x operating system he had begun receiving calls from various 10x sites asking what this creeper thing appearing on their system was and how to get rid of it that got rey's attention and he immediately got to work by 1972 rey had brought two r's to the table replication and reaper in a 2014 interview ray stated i don't recall specifically why replication seemed interesting i think i envisioned applications where one thing leads to another for example an application analyzes data that indicate the existence of additional data located elsewhere so it splits off an alter ego to go process that data while the existing instance continues the analysis of the data in hand in such a case the application's instances would naturally terminate as they concluded their analysis so capture was not necessary as long as there were no malfunctions rey had altered creeper's code so but rather than removing itself from each machine as it went it simply copied itself it left itself on the originating machine and on the new machine it now replicated itself like a virus or a worm software has bugs for example the application might fail to realize it had already visited a data set and run forever repeatedly replicating and jumping from site to site ray's reasoning seemed to focus on creating a scenario where software had failed to terminate after completing its function a world of creepers might sound fun but already ray understood where this could lead this possibility led to reaper which went looking for instances of creeper to terminate them in creating the reaper program to search for and wipe out any instances of creeper left running rey had inadvertently created not only the world's first virus but also the world's first anti-virus thankfully nothing really could have got out of hand at this stage no more than 28 machines could have been visited by creeper since that is the number of arpanet sites running the 10x operating system at the time in reality creeper wouldn't be described as a virus even if it was malevolent it didn't slip onto a system as a hidden package or tucked away in a boot sector it was a worm duplicating from machine to machine of its own volition a computer worm is a standalone malware computer program that replicates itself in order to spread to other computers but of course creeper couldn't be called a worm because the term worm didn't exist it wouldn't exist for another 10 years in the wild but it was actually coined in 1975 by science fiction writer john brunner in the shockwave rider then the answer dawned on him and he almost laughed fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm probably headed by a denunciation group borrowed from a major corporation which would shunt itself from one nexus to another every time his credit code was punched into a keyboard it could take days to kill a worm like that and sometimes weeks here then is a world where people can use worms to their malicious advantage to send them scurrying through computer systems taking money destroying credit or doing anything else they were designed to do a somewhat eerie prediction that although already set in controlled motion by bob thomas just like robert oppenheimer during the manhattan project would soon become wild [Music] using the term loosely it's somewhat ironic that during development xerox's 820 personal computer was codenamed the worm as a symbolic reference to apple the xerox being the computer that would eat apple just like an actual worm because xerox also liberated the term worm straight from bruner for a suite of software they rolled out in the summer of 1981 these programs could span individual machine boundaries and replicate themselves on idle machines in exactly the same way that creeper had done 10 years prior in an infoworld interview xerox were quoted as saying this idea is very powerful what you really want to do is run a program that taps the excess computing power of 35 or 50 or 100 computers and lets you know when the answer is ready and does it all automatically xerox actually tested five different types of worms in this period the simplest of which had one job to stay alive xerox developers john shkok and john hupp programmed it to appear on different machines displaying the message i'm a worm kill me if you can they then tossed what they called an antibody packet to find and remove this worm almost identical to what bob and ray had created some 10 years prior with creeper and reaper but it's at xerox where the controlled worm quickly got out of hand and the first taste of what a malicious computer hopping worm could do hit home one of the worms the johns were experimenting with was called a vampire worm which is perhaps as sinister as it sounds this worm was designed to hide itself until human operators had left for the night before activating once activated the vampire would pass out large calculations to computers across the network before vanishing once more before sunrise that could be pretty handy however one of these vampires had become defective and went on a killing spree as it flew from machine to machine it destroyed essential operating system data leaving each workstation completely inoperable so as for john's arrived on monday morning to continue their work they faced an unknown situation they knew damage had been caused but they didn't know the extent they even suspected that the worm might have jumped through a network gateway to crash other xerox machines in remote locations around the country thankfully this wasn't the case but the vampire did cause a lot of damage rendering a hundred machines unusable throughout the building thankfully the johns were able to use their antibody packet to track down any remaining segments of the worm and neutralize it but this is perhaps the very first instance of a computer worm getting loose and causing actual damage it may not have been intentional but it shows how easily damage can be caused with problematic programming by 1983 other computer worms existed and with these the problematic programming was intentional one such burrowing beast injected into the ucla system was called pinball it would sit on an infected machine for months before out of the blue throwing up the message let's play pinball before causing absolute on-screen havoc while simultaneously moving the hard disk heads back and forth like pinball flippers erasing files as they went curiously there isn't much information about pinball other than the odd magazine segment like this infoworld article by john c dvorak more commonly known is the morris worm created by robert tappan morris and is often accredited as being the first worm to spread extensively in the wild written in wrecks on the vmcms operating system this self-replicating computer hopper first emerged from mit albeit as a decoy exploiting buffer overrun vulnerabilities on decks vacs and sun machines it's also the first worm to make use of widely connected machines on the early internet back in november 1988. an interesting quirk is that the worm will copy itself 14 of the time regardless of having already infected a machine thereby potentially mimicking the effect of the rabbit fork bomb almost 20 years prior along with boot sector infections such as elk cloner written on the apple ii in 1982 by 15 year old richard skrenter this was the start of computer infections as we know it and like it or love it we're now stuck with it particularly us windows users but it's really creeper reaper and the vampire which led the way in malicious worm software without these tentative sometimes problematic steps the world of computer virology and maybe even the world of gaming may have been very different to what we have now it's unlikely that worms such as morris and pinball would have existed nor of a slew of viruses which surged through the 80s like a leaking nappy the bbn guys really paved the new way for programs to move across a network you could be sitting there watching a video in blissful ignorance whilst a malicious piece of code is literally picking your operating system apart and so really we should thank bob thomas ray tomlinson and the xerox guys the cop unfortunately unlike examples such as the morris worm the creeper source code is missing in action but remember this technology wasn't just used for malicious purposes as an example the methods used with creeper were used in the mcross air traffic simulator to allow parts of the simulation to move across the network ultimately allowing control of a flight to move from one computer to another also ray tomlinson invented the core functionality of email for hex sake the at symbol the subject fields all this stuff we take for granted that was him back on the arpanet thank god the email was never used for sending viruses then raymond but these pioneers we owe a hell of a lot to because without them well we wouldn't have the tech that surrounds us and we take for granted today until next time i've been nostalgia nerd toodaloo [Music] raymond

2022-08-27 00:58

Show Video

Other news