Worm: The First Digital World War

By Mark Bowden

The Conficker computer virus contaminated its first computing device in November 2008 and inside a month had infiltrated 1.5 million pcs in 195 nations. Banks, telecommunications businesses, and significant executive networks (including the British Parliament and the French and German army) have been contaminated. nobody had ever obvious something love it. by way of January 2009 the malicious program lay hidden in at the very least 8 million desktops and the botnet of associated desktops that it had created used to be large enough that an assault could crash the world.

Surprisingly, the U.S. executive used to be purely vaguely conscious of the chance that Conficker posed, and the duty of mounting resistance fell to disparate yet talented staff of geeks, web marketers, and desktop programmers. They shaped what got here to be known as the Conficker Cabal, and started a tireless struggle opposed to the bug. but if Conficker’s controllers grew to become conscious that their construction used to be commencing to stumble upon resistance, they started refining the worm’s code to make it tougher to track and extra strong trying out the Cabal’s harmony and get to the bottom of. Will the Cabal lock down the computer virus prior to it really is too overdue? video game on.

Worm experiences at the attention-grabbing conflict among these decided to use the net and people dedicated to guard it.

Show description

Preview of Worm: The First Digital World War PDF

Best Technology books

Effective Ruby: 48 Specific Ways to Write Better Ruby (Effective Software Development Series)

If you’re an skilled Ruby programmer, powerful Ruby may help you harness Ruby’s complete strength to jot down extra powerful, effective, maintainable, and well-performing code. Drawing on approximately a decade of Ruby adventure, Peter J. Jones brings jointly forty eight Ruby most sensible practices, professional information, and shortcuts—all supported through real looking code examples.

The Singularity Is Near: When Humans Transcend Biology

For over 3 many years, Ray Kurzweil has been essentially the most revered and provocative advocates of the position of know-how in our destiny. In his vintage The Age of religious Machines, he argued that pcs may quickly rival the total diversity of human intelligence at its top. Now he examines your next step during this inexorable evolutionary approach: the union of human and computing device, within which the information and abilities embedded in our brains may be mixed with the tremendously larger means, velocity, and knowledge-sharing skill of our creations.

Return From the Stars

Hal Bregg is an astronaut who returns from an area challenge during which in basic terms 10 organic years have handed for him, whereas 127 years have elapsed on the earth. He unearths that the Earth has replaced past acceptance, packed with people who've been medically neutralized. How does an astronaut subscribe to a civilization that shuns chance?

The Shock of the Old: Technology and Global History since 1900

From the books of H. G. Wells to the click releases of NASA, we're awash in clichéd claims approximately excessive technology's skill to alter the process historical past. Now, within the surprise of the previous, David Edgerton deals a startling new and clean frame of mind concerning the historical past of expertise, greatly revising our principles in regards to the interplay of expertise and society long ago and within the current.

Additional resources for Worm: The First Digital World War

Show sample text content

Biz, the 1st malware touch made via the malicious program whilst it initiated. bankruptcy four: An Ocean of Suckers Having mutant powers . . . others, “The X-Men Chronicles,” March 1995; the assumption . . . it’s a neat little bit of paintings, The Shockwave Rider, John Brunner, Harper & Row, 1975, web page 222; connection with destiny surprise as a resource is at the Acknowledgments web page of Shockwave Rider; The Cuckoo’s Egg, through Cliff Stoll, Pocket Books, 2005; the assumption was once referred to as . . . surviving nodes, the place the Wizards stay awake past due, pages 54–66; My account of the evolution of Conficker comes essentially from interviews with Stewart, DiMino, and Porras, with specifics of the person viruses and worms from Wikipedia entries for every. Wikipedia, whereas an unreliable resource for plenty of issues, is, possibly unsurprisingly, a accomplished and trustworthy resource for info approximately pcs, laptop background, and malware; the next move . . . such an intrusion, “Access for Sale,” Schecter and Smith, 2003. bankruptcy five: The X-Men He and others . . . for being talented, “The X-Men Chronicles,” surprise Comics, March 1995; by means of mid-December . . . on the web, an infection numbers have been being tracked basically by way of Shadowserver and through Wesson at this aspect. The quantity displays calls to command and keep watch over destinations from assorted IP addresses, as they arrived on the a variety of sinkholes. Efforts have been made to prevent counting greater than as soon as a working laptop or computer sending a number of messages; past this staff . . . down the road, Hruska’s article are available at arstechnica. com/security/news/2008/12/time-for-forced-updates-confickerbotnet-makes-us-wonder. ars; in relation to . . . attempt opposed to Conficker, Vixie. A video of his Defcon thirteen speech are available at http://www. youtube. com/watch? v=wP5TQlaWiuE; “Private region . . . paralyze the United States,” p. one hundred sixty five. the total document are available at http://www. uscc. gov/annual_report/2008/annual_report_full_08. pdf; The advert hoc workforce . . . over their heads, Joffe, Porras, Wesson, DiMino, Ludwig, et al. ; we're the final line . . . if now not now . . . whilst? Conficker documents 2/9/09; colours of Samuel Richardson, “Whenever I’m extra . . . the suspense,” CArchives. 3/2/09; “I believe like . . . excessive school,” WArchives 2/20/09; by means of the tip of . . . melting completely,” Campana. bankruptcy 6: electronic Detectives this would possibly not be . . . struggle for it, “The extraordinary X-Men, Age of Apocalypse,” April 1995; on the October . . . demanding to think, Campana, DiMino; Brian Krebs . . . even reply, DiMino. Krebs’s article, “Bringing Botnets Out of the Shadows,” March 21, 2006, are available at http://www. washingtonpost. com/wp-dyn/content/article/2006/03/21/AR2006032100279. html; Gratitude all started . . . start to cease it? DiMino; nobody was once deeper . . . command middle, Porras, Twomey, DiMino; discovering that . . . executive organisations, Porras, Saidi; Phil wanted . . . again of his hand, Wesson; the net, in contrast to roads . . . to that area; Wesson, Joffe, DiMino; At a time . . . web protection, Wesson; So while Phil . . . for the advice, Porras, first quote from PArchives 12/15/08, trade with U. S. CERT, PArchives 12/15/08; environment apart .

Download PDF sample

Rated 4.51 of 5 – based on 30 votes