Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The History of Computing - The History of Computer Viruses

The History of Computer Viruses

07/26/19 • 17 min

The History of Computing

Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we’re able to be prepared for the innovations of the future! Todays episode is not about Fear, Uncertainty, and Death. Instead it’s about viruses. As with many innovations in technology, early technology had security vulnerabilities. In fact, we still have them!

Today there are a lot of types of malware. And most gets to devices over the Internet. But we had viruses long before the Internet; in fact we’ve had them about as long as we’ve had computers. The concept of the virus came from a paper published by a Hungarian Scientist in 1949 called “Theory of Self-reproducing automata.” The first virus though, didn’t come until 1971 with Creeper. It copied between DEC PDP-10s running TENEX over the ARPANET, the predecessor to the Internet. It didn’t hurt anything; it just output a simple little message to the teletype that read “I’m the creeper: catch me if you can.” The original was written by Bob Thomas but it was made self-replicating by Ray Tomlinson thus basically making him the father of the worm. He also happened to make the first email program. You know that @ symbol in an email address? He put it there. Luckily he didn’t make that self replicating as well.

The first antivirus software was written to, um, to catch Creeper. Also written by Ray Tomlinson in 1972 when his little haxie had gotten a bit out of control. This makes him the father of the worm, creator of the anti-virus industry, and the creator of phishing, I mean, um email. My kinda’ guy.

The first virus to rear its head in the wild came in 1981 when a 15 year old Mt Lebanon high school kid named Rich Skrenta wrote Elk Cloner. Rich went on to work at Sun, AOL, create Newhoo (now called the Open Directory Project) and found Blekko, which became part of IBM Watson in 2015 (probably because of the syntax used in searching and indexes). But back to 1982. Because Blade Runner, E.T., and Tron were born that year. As was Elk Cloner, which that snotty little kid Rich wrote to mess with gamers. The virus would attach itself to a game running on version 3.3 of the Apple DOS operating system (the very idea of DOS on an Apple today is kinda’ funny) and then activate on the 50th play of the game, displaying a poem about the virus on the screen. Let’s look at the Whitman-esque prose:

Elk Cloner: The program with a personality

It will get on all your disks

It will infiltrate your chips

Yes, it's Cloner!

It will stick to you like glue

It will modify RAM too

Send in the Cloner!

This wasn’t just a virus. It was a boot sector virus! I guess Apple’s MASTER CREATE would then be the first anti-virus software. Maybe Rich sent one to Kurt Angle, Orin Hatch, Daya, or Mark Cuban. All from Mt Lebanon. Early viruses were mostly targeted at games and bulletin board services. Fred Cohen coined the term Computer Virus the next year, in 1983.

The first PC virus came also to DOS, but this time to MS-DOS in 1986. Ashar, later called Brain, was the brainchild of Basit and Amjad Farooq Alvi, who supposedly were only trying to protect their own medical software from piracy. Back then people didn’t pay for a lot of the software they used. As organizations have gotten bigger and software has gotten cheaper the pirate mentality seems to have subsided a bit. For nearly a decade there was a slow roll of viruses here and there, mainly spread by being promiscuous with how floppy disks were shared. A lot of the viruses were boot sector viruses and a lot of them weren’t terribly harmful. After all, if they erased the computer they couldn’t spread very far. The virus started “Welcome to the Dungeon.” The following year, the poor Alvi brothers realized if they’d of said Welcome to the Jungle they’d be rich, but Axl Rose beat them to it. The brothers still run a company called Brain Telecommunication Limited in Pakistan. We’ll talk about zombies later. There’s an obvious connection here.

Brain was able to spread because people started sharing software over bulletin board systems. This was when trojan horses, or malware masked as a juicy piece of software, or embedded into other software started to become prolific. The Rootkits, or toolkits that an attacker could use to orchestrate various events on the targeted computer, began to get a bit more sophisticated, doing things like phoning home for further instructions. By the late 80s and early 90s, more and more valuable data was being stored on computers and so lax security created an easy way to get access to that data. Viruses started to go from just being pranks by kids to being something more.

A few people saw the writing on the wall. Bernd Fix wrote a tool to remove a virus in 1987. Andreas Luning and Kai Figge released The Ultimate Virus Killer, an Antivirus for the Atari ST. NOD antivirus was re...

plus icon
bookmark

Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we’re able to be prepared for the innovations of the future! Todays episode is not about Fear, Uncertainty, and Death. Instead it’s about viruses. As with many innovations in technology, early technology had security vulnerabilities. In fact, we still have them!

Today there are a lot of types of malware. And most gets to devices over the Internet. But we had viruses long before the Internet; in fact we’ve had them about as long as we’ve had computers. The concept of the virus came from a paper published by a Hungarian Scientist in 1949 called “Theory of Self-reproducing automata.” The first virus though, didn’t come until 1971 with Creeper. It copied between DEC PDP-10s running TENEX over the ARPANET, the predecessor to the Internet. It didn’t hurt anything; it just output a simple little message to the teletype that read “I’m the creeper: catch me if you can.” The original was written by Bob Thomas but it was made self-replicating by Ray Tomlinson thus basically making him the father of the worm. He also happened to make the first email program. You know that @ symbol in an email address? He put it there. Luckily he didn’t make that self replicating as well.

The first antivirus software was written to, um, to catch Creeper. Also written by Ray Tomlinson in 1972 when his little haxie had gotten a bit out of control. This makes him the father of the worm, creator of the anti-virus industry, and the creator of phishing, I mean, um email. My kinda’ guy.

The first virus to rear its head in the wild came in 1981 when a 15 year old Mt Lebanon high school kid named Rich Skrenta wrote Elk Cloner. Rich went on to work at Sun, AOL, create Newhoo (now called the Open Directory Project) and found Blekko, which became part of IBM Watson in 2015 (probably because of the syntax used in searching and indexes). But back to 1982. Because Blade Runner, E.T., and Tron were born that year. As was Elk Cloner, which that snotty little kid Rich wrote to mess with gamers. The virus would attach itself to a game running on version 3.3 of the Apple DOS operating system (the very idea of DOS on an Apple today is kinda’ funny) and then activate on the 50th play of the game, displaying a poem about the virus on the screen. Let’s look at the Whitman-esque prose:

Elk Cloner: The program with a personality

It will get on all your disks

It will infiltrate your chips

Yes, it's Cloner!

It will stick to you like glue

It will modify RAM too

Send in the Cloner!

This wasn’t just a virus. It was a boot sector virus! I guess Apple’s MASTER CREATE would then be the first anti-virus software. Maybe Rich sent one to Kurt Angle, Orin Hatch, Daya, or Mark Cuban. All from Mt Lebanon. Early viruses were mostly targeted at games and bulletin board services. Fred Cohen coined the term Computer Virus the next year, in 1983.

The first PC virus came also to DOS, but this time to MS-DOS in 1986. Ashar, later called Brain, was the brainchild of Basit and Amjad Farooq Alvi, who supposedly were only trying to protect their own medical software from piracy. Back then people didn’t pay for a lot of the software they used. As organizations have gotten bigger and software has gotten cheaper the pirate mentality seems to have subsided a bit. For nearly a decade there was a slow roll of viruses here and there, mainly spread by being promiscuous with how floppy disks were shared. A lot of the viruses were boot sector viruses and a lot of them weren’t terribly harmful. After all, if they erased the computer they couldn’t spread very far. The virus started “Welcome to the Dungeon.” The following year, the poor Alvi brothers realized if they’d of said Welcome to the Jungle they’d be rich, but Axl Rose beat them to it. The brothers still run a company called Brain Telecommunication Limited in Pakistan. We’ll talk about zombies later. There’s an obvious connection here.

Brain was able to spread because people started sharing software over bulletin board systems. This was when trojan horses, or malware masked as a juicy piece of software, or embedded into other software started to become prolific. The Rootkits, or toolkits that an attacker could use to orchestrate various events on the targeted computer, began to get a bit more sophisticated, doing things like phoning home for further instructions. By the late 80s and early 90s, more and more valuable data was being stored on computers and so lax security created an easy way to get access to that data. Viruses started to go from just being pranks by kids to being something more.

A few people saw the writing on the wall. Bernd Fix wrote a tool to remove a virus in 1987. Andreas Luning and Kai Figge released The Ultimate Virus Killer, an Antivirus for the Atari ST. NOD antivirus was re...

Previous Episode

undefined - The History Of Apple's Mobile Device Management

The History Of Apple's Mobile Device Management

Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we’re better prepared for the innovations of the future! Today we’re going to talk about Apple’s Mobile Device Management; what we now call Mobility. To kick things off we’ll take you back to the year 2001. 2001 was the year Nickelback released How You Remind Me. Destiny’s Child was still together. Dave Matthews released The Space Between, and the first real Mobile Device Management was born.

The first real mobile management solution to gain traction was SOTI, which launched in 2001 with an eye towards leveraging automation using mobile devices and got into device management when those options started to emerge. More and more IT departments wanted “Over The Air” management, or OTA management. So Airwatch, founded by John Marshall in 2003 as Wandering Wi-Fi, was the first truly multi-platform device management solution.

This time, rather than try to work within the confines of corporate dogma surrounding how the business of IT was done, Apple would start to go their own way. This was made possible by the increasing dominance of the iPhone accessing Exchange servers and the fact that suddenly employees were showing up with these things and using them at work. Suddenly, companies needed to manage the OS that ships on iPhone, iOS.

The original iPhone was released in 2007 and iOS management initially occurred manually through iTunes. You could drag an app onto a device and the app would be sent to the phone over the USB cable, and some settings were exposed to iTunes. Back then you had to register an iOS device with Apple by plugging it into iTunes in order to use it. You could also backup and restore a device using iTunes, which came with some specific challenges, such as the account you used to buy an app would follow the “image” to the new device. Additionally, if the backup was encrypted or not determined what was stored in the backup and some information might have to be re-entered.

This led to profiles. Profiles were created using a tool called the iPhone Configuration Utility, released in 2008. A Profile is a small xml file that applies a given configuration onto an iOS device. This was necessary because developers wanted to control what could be done on iOS devices. One of those configurations was the ability to install an app over the air that was hosted on an organization’s own web server, provided the .ipa mime type on the web server was defined. This basically mirrored what the App Store was doing and paved the way for internal app stores and profiles that were hosted on servers, both of which could be installed using in-house app stores. During that same time-frame, Jamf, Afaria (by SAP), and MobileIron, founded by Ajay Mishra and Suresh Batchu, in the previous year, were also building similar OTA profile delivery techniques leveraging the original MDM spec.

At this point, most OTA management tasks (such as issuing a remote wipe or disabling basic features of devices) were done using Exchange ActiveSync (EAS). You could control basic password policies as well as some rudimentary devices settings such as disabling the camera. With this in mind, Apple began to write the initial MDM specifications, paving the way for an entire IT industry segment to be born.

This was the landscape when the first edition of the Enterprise iPhone and iPad Administrator’s Guide was released by Apress in 2010. Additional MDM solutions were soon to follow. TARMAC released MDM for iOS devices using a server running on a Mac in late 2011. AppBlade and Excitor was also released in 2011. Over the course of the next 8 years, MDM became one part of a number of other lovely acronyms:

  • • Mobile Content Management, or MCM, is really just a Content Management System that sends content and services to mobile devices.
  • • Mobile Identity Management, or MIM, refers to where the SIM card of one’s mobile phone works as an identity
  • • Enterprise Mobility Management, or EMM, gets more into managing apps and content that gets put on devices
  • • Unified Endpoint Management, or UEM, brings traditional laptops and then desktops into the management feature, merging EMM with traditional device management.

X-Men First Class came in 2011, although the mail server by the same name was all but gone by then. This was a pivotal year for Apple device management and iOS in the enterprise, as Blackberry announced that you would be able to manage Apple devices with their Blackberry Enterprise Server (BES), which had been created in 1999 to manage Blackberry devices. This legitimized using Apple’s mobile devices in enterprise environments and also an opportunistic play for licensing due to the fact that the devices were becoming such a mainstay in the enterprise and a shift towards UEM that would continue until 2018, when...

Next Episode

undefined - Digital Equipment Corporation

Digital Equipment Corporation

Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we’re able to be prepared for the innovations of the future! Todays episode is on Digital Equipment Corporation, or DEC.

DEC was based in Maynard Massachusetts and a major player in the computer industry from the 1950s through the 1990s. They made computers, software, and things that hooked into computers. My first real computer was a DEC Alpha. And it would be over a decade before I used 64-bit technology again.

DEC was started in 1957 by Ken Olsen, Stan Olsen, and Harlan Anderson of the MIT Lincoln Laboratory using a $70,000 loan because they could sell smaller machines than the big mainframes to users where output and realtime operation were more important than performance. Technology was changing so fast and there were so few standards for computers that investors avoided them. So they decided to first ship modules, or transistors that could be put on circuit boards and then ship systems. They were given funds and spent the next few years building a module business to fund a computer business.

IBM was always focused on big customers. In the 1960s, this gave little DEC the chance to hit the smaller customers with their PDP-8, the first successful mini-computer, at the time setting customers back around $18,500. The “Straight-8” as it was known was designed by Edson de Castro and was about the size of a refrigerator, weighing in at 250 pounds. This was the first time a company could get a computer for less than $20k and DEC sold over 300,000 of them! The next year came the 8/s. No, that’s not an iPhone model. It only set customers back $10k. Just imagine the sales team shows up at your company talking about the discrete transistors, the transistor-transistor logic, or TTL. And it wouldn’t bankrupt you like that IBM. The sales pitch writes itself. Sign me up!

What really sold these though, was the value engineering. They were simpler. Sure, programming was a little harder, and more code. Sure, sometimes that caused the code to overflow the memory. But at the cost savings, you could hire another programmer! The rise of the compiler kinda’ made that a negligible issue anyway. The CPU had only four 12-bit registers. But it could run programs using the FORTRAN compiler anruntime, or DECs FOCAL interpreter. Or later you could use PAL-III Assembly, BASIC, or DIBOL.

DEC also did a good job of energizing their user base. The Digital Equipment Corporation User Society was created in 1961 by Edward Fredkin and was subsidized by DEC. Here users could trade source code and documentation, with two DECUS US symposia per year - and there people would actually trade code and later tapes. It would later merge with HP and other groups during the merger era and is alive today as the Connect User Group Community, with over 70,000 members! It is still independent today. The User Society was an important aspect of the rise of DEC and of the development of technology and software for mini computers. The feeling of togetherness through mutual support helped keep the costs of vendor support down while also making people feel like they weren’t alone in the world. It’s also important as part of the history of free software, something we’ll talk about in more depth in a later episode.

The PDP continued to gain in popularity until 1977, when the VAX came along. The VAX brought with it the virtual address extension for which it derives its name. This was really the advent of on-demand paged virtual memory, although that had been initially adopted by Prime Computer without the same level of commercial success. This was a true 32-bit CISC, or Complex Instruction Set Computer. It ran Digital’s VAX/VMS which would later be called OpenVMS; although some would run BSD on it, which maintained VAX support until 2016. This thing set standards in 1970s computing. You know Millions of instructions per second (MIPS) - the VAX was the benchmark. The performance was on par with the IBM System/360.

The team at DEC was iterating through chips at a fast rate. Over the next 20 years, they got so good that Soviet engineers bought them just to try and reverse engineer the chips. In fact it got to the point that “when you care enough to steal the very best” was etched into microprocessor die. DEC sold another 400,000 of the VAX. They must have felt on top of the world when they took the #2 computer company spot! DEC was the first computer company with a website, launching dec.com in 85.

The DEC Western Research Library started to build a RISC chip called Titan in 1982, meant to run Unix. Alan Kotok and Dave Orbits started designing a 64-bit chip to run VMS (maybe to run Spacewar faster). Two other chips, HR-32 and CASCADE were being designed in 1984. And Prism began in 1985. With all of these independent development efforts, tu...

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-history-of-computing-6534/the-history-of-computer-viruses-21270102"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to the history of computer viruses on goodpods" style="width: 225px" /> </a>

Copy