
2
Total Mentions
1
Documents
0
Connected Entities
Name reference in documents
uters nanoseconds to execute and it worked like this: The program - it later became known as a “worm” by the police who would come to find and arrest Morris Jr. - would find an open door on a network-connected computer. (In 1988, the pre-Warez Dude era, finding such doors was not difficult. Finding locked doo
No 3 (July 1942) p. 439 144 HOUSE_OVERSIGHT_018376 terrifying Golden Rules of Computer Security.“Rule One: Don’t Own A Computer.” The machine that Morris Jr. created was madeentirely of software. It took the form ofa compact, simply designed computer program he’d written and designed to spread quickly and
No connected entities