- published: 04 Nov 2013
- views: 172
7:05
The Morris Worm (Part 1): Overview
The Morris Worm marks a pivotal event in the history of cybersecurity and largely acted as...
published: 04 Nov 2013
The Morris Worm (Part 1): Overview
The Morris Worm (Part 1): Overview
The Morris Worm marks a pivotal event in the history of cybersecurity and largely acted as an impetus for legitimizing the formal field of cybersecurity as we know it today. The worm was released over 25 years ago by Robert Morris Junior who, at the time, was a graduate student at Cornell University. The evidence seems to suggest that Morris did not have malevolent intentions, but rather that it was an experiment gone awry. The Morris Worm spread from system to system across the Internet, which in 1987 comprised about 60,000 machines. The mechanisms by which the worm spread included the exploitation of security shortcomings in the Unix Finger program, the Sendmail program, and the Unix utilities rsh as well as rexec. In this video, which is the first in a multi-part series, Sourcefire's Chief Scientist, Zulfikar Ramzan, gives an overview of the Morris Worm. In subsequent videos, Zulfikar dives into more detail regarding the worm's inner workings. For more Sourcefire Chalk Talks, visit http://sfi.re/ChalkTalks- published: 04 Nov 2013
- views: 172
29:20
The Computer Chronicles - Computer Viruses (1/17/1989)
Skip to 0:33 to begin. An interesting look at computer viruses from the popular program Th...
published: 14 Apr 2012
author: danooct1
The Computer Chronicles - Computer Viruses (1/17/1989)
The Computer Chronicles - Computer Viruses (1/17/1989)
Skip to 0:33 to begin. An interesting look at computer viruses from the popular program The Computer Chronicles from 1989. Some viruses discussed include the...- published: 14 Apr 2012
- views: 17165
- author: danooct1
3:00
Computer Virus TV News Report 1988
Overly melodramatic and cheesy Boston TV channel news report about a computer virus outbre...
published: 12 May 2007
author: Alexander Benenson
Computer Virus TV News Report 1988
Computer Virus TV News Report 1988
Overly melodramatic and cheesy Boston TV channel news report about a computer virus outbreak discovered by MIT nerds. Fun because they don't just report on t...- published: 12 May 2007
- views: 276813
- author: Alexander Benenson
4:21
The great worm (morris worm) source
Rare source code of Morris Worm Not all code is shown to protect against something like th...
published: 19 Jul 2013
author: Virus Lovers
The great worm (morris worm) source
The great worm (morris worm) source
Rare source code of Morris Worm Not all code is shown to protect against something like this happening again. Tags Computer,Virus,Soldering,Video,Worm,Morris...- published: 19 Jul 2013
- views: 24
- author: Virus Lovers
8:06
The Morris Worm (Part 2): Propagation via Finger Daemon Vulnerability
This chalk talk is part two in a series covering the history and propagation of the Morris...
published: 04 Nov 2013
The Morris Worm (Part 2): Propagation via Finger Daemon Vulnerability
The Morris Worm (Part 2): Propagation via Finger Daemon Vulnerability
This chalk talk is part two in a series covering the history and propagation of the Morris Worm. For more Sourcefire Chalk Talks, visit http://sfi.re/ChalkTalks- published: 04 Nov 2013
- views: 54
1:59
2nd November 2013 Teaser The Morris Worm
This is the video for today's Teaser: to find out more, or put in your answers, go to http...
published: 02 Nov 2013
2nd November 2013 Teaser The Morris Worm
2nd November 2013 Teaser The Morris Worm
This is the video for today's Teaser: to find out more, or put in your answers, go to http://niknaksoldpeculiarblog.blogspot.com/2013/11/the-daily-teaser-2-11-2013-morris-worm.html Questions © Paul Downie. Audio and images are copyright of the original owners, writers or copyright holders: for details see http://niknaksoldpeculiarblog.blogspot.com/p/for-copyright-holders.html. I created the video and questions. I own the digital reproduction rights to some images: others are issued under the Creative-Commons Licenses used by Wikimedia Commons, CC Search and others http://commons.wikimedia.org/wiki/Main_Page http://search.creativecommons.org/ http://creativecommons.org/licenses/by-sa/3.0/- published: 02 Nov 2013
- views: 4
5:46
The Morris Worm(1988)
I was born in October of 1988 and I chose to do my topic on Robert Tappan Morris who sent ...
published: 23 Jul 2013
author: Lacy landis
The Morris Worm(1988)
The Morris Worm(1988)
I was born in October of 1988 and I chose to do my topic on Robert Tappan Morris who sent out the first worm.- published: 23 Jul 2013
- views: 1
- author: Lacy landis
6:17
Morris Worm (Part 4): Spreading Over rexec and rsh
The Morris Worm spread via four mechanisms: rsh, fingerd, sendmail, and rexec. This video,...
published: 02 Dec 2013
Morris Worm (Part 4): Spreading Over rexec and rsh
Morris Worm (Part 4): Spreading Over rexec and rsh
The Morris Worm spread via four mechanisms: rsh, fingerd, sendmail, and rexec. This video, by Sourcefire Chief Scientist Zulfikar Ramzan, describes the rsh and rexec propagation techniques in more detail. This video is part of a multi-part series on the Morris Worm.- published: 02 Dec 2013
- views: 2
8:32
Morris Worm (Part 3): How it Guessed Passwords
As part of its propagation mechanisms, the Morris Worm attempted to determine the password...
published: 04 Nov 2013
Morris Worm (Part 3): How it Guessed Passwords
Morris Worm (Part 3): How it Guessed Passwords
As part of its propagation mechanisms, the Morris Worm attempted to determine the passwords of the users on the system it had just compromised. Specifically, the Morris Worm tried to employ a password dictionary attack. This video, by Sourcefire Chief Scientist Zulfikar Ramzan, describes the specific dictionary attack mechanisms espoused by the Morris Worm. The video is part of a multi-part series on the Morris Worm.- published: 04 Nov 2013
- views: 40
1:06
Twenty five years of the Morris worm
Mint's Moulishree Srivastava tells us how cyberspace has evolved since the first computer ...
published: 02 Oct 2013
Twenty five years of the Morris worm
Twenty five years of the Morris worm
Mint's Moulishree Srivastava tells us how cyberspace has evolved since the first computer worm came into being in 1988.- published: 02 Oct 2013
- views: 17
7:38
Flow Through Worm Bin, 1st Harvest
Actually harvesting vermicompost for the 2nd time; filming of the 1st one failed. 1st harv...
published: 23 May 2012
author: Greg Morris
Flow Through Worm Bin, 1st Harvest
Flow Through Worm Bin, 1st Harvest
Actually harvesting vermicompost for the 2nd time; filming of the 1st one failed. 1st harvest had 3-4 gallons of vc. Made (2) 5 gal. buckets of compost tea a...- published: 23 May 2012
- views: 4278
- author: Greg Morris
1:35
Top 10 Black Hat Hackers
Top 10 Black Hat Hackers
10. Vladimir Levin
Vladimir Leonidovitch Levin is a Russian-born...
published: 03 Sep 2013
Top 10 Black Hat Hackers
Top 10 Black Hat Hackers
Top 10 Black Hat Hackers 10. Vladimir Levin Vladimir Leonidovitch Levin is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently transfer US$10.7 million via Citibank's computers. 9. Albert Gonzalez Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the biggest such fraud in history. Born: 1981 Education: South Miami High School 8. Kevin Poulsen Kevin Lee Poulsen is an American former black hat hacker who is a News Editor at Wired.com. Born: November 30, 1965, Pasadena, California, United States 7. Robert Tappan Morris Robert Tappan Morris is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet—and subsequently becoming the first person convicted under the Computer Fraud and Abuse Act. Born: November 8, 1965 Education: Harvard University (1999), Harvard University (1987), Massachusetts Institute of Technology, Cornell University 6. Michael Calce MafiaBoy was the Internet alias of Michael Demon Calce, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN. He also launched a series of failed simultaneous attacks against 9 of the 13 root name servers. 5. Kevin Mitnick Kevin David Mitnick is an American computer security consultant, author, convicted criminal, and hacker. In the late 20th century, he was convicted of various computer and communications-related crimes. Born: August 6, 1963, Los Angeles, California, United States Education: James Monroe High School 4. George Hotz George Francis Hotz, alias geohot, is an American hacker known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T; and Apple's intent. Born: October 2, 1989, Glen Rock, New Jersey, United States Education: Rochester Institute of Technology, Bergen County Academies 3. Adrian Lamo Adrian Lamo is an American threat analyst and "gray hat" hacker. He first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo!, and Microsoft, culminating in his 2003 arrest. Born: February 20, 1981, Boston, Massachusetts, United States Education: Lowell High School, American River College 2. Gary McKinnon Gary McKinnon is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the "biggest military computer hack of all time,"although McKinnon himself -- who has a diagnosis of Asperger's Syndrome -- states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public. On 16 October 2012, after a series of legal proceedings in Britain, Home Secretary Theresa May withdrew her extradition order to the United States. Born: February 10, 1966, Glasgow, United Kingdom 1. Jonathan James Jonathan Joseph James, was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. Born: December 12, 1983, United States of America Died: May 18, 2008- published: 03 Sep 2013
- views: 1
Youtube results:
10:01
FlowThrough worm bin, year-round, insulated R-18
My first attempt at building a flow through worm bin. Paying extra for material in hopes t...
published: 08 Mar 2012
author: Greg Morris
FlowThrough worm bin, year-round, insulated R-18
FlowThrough worm bin, year-round, insulated R-18
My first attempt at building a flow through worm bin. Paying extra for material in hopes to make the bin virtually maintence free - with nearly all areas ins...- published: 08 Mar 2012
- views: 10798
- author: Greg Morris
7:28
DIY Worm Separator Cone
For under $20, a DIY cone that anyone with a dremel, pop-rivet gun and drill can build to ...
published: 24 Sep 2011
author: Greg Morris
DIY Worm Separator Cone
DIY Worm Separator Cone
For under $20, a DIY cone that anyone with a dremel, pop-rivet gun and drill can build to aid in the separation of your worms from your compost. Attached to ...- published: 24 Sep 2011
- views: 3481
- author: Greg Morris
3:51
3 weeks to harvest worm casting project, 2 of 4 (10 day check)
10 Day checkup, it's doing better than expected. Still first day of filming and promise to...
published: 14 Apr 2011
author: Greg Morris
3 weeks to harvest worm casting project, 2 of 4 (10 day check)
3 weeks to harvest worm casting project, 2 of 4 (10 day check)
10 Day checkup, it's doing better than expected. Still first day of filming and promise to get better - only a cheap camera and hard to get use to videoing w...- published: 14 Apr 2011
- views: 20510
- author: Greg Morris