About: Christmas Tree EXEC     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:WikicatEmailWorms, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FChristmas_Tree_EXEC

Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system. Written by a student at the Clausthal University of Technology in the REXX scripting language, it drew a crude Christmas tree as text graphics, then sent itself to each entry in the target's email contacts file. In this way it spread onto the European Academic Research Network (EARN), BITNET, and IBM's worldwide VNET. On all of these systems it caused massive disruption.

AttributesValues
rdf:type
rdfs:label
  • Christmas Tree EXEC (en)
  • Christmas Tree EXEC (it)
  • Christmas Tree (ru)
rdfs:comment
  • Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system. Written by a student at the Clausthal University of Technology in the REXX scripting language, it drew a crude Christmas tree as text graphics, then sent itself to each entry in the target's email contacts file. In this way it spread onto the European Academic Research Network (EARN), BITNET, and IBM's worldwide VNET. On all of these systems it caused massive disruption. (en)
  • In informatica Christmas Tree EXEC è considerato il primo worm ad aver compromesso porzioni rilevati delle reti informatiche. La sua circolazione iniziò nel dicembre del 1987. Il worm fu scritto da uno studente tedesco della utilizzando il linguaggio di programmazione REXX. La sua propagazione avveniva sfuttando la posta elettronica con messaggi che si presentavano come auguri natalizi. Il worm è anche noto come CHRISTMA EXEC dal nome del file che lo conteneva scritto secondo lo standard per i nomi di file del sistema IBM VM del tempo. (it)
  • Christmas Tree (CHRISTMAS EXEC) — одна из первых сетевых самовоспроизводящихся программ, которая парализовала работу частной почтовой сети IBM Vnet по всему миру 17 декабря 1987 года. Программа была написана студентом университета Клаустал-Зеллерфилд (нем. Clausthal-Zellerfield), ФРГ. Он заявил, что программа, написанная на языке REXX для VM/CMS, предназначалась для рассылки рождественских поздравлений его друзьям в университете. Первое известное заражение произошло в 13:00 GMT 9 декабря в Клаустал-Зеллерфилде (узел EARN DCZTU1). (ru)
foaf:name
  • Christmas Tree EXEC (en)
name
  • Christmas Tree EXEC (en)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
author
  • Unknown Clausthal University of Technology student (en)
genre
other names
  • CHRISTMA EXEC, CHRISTMAS EXEC (en)
platform
programming language
released
  • December 1987 (en)
has abstract
  • Christmas Tree EXEC was the first widely disruptive computer worm, which paralyzed several international computer networks in December 1987. The virus ran on the IBM VM/CMS operating system. Written by a student at the Clausthal University of Technology in the REXX scripting language, it drew a crude Christmas tree as text graphics, then sent itself to each entry in the target's email contacts file. In this way it spread onto the European Academic Research Network (EARN), BITNET, and IBM's worldwide VNET. On all of these systems it caused massive disruption. The core mechanism of the ILOVEYOU worm of 2000 was essentially the same as Christmas Tree, although it ran on PCs rather than mainframes, was spread over a different network, and was scripted using VBScript rather than REXX. The name was actually "CHRISTMA EXEC" because the IBM VM systems originally required file names to be formatted as 8+space+8 characters. Additionally, IBM required REXX script files to have a file type of "EXEC". The name is sometimes written as "CHRISTMAS EXEC" (adding a 9th character) to make the name more readable. The user was prompted to: "...just type CHRISTMAS..."—and this in fact launched the "worm". The worm would read the user's CMS NAMES file, which contained a list of users at remote nodes to transmit the worm to. The worm would then use the SENDFILE command to transmit the worm to those remote users, who would presumably run it, repeating the cycle. Some versions of the worm had concealed code. The actual executable part of the worm was contained in several overly long lines (more than 80 characters) that were not visible unless the user scrolled the screen to the right. The IBM 3279 color terminal would display the christmas tree with some blinking colored characters (asterisks) to represent tree lights. It displays this message when the program is run and then forwards itself to mailbox addresses contained in the user's address file. * * *** ***** ******* ********* ************* A ******* *********** VERY *************** ******************* HAPPY *********** *************** CHRISTMAS ******************* *********************** AND MY *************** ******************* BEST WISHES *********************** *************************** FOR THE NEXT ****** ****** YEAR ****** (en)
  • In informatica Christmas Tree EXEC è considerato il primo worm ad aver compromesso porzioni rilevati delle reti informatiche. La sua circolazione iniziò nel dicembre del 1987. Il worm fu scritto da uno studente tedesco della utilizzando il linguaggio di programmazione REXX. La sua propagazione avveniva sfuttando la posta elettronica con messaggi che si presentavano come auguri natalizi. Il worm è anche noto come CHRISTMA EXEC dal nome del file che lo conteneva scritto secondo lo standard per i nomi di file del sistema IBM VM del tempo. L'esecuzione del codice di Christmas Tree EXEC determinava la comparsa sullo schermo di un semplice albero di Natale realizzato con la tecnica dell'ASCII art ed affiancato da una breve frase di augurio: A VERY HAPPY CHRISTMAS AND MY BEST WISHES FOR THE NEXT YEAR. Contemporaneamente però il worm eseguiva anche la lettura dei contatti di posta elettronica presenti sul computer per poi inviare una copia di se stesso a ciascuno dei destinatari individuati. Questo meccanismo d'azione permise ad Christmas Tree EXEC di raggiungere picchi di diffusione molto elevati per l'epoca e tali da causare pesanti disservizi sulle reti informatiche (EARN), ed . La modalità di diffusione impiegata da Christmas Tree EXEC è stata ripresa negli anni successivi da altri worm. Nel 2000 ad esempio il worm ILOVEYOU sfruttò le stesse dinamiche diffondendosi tramite posta elettronica. Mentre CHRISTMA EXEC era scritto in REXX e agiva essenzialmente sui mainframe di fine anni ottanta, ILOVEYOU era scritto in VBScript ed era in grado di infettare i personal computer con sistema operativo Windows. (it)
  • Christmas Tree (CHRISTMAS EXEC) — одна из первых сетевых самовоспроизводящихся программ, которая парализовала работу частной почтовой сети IBM Vnet по всему миру 17 декабря 1987 года. Программа была написана студентом университета Клаустал-Зеллерфилд (нем. Clausthal-Zellerfield), ФРГ. Он заявил, что программа, написанная на языке REXX для VM/CMS, предназначалась для рассылки рождественских поздравлений его друзьям в университете. Первое известное заражение произошло в 13:00 GMT 9 декабря в Клаустал-Зеллерфилде (узел EARN DCZTU1). Когда программа получала управление, она выводила вот такое поздравление: * * *** ***** ******* ********* ************* A ******* *********** VERY *************** ******************* HAPPY *********** *************** CHRISTMAS ******************* *********************** AND MY *************** ******************* BEST WISHES *********************** *************************** FOR THE NEXT ****** ****** YEAR ****** (ru)
prov:wasDerivedFrom
page length (characters) of wiki page
author
computing platform
genre
programming language
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (61 GB total memory, 51 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software