resistance
countering the techniques and “technologies of power” that impose isolation, distraction and domination through surveillance, entertainment, and force.
examples of "electronic dusturbance"
-what is a software virus
a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends . The virus may do nothing but propagate itself and then allow the program to run normally.
. Many nasty viruses, written by particularly perversely minded crackers, do irreversible damage, like nuking all the user's files.
-what is a software "trojan horse"?
A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or a program to find and destroy viruses
-what is "worm"?
A program that propagates itself over a network, reproducing itself as it goes. Compare virus.
(Morris)
-what is a software "bomb"?
Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met
-what is a "back door"?
A hole in the security of a system deliberately left in place by designers or maintainers.
often lurked in systems longer than anyone expected or planned, and a few have become widely known.
Robert Tappan Morris
-he is MIT professor. when 23,brought the internet to a virtual
stop in 1988 with a “worm.” his father was big man in country.
so it was more surprising occurence.
-End