ARCHIVE: 'Phage List' - Archives (1988 - 1989)
DOCUMENT: phage #111 [Re: Let's get the name correct] (1 message, 801 bytes)
NOTICE: securitydigest.org recognises the rights of all third-party works.
START OF DOCUMENT
From: Tom Libert <firstname.lastname@example.org>
Date: Mon 13:23:00 07/11/1988 EST
Subject: Re: Let's get the name correct
References: [Thread Prev: 107] [Thread Next: 231] [Message Prev: 109] [Message Next: 112]
... I hope these references help. I would suggest you read them if you have further questions, and let's get the nomenclature on this consistent. Nice list, Gene. I'd also add the following: Fred Cohen, "Computer Viruses", 1985 USC doctoral thesis (available from the author, CS Dept., U of Cincinnati). Cohen attributes the term "virus" to Len Adleman of RSA (etc.) fame. Fred Cohen, "Computer Viruses--Theory and Experiments", Computers & Security, vol. 6, 1987, Elsevier/North-Holland, pp. 22-35. Ken Thompson, "Reflections on Trusting Trust", Turing Award Lecture, CACM, August 1984. The famous "compiler virus". Fred Cohen, "A Cryptographic Checksum for Integrity Protection", Computers & Security, vol. 6, 1987, Elsevier/North-Holland, pp. 505-510. Maria M. Pozzo and Terence E. Gray, "An Approach to Containing Computer Viruses", Computers & Security, vol. 6, 1987, Elsevier/North-Holland, pp. 321-331. I haven't read this one, but it sounds interesting: B. Landreth, "Out of the Inner Circle: A Hacker's Guide to Computer Security", Microsoft Press, Bellevue WA 1985.
END OF DOCUMENT
|ISSN 1742-948X 01 (Online) | 2005/03/01 | Copyright 2002-2008 securitydigest.org. All rights reserved.|