Top-Rated Free Essay
Preview

ollie mullin

Good Essays
866 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ollie mullin
It’s not the Computer’s Fault
Love Virus (2000)
It cost $8.75 billion dollars and millions of computers were infected along with significant data loss. The LoveLetter infected millions of people worldwide and had caused the largest damage of any virus in history. The bug deleted files, changed home pages and messed with the Registry.
It attacked via-email and sent an email with the subject of “ILOVEYOU”. When the user opened the message it would infect the computer and everyone else’s in the address book.
The LoveVirus could not have been prevented easily as soon as you opened the email. Once opened however you could delete the e-mail if the attachment file ended in .vbs (Visual Basic Script).
My conclusion is that the law in the Philippines didn’t cover this and therefore what the two men did wasn’t illegal so they technically in the wrong. Although what they did had huge consequences they weren’t jailed and many countries can learn the lesson.
Source: http://sandipsandilya.wordpress.com/2011/01/17/20-famous-software-disasters/

Mariner Bugs Out (1962)
The Mariner 1 rocket with a space probe headed for Venus changed the flight path it was meant to take only seconds after it launched. Mission Control destroyed the rocket 293 seconds after liftoff!
A programmer incorrectly transcribed a handwritten formula into computer code; he mistakenly missed a single superscript bar. Without the smoothing function indicated by the bar, the software treated normal variations of velocity as if they were serious, meaning all the faulty corrections sent the rocket flying off course.
This minute error proved one of the biggest and history and probably one of the most preventable too. If the programmer took a bit more care and proof checked it numerous times then the superscript bar would never have been missed and the rocket would have read the formula and continued on the correct path.
I will conclude this software error by saying that it is very rare it is the computer’s fault; especially in this case as the programmer incorrectly designed the script, the computer did exactly as it was asked and had the program been correct the computer would have followed it and stayed on the right path.

Sydney Cash Machine Glitch
Queues formed at cash machines in the Australian city of Sydney after they malfunctioned and began giving out large sums of money. More than 40 Commonwealth Bank cash machines across the city were affected by the problem. Officials said they were operating in stand-by mode, so could not identify the account balances of customers. The software went on stand-by because of a lack of staff keeping it running at that very one time and it took a while before they could reboot it back to normal
That meant that in some cases customers who had little or no money were able to withdraw large sums of cash. The technical glitch reportedly lasted for about five and a half hours.
Witnesses spoke of a queue of as many as 50 people at one particular cash machine in a Sydney suburb as word got out, Australian media said.
Problems were also reported in Melbourne.
"As a result of our problems today, some of our customers have gone to our ATMs and they've been able to withdraw more funds than they had in their account and therefore they've overdrawn their account," spokesman Bryan Fitzgerald told the Australian Broadcasting Corporation.
"We have a record of every transaction that's been made today and we'll be following up with our customers to make sure that we recover the funds they've overdrawn."
Police warned that it was an offence to keep money dispensed accidentally from a cash machine and urged people to return the cash.
"They should also realise that ATM locations are covered extensively by surveillance," Det Supt Col Dyson of New South Wales fraud squad said in a statement. Overall this was a big error and the bank should never allow a machine to go on standby mode even when the staff aren't keeping it updated and running. The operators changed this a few weeks later and many other small banks made sure it couldn't happen to them either.
USS Yorktown Incident
In the world of software development, there are several commonly known bugs that programmers encounter and have to cater for. One such example is the ‘divide by zero’ bug, where a calculation is performed that divides any number by zero. Such a calculation isn’t possible to resolve, at least not without using higher mathematics, and most software – for everything from super computers to pocket calculators – is written to take this scenario into account.
It was with some embarrassment, then, that the USS Yorktown suffered a complete failure of its propulsion system and was dead in the water for nearly 3 hours when a crew member typed a “0″ into the on-board database management system which was then used in a division calculation. The software was installed as part of a wider operation to use computers to reduce the man power needed to run some ships. Fortunately, the ship was engaged in maneuvers at the time of the incident, rather than deployed in a combat environment, which could have had more severe consequences.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The next two faults categories, excluding the OMISSION faults, emulate specific programming errors common to kernel code according to earlier studies [Sullivan and Chillarege, 1991; Christmansson and Chillarege, 1996].…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There can be least denial the fact that computer viruses can prove to be a lot more deadly in nature and the statement holds all the valid for a threat similar to Ransom: Win32/VenusLocker.A. The reason as to why; the same is considered to be one of the most severe forms of threats developed is simply because it holds the sheer ability of inflicting havoc and carrying out other forms of nefarious activities including - disabling, stealing, damaging, or destroying computer and information…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Payload is defined as the malicious activity that is a result of the activation of a computer virus. The CIH virus was designed to overwrite the machine’s BIOS program code, while still leaving it fully intact. The BIOS code is fundamental because it directly accesses hardware to test system memory and disk drives whenever the computer is booted. This is how the local disk is able to load the operating system at boot, and generally most [newer Windows OSs] will store the BIOS on write-able RAM memory to allow updates when available – hence a more secure network. CIH also disabled Font Removal and created conflict problems in the computer’s TCP/IP protocol.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 5 research paper

    • 297 Words
    • 2 Pages

    The flaw was discovered by a math professor in 1994 and he attempted to bring it to…

    • 297 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    An exceptionally dangerous ransomware infection has seemed web based, passing by the name .725 Ransomware. The infection intends to first taint your PC while it remains muddled and second to make monstrous temporary harm your documents by scrambling them with an encryption cipher. This cipher brings about the records turning into no longer openable. The .725 Ransomware at that point demands victims to pay a weighty ransom fee keeping in mind the end goal to recover the records restored back into working state.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Paul Keller tripped the sequence switches at control monitor 23 in accordance with the countdown instruction just to his left. All hydraulic systems were functioniing normally in the second stage of the spacecraft booster point 1 minus 45. Keller automatically snapped master control switch to GREEN and knew that his electronic impulse along with hundreds of others from similar consoles within the Cape Canaveral complex signaled continuation of the countdown.…

    • 1647 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Grace Murray Hopper

    • 1336 Words
    • 6 Pages

    The Mark I was the first digital computer to be programmed sequentially. The complex code of machine language could be easily misread or incorrectly written. To reduce the number of programming errors, Hopper and her colleagues collected programs that were free of error and generated a catalogue of subroutines that could be used to develop new programs. By this time, the Mark II had been built. Aiken 's team used the two computers side by side, effectively achieving an early instance of multiprocessing.…

    • 1336 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Bergin C. (2007). Remembering the Mistakes of Challenger. Retrieved on June 13, 2013 from http://www.nasaspaceflight.com/2007/01/remembering-the-mistakes-of-challenger/…

    • 1098 Words
    • 5 Pages
    Good Essays
  • Better Essays

    McDonald , Allan, J. “Space Shuttle Challenger Disaster”. Aerospace.net. Vic Spathopoulos. 15 August, 2013. Web. 29 October, 2013.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    On January 28, 1986, another incident of failed communication occurred. The Challenger space shuttle was set to launch and indeed it did, but it did not make it to the intended destination as it exploded in mid-air. Prior to the launch, Roger Boisjoly had made efforts to address an issue of a possible equipment malfunction that had been pointed out by. Unfortunately, nothing was done to ensure the avoidance of this malfunction.…

    • 1095 Words
    • 5 Pages
    Good Essays