Search Details

Word: disks (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...Journal-Bulletin's computer center, where Joselow took her troubled floppy, the detective work began immediately. Using a binary editor -- the computer equivalent of a high-powered magnifying glass -- Systems Engineer Peter Scheidler examined the disk's contents line by line. "What I saw wasn't pretty," says Scheidler. "It was garbage, a real mess." Looking for a way to salvage at least part of Joselow's work, he began peering into each of the disk's 360 concentric rings of data...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

Suddenly he spotted something that gave him a chill. Buried near Sector 0, the disk's innermost circle, was evidence that the glitch that had swallowed six months of Joselow's professional life was not a glitch at all but a deliberate act of sabotage. There, standing out amid a stream of random letters and numbers, was the name and phone number of a Pakistani computer store and a message that read, in part: WELCOME TO THE DUNGEON . . . CONTACT US FOR VACCINATION...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

...software virus, a small but deadly program that lurks in the darkest recesses of a computer waiting for an opportunity to spring to life. The computer virus that struck Joselow had been hiding in the memory of the newspaper's machine and had copied itself onto her data disk, scrambling its contents and turning the reporter's words and sentences into electronic confetti...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

...cell and trick it into making thousands of flawless replicas of the original virus. Like its biological counterpart, a computer virus carries in its instructional code the recipe for making perfect copies of itself. Lodged in a host computer, the typical virus takes temporary control of the computer's disk operating system. Then, whenever the infected computer comes in contact with an uninfected piece of software, a fresh copy of the virus passes into the new program. Thus the infection can be spread from computer to computer by unsuspecting users who either swap disks or send programs to one another...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

...what made this virus special was how it spread. Brandow, who collaborated with Davidson in creating it, inserted the virus into game disks that were distributed at meetings of a Montreal Macintosh users group. A speaker at one meeting was a Chicago software executive named Marc Canter, whose company was doing some contract work for Aldus Corp., a Seattle-based software publisher. Canter innocently picked up a copy of the infected disk, tried it out on his office computer, and then proceeded, on the same machine, to review a piece of software being prepared for shipment to Aldus. Unaware that...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | Next