History of the internet

History of the Internet

By 12C-IT1
  • first computer bug

    This was when a moth had been trapped between the points of relay #70 in Panel F. Grace Murray Hopper was the first person to ‘debug’ a computer.
  • The Internet Begins

    The Internet Begins
    APRA sent the first message using computer connected to a network across america this signalled the start of the internet. The internet was inveneted at universities in america for miltary contracts.
    Author: Mr Borland
    Source
  • When Viruses started to affect computers

    In 1983 Fredrick Cohen officially introduced a virus when it started to affect people’s computer. The virus for the computer programmes are infectious as it has the ability to replicate.
    S.Sheikh
  • Release of Microsoft Windows

    A partnership called Microsoft was formed by Bill Gates and Paul Allen in 1975 but the first installment of Microsoft Windows was released in 1985.
  • Release of AVG (antivirus software)

    It is an antivirus software which aims to protect your computer or network from viruses. If and when a virus is detected the computer displays a warning asking what action should be taken.
  • Release of Internet Explorer

    It is one of the most widely used web browsers. There are 10 main versions- IE10 has 2 versions: one for notebook PC's /desktops and the other for tablets.
  • The Morris Worm

    A University student called robert morris , released a worm which affected 10 % of all computers connected to the internet, slowing them down to a halt. VG
  • ILOVEYOU

    LOVE BUG flooded internet users with ilove you messages in may 2000, added by an obsessed admirer from the netherlands VG
  • Millennium Bug (Y2K)

    A bug 15 years that the UK coped with. Where this ‘’millennium bug’’ would make computers in different industries i.e. tills and power stations malfunction.
  • A virus called Code Red also known as a worm that misused operating systems

    The virus allowed and forced websites to be taken down and some that were temporarily taken down. This can include government agencies to temporarily take down their public websites. The worm was spread to selected IP address, the people who then visited those websites would receive the virus. Scanning the computer with Microsoft systems and then spreading to those specific computers.
    S.Sheikh
  • My Doom

    The Virus Mydoom was transmitted via an e-mail, as a transmission error, including like such as "Mail Transaction Failed" in different languages. It contained an attachmet that would send eopies of itsellf to all oteher contacts found in local files. It ignored most university e-mails, and companies like microsoft. I became the quickest spreading virus.
  • NASA

    NASA
    NASA confirmed on Wednesday that a computer virus sneaked aboard the International Space Station only to be tossed into quarantine on July 25 by security software.
    A "worm type" virus was found on laptop computers that astronauts use to send and receive email from the station by relaying messages through a mission control center in Texas,
  • RasGas

    RasGas
    Computer systems at energy firm RasGas have been taken offline by a computer virus only days after a similar attack on oil giant Aramco.
  • YTN - South Korea

    YTN - South Korea
    Disruption that paralysed the computer networks of broadcasters and banks in South Korea appears to have been caused by a virus
    Staff at broadcaster YTN were faced with error messages on computer screens
  • British man accused of hacking into US government systems

    Lauri Love has been arrested under the Computer Misuse Act, he hacked into systems of the US Army, Nasa and the Environmental Protection Agency etc.
  • Russian hacker took over BBC server, tried to sell access

    A Russian hacker managed to take over one of the BBC's computer servers, and then offered access to it for sale online, It's not known whether there were any buyers or any data that was lost.
  • Heartbleed Bug

    This form of a bug was identified to providing hackers to gain access to individuals passwords. It mainly impacted companies and businesses who were recommended and advised to change their passwords in order to ensure and sustain a high security service on elements such as emailing, file storage and banking accounts were set. This specific bug was highlighted to of meant that when individuals inputted a password it would copy the password and all of the information after it. Sophie
  • Peter Pan Virus

    Peter Pan Virus
    A Peter Pan pantomime in Bournemouth is being used as part of a sophisticated hacking attack from Eastern Europe that is targeting thousands of British businesses.
    An email claiming to be a £145 invoice for nine tickets to a performance of Peter Pan at the Bournemouth Pavilion theatre contained an attachment that if opened installs a virus onto the recipient’s computer.
  • 15-Year-Old Admits Hacking NASA Computers

    A 15 year old boy caused a 21 day shutdown of NASA computers, he intercept 3,300 emails, stole passwords and acted like an employee.
  • Poodle Bug

    This type of a bug was created in order to allow hackers to gain access to bank details. The poodle bug meant that hackers were able to see data that was previously encrypted into plain text, which consequently meant that access to accounts such as email, banking and other services became available. Sophie Ball
  • Sophisticated Piece of Malware

    This bug was identified to have a malicious intention of obtaining personal and financial information about governments, companies and businesses. The bug was detected to have tried to gain and obtain access to confidential information. If the bug was able to breach a computer it means that it can gain control of the mouse pointer, recover any deleted files and make copies of passwords. Sophie
  • BeeBone

    BeeBone
    A new and deadly variant of computer virus called 'Beebone' has been detected in Indian cyberspace and Internet security sleuths have warned users to safeguard their systems against its attack which leads to unauthorised entry of malware.
    'Beebone' belongs to the notorious family of Trojan malwares which get a "privileged access" into a users computer by faking its identity and deploying smart and corrupt techniques to attack vulnerable computers.