Some general sources are mentioned .
Actually, the defense attorney's statement is ludicrous.
Eliezer Yudkowsky's work is supported by the . If you've found Yudkowsky's pages on rationality useful, please consider to the Machine Intelligence Research Institute.
rhetorically effective argument essay.
Astoundingly, there have been criminal prosecutions and convictions of the author(s) of malicious programs, all of which are described below: I hope that when people read this essay and become aware of both the malicious design and great harm caused by computer viruses and worms, readers will urge their legislators:
I have not cited a source for each fact mentioned in this essay,because most of these facts have been reported at many different sources,and are well known to computer experts who are familiar with viruses and worms.
Have a study or assignment writing question? Ask an expert at
An Internet Service Provider in Europe alerted the web server in the Philippines at 08:30 GMT on Thursday, 4 May 2000, and was removed from the website, which prevented most of the harm in Europe and the USA from this password-collecting program.
Court of Appeals upheld the trial court's decision.
was a Trojan Horse program that collected usernames and passwords from the victim's hard drive and e-mailed them to an address in the Philippines, .
Supreme Court refused to hear an appeal from Morris.
The proposal was rejected with handwritten comments "This is illegal." and "We don't produce burglars." The student then dropped out of the college without earning a degree.
Morris, 928 F.2d 504, 506 (2dCir.
In comparison, Melissa sent copies to only the first 50 entries in the Microsoft Outlook address book, while ILOVEYOU sent copies to address in the that victims' book.