Knowledge

Creeper and Reaper

Source 📝

498: 33: 153:
Creeper had a minimal impact on the computers it infected. No more than 28 machines could have been infected, as that was the number of machines running the TENEX operating system on ARPANET. The operators of the machines were also collaborators in the project, and Tomlinson needed permission to run
454:
When Mother realized the mistake it had made, *Reaper was created to combat the self-replicating mess it had created, and fabricated the story about a "creeper virus" in order to obfuscate the matter to human
285:
program, which became the world's first computer virus: a computation that used the network to recreate itself on another node, and spread from node to node. The source code of creeper remains unknown.
134:
designed to copy itself between computers rather than simply move. This self-replicating version of Creeper is generally accepted to be the first
467: 145:
as it caused no damage to data, the only effect being a message it output to the teletype reading "I'M THE CREEPER : CATCH ME IF YOU CAN"
138:. Creeper was a test created to demonstrate the possibility of a self-replicating computer program that could spread to other computers. 154:
the program on their machines. In an interview, Tomlinson also stated that there were no unintended effects from running the program.
539: 399: 442: 17: 113: 298: 532: 351: 193: 123: 97: 563: 573: 568: 525: 239: 513: 371: 8: 424: 119: 558: 217: 204:
was the first anti-virus software, designed to delete Creeper by moving across the
188: 109: 274: 509: 230: 352:
From the first email to the first YouTube video: a definitive internet history
225:, while fictionalized versions of Reaper have been used as antagonists in the 552: 173: 135: 131: 74: 44: 356: 235: 251: 168: 216:
The conflict between Creeper and Reaper served as inspiration for the
52: 372:"The History of the First Computer Virus on Windows, Mac, and Linux" 328: 244: 221: 505: 205: 142: 127: 497: 116: 108:
was an experimental computer program written by Bob Thomas at
32: 296: 226: 112:
in 1971. Its original iteration was designed to move between
281:
from one machine to another led to experimentation with the
279:. Vol. 27–28. IEEE Computer Society. 2005. p. 74. 400:"Interview with Ray Tomlinson on Creeper/Reaper – OSnews" 550: 243:. A humanized Creeper has also appeared in the 441: 533: 326: 540: 526: 347: 345: 322: 320: 318: 55:software, designed to eliminate Creeper. 417: 31: 342: 315: 276:IEEE Annals of the History of Computing 208:. It was created by Tomlinson in 1972. 14: 551: 468:"Internet Explorer – Ep. 50 – Creeper" 297:Thomas Chen, Jean-Marc Robert (2004). 269: 267: 435: 369: 250:, alongside the likewise personified 492: 394: 392: 299:"The Evolution of Viruses and Worms" 425:"Chronicle, The Background History" 264: 24: 354:. Tom Meltzer and Sarah Phillips. 211: 36:Screenshot of a Creeper simulation 25: 585: 389: 27:First computer worm and antivirus 496: 329:"Core War: Creeper & Reaper" 460: 370:Sahay, Manish (January 2023). 363: 290: 13: 1: 257: 141:The program was not actively 512:. You can help Knowledge by 7: 10: 590: 491: 130:, with a later version by 58: 187: 179: 167: 157: 148: 93: 88: 80: 70: 65: 508:-related article is a 124:TENEX operating system 37: 447:Digital: A Love Story 327:John Metcalf (2014). 240:Digital: A Love Story 35: 164: 120:mainframe computers 169:Original author(s) 162: 143:malicious software 66:Creeper and Reaper 38: 521: 520: 445:(February 2010). 360:. 23 October 2009 248:Internet Explorer 199: 198: 103: 102: 89:Technical details 16:(Redirected from 581: 542: 535: 528: 500: 493: 483: 482: 480: 478: 464: 458: 457: 439: 433: 432: 421: 415: 414: 412: 410: 396: 387: 386: 384: 382: 376:thepcinsider.com 367: 361: 349: 340: 339: 337: 335: 324: 313: 312: 310: 308: 303: 294: 288: 287: 271: 218:programming game 189:Operating system 165: 161: 63: 62: 21: 18:Reaper (program) 589: 588: 584: 583: 582: 580: 579: 578: 549: 548: 547: 546: 489: 487: 486: 476: 474: 466: 465: 461: 440: 436: 423: 422: 418: 408: 406: 398: 397: 390: 380: 378: 368: 364: 350: 343: 333: 331: 325: 316: 306: 304: 301: 295: 291: 273: 272: 265: 260: 214: 212:Cultural impact 180:Initial release 160: 151: 61: 28: 23: 22: 15: 12: 11: 5: 587: 577: 576: 571: 566: 564:Computer worms 561: 545: 544: 537: 530: 522: 519: 518: 501: 485: 484: 459: 443:Christine Love 434: 416: 404:www.osnews.com 388: 362: 341: 314: 289: 262: 261: 259: 256: 231:Digimon Tamers 213: 210: 197: 196: 191: 185: 184: 181: 177: 176: 171: 159: 156: 150: 147: 101: 100: 95: 91: 90: 86: 85: 82: 78: 77: 72: 68: 67: 60: 57: 51:was the first 43:was the first 26: 9: 6: 4: 3: 2: 586: 575: 574:Malware stubs 572: 570: 569:1971 software 567: 565: 562: 560: 557: 556: 554: 543: 538: 536: 531: 529: 524: 523: 517: 515: 511: 507: 502: 499: 495: 494: 490: 473: 469: 463: 456: 453: 448: 444: 438: 430: 426: 420: 405: 401: 395: 393: 377: 373: 366: 359: 358: 353: 348: 346: 330: 323: 321: 319: 300: 293: 286: 284: 278: 277: 270: 268: 263: 255: 253: 249: 246: 242: 241: 237: 233: 232: 228: 224: 223: 219: 209: 207: 203: 195: 192: 190: 186: 182: 178: 175: 174:Ray Tomlinson 172: 170: 166: 155: 146: 144: 139: 137: 136:computer worm 133: 132:Ray Tomlinson 129: 125: 121: 118: 115: 111: 107: 99: 96: 92: 87: 83: 79: 76: 75:Computer worm 73: 69: 64: 56: 54: 50: 46: 45:computer worm 42: 34: 30: 19: 514:expanding it 503: 488: 475:. Retrieved 472:webtoons.com 471: 462: 451: 450: 446: 437: 428: 419: 407:. Retrieved 403: 379:. Retrieved 375: 365: 357:The Guardian 355: 332:. Retrieved 305:. Retrieved 292: 282: 280: 275: 247: 238: 236:visual novel 229: 220: 215: 201: 200: 152: 140: 122:running the 105: 104: 48: 40: 39: 29: 252:Morris Worm 553:Categories 455:observers. 452:*Blue Sky: 429:konaka.com 409:17 January 258:References 126:using the 84:Bob Thomas 53:antivirus 477:1 August 245:webcomic 234:and the 222:Core War 94:Platform 47:, while 559:ARPANET 506:malware 381:16 June 307:31 July 283:Creeper 206:ARPANET 128:ARPANET 106:Creeper 81:Authors 59:Creeper 41:Creeper 202:Reaper 163:Reaper 158:Reaper 149:Impact 117:PDP-10 49:Reaper 504:This 334:1 May 302:(PDF) 227:anime 194:TENEX 98:TENEX 510:stub 479:2022 411:2024 383:2022 336:2014 309:2019 183:1972 71:Type 114:DEC 110:BBN 555:: 470:. 449:. 427:. 402:. 391:^ 374:. 344:^ 317:^ 266:^ 254:. 541:e 534:t 527:v 516:. 481:. 431:. 413:. 385:. 338:. 311:. 20:)

Index

Reaper (program)

computer worm
antivirus
Computer worm
TENEX
BBN
DEC
PDP-10
mainframe computers
TENEX operating system
ARPANET
Ray Tomlinson
computer worm
malicious software
Original author(s)
Ray Tomlinson
Operating system
TENEX
ARPANET
programming game
Core War
anime
Digimon Tamers
visual novel
Digital: A Love Story
webcomic
Morris Worm

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.