Which reminds me, since I’m on yet another long-winded roll, of the very first mass “malware” infection, an interesting story which is quite instructive as a cautionary tale. I fell “victim” to it myself, which I was actually happy about, as were the other “victims”. I first studied Computer Science on a campus with a UNIVAC 1100 series multi-million dollar mainframe running UNIVAC’s (proprietary, as were they all in those days) Exec 8 for it’s highly regarded OS. At the very same time, a programmer named John Walker (not the spy) wrote a fun little self-propagating game program for UNIVAC Exec 8 that he appropriately named ANIMAL.
ANIMAL was akin to early grandmaster software philosopher Joseph Weizenbaum’s famous early AI-like program ELIZA. When you ran it, it asked “Think of an animal…”, then it presented a series of 20-questions-like queries that it used to determine which animal you were thinking of (in the cases where a previous user had correctly described that animal in Yes/No questioning). If the questioning didn’t lead to an answer in its pre-existing database, it asked you to name the animal and then differentiate it from all other animals it already “knew” of. If the animal you named was already in its database but your answers didn’t lead there, ANIMAL would lead you through additional questioning to try to disambiguate your responses from those of earlier users. For those days in the mid 1970’s anyway, many considered it to be “fun”.
But Walker had written ANIMAL for an ulterior, and cautionary, purpose: To warn the world of the danger of what would eventually become known as software viruses (or Trojan Horses, to be more specific).
You see, considering the hopelessly asocial people early programmers especially were, playing ANIMAL was what passed as a “fun game” in those, pre-Grand Theft Auto (hell, pre-Adventure) days. So if you saw someone playing it, you naturally asked for a copy so you could play, too. Before long, these requests for copies dominated nearly all of Walker’s time, so, with eyes wide open and with full knowledge of what would happen (which Walker thought the world needed to be warned about regarding the potential dangers from non-benevolent programmers), he included a routine inside ANIMAL called PERVADE. PERVADE’s purpose, as the name indicates, was to search through all of the user and system directories that the user held write privileges for (note, though, that Exec 8 was brilliantly designed from the outset with security in mind, and it was far ahead of its competitors in that regard, especially for those days), and copied it’s host program (ANIMAL in this case) to all directories that the user’s privilege levels allowed.
Most of the time, that only included the user’s own personal directory, but if a more privileged user ran ANIMAL, it would “infect” a great many system and user directories. So before long, ANIMAL would be in pretty much every single directory on the system! (Note that this is precisely what Walker wanted, and he took extreme caution to ensure that ANIMAL was completely benign in every other way.)
In those days, user groups served an essential purpose, including acting as a repository for all the various non-proprietary programs and utilities that various users had developed to share with others (the terms “freeware” and “open source” were years away from being coined). The programs were distributed via mag tapes, for obvious reasons (even the Arpanet was years away from becoming at all commonplace). As a consequence of PERVADE, ANIMAL was everywhere on those tapes, so the “infection” spread exponentially (well, as “exponentially” as the few multi-million dollar UNIVAC systems in existence permitted, anyway).
This solved Walker’s problem of being asked to send out all those copies of ANIMAL, but his cautionary tale of what self-replicating software would eventually inflict on the world did not come to many people’s attention until ANIMAL saturated an undue percentage of all the world’s hideously expensive UNIVAC storage space.
Fear ensued. That was the whole point.
I heard stories in those days about Walker creating a “time bomb” version of ANIMAL that would allegedly copy itself twice into the same directory and later delete itself, but those absurd fables are pure ANIMAL shit. What really happened is that UNIVAC’s system programmers modified the system data structures that PERVADE looked at in order to find writable directories, so that PERVADE stopped working.
The interesting fact is that UNIVAC did not do this in order to stop PERVADE at all! It was just another system software update that was designed for an entirely different purpose.
So: Lesson? Sadly, not all that well learned.
At least not until my software design über-hero Dave Cutler designed the OS and its nested security system called VAX/VMS for Digital Equipment Corp’s (DEC) 32-bit VAX computers. Cutler had previously been instrumental in the hugely successful RSX-11M 16-bit operating system for DEC’s PDP-11 series computers, with which his fame began.
With DEC’s premature demise (it was building personal computers running DEC’s highly reliable operating systems that cost even more than early Macintoshes, if you can imagine such a thing (my first acceptably powerful Mac, a IIcx model, cost me over $11,000(!!) with the necessary apps, a color monitor, and a printer), Cutler went on to design Microsoft’s only tolerable operating system in its history up to that point: Windows NT. Cutler, a socially “indiscreet” (read: extremely profane ass-kicker and problem solver) man and designer, whom it seems unlikely to have worked well with Bill (but what do I know?), is thus the prime mover behind Windows XP, too.
Why am I going on about Cutler? It’s because the nested security strategy and system he invented for VMS is virtually identical to that in Vista and Windows 7. But I can easily imagine Cutler working up a terrifying verbal fuck!storm about the ludicrous decision Microsoft made to enable his powerful multi-user account security strategy on a primarily single-user personal OS like Vista as the default! It would not have been pretty to be in earshot of that, I can promise you.
. . .
In closing, here’s a “fun fact”: If you were somehow to get your hands on a UNIVAC tape from those years, ANIMAL will still be there. In fact, many, many copies will still be there, waiting patiently to devour us again…