Cookie Monster (computer program)

Last updated

Cookie Monster was a program created in 1969 for several computer operating systems. [1] The program was named after an obnoxious cartoon bear advertising cereal, but later became associated with the Muppet Cookie Monster. It started out as a way for computer users at Brown University to annoy their fellow students by manually sending messages blocking computer processes and demanding cookies until the user of the ransomed computer typed “cookie”. Though it is often called a virus, it does not self-replicate and spread, and so is considered a proto-virus, or simply malware instead. [2] It is unrelated to the HTTP cookie.

When C.D. Tavares heard the idea at MIT, he decided to automate it. Since then, the program has been shared on different operating systems. [3]

The automated program ran on PDP series minicomputers [2] and was later replicated for Atari in two strains, called Cookie Monster Virus A and B. The only difference is that Virus B can survive a system reset if the system is not completely powered down. [4] The Atari version has the same function as the original program, but this time pops up automatically in regular intervals, and sometimes appears ever more frequent as the program is "fed" more cookies. In order to remove the program completely, the user must type in "Oreo". [5] In one version of the program, the demand for cookies would flash on the screen ever more rapidly until it would suddenly stop and print “I didn’t want a cookie anyway,” and then desist. [6]

The program inspired the movie Hackers to include a fictitious "Cookie Monster Virus" that "ate" the system data of a Gibson supercomputer. It was stopped (presumably only temporarily) when the system administrator typed "cookie".

Related Research Articles

<span class="mw-page-title-main">Computer worm</span> Self-replicating malware program

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

<span class="mw-page-title-main">Malware</span> Malicious software

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application. Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. This is one reason it can be dangerous to open unexpected attachments in e-mails. Many antivirus programs can detect macro viruses; however, the macro virus' behavior can still be difficult to detect.

<span class="mw-page-title-main">Spyware</span> Malware that collects and transmits user information without their knowledge

Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behaviour may be present in malware and in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected.

<span class="mw-page-title-main">WordPerfect</span> Word processing application

WordPerfect (WP) is a word processing application, now owned by Corel, with a long history on multiple personal computer platforms. At the height of its popularity in the 1980s and early 1990s, it was the dominant player in the word processor market, displacing the prior market leader WordStar.

<span class="mw-page-title-main">Timeline of computer viruses and worms</span> Computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Live CD</span> Complete, bootable computer installation that runs directly from a CD-ROM

A live CD is a complete bootable computer installation including operating system which runs directly from a CD-ROM or similar storage device into a computer's memory, rather than loading from a hard disk drive. A live CD allows users to run an operating system for any purpose without installing it or making any changes to the computer's configuration. Live CDs can run on a computer without secondary storage, such as a hard disk drive, or with a corrupted hard disk drive or file system, allowing data recovery.

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes. Patches are often written to improve the functionality, usability, or performance of a program. The majority of patches are provided by software vendors for operating system and application updates.

Installation of a computer program, is the act of making the program ready for execution. Installation refers to the particular configuration of software or hardware with a view to making it usable with the computer. A soft or digital copy of the piece of software (program) is needed to install it. There are different processes of installing a piece of software (program). Because the process varies for each program and each computer, programs often come with an installer, a specialised program responsible for doing whatever is needed for the installation. Installation may be part of a larger software deployment process.

<i>Temple of Apshai</i> 1979 video game

Temple of Apshai is a dungeon crawl role-playing video game developed and published by Automated Simulations in 1979. Originating on the TRS-80 and Commodore PET, it was followed by several updated versions for other computers between 1980 and 1986.

<span class="mw-page-title-main">CA Anti-Spyware</span> Spyware detection program

CA Anti-Spyware is a spyware detection program distributed by CA, Inc. Until 2007, it was known as PestPatrol.

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

<span class="mw-page-title-main">WinFixer</span> Rogue security software

WinFixer was a family of scareware rogue security programs developed by Winsoftware which claimed to repair computer system problems on Microsoft Windows computers if a user purchased the full version of the software. The software was mainly installed without the user's consent. McAfee claimed that "the primary function of the free version appears to be to alarm the user into paying for registration, at least partially based on false or erroneous detections." The program prompted the user to purchase a paid copy of the program.

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know, but it can also be in the form of a pop-up window.

<span class="mw-page-title-main">SpartaDOS X</span> Disk operating system

SpartaDOS X is a disk operating system for the Atari 8-bit family of computers that closely resembles MS-DOS. It was developed and sold by ICD, Inc. in 1987-1993, and many years later picked up by the third-party community SpartaDOS X Upgrade Project, which still maintains the software.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

There have been a variety of Sesame Street video games released for video game platforms. Most of the Sesame Street video games were published and developed by NewKidCo.

Forex autotrading is a slang term for algorithmic trading on the foreign exchange market, wherein trades are executed by a computer system based on a trading strategy implemented as a program run by the computer system.

References

  1. Brandom, Russell (25 July 2014). "The Computer Virus Catalog". The Verge. Retrieved 28 August 2018.
  2. 1 2 Wentworth, Rob. "Computer Virus!". The Digital Viking. Twin Cities PC User Group. Retrieved 1 March 2012.
  3. Tavares, C.D. "Origin of the Cookie Monster". Multics. multicians.org. Retrieved 1 March 2012.
  4. "The Known Viruses On Atari And Their Symptoms". Listing AVK. atari-forum.com. Retrieved 1 March 2012.
  5. Posey, Talainia (25 February 2000). "When viruses attack". techrepublic.org. Tech Republic. Retrieved 1 March 2012.
  6. Fitzpatrick, Laura (2008-09-08). "The Biggest Pranks In Geek History". Time Specials. Time. Archived from the original on November 30, 2008. Retrieved 2 March 2012.