亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? morris~1.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 3 頁
字號(hào):
928 F.2d 504 59 U.S.L.W. 2603(CITE AS: 928 F.2D 504)                       UNITED STATES of America, Appellee,                                       v.                   Robert Tappan MORRIS, Defendant-Appellant.                            No. 774, Docket 90-1336.                         United States Court of Appeals,                                 Second Circuit.                              Argued Dec. 4, 1990.                             Decided March 7, 1991.  Defendant was convicted in the United States District Court for the Northern District of New York, Howard G. Munson, J., of violating computer Fraud and Abuse Act.  Defendant appealed.  The Court of Appeals, Jon O. Newman, Circuit Judge, held that:  (1) statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss, and (2) there was sufficient evidence to conclude that defendant acted without authorization within meaning of statute.  Affirmed. [1] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Statute which punishes anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss.  18 U.S.C.A. s 1030(A)(5)(A). U.S. v. Morris 928 F.2d 504, 59 U.S.L.W. 2603 [2] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Defendant's transmission of computer "worm" constituted accessing federal interest computer without authorization under statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more;  defendant used computer program that transfers and receives electronic mail and program that permits person to obtain limited information about users of another computer to release "worm" into group of national networks that connected university, governmental, and military computers around the country and use of those features was not in any way related to their intended function.  18 U.S.C.A. s 1030(A)(5)(A).  *504 Thomas A. Guidoboni, Washington, D.C., for defendant-appellant.  Ellen R. Meltzer, U.S. Dept. of Justice, Washington, D.C. (Frederick J. Scullin, Jr., U.S. Atty., Syracuse, N.Y., Mark D. Rasch, U.S. Dept. of Justice, Washington, D.C., on the brief), for appellee.  *505 Before NEWMAN and WINTER, Circuit Judges, and DALY, District Judge. [FN*]      FN* The Honorable T.F. Gilroy Daly of the District Court for the District     of Connecticut, sitting by designation.  JON O. NEWMAN, Circuit Judge:  This appeal presents two narrow issues of statutory construction concerning a provision Congress recently adopted to strengthen protection against computer crimes.  Section 2(d) of the computer Fraud and Abuse Act of 1986, 18 U.S.C. s 1030(A)(5)(A) (1988), punishes anyone who intentionally accesses without authorization a category of computers known as "[f]ederal interest computers" and damages or prevents authorized use of information in such computers, causing loss of $1,000 or more.  The issues raised are (1) whether the Government must prove not only that the defendant intended to access a federal interest computer, but also that the defendant intended to prevent authorized use of the computer'S information and thereby cause loss; and (2) what satisfies the statutory requirement of "access without authorization."  These questions are raised on an appeal by Robert Tappan Morris from the May 16, 1990, judgment of the District Court for the Northern District of New York (Howard G. Munson, Judge) convicting him, after a jury trial, of violating 18 U.S.C. s 1030(A)(5)(A).  Morris released into INTERNET, a national computer network, a computer program known as a "worm" [FN1] that spread and multiplied, eventually causing computers at various educational institutions and military sites to "crash" or cease functioning.      FN1. In the colorful argot of computers, a "worm" is a program that     travels from one computer to another but does not attach itself to the     operating system of the computer it "infects."  It differs from a "virus,"     which is also a migrating program, but one that attaches itself to the     operating system of any computer it enters and can infect any other     computer that uses files from the infected computer.  We conclude that section 1030(a)(5)(A) does not require the Government to demonstrate that the defendant intentionally prevented authorized use and thereby caused loss.  We also find that there was sufficient evidence for the jury to conclude that Morris acted "without authorization" within the meaning of section 1030(a)(5)(A).  We therefore affirm.                                      FACTS  In the fall of 1988, Morris was a first-year graduate student in Cornell University's computer science Ph.D. program.  Through undergraduate work at Harvard and in various jobs he had acquired significant computer experience and expertise.  When Morris entered Cornell, he was given an account on the computer at the computer Science Division.  This account gave him explicit authorization to use computers at Cornell.  Morris engaged in various discussions with fellow graduate students about the security of computer networks and his ability to penetrate it.  In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus."  The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered.  The tactic he selected was release of a worm into network computers.  Morris designed the program to spread across a national network of computers after being inserted at one computer location connected to the network.  Morris released the worm into INTERNET, which is a group of national networks that connect university, governmental, and military computers around the country.  The network permits communication and transfer of information between computers on the network.  Morris sought to program the INTERNET worm to spread widely without drawing attention to itself.  The worm was supposed to occupy little computer operation time, and thus not interfere with normal use of the computers. Morris programmed the worm to make it difficult to detect and read, so that other programmers would not be able to "kill" the worm easily.  *506 Morris also wanted to ensure that the worm did not copy itself onto a computer that already had a copy.  Multiple copies of the worm on a computer would make the worm easier to detect and would bog down the system and ultimately cause the computer to crash.  Therefore, Morris designed the worm to "ask" each computer whether it already had a copy of the worm.  If it responded "no," then the worm would copy onto the computer;  if it responded "yes," the worm would not duplicate.  However, Morris was concerned that other programmers could kill the worm by programming their own computers to falsely respond "yes" to the question.  To circumvent this protection, Morris programmed the worm to duplicate itself every seventh time it received a "yes" response.  As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated.  The worm was also designed so that it would be killed when a computer was shut down, an event that typically occurs once every week or two.  This would have prevented the worm from accumulating on one computer, had Morris correctly estimated the likely rate of reinfection.  Morris identified four ways in which the worm could break into computers on the network:   (1) through a "hole" or "bug" (an error) in SEND MAIL, a computer program that transfers and receives electronic mail on a computer;   (2) through a bug in the "finger demon" program, a program that permits a person to obtain limited information about the users of another computer;   (3) through the "trusted hosts" feature, which permits a user with certain privileges on one computer to have equivalent privileges on another computer without using a password;  and   (4) through a program of password guessing, whereby various combinations of letters are tried out in rapid sequence in the hope that one will be an authorized user's password, which is entered to permit whatever level of activity that user is authorized to perform.  On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology.  MIT was selected to disguise the fact that the worm came from Morris at Cornell.  Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated.  Ultimately, many machines at locations around the country either crashed or became "catatonic."  When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution.  Eventually, they sent an

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产成人午夜在线一区| 亚洲免费观看高清在线观看| 91免费观看在线| 免费看黄色91| 亚洲日本在线a| 亚洲精品在线网站| 欧美日韩国产影片| av色综合久久天堂av综合| 免费的成人av| 亚洲国产va精品久久久不卡综合 | 日韩精品中文字幕一区二区三区| 北条麻妃一区二区三区| 久久激情五月婷婷| 日本不卡一二三区黄网| 一区二区在线观看视频| 国产精品青草久久| 国产色91在线| 欧美成人aa大片| 7777精品伊人久久久大香线蕉的 | 91国偷自产一区二区三区观看| 国产精品一卡二卡| 麻豆国产一区二区| 日一区二区三区| 亚洲一区二区三区四区五区黄| 国产精品日产欧美久久久久| 亚洲精品一区二区三区99| 日韩午夜在线影院| 欧美一区二区视频在线观看2022| 欧美亚洲丝袜传媒另类| 97久久精品人人澡人人爽| 高清在线不卡av| 国产99久久久国产精品免费看 | 欧美视频在线不卡| 91视视频在线观看入口直接观看www | 丁香六月综合激情| 日本特黄久久久高潮| 亚洲欧美区自拍先锋| 国产精品久久久久久久午夜片| 久久精品男人的天堂| 26uuu国产电影一区二区| 精品日韩欧美一区二区| 欧美成人激情免费网| 欧美一区二区三区喷汁尤物| 欧美一区二区在线免费观看| 欧美一区二区不卡视频| 欧美一区二区三区啪啪| 日韩亚洲电影在线| 日韩免费一区二区| 国产亚洲成aⅴ人片在线观看| 久久久亚洲高清| 国产精品少妇自拍| 亚洲欧洲精品成人久久奇米网| 国产精品久久久久久久久搜平片 | 亚洲成国产人片在线观看| 日韩精品一区第一页| 精品午夜久久福利影院| 丰满少妇久久久久久久| 91在线云播放| 在线视频欧美区| 制服视频三区第一页精品| 日韩欧美亚洲一区二区| 国产日韩欧美a| 亚洲精品老司机| 亚洲国产综合视频在线观看| 日本女人一区二区三区| 国产乱人伦精品一区二区在线观看 | 日韩无一区二区| 久久精品在这里| 一区二区视频在线| 免费在线观看日韩欧美| 国产成人av影院| 在线看不卡av| 日韩一级高清毛片| 中文字幕一区三区| 日韩精品久久久久久| 懂色av一区二区在线播放| 色婷婷av一区二区三区gif| 69精品人人人人| 国产欧美日韩不卡| 日韩中文字幕不卡| 成人app在线| 日韩欧美久久久| 中文字幕日韩一区二区| 日韩激情中文字幕| www.成人在线| 欧美大片在线观看| 亚洲欧美国产77777| 美国十次综合导航| 色婷婷综合激情| 久久一夜天堂av一区二区三区| 亚洲欧美日韩系列| 国产精品综合网| 欧美日本精品一区二区三区| 国产日韩欧美麻豆| 日韩综合小视频| 一本色道亚洲精品aⅴ| 亚洲精品一区二区三区福利| 亚洲伊人色欲综合网| 成人一区二区三区视频| 日韩一区二区精品在线观看| 亚洲男人的天堂网| 国产不卡一区视频| 欧美一卡2卡三卡4卡5免费| 亚洲摸摸操操av| 国产成人小视频| 欧美一区二区播放| 亚洲第一狼人社区| 99久久国产综合精品麻豆| 久久综合色综合88| 午夜亚洲国产au精品一区二区| 成人黄页毛片网站| 精品国产一区二区三区四区四| 亚洲成人免费在线| 欧美性xxxxxxxx| 亚洲视频在线观看一区| 国产suv精品一区二区883| 精品国产亚洲在线| 免费在线成人网| 欧美人伦禁忌dvd放荡欲情| 亚洲女性喷水在线观看一区| 成人的网站免费观看| 国产欧美日韩中文久久| 经典三级视频一区| 欧美一区二区三区思思人| 亚洲一区二区精品久久av| 91久久精品一区二区二区| 中文字幕一区二区三区四区不卡 | 麻豆专区一区二区三区四区五区| 欧美中文字幕一区二区三区| 日韩美女视频一区二区| 丰满少妇久久久久久久| 欧美国产国产综合| 成人影视亚洲图片在线| 欧美国产精品一区二区| 成人免费毛片高清视频| 亚洲国产成人在线| 成人午夜精品在线| 中文字幕在线观看一区二区| 成人在线综合网| 国产精品免费av| 成人网男人的天堂| 亚洲欧洲av在线| 91久久精品网| 三级亚洲高清视频| 日韩一区二区三区在线视频| 久久激情综合网| 国产日韩欧美精品电影三级在线| 风间由美一区二区av101| 国产精品人成在线观看免费| 97精品久久久午夜一区二区三区| 国产精品高潮呻吟久久| 色偷偷久久人人79超碰人人澡| 亚洲一区二区三区四区在线免费观看 | 亚洲精品在线网站| 国产福利一区二区三区在线视频| 国产亚洲视频系列| 99精品热视频| 亚洲福利一二三区| 日韩一区二区免费在线电影| 国产精品影视网| 亚洲日本一区二区| 欧美一区二区三区喷汁尤物| 国产精品亚洲人在线观看| 亚洲色欲色欲www| 欧美理论片在线| 国产麻豆成人传媒免费观看| 国产精品久久毛片a| 欧美性生活一区| 精品制服美女丁香| 中文字幕一区二区三区在线播放| 欧美视频日韩视频在线观看| 久久精品国产一区二区三区免费看 | 日韩女同互慰一区二区| 风流少妇一区二区| 亚洲国产精品尤物yw在线观看| 欧美大片日本大片免费观看| 粉嫩av亚洲一区二区图片| 一区二区免费在线| 欧美精品一区二区在线观看| 色综合夜色一区| 美国毛片一区二区三区| 亚洲日本va在线观看| 日韩精品中文字幕一区二区三区| fc2成人免费人成在线观看播放| 亚洲成av人**亚洲成av**| 国产亚洲婷婷免费| 欧美日韩成人激情| 不卡一区二区中文字幕| 蜜臀av一区二区在线免费观看| 亚洲欧美在线高清| 欧美刺激午夜性久久久久久久| 91免费看片在线观看| 精品午夜久久福利影院 | 亚洲电影你懂得| 国产无人区一区二区三区| 欧美色倩网站大全免费| 成人亚洲一区二区一| 精品写真视频在线观看| 午夜精品久久久久久久久久久 | 久久精品国产免费|