亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? morris~1.txt

?? 黑客培訓(xùn)教程
?? TXT
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
928 F.2d 504 59 U.S.L.W. 2603(CITE AS: 928 F.2D 504)                       UNITED STATES of America, Appellee,                                       v.                   Robert Tappan MORRIS, Defendant-Appellant.                            No. 774, Docket 90-1336.                         United States Court of Appeals,                                 Second Circuit.                              Argued Dec. 4, 1990.                             Decided March 7, 1991.  Defendant was convicted in the United States District Court for the Northern District of New York, Howard G. Munson, J., of violating computer Fraud and Abuse Act.  Defendant appealed.  The Court of Appeals, Jon O. Newman, Circuit Judge, held that:  (1) statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss, and (2) there was sufficient evidence to conclude that defendant acted without authorization within meaning of statute.  Affirmed. [1] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Statute which punishes anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss.  18 U.S.C.A. s 1030(A)(5)(A). U.S. v. Morris 928 F.2d 504, 59 U.S.L.W. 2603 [2] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Defendant's transmission of computer "worm" constituted accessing federal interest computer without authorization under statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more;  defendant used computer program that transfers and receives electronic mail and program that permits person to obtain limited information about users of another computer to release "worm" into group of national networks that connected university, governmental, and military computers around the country and use of those features was not in any way related to their intended function.  18 U.S.C.A. s 1030(A)(5)(A).  *504 Thomas A. Guidoboni, Washington, D.C., for defendant-appellant.  Ellen R. Meltzer, U.S. Dept. of Justice, Washington, D.C. (Frederick J. Scullin, Jr., U.S. Atty., Syracuse, N.Y., Mark D. Rasch, U.S. Dept. of Justice, Washington, D.C., on the brief), for appellee.  *505 Before NEWMAN and WINTER, Circuit Judges, and DALY, District Judge. [FN*]      FN* The Honorable T.F. Gilroy Daly of the District Court for the District     of Connecticut, sitting by designation.  JON O. NEWMAN, Circuit Judge:  This appeal presents two narrow issues of statutory construction concerning a provision Congress recently adopted to strengthen protection against computer crimes.  Section 2(d) of the computer Fraud and Abuse Act of 1986, 18 U.S.C. s 1030(A)(5)(A) (1988), punishes anyone who intentionally accesses without authorization a category of computers known as "[f]ederal interest computers" and damages or prevents authorized use of information in such computers, causing loss of $1,000 or more.  The issues raised are (1) whether the Government must prove not only that the defendant intended to access a federal interest computer, but also that the defendant intended to prevent authorized use of the computer'S information and thereby cause loss; and (2) what satisfies the statutory requirement of "access without authorization."  These questions are raised on an appeal by Robert Tappan Morris from the May 16, 1990, judgment of the District Court for the Northern District of New York (Howard G. Munson, Judge) convicting him, after a jury trial, of violating 18 U.S.C. s 1030(A)(5)(A).  Morris released into INTERNET, a national computer network, a computer program known as a "worm" [FN1] that spread and multiplied, eventually causing computers at various educational institutions and military sites to "crash" or cease functioning.      FN1. In the colorful argot of computers, a "worm" is a program that     travels from one computer to another but does not attach itself to the     operating system of the computer it "infects."  It differs from a "virus,"     which is also a migrating program, but one that attaches itself to the     operating system of any computer it enters and can infect any other     computer that uses files from the infected computer.  We conclude that section 1030(a)(5)(A) does not require the Government to demonstrate that the defendant intentionally prevented authorized use and thereby caused loss.  We also find that there was sufficient evidence for the jury to conclude that Morris acted "without authorization" within the meaning of section 1030(a)(5)(A).  We therefore affirm.                                      FACTS  In the fall of 1988, Morris was a first-year graduate student in Cornell University's computer science Ph.D. program.  Through undergraduate work at Harvard and in various jobs he had acquired significant computer experience and expertise.  When Morris entered Cornell, he was given an account on the computer at the computer Science Division.  This account gave him explicit authorization to use computers at Cornell.  Morris engaged in various discussions with fellow graduate students about the security of computer networks and his ability to penetrate it.  In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus."  The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered.  The tactic he selected was release of a worm into network computers.  Morris designed the program to spread across a national network of computers after being inserted at one computer location connected to the network.  Morris released the worm into INTERNET, which is a group of national networks that connect university, governmental, and military computers around the country.  The network permits communication and transfer of information between computers on the network.  Morris sought to program the INTERNET worm to spread widely without drawing attention to itself.  The worm was supposed to occupy little computer operation time, and thus not interfere with normal use of the computers. Morris programmed the worm to make it difficult to detect and read, so that other programmers would not be able to "kill" the worm easily.  *506 Morris also wanted to ensure that the worm did not copy itself onto a computer that already had a copy.  Multiple copies of the worm on a computer would make the worm easier to detect and would bog down the system and ultimately cause the computer to crash.  Therefore, Morris designed the worm to "ask" each computer whether it already had a copy of the worm.  If it responded "no," then the worm would copy onto the computer;  if it responded "yes," the worm would not duplicate.  However, Morris was concerned that other programmers could kill the worm by programming their own computers to falsely respond "yes" to the question.  To circumvent this protection, Morris programmed the worm to duplicate itself every seventh time it received a "yes" response.  As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated.  The worm was also designed so that it would be killed when a computer was shut down, an event that typically occurs once every week or two.  This would have prevented the worm from accumulating on one computer, had Morris correctly estimated the likely rate of reinfection.  Morris identified four ways in which the worm could break into computers on the network:   (1) through a "hole" or "bug" (an error) in SEND MAIL, a computer program that transfers and receives electronic mail on a computer;   (2) through a bug in the "finger demon" program, a program that permits a person to obtain limited information about the users of another computer;   (3) through the "trusted hosts" feature, which permits a user with certain privileges on one computer to have equivalent privileges on another computer without using a password;  and   (4) through a program of password guessing, whereby various combinations of letters are tried out in rapid sequence in the hope that one will be an authorized user's password, which is entered to permit whatever level of activity that user is authorized to perform.  On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology.  MIT was selected to disguise the fact that the worm came from Morris at Cornell.  Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated.  Ultimately, many machines at locations around the country either crashed or became "catatonic."  When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution.  Eventually, they sent an

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久久综合视频| 欧美日韩精品久久久| 久久久久久免费| 国产精品亚洲视频| 国产日韩欧美精品一区| 成人午夜视频免费看| 亚洲欧美成aⅴ人在线观看| 91福利在线看| 日日摸夜夜添夜夜添国产精品| 91麻豆精品国产91久久久久| 精品一区二区三区香蕉蜜桃| 2023国产精品视频| 91蜜桃传媒精品久久久一区二区| 一区二区三区日韩欧美| 欧美精品一卡二卡| 国产成人8x视频一区二区 | 欧美精品xxxxbbbb| 日本高清不卡视频| 免费看黄色91| 久久久www成人免费无遮挡大片| 成人avav影音| 日本 国产 欧美色综合| 中文字幕+乱码+中文字幕一区| 在线免费观看视频一区| 美美哒免费高清在线观看视频一区二区 | 久久久精品日韩欧美| 大白屁股一区二区视频| 亚洲一区二区五区| 欧美成人午夜电影| 在线欧美一区二区| 国产麻豆精品一区二区| 亚洲午夜影视影院在线观看| 久久综合久久综合九色| 在线观看免费亚洲| 粉嫩蜜臀av国产精品网站| 亚洲午夜久久久| 国产欧美va欧美不卡在线| 在线电影一区二区三区| 成人黄色国产精品网站大全在线免费观看| 99re6这里只有精品视频在线观看| 日本女优在线视频一区二区| 国产精品美女久久久久久久久| 91精选在线观看| 色综合久久天天综合网| 国产又粗又猛又爽又黄91精品| 亚洲激情成人在线| 国产日韩在线不卡| 91精品国产品国语在线不卡| 色呦呦国产精品| 国产一区二区三区黄视频 | 国产精品一区二区久久不卡 | 欧美一区二区美女| 99视频超级精品| 激情另类小说区图片区视频区| 亚洲综合一二三区| 欧美韩国日本综合| 久久综合网色—综合色88| 欧美精品99久久久**| 日本高清成人免费播放| 成人国产免费视频| 国产福利视频一区二区三区| 精品综合免费视频观看| 亚洲已满18点击进入久久| 一区免费观看视频| 欧美高清一级片在线观看| 久久综合九色综合97婷婷| 日韩欧美不卡在线观看视频| 欧美电影一区二区三区| 欧美视频在线一区二区三区| 91女神在线视频| 不卡av在线免费观看| 99精品视频免费在线观看| 国产女人aaa级久久久级| 精品国产百合女同互慰| 成人高清av在线| 国产**成人网毛片九色| 亚洲免费在线视频一区 二区| 中文字幕久久午夜不卡| 亚洲国产经典视频| 国产精品久久午夜| 中文字幕亚洲在| 欧美日韩一区二区在线观看视频| 亚洲国产中文字幕| 中文字幕亚洲电影| 日韩久久久精品| 欧美日韩欧美一区二区| 成人动漫一区二区在线| 日本韩国欧美国产| 国产盗摄视频一区二区三区| 日韩国产一二三区| 亚洲黄色在线视频| 国产精品久久久久久久裸模| 日韩精品一区二区三区中文精品| 色视频欧美一区二区三区| 国产酒店精品激情| 久久精品国产久精国产| 日本在线播放一区二区三区| 亚洲综合色丁香婷婷六月图片| 国产欧美日韩不卡免费| 久久免费的精品国产v∧| 337p亚洲精品色噜噜狠狠| 欧美亚洲日本国产| 色婷婷亚洲精品| 色美美综合视频| 色综合欧美在线| 色综合久久中文综合久久97| 99久久伊人精品| 成人av免费在线| 波多野结衣精品在线| 成人性生交大合| 99视频热这里只有精品免费| 成人a区在线观看| www.欧美色图| 日本高清不卡视频| 欧美亚一区二区| 91福利在线观看| 欧美日韩国产成人在线91| 欧美军同video69gay| 成人av先锋影音| 色哦色哦哦色天天综合| 国产成人免费在线| 成人aa视频在线观看| 99精品桃花视频在线观看| 99久久99久久久精品齐齐| 99久久免费精品高清特色大片| 97se亚洲国产综合在线| 92精品国产成人观看免费| 色综合久久天天| 91精品国产综合久久精品| 欧美一区二区成人6969| 精品国产一区二区三区久久影院| 久久欧美一区二区| 天天色综合天天| 日本伊人色综合网| 国产一区不卡在线| av在线不卡免费看| 在线观看91精品国产入口| 欧美系列亚洲系列| 精品久久免费看| 日韩理论片中文av| 日韩福利电影在线观看| 国产成a人无v码亚洲福利| 欧亚洲嫩模精品一区三区| 在线综合亚洲欧美在线视频| 欧美精品一区二区三区蜜臀| |精品福利一区二区三区| 午夜精品一区二区三区三上悠亚| 久久91精品久久久久久秒播| 99精品热视频| 日韩欧美亚洲另类制服综合在线| 国产精品理论在线观看| 丝袜诱惑亚洲看片| 福利电影一区二区| 欧美精品丝袜中出| 国产精品国产自产拍在线| 香蕉久久夜色精品国产使用方法| 国产美女一区二区三区| 欧美日韩一区二区在线观看| 国产欧美日本一区视频| av一二三不卡影片| 日韩亚洲欧美成人一区| 亚洲免费视频成人| 国产一区二区三区免费观看| 在线精品视频小说1| 久久久www免费人成精品| 水蜜桃久久夜色精品一区的特点| 成人性色生活片| 亚洲精品一区在线观看| 爽好多水快深点欧美视频| 99精品欧美一区二区三区小说| 欧美tickling网站挠脚心| 亚洲国产sm捆绑调教视频| 97久久超碰国产精品电影| 国产性色一区二区| 精品一区二区三区免费播放| 欧美三级日韩在线| 亚洲精品v日韩精品| 国产成人亚洲综合色影视| 欧美成人一区二区三区片免费| 天堂av在线一区| 欧美日韩另类国产亚洲欧美一级| 国产精品久久久爽爽爽麻豆色哟哟 | 美女脱光内衣内裤视频久久影院| 91色porny在线视频| 中文一区在线播放| 国产在线播放一区| 欧美不卡一二三| 免费成人小视频| 日韩欧美专区在线| 美女视频黄 久久| 欧美成人性战久久| 精品一区二区三区在线观看国产| 欧美一区二区精品在线| 日本一不卡视频| 欧美mv和日韩mv的网站| 激情伊人五月天久久综合| 久久久久久久久久看片| 国产成人综合在线观看| 国产精品素人一区二区| 成人av资源下载|