亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? morris~1.txt

?? 黑客培訓(xùn)教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
928 F.2d 504 59 U.S.L.W. 2603(CITE AS: 928 F.2D 504)                       UNITED STATES of America, Appellee,                                       v.                   Robert Tappan MORRIS, Defendant-Appellant.                            No. 774, Docket 90-1336.                         United States Court of Appeals,                                 Second Circuit.                              Argued Dec. 4, 1990.                             Decided March 7, 1991.  Defendant was convicted in the United States District Court for the Northern District of New York, Howard G. Munson, J., of violating computer Fraud and Abuse Act.  Defendant appealed.  The Court of Appeals, Jon O. Newman, Circuit Judge, held that:  (1) statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss, and (2) there was sufficient evidence to conclude that defendant acted without authorization within meaning of statute.  Affirmed. [1] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Statute which punishes anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more does not require Government to demonstrate that defendant intentionally prevented authorized use and thereby caused loss.  18 U.S.C.A. s 1030(A)(5)(A). U.S. v. Morris 928 F.2d 504, 59 U.S.L.W. 2603 [2] 129K1 DISORDERLY CONDUCT K. Nature and elements of offenses. C.A.2 (N.Y.) 1991. Defendant's transmission of computer "worm" constituted accessing federal interest computer without authorization under statute punishing anyone who intentionally accesses without authorization federal interest computers and damages or prevents authorized use of information in those computers causing loss of $1,000 or more;  defendant used computer program that transfers and receives electronic mail and program that permits person to obtain limited information about users of another computer to release "worm" into group of national networks that connected university, governmental, and military computers around the country and use of those features was not in any way related to their intended function.  18 U.S.C.A. s 1030(A)(5)(A).  *504 Thomas A. Guidoboni, Washington, D.C., for defendant-appellant.  Ellen R. Meltzer, U.S. Dept. of Justice, Washington, D.C. (Frederick J. Scullin, Jr., U.S. Atty., Syracuse, N.Y., Mark D. Rasch, U.S. Dept. of Justice, Washington, D.C., on the brief), for appellee.  *505 Before NEWMAN and WINTER, Circuit Judges, and DALY, District Judge. [FN*]      FN* The Honorable T.F. Gilroy Daly of the District Court for the District     of Connecticut, sitting by designation.  JON O. NEWMAN, Circuit Judge:  This appeal presents two narrow issues of statutory construction concerning a provision Congress recently adopted to strengthen protection against computer crimes.  Section 2(d) of the computer Fraud and Abuse Act of 1986, 18 U.S.C. s 1030(A)(5)(A) (1988), punishes anyone who intentionally accesses without authorization a category of computers known as "[f]ederal interest computers" and damages or prevents authorized use of information in such computers, causing loss of $1,000 or more.  The issues raised are (1) whether the Government must prove not only that the defendant intended to access a federal interest computer, but also that the defendant intended to prevent authorized use of the computer'S information and thereby cause loss; and (2) what satisfies the statutory requirement of "access without authorization."  These questions are raised on an appeal by Robert Tappan Morris from the May 16, 1990, judgment of the District Court for the Northern District of New York (Howard G. Munson, Judge) convicting him, after a jury trial, of violating 18 U.S.C. s 1030(A)(5)(A).  Morris released into INTERNET, a national computer network, a computer program known as a "worm" [FN1] that spread and multiplied, eventually causing computers at various educational institutions and military sites to "crash" or cease functioning.      FN1. In the colorful argot of computers, a "worm" is a program that     travels from one computer to another but does not attach itself to the     operating system of the computer it "infects."  It differs from a "virus,"     which is also a migrating program, but one that attaches itself to the     operating system of any computer it enters and can infect any other     computer that uses files from the infected computer.  We conclude that section 1030(a)(5)(A) does not require the Government to demonstrate that the defendant intentionally prevented authorized use and thereby caused loss.  We also find that there was sufficient evidence for the jury to conclude that Morris acted "without authorization" within the meaning of section 1030(a)(5)(A).  We therefore affirm.                                      FACTS  In the fall of 1988, Morris was a first-year graduate student in Cornell University's computer science Ph.D. program.  Through undergraduate work at Harvard and in various jobs he had acquired significant computer experience and expertise.  When Morris entered Cornell, he was given an account on the computer at the computer Science Division.  This account gave him explicit authorization to use computers at Cornell.  Morris engaged in various discussions with fellow graduate students about the security of computer networks and his ability to penetrate it.  In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus."  The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered.  The tactic he selected was release of a worm into network computers.  Morris designed the program to spread across a national network of computers after being inserted at one computer location connected to the network.  Morris released the worm into INTERNET, which is a group of national networks that connect university, governmental, and military computers around the country.  The network permits communication and transfer of information between computers on the network.  Morris sought to program the INTERNET worm to spread widely without drawing attention to itself.  The worm was supposed to occupy little computer operation time, and thus not interfere with normal use of the computers. Morris programmed the worm to make it difficult to detect and read, so that other programmers would not be able to "kill" the worm easily.  *506 Morris also wanted to ensure that the worm did not copy itself onto a computer that already had a copy.  Multiple copies of the worm on a computer would make the worm easier to detect and would bog down the system and ultimately cause the computer to crash.  Therefore, Morris designed the worm to "ask" each computer whether it already had a copy of the worm.  If it responded "no," then the worm would copy onto the computer;  if it responded "yes," the worm would not duplicate.  However, Morris was concerned that other programmers could kill the worm by programming their own computers to falsely respond "yes" to the question.  To circumvent this protection, Morris programmed the worm to duplicate itself every seventh time it received a "yes" response.  As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated.  The worm was also designed so that it would be killed when a computer was shut down, an event that typically occurs once every week or two.  This would have prevented the worm from accumulating on one computer, had Morris correctly estimated the likely rate of reinfection.  Morris identified four ways in which the worm could break into computers on the network:   (1) through a "hole" or "bug" (an error) in SEND MAIL, a computer program that transfers and receives electronic mail on a computer;   (2) through a bug in the "finger demon" program, a program that permits a person to obtain limited information about the users of another computer;   (3) through the "trusted hosts" feature, which permits a user with certain privileges on one computer to have equivalent privileges on another computer without using a password;  and   (4) through a program of password guessing, whereby various combinations of letters are tried out in rapid sequence in the hope that one will be an authorized user's password, which is entered to permit whatever level of activity that user is authorized to perform.  On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology.  MIT was selected to disguise the fact that the worm came from Morris at Cornell.  Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated.  Ultimately, many machines at locations around the country either crashed or became "catatonic."  When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution.  Eventually, they sent an

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品日韩精品| 久久99国产乱子伦精品免费| 成人激情午夜影院| 久久久777精品电影网影网 | 成人精品免费网站| 精品国产一二三| 久久精品国产澳门| 精品日韩欧美一区二区| 久草中文综合在线| 精品国免费一区二区三区| 日韩主播视频在线| 欧美大肚乱孕交hd孕妇| 激情综合色播激情啊| 欧美本精品男人aⅴ天堂| 国内偷窥港台综合视频在线播放| 欧美大片免费久久精品三p| 精品一区二区精品| 久久久不卡网国产精品一区| 国产精品中文字幕一区二区三区| 国产午夜精品久久久久久久| av一区二区三区在线| 亚洲欧洲制服丝袜| 欧洲一区在线电影| 亚洲国产精品久久久久婷婷884| 欧美在线观看18| 免费xxxx性欧美18vr| 久久久久久久久久电影| 成人污视频在线观看| 亚洲色图清纯唯美| 欧美精品乱码久久久久久按摩| 久久国产精品露脸对白| 中文字幕制服丝袜一区二区三区 | 美女www一区二区| 3751色影院一区二区三区| 亚洲成av人片在线| 久久亚洲精精品中文字幕早川悠里| 国产福利精品一区| 一区二区三区四区在线| 777午夜精品免费视频| 国产在线精品一区二区三区不卡| 国产精品乱码妇女bbbb| 在线免费观看一区| 激情文学综合插| 久久久精品国产免大香伊| 成人a免费在线看| 日韩电影在线一区二区| 国产精品国产自产拍高清av| 欧美日韩不卡在线| 岛国av在线一区| 日韩综合小视频| 亚洲三级视频在线观看| 日韩你懂的电影在线观看| 99riav一区二区三区| 免费高清视频精品| 亚洲综合久久久| 国产午夜亚洲精品不卡| 欧美性三三影院| 成人激情午夜影院| 狠狠色丁香婷婷综合| 亚洲一级电影视频| 国产精品日日摸夜夜摸av| 91精品国产综合久久精品| 99re66热这里只有精品3直播| 久久99久久精品欧美| 亚洲国产精品人人做人人爽| 久久久久久夜精品精品免费| 色呦呦日韩精品| 成人妖精视频yjsp地址| 狠狠v欧美v日韩v亚洲ⅴ| 日韩精品一卡二卡三卡四卡无卡| 亚洲男同1069视频| 国产精品色呦呦| 久久一二三国产| 日韩一区二区三区电影在线观看| 色综合久久综合中文综合网| 成人一区二区三区中文字幕| 偷偷要91色婷婷| 一区二区三区精品在线| 中文字幕一区二区三区视频| 国产日产欧美一区| 久久毛片高清国产| 久久综合九色综合97_久久久| 欧美一区二区观看视频| 欧美日韩国产中文| 欧美中文字幕一区二区三区 | 三级在线观看一区二区| 亚洲大型综合色站| 亚洲一区二区三区四区五区黄 | 久久精品国产色蜜蜜麻豆| 日韩精品乱码av一区二区| 三级不卡在线观看| 日韩国产精品大片| 日本亚洲一区二区| 日本va欧美va欧美va精品| 亚洲午夜精品网| 亚洲免费观看高清完整| 亚洲老司机在线| 亚洲精品国产精品乱码不99| 亚洲精品水蜜桃| 亚洲国产一区二区视频| 一区二区高清在线| 伊人色综合久久天天人手人婷| 亚洲免费观看高清完整| 午夜精彩视频在线观看不卡| 奇米影视7777精品一区二区| 丝袜美腿成人在线| 日本va欧美va瓶| 免费观看在线综合| 国内成+人亚洲+欧美+综合在线| 国产精品一区二区三区乱码 | 亚洲h在线观看| 全部av―极品视觉盛宴亚洲| 极品尤物av久久免费看| 国产成人av一区二区三区在线观看| 岛国一区二区在线观看| 色综合久久中文综合久久97| 欧美精品一卡二卡| 久久综合av免费| 自拍偷拍亚洲综合| 婷婷综合在线观看| 国产福利精品一区二区| 色8久久精品久久久久久蜜| 一本一本久久a久久精品综合麻豆| 欧美在线观看禁18| 精品对白一区国产伦| 最好看的中文字幕久久| 日韩在线卡一卡二| 国产精品99久久久久| 色综合天天性综合| 日韩一区二区电影在线| 欧美国产精品劲爆| 亚洲女同一区二区| 日本色综合中文字幕| 成人精品国产一区二区4080| 色婷婷一区二区| 久久久久久久免费视频了| 一区二区三区在线视频免费观看| 久久精品999| 色综合久久66| 精品国产网站在线观看| 中日韩av电影| 丝袜诱惑制服诱惑色一区在线观看 | 最新中文字幕一区二区三区| 久久av资源站| 91精品国产综合久久福利软件 | 国产福利精品一区| 精品国产一区二区亚洲人成毛片| 亚洲一区二区三区免费视频| av成人免费在线| 亚洲一区视频在线观看视频| 国产精品香蕉一区二区三区| 日韩欧美在线一区二区三区| 亚洲综合偷拍欧美一区色| 91在线码无精品| 国产精品国产三级国产专播品爱网| 国产一区二区网址| 欧美精品一区二区三区一线天视频| 天堂久久久久va久久久久| 欧美日韩一二三区| 五月激情综合色| 91精品国产综合久久福利| 视频一区二区中文字幕| 欧美一区永久视频免费观看| 五月激情六月综合| 欧美一级黄色大片| 青青草97国产精品免费观看 | 欧美四级电影在线观看| 尤物视频一区二区| 欧美性感一类影片在线播放| 午夜欧美2019年伦理| 欧美一区二区三区日韩视频| 久久精品噜噜噜成人88aⅴ| 精品国产免费人成电影在线观看四季| 看片网站欧美日韩| 精品国产一二三区| 懂色av一区二区夜夜嗨| 精品视频在线免费| 欧美—级在线免费片| 国产成人午夜精品影院观看视频 | 8x8x8国产精品| 奇米四色…亚洲| 国产亚洲午夜高清国产拍精品 | 中文字幕精品一区二区三区精品| 成人动漫一区二区在线| 亚洲综合在线第一页| 5566中文字幕一区二区电影 | 久久国产精品露脸对白| 久久久久久久久久久电影| 不卡一区二区中文字幕| 一区二区三区蜜桃| 欧美一区二区三区啪啪| 国产福利电影一区二区三区| 亚洲精品视频一区| 555www色欧美视频| 成人美女视频在线观看18| 亚洲精品视频在线看| 欧美成人三级在线| 99热在这里有精品免费| 免费在线看成人av| 国产精品每日更新|