{"id":148,"date":"2008-09-04T10:52:14","date_gmt":"2008-09-04T14:52:14","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/ahshieh\/?p=148"},"modified":"2008-09-04T10:52:14","modified_gmt":"2008-09-04T14:52:14","slug":"le-petit-overload-alan-demonstrates-publics-understanding-of-computer-security","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/2008\/09\/04\/le-petit-overload-alan-demonstrates-publics-understanding-of-computer-security\/","title":{"rendered":"le petit overload. alan demonstrates public&#8217;s understanding of computer security."},"content":{"rendered":"<p>I am constantly asked, &#8220;How quickly can you take down someone&#8217;s computer?&#8221; and am constantly told, &#8220;No one&#8217;s dumb enough these days to open a virus.&#8221; Well virus or not, contrary to standard belief, the public really doesn&#8217;t check any more in regards to security before opening a file.<\/p>\n<p>In a recent talk I was asked to demonstrate how hard it would be to shutdown someone&#8217;s computer through overload. I opened a text editor, created a looping batch file, packaged it in an executable, and plugged a phony icon into it. The whole process took less than a minute, since it consisted of typing &#8220;start start start start start &#8230;&#8221; and then having the same process launch: painfully &#8220;Hello World.&#8221; level programming anyone can do. <\/p>\n<p>I threw the file online as a torrent, said it was the crack to the upcoming Red Alert 3, and watched hundreds of computers freeze and crash despite putting &#8220;will cause computer to crash&#8221; and &#8220;fake&#8221; in the file name and description.<\/p>\n<p>Wow.<\/p>\n<p>Download a similar looping batch file <a href=\"http:\/\/stanford.edu\/~nadiafx\/petit.exe\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am constantly asked, &#8220;How quickly can you take down someone&#8217;s computer?&#8221; and am constantly told, &#8220;No one&#8217;s dumb enough these days to open a virus.&#8221; Well virus or not, contrary to standard belief, the public really doesn&#8217;t check any more in regards to security before opening a file. In a recent talk I was [&hellip;]<\/p>\n","protected":false},"author":1892,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[901],"tags":[],"class_list":["post-148","post","type-post","status-publish","format-standard","hentry","category-life"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/posts\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/users\/1892"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ahshieh\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}