On Tuesday, June 24, 2003, the first-ever post to this blog read:
Hello! Welcome to my world! Rather than send e-mail to my friends (and foes), I decided to enter the 21st century and publish a Web Log (Blog). Visit daily. Youneverknow.
More than 11K visitors have clicked on this blog's URL to look among nearly 2,500 posts. However, another gap in the Associated Press 40th Anniversary Timeline of Internet Milestones makes no mention of blogging or Wikipedia. The magic of hyperlinks mends those flaws. Now, thanks to this blog, the 40th Anniversary Timeline is improved. If this is a (fair & balanced) delusion of grandeur, so be it.
[x AP]
The Internet’s 40th Anniversary Milestone Timeline
Tag Cloud of the following timeline
Summer of 2009: Bad URLs swamp the Internet. Through the first half of 2009, IBM’s X-Force team tracks a 508% leap in the number of new malicious Web links versus the first half of 2008. Most bad links function as relays to other Web pages set up to quickly embed a wormhole (referred to as a Trojan downloader) to the hard drive of the visitor’s PC. The attacker then uses this wormhole to install code that groups the PC with thousands of other infected machines in a botnet. The attacker is then able to lease out the botnet to other criminals who need computing power to deliver spam, steal data, spread promos for fake antivirus subscriptions and hijack online banking accounts. Bad links are moot, of course, if no one clicks on them. So the Internet has become swamped with ploys to steer people to bad links. They turn up in search query results and in e-mail spam. And bad links are surging through messages and postings on popular social networks.
2009: The Koobface worm steals logons and contact lists from users of Facebook, MySpace, Twitter, YouTube, Friendster, Bebo and Hi5. It delivers bad links in messages and microblogs that appear to come from trusted acquaintances.
2009: The Seattle Post-Intelligencer becomes the first major daily newspaper to move entirely online. Google announces development of a free computer operating system designed for a user experience that primarily takes place on the Web.
2009: Twitter emerges as the fastest growing site on the Internet with 6 million unique monthly visitors and 55 million monthly visits — getting 1,400 percent larger every month
2009: Conficker RPC-DCOM worm; The Conficker worm has created a secure, worldwide infrastructure for cybercrime. The worm allows its creators to remotely install software on infected machines. What will that software do? We don’t know. Most likely the worm will be used to create a botnet that will be rented out to criminals who want to send SPAM, steal IDs and direct users to online scams and phishing sites.
2008: Cyber thieves crack database of Heatland Payment Systems and steal 130 million payment card transaction records over 13 months before getting detected.
2008: World Internet population surpasses 1.5 billion. China’s Internet population reaches 250 million, surpassing the United States as the world’s largest. Netscape’s developers pull the plug on the pioneer browser, though an offshoot, Firefox, remains strong. Major airlines intensify deployment of Internet service on flights.
2007: Storm email virus; Poor Microsoft, always the popular target. Like Blaster and others before, this worm’s payload performed a denial-of-service attack on www.microsoft.com. During Symantec’s tests an infected machine was observed sending a burst of almost 1,800 emails in a five-minute period.
2007: Apple releases iPhone, introducing millions more to wireless Internet access.
2006: Cyber thieves breach TJX retail chain database to steal 94 million credit and debit card transaction records over an eight month period.
2006: World Internet population surpasses 1 billion.
2005: Launch of YouTube video-sharing site.
2004: Mark Zuckerberg starts Facebook as a sophomore at Harvard University.
2004: Sasser LSASS worm; This nasty worm spread by exploiting a vulnerable network port, meaning that it could spread without user intervention. Sasser wreaked havoc on everything from The British Coast Guard to Delta Airlines, which canceled some flights because of computer infection.
2003: MSBlast RPC-DCOM worm; Blaster is a worm that triggered a payload that launched a denial of service attack against windowsupdate.com, which included the message, “billy gates why do you make this possible? Stop making money and fix your software!!”
2003: Slammer SQL server worm; This fast-moving worm managed to temporarily bring much of the Internet to its knees in January of 2003. The threat was so aggressive that it was mistaken by some countries to be an organized attack against them.
2002: World Internet population surpasses 500 million.
2001: Code Red ISS worm; Websites affected by the Code Red worm were defaced by the phrase “Hacked By Chinese!” At its peak, the number of infected hosts reached 359,000.
2001: Nimda email virus; A mass-mailing worm that uses multiple methods to spread itself, within 22 minutes, Nimda became the Internet’s most widespread worm. The name of the virus came from the reversed spelling of “admin.”
2000: The dot-com boom of the 1990s becomes a bust as technology companies slide. Amazon.com, eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
2000: I Love You email virus; Who wouldn’t open an e-mail with “I Love You” in the subject line? Well, that was the problem. By May 2000, 50 million infections of this worm had been reported. The Pentagon, the CIA, and the British Parliament all had to shut down their e-mail systems in order to purge the threat.
2000: Mafiaboy installs bots on computers at Yale and Harvard universities and used them to crash CNN’s Web site for four hours and create chaos at the Web sites of Yahoo, eBay, Amazon, Dell, Excite, and E-Trade. He bragged in chat rooms that the FBI would never catch him.
1999: First Harry Potter book is published; Ricky Martin has hit single, "In Vida Loca"; Amazon loses millions selling books on line, but investors shower it with funds, and its stock prices soars from $6 per share to $106, giving founder Jeff Bezos plenty to laugh about.
1999: Melissa email virus; Melissa was an exotic dancer and David L. Smith was obsessed with her and also with writing viruses. The virus he named after Melissa and released to the world on March 26th, 1999, kicked off a period of high-profile threats that rocked the Internet between 1999 and 2005.
1999: Napster popularizes music file-sharing and spawns successors that have permanently changed the recording industry. World Internet population surpasses 250 million.
1998: Google forms out of a project that began in Stanford dorm rooms. U.S. government delegates oversight of domain name policies to Internet Corporation for Assigned Names and Numbers, or ICANN. Justice Department and 20 states sue Microsoft, accusing the maker of the ubiquitous Windows operating system of abusing its market power to thwart competition from Netscape and others.
1996: Passage of U.S. law curbing pornography online. Although key provisions are later struck down as unconstitutional, one that remains protects online services from liability for their users’ conduct, allowing information and misinformation to thrive.
1995: Amazon.com opens its virtual doors.
1994: Marc Andreessen and others on the Mosaic team form a company to develop the first commercial Web browser, Netscape, piquing the interest of Microsoft and other developers who would tap the Web’s commerce potential. Two immigration lawyers introduce the world to spam, advertising their green card lottery services.
1993: Andreessen and colleagues at University of Illinois create Mosaic, the first Web browser to combine graphics and text on a single page, opening the Web to the world with software that is easy to use.
1990: Tim Berners-Lee creates the World Wide Web while developing ways to control computers remotely at CERN, the European Organization for Nuclear Research.
1989: Quantum Computer Services, now AOL, introduces America Online service for Macintosh and Apple II computers, beginning an expansion that would connect nearly 27 million Americans online by 2002. Source: AP
1988: One of the first Internet worms, Morris, cripples thousands of computers.
1988: Morris worm. An oldie but a goodie; without Morris the current threat “superstars” wouldn’t exist. The Morris worm (or Internet worm) was created with innocent intentions. Robert Morris claims that he wrote the worm in an effort to gauge the size of the Internet. Unfortunately, the worm contained an error that caused it to infect computers multiple times, creating a denial of service.
1983: Domain name system is proposed. Creation of suffixes such as “.com,” “.gov” and “.edu” comes a year later.
1974: Vint Cerf and Bob Kahn develop communications technique called TCP, allowing multiple networks to understand one another, creating a true Internet. Concept later splits into TCP/IP before formal adoption on January 1, 1983.
1973: Arpanet gets first international nodes, in England and Norway.
1972: Ray Tomlinson brings e-mail to the network, choosing “at” symbol @ as way to specify e-mail addresses belonging to other systems.
1970: Arpanet gets first East Coast node, at Bolt, Beranek and Newman in Cambridge, Mass.
1969: On September 2, two computers at University of California, Los Angeles, exchange meaningless data in first test of Arpanet, an experimental military network. The first connection between two sites UCLA and the Stanford Research Institute in Menlo Park, CA takes place on October 29, though the network crashes after the first two letters of the word “logon.” UC Santa Barbara and University of Utah later join. Ω
Copyright © 2009 Associated Press
Get the Google Reader at no cost from Google. Click on this link to go on a tour of the Google Reader. If you read a lot of blogs, load Reader with your regular sites, then check them all on one page. The Reader's share function lets you publicize your favorite posts.
Copyright © 2009 Sapper's (Fair & Balanced) Rants & Raves
No comments:
Post a Comment
☛ STOP!!! Read the following BEFORE posting a Comment!
Include your e-mail address with your comment or your comment will be deleted by default. Your e-mail address will be DELETED before the comment is posted to this blog. Comments to entries in this blog are moderated by the blogger. Violators of this rule can KMA (Kiss My A-Double-Crooked-Letter) as this blogger's late maternal grandmother would say. No e-mail address (to be verified AND then deleted by the blogger) within the comment, no posting. That is the (fair & balanced) rule for comments to this blog.