There's something magic about when mothers make food. Even if it's microwavable macaroni or ramen noodle soup, it always tastes better.

By Jordan Spencer Cunningham on November 21, 2014

In the course of writing a research paper on possible new methods to reduce and eradicate computer virus threats, I came across a bit of intriguing history whose available details did not satisfy my curiosity, and I needed to know more than what the internet had to offer. The event in question was the creation of Creeper, a piece of software created in 1971 by Bob Thomas that has since been commonly accepted as the world’s first computer virus. What Wikipedia and the rest of the internet will tell you is that Creeper was created to “infect” computers running the TENEX operating system on ARPAnet, the predecessor to the internet. It would cause the machine to print “I’M THE CREEPER. CATCH ME IF YOU CAN.” Then Ray Tomlinson created Reaper whose sole purpose was to seek out and remove Creeper from TENEX machines on ARPAnet– so all at once, the first virus (specifically worm, if that) and the first helpful worm were created.  However, I’m beginning to think journalistic sensationalism has turned Creeper into something it’s not, especially by today’s standards– that is, a virus. Regardless, this was all still interesting.

I wanted to know more, though. Why was Creeper created in the first place? Did it cause problems? Was it an annoyance?  Should it really be considered the first virus? So I found contact information for Ray Tomlinson, asked him if I could ask a few questions about Creeper and Reaper, and he very kindly obliged. Below is an email Q&A session with Ray himself, and I think the details he reveals about this piece of history are very interesting and enlightening; they also cast it in an entirely different light. Also, Ray sent me a link before I asked him my questions that contained the best information I could thus far find online; this information helped me form some of these questions in a better way as it helped me realize that Creeper wasn’t a malevolent or even jovial practical joke as it is sometimes painted. The link he sent is available here.

{Read further…}

By Jordan Spencer Cunningham on September 24, 2014

I happened to lose the five-digit code for a SentrySafe (model KSW0510) that we had bought. Looking up the company’s website let me know that I could get the factory default combination from them again with a notarized form proving that I am who I say I am as well as $30. I knew of a couple of other things on which I could spend that $30, and I knew that the safe’s electronics were likely rather simple, so I opted to take the funner way out and use my programming and electronics prowess to crack the combination myself. This post outlines in good detail how I cracked the combination using a brute-force combination cracker I programmed in Python that interfaced with the safe using a Raspberry Pi. If you’re not very tech-savvy and just want to see the safe cracker in action, click here to skip ahead to the video of the finished product.

{Read further…}

By Jordan Spencer Cunningham on September 23, 2014

“Bigotry” is one of those 21st-century words that’s thrown around by the media and the popular kids like a football at a college campus on Thanksgiving. It doesn’t really mean what it originally meant. In fact, it doesn’t really mean anything anymore just like the rest of the words that have been neutered by the “progressives” with perpetually hurt feelings, but let’s explore what it’s supposed to mean and what it originated in meaning and compare and contrast (like we did in elementary school) the vast, ironic, and funny differences.

{Read further…}

By Jordan Spencer Cunningham on September 22, 2014

See part one explaining the problem here

Since the dawn of the modern office, the common man has increasingly had to deal with the stresses of too much information causing him what is known as information overload. According to a study performed at the beginning of the internet’s explosion, “information overload occurs when the amount of input to a system exceeds its processing capacity”. The processing capacity of mankind has been pushed to its limits in the years since that study, and now society is facing unprecedented problems with stress, unproductivity, laziness, and even unfaithfulness all due to the vast increase in the overload of data having to process through the average human brain.

{Read further…}

By Jordan Spencer Cunningham on September 16, 2014

 

Why do we fund our own enslavement to a life of mediocrity by purchasing the very tools, over and over again, that help us be mediocre?

By Jordan Spencer Cunningham on September 15, 2014

The 21st-century world is perpetually flooded with more information and data than it can hold, and society is driven to consume as much of it as possible both in lieu of occupation and by choice. In the realm of technology, a computer can only process so much information at one time. Each device—from the simplest microwave to the most advanced supercomputer with dozens of nodes—has its limit of how much data can be pumped through its chips before it bottlenecks or even halts absolutely. So, too, the human psyche has its limits and will similarly degrade in productivity or even stall when confronted with too many stimuli and input. Its causes are various and widespread. It’s not just a personal problem; when an individual suffers, so does everything around him: his family, friends, work, social tendencies, and other devotions. With too many points of focus, no points will receive adequate attention.

{Read further…}

By Jordan Spencer Cunningham on September 10, 2014

I recently filled out some junk online forms with fake information using the name Julie Doggie, who is a real person and just so happens to be my dog. I made the mistake of using my Google Voice number for this junk form. The other day I received a call from a number in my local area code. After picking up and giving a greeting, I heard a lady ask, “May I speak with Julie?”

{Read further…}