Computer Terror and Distruction Issue #1 – BBS Infiltration _____By the Chamelion
>This article starts of the first issue of Computer Terror and Distruction. Each issue will deal with a particular area of computer distruction, dealing mostly with different ways to fuck over computers.
>A number of myths have popped up recently about the threat of computer “viruses”. There are myths about how widespread they are, how dangerous they are, and even myths about what a computer virus really is. We’d like the facts to be known.
Back in the mid-1960s, at the height of the cold war, the U. S. Department of Defense faced a tough question: How could orders be issued to the armed forces if the U.S. were ravaged by a nuclear assault? The communication hubs in place at the time the telephone switching offices and the radio and TV broadcast stations were not only vulnerable to attack, they would also probably be the first to go. The Pentagon needed a military command-and-control system that would continue to operate even if most of the phone lines were in tatters and the switches had melted down.