Actually, the defense attorney's statement is ludicrous.

A good example of a geometric series is the propagation of a computer worm.

VAXcomputers running versions of the Berkeley UNIX operating system.

The additional space required by the document from the victim's computer makes the attachment even larger, perhaps more than 200000 bytes, which is larger than most webpages and most e-mail messages.

This virus infected the boot sector of 5¼ inchfloppy diskettes with a 360 kbyte capacity.

who were trying to decompile the worm and understand it.

On 5 October 1992, Blumenthal and Pilgrim were each sentenced to:The court clerk has informed me that there is no written Judgmentfiled for either Blumenthal or Pilgrim.

In November 1987, a virus was discovered infectingthe  file on DOS diskettes atLehigh University.

The Rutgers Program in Comparative Literature is pleased to announce a five-year collaboration with the Autonomous National University of Mexico (UNAM). This partnership, beginning in 2018-19 and funded generously by the Mellon Foundation’s Critical Theory in the Global South initiative, will support reciprocal dissertation workshops in Mexico City and New Brunswick, as well as the creation of a new interdisciplinary course, to be taught concurrently in English and Spanish at Rutgers and UNAM, on “The University and Its Publics: North, South, and In Between.”

A student at a university in Germany created a wormin the REXX language.


Court of Appeals upheld the trial court's decision.

(This trick would be used again, on a different operating system,in March 1999 by the virus.)The Christma worm deleted itself after it functioned once.

Supreme Court refused to hear an appeal from Morris.

However, the one copy deleted was replaced by multiple copies sentto everyone with an e-mail address in either the in-box or out-box of theuser's account, so the total number of copies continued to increase.

Morris, 928 F.2d 504, 506 (2dCir.



On 2 November 1988, Robert Tappan Morris, then a first-year graduate student incomputer science at Cornell University, released his worm that effectivelyshut down the Internet for several days.

Denning, editor, Addison-Wesley, 1990.



Quick intervention at Lehigh University, including overnightdevelopment and distribution of a disinfection program, stopped this virusfrom spreading off campus.

Available from the and published in various places.



The Morris Worm used four different ways to get authorizedaccess to computers connected to the Internet:The worm only infected SUN-3 and Digital Equipment Corp.

Available from a in Canada and also from .

Among the affected computers were those at the University of Californiaat Berkeley, MIT, Stanford, Princeton , Purdue, Harvard, Dartmouth,University of Maryland, University of Utah,Georgia Institute of Technology, and many other universities,as well as computers at military and government laboratories.

Available from Francis Litterio's .

Further, the anonymous source, and also the tentative tone(i.e., " virus report", " be a virus loose","I hope it is a "),make this message much less helpful than it could have been.