Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Urban Legends Good Times - 1,927 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Implicit in the rhetoric of the Information Superhighway is the understanding that through this technology, individuals will better understand the world around them, establishing a stronger sense of community through open dialogue. An examination of folktales and urban legends on the Internet, however, suggests that, if anything, this technology is becoming increasingly mythologized and is leading to a new sense of domestic alienation. In the years since Carl Lindahl noted that turning to modern legends that address... technology, we find relatively few which present evidence of the otherworld, new technologies have emerged to form that missing otherworld.

Chief among these technologies has been the explosion of the Internet, giving some users a new sense of community based upon a shared reality empowered by technology. Not surprisingly, the online community has created its own set of myths, often telling of unknown persons and unusual events. These stories have also come to include a new kind of supernatural anti-hero: the unknown and unknowable hacker, who makes his home among the silicon and binaries of this new otherworld. Stories of this characters powers circulate in abundance, forwarded from one person to the next through e-mail and newsgroups.

These stories represent a new breed of legend, one which combines the traditional folktale with the style and contemporary nature of urban legends to form a new version of both, something that might best be described as an electronic legend or e-legend. Virus hoaxes are perhaps the most noticeable form of the hacker e-legend. They are terrifying stories, which warn against imaginary and often technically impossible viruses created by hackers. Often, virus hoaxes are reports about viruses which are allegedly spreading across the Internet, generally through e-mail, and they are often considered true by many unwitting Internet users. As part of any investigation into folktales and legends, it is necessary to identify the community for whom these stories provide some means of information transmission.

In the case of e-legends, the community in question is the wired community collectively known as the Internet. From its origins in academic and defense department computing, the Internet has gradually come to affect almost every aspect of modern life, from how we gather and arrange information, to where we go to buy a new car. In this community, information of common interest is transmitted from user to user with the help of several information mediums such as e-mail, IRC (a form of real time chat), news groups and websites. Virus hoaxes thrive in a community for whom the threat of virus infection is a genuinely frightening possibility. Although they rarely do the amount of damage that hoaxes suggest, computer viruses do spread online and are, in fact, capable of destroying vast quantities of information. Some of the most common variations of virus hoaxes are known by the titles Good Times, Pen pal, Deeyenda and Death 69.

These sorts of hoaxes warn against viruses that do the impossible, such as spread merely by the transmission of e-mail (Good Times, Pen pal, Deeyenda and Death 69 all claim this feature). Death 69 claims that its virus is capable of physically eat[ing] at the materials of the [hard]drive (a variation on this theme is also found in the Pen Pal hoax). The assertion that these viruses can do the impossible and the common belief that they are the creation of hackers has elevated both hackers and viruses to an otherworldly status. Viruses act as the spells cast by mythical hackers.

The Good Times virus hoax, dated back to November 15, 1994, is frequently considered the grandfather of email virus hoaxes. It has also undergone the most changes during its lifetime. In its original draft, known as the FYI version, the person who forwarded the message includes the simple statement, I understand that there is a virus included in x-named file, which if downloaded to your personal computer, will ruin all of your files. With this version of the Good Times hoax, the author doesnt claim to have any definite proof and appears to be passing it along just to be safe. While many people might assume that legends will experience only limited change in an environment where people are just re-mailing and re-posting the same message, Good Times has proven this assumption to be false. Within three weeks (dated back to Dec. 2, 1994) of the FYI version, the Happy Chanukah version appeared.

Two things are most notable in this version: first, it expresses no doubt about the virus existence, and second, the myth that the virus is part of a file has been replaced with the myth that the virus is the actual message itself. The FYI versions statement of I understand that there is a virus included in that file, which if downloaded to your personal computer, will ruin all of your files is mild in comparison with Happy Chanukah's warning that If you get anything called Good Times, DONT read it or download it. It is a virus that will erase your hard drive. Forward this to all your friends.

It may help them a lot. The threat is no longer just a file, but now the words themselves. Additionally, the Happy Chanukah version also asks the receiver to rebroadcast the message in order to protect others. Not long after the Happy Chanukah version of Good Times appeared, the most persistent version of this hoax also appeared, the ASCII version, along with its common variation, FCC or Infinite Loop.

In the ACSII version of the Good Times hoax, the e-legend includes two new characters in the warning, the Federal Communications Commission and, more importantly, an unnamed AOL user who engineered this virus. In the FCC/Infinite Loop variations of Good Times the message begins with the statement that, The FCC released a warning concerning a matter of major importance to any regular user of the InterNet. The assertion that the warning has come from the FCC lends the hoax to frequent revivals, apparently because users seem to feel that something quoted from a government agency must have some basis in fact. The FCC variation goes on to say that the virus was engineered by a user of America Online [and] is unparalleled in its destructive capability. This warning elevates the status of the Good Times creator to almost god-like proportions. While the warning doesnt go so far as to claim the creator was a hacker, many people would infer this from a common misconception, itself an e-myth, which stipulates that all viruses are written by hackers.

Bob Rosenberger addresses this on a web page called MYTH: teenage hackers write most of the viruses out there. The FCC variation of the Good Times hoax, which couples hacker mythology and government sanction, encourages users to view the hacker as a possessor of supernatural powers Another lesser known virus hoax that also draws upon the figure of the hacker as a supernatural figure is Death 69. The author of this hoax claims that the virus is full stealth and Trojan, once thought never possible. Essentially, the author is claiming that the virus creator has managed to transcend the limitations of all known computer programs. The hacker gets situated in the otherworld. His or her otherworldliness is reinforced when the author goes on to explain how the virus first formats the hard drive, then it physically eats at the materials of the drive.

The premise of a virus such as Death 69 which has the power to physically [eat] at the materials of the drive taps into common fears of foreign invasions into and destruction of the users private property. This hoax suggests that the hackers code, itself just a series of 1 s and 0 s, is able to physically manifest itself as an entity not just in the otherworld of the Internet, but in the world of our domestic lives. As computers grow more crucial to daily life, in other words, they become increasingly endowed with super-myths and legends. Perhaps because most ordinary users dont understand their computers, they turn to superstition and mythology to explain them.

Claims that viruses can do the impossible prey upon the ignorance of users and figure the computer as a liminal zone through which supernatural characters of the otherworld (hackers, crackers and malicious coders) can trespass upon the users personal domain. Viruses, at least of the hoax variety, turn this domain into a portal through which hackers can pass, destroying the users interaction with her online community. Thus hackers, already seen as a threat to the world of computers, are instilled with the additional power to disrupt community stability and organization. In identifying the computer as a liminal zone, it is important to remember that it represents the area between this world and the otherworld, thus suggesting a geographic distinction between our world and an imaginary online community. In the case of virus hoaxes, computers provide the distinction between worlds, because it is only through the use of the computer that users can access the otherworld. It is a reliance upon computers which leads to the vilification of hackers as a threat to the wired community.

Without the need for computers to act as information conduits and magical communities, the virus hoax, and by extension the hacker, would be rendered powerless. Its important to remember that the term computer virus is a direct reference to human viruses, and therefore evokes a sense of human vulnerability. This sense of vulnerability, then, can be connected to the way viruses are perceived as a physical threat to the individual members of the wired community. In the threat of violence against the property of the average computer user there is another sign of the traditional folktale: as Max L thi puts it, all changes of form come about with mechanical abruptness. The mechanical abruptness of the folktale is apparent in the last lines of Good Times which claim most novice computer users will not realize what is happening until it is far too late. Likewise, the Death 69 hoax claims that researchers are stunned, they say it is probably the most destructive virus ever created.

The threat of physical harm is also present in many urban legends, which tend to be violent. Perhaps the social changes which have followed the Internet explosion, themselves quite abrupt, have lead to stories which suggest near-apocalyptic scenarios in which innocent users find themselves suddenly at the mercy of forces beyond their control. Despite their similarities to folktales, there can be little doubt that computer virus hoaxes are urban legends spread to warn users of the dangers out there. According to Lindahl, urban technology is a threat because it makes home life increasingly reliant on sources beyond its control.

Hoaxes, as a subset of the technology legend, reveal a sense of vulnerability upon the part of the computer user, a feeling that while technology can be good, it also holds the potential for misuse and threat. This impending threat is apparent when computer users forward a copy of Death 69 to all their friends, and post these messages to news groups in the belief that they are performing a public service by warning other users of the danger they face. Virus myths also reveal how new modes of production and communication always seem to lead to new kinds of mythologizing. The effect of re-broadcasting these virus threat messages through the Internet presents a paradoxical doubling. While the e-mail messages may contain methods of destruction as implied by virus myths, the messages could also potentially be a means of salvation, saving potential victims from danger.


Free research essays on topics related to: hard drive, good times, e mail, urban legends, computer virus

Research essay sample on Urban Legends Good Times

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com