Reaper is the world’s first antivirus program, although at the time it was made, in the early 1970s, there was no concept of an antivirus. Reaper was created to combat the Creeper virus, which was the world’s first computer virus.

Where did Reaper come from?

Creeper was created as an experimental program by Bob Thomas at Raytheon BBN Technologies, originally named Bolt Beranek and Newman Inc. The Creeper program was designed to self-replicate itself and move between Digital Equipment Corporation (DEC) PDP-10 computers using ARPANET, the precursor to the internet.

How does Reaper work?

Reaper was created by Ray Tomlinson, an American computer programmer well-known to implement the first email program on ARPANET. The Reaper antivirus was designed to delete any instance of the Creeper program that it would find from the DEC computers, marking the beginning of the cybersecurity industry. 

How are Reaper and Creeper related?

When the Creeper program was made with no malicious intent. It is harmless as it only displayed the message “I’m the creeper, catch me if you can”. The Creeper was simply designed to move like a “worm” from one computer to the next using nodes of the ARPANET. As it moved to the next computer, Creeper was designed to erase its old version. The technique used in the Creeper virus was later used in the air traffic simulator programs.

The self-replicating nature of Creeper made it categorized as a virus, although there was nothing malicious about it. It affected 28 DEC mainframe devices and went down in history as the first computer virus program. The video game Core Ware was inspired by the Creeper and Reaper computer programs.

How can businesses use Reaper to protect themselves?

Computer viruses in modern times have evolved into more complex and sophisticated programs including spyware, Trojan horses, keyloggers, and ransomware. The antivirus programs have also evolved over the years to tackle different types of computer viruses.

Although the Creeper virus does not appear to be a problem for businesses of today, similar viruses can cause issues. Reaper might not be sophisticated enough to handle modern-day viruses, therefore businesses should look at updated versions of antivirus programs, security protocols, employee awareness and training, and other methods to combat the ongoing threat of computer viruses.

Ali Azhar
Ali Azhar
Ali is a professional writer with diverse experience in content writing, technical writing, social media posts, SEO/SEM website optimization, and other types of projects. Ali has a background in engineering, allowing him to use his analytical skills and attention to detail for his writing projects.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...