Reaper is the world’s first antivirus program, although at the time it was made, in the early 1970s, there was no concept of an antivirus. Reaper was created to combat the Creeper virus, which was the world’s first computer virus.

Where did Reaper come from?

Creeper was created as an experimental program by Bob Thomas at Raytheon BBN Technologies, originally named Bolt Beranek and Newman Inc. The Creeper program was designed to self-replicate itself and move between Digital Equipment Corporation (DEC) PDP-10 computers using ARPANET, the precursor to the internet.

How does Reaper work?

Reaper was created by Ray Tomlinson, an American computer programmer well-known to implement the first email program on ARPANET. The Reaper antivirus was designed to delete any instance of the Creeper program that it would find from the DEC computers, marking the beginning of the cybersecurity industry. 

How are Reaper and Creeper related?

When the Creeper program was made with no malicious intent. It is harmless as it only displayed the message “I’m the creeper, catch me if you can”. The Creeper was simply designed to move like a “worm” from one computer to the next using nodes of the ARPANET. As it moved to the next computer, Creeper was designed to erase its old version. The technique used in the Creeper virus was later used in the air traffic simulator programs.

The self-replicating nature of Creeper made it categorized as a virus, although there was nothing malicious about it. It affected 28 DEC mainframe devices and went down in history as the first computer virus program. The video game Core Ware was inspired by the Creeper and Reaper computer programs.

How can businesses use Reaper to protect themselves?

Computer viruses in modern times have evolved into more complex and sophisticated programs including spyware, Trojan horses, keyloggers, and ransomware. The antivirus programs have also evolved over the years to tackle different types of computer viruses.

Although the Creeper virus does not appear to be a problem for businesses of today, similar viruses can cause issues. Reaper might not be sophisticated enough to handle modern-day viruses, therefore businesses should look at updated versions of antivirus programs, security protocols, employee awareness and training, and other methods to combat the ongoing threat of computer viruses.

Ali Azhar
Ali Azhar
Ali is a professional writer with diverse experience in content writing, technical writing, social media posts, SEO/SEM website optimization, and other types of projects. Ali has a background in engineering, allowing him to use his analytical skills and attention to detail for his writing projects.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

Crypt888 Ransomware

Crypt888, also known as Mircop, is ransomware that encrypts files on desktops, downloads,...

AutoLocky Ransomware

AutoLocky is ransomware written in the popular AutoIt scripting language. It uses strong...

Data Governance

Data governance is a term used to refer to the management of processes,...