Yeah, I read about Morris worm a year later in my networking textbook. It was a good feeling to realize what I have done was similar in nature.
Of course, Morris worm was a real technical exploit (buffer overflow was involved IIRC)
Mine was nowhere comparable to that in sophistication.
nebula|8 years ago