# Code Red

> a computer worm

**Wikidata**: [Q1105649](https://www.wikidata.org/wiki/Q1105649)  
**Wikipedia**: [English](https://en.wikipedia.org/wiki/Code_Red_(computer_worm))  
**Source**: https://4ort.xyz/entity/code-red

## Summary
Code Red is a computer worm, a specific type of non-tangible software designed to spread across computer networks. It was released in 2001 and is recognized globally as a distinct entity within cybersecurity history.

## Key Facts
- **Definition:** Code Red is a computer worm, which falls under the classification of software (non-tangible executable component).
- **Production Date:** The worm was created or released in 2001.
- **Naming Origin:** It is named after the Mountain Dew soft drink.
- **Distinct Entities:** It is distinct from "Code Red" (a separate entity) and "Code Red II" (a related but different worm).
- **Global Presence:** The entity has Wikipedia articles in 19 languages, including English, Arabic, Chinese, Russian, and Japanese.
- **Wikidata Identifier:** Listed as Q159559 on Wikidata.
- **Freebase ID:** /m/017lrz.
- **Sitelink Count:** Connected to 20 sitelinks across various knowledge bases.

## FAQs
### Q: What type of software is Code Red?
A: Code Red is a computer worm, which is a subclass of software. Unlike general application software, it is a malicious executable component designed to replicate and spread.

### Q: When was Code Red released?
A: Code Red appeared in 2001. It is documented as a distinct software entity from that year.

### Q: Where does the name "Code Red" come from?
A: The worm is named after the Mountain Dew soft drink. This distinguishes it from other entities with similar names.

### Q: Is Code Red the same as Code Red II?
A: No, Code Red is explicitly defined as different from Code Red II. While they share a naming convention, they are separate entities in software history.

## Why It Matters
Code Red represents a significant category of software known as computer worms. As a non-tangible executable component, it demonstrates the dual nature of software as both a creative work and a potential tool for disruption. Unlike productive software such as Java or Google Docs Editors, Code Red exemplifies how executable logic can be weaponized to affect computer systems globally. Its presence in 19 Wikipedia languages and a sitelink count of 20 indicates its widespread recognition in digital infrastructure history. The worm serves as a key case study in software engineering and cybersecurity, illustrating the importance of software quality, testability, and security architecture in modern computing.

## Notable For
- **Classification as Malware:** While most software is designed as a creative work or tool, Code Red is notable as a computer worm, a harmful subclass of software.
- **Naming Convention:** Unique among software entities for being explicitly named after a commercial soft drink, Mountain Dew.
- **Global Recognition:** Indexed by major international authorities and present across diverse linguistic platforms (Arabic, Chinese, Russian, etc.), signifying its global impact.
- **Temporal Specificity:** Firmly tied to the year 2001, serving as a historical marker for that era of cybersecurity threats.
- **Entity Distinction:** Requires differentiation from other similarly named threats, specifically "Code Red" (the general concept) and "Code Red II," highlighting the complexity of software classification.

## Body

### Definition and Classification
Code Red is formally classified as a computer worm, a specific type of software. As software, it is defined as a non-tangible executable component of a computer system. It functions as a creative and written work, serving as a means for a computer to perform operations, though in this context, those operations are malicious. It is taxonomically a subclass of creative work, written work, means, and product. It is the functional opposite of computer hardware, existing purely as executable logic and data without physical form.

### Naming and Identity
The entity is officially named "Code Red" and is documented under several aliases, including "Ver Code Red," "CodeRed," and "Code red" (as well as "Червь Code Red" and "Code Red (червь)" in Russian). It was explicitly named after the Mountain Dew soft drink. In knowledge bases, it is crucial to distinguish this entity from other similar entries. It is listed as "different_from" a separate entity simply titled "Code Red" and another known as "Code Red II." Its unique identifiers include the Wikidata ID Q159559 and the Freebase ID /m/017lrz.

### Historical Context
Code Red was produced in 2001. This places it within the broader history of software development, occurring years after the inception of foundational languages like Java (1995) but during a period of increasing network connectivity. Unlike productive software tools like Sonata (1986) or Chainlink (2017), Code Red emerged as a significant cybersecurity event. Its image is archived on Wikimedia Commons, specifically showing a website defaced by the worm.

### Technical Characteristics and Study
As a piece of software, Code Red possesses the core technical characteristics of the medium, consisting of computer programs and data. Its study falls under the academic disciplines of software engineering and software studies, though specifically within the cybersecurity domain. While standard software attributes include source code, software architecture, and testability, Code Red is studied for its propagation mechanisms and impact. It is categorized under Dewey Decimal Classification codes 005.3 and 005, which cover software.

### Global Documentation and Reach
Code Red is a globally recognized entity within knowledge systems. It has a sitelink count of 20, indicating broad connection across various platforms. Its Wikipedia title is "Code Red (computer worm)," and it is documented in 19 languages, including major world languages like English (en), Spanish (es), French (fr), German (de), Chinese (zh), Russian (ru), Arabic (ar), and Japanese (ja), among others (cs, fa, hr, it, ko, lmo, ml, pl, sl, sv, ta, te). This extensive linguistic presence underscores its notability as a subject of international record.

## References

1. Freebase Data Dumps. 2013