The finger program was written in 1971 by Les Earnest who created the program to solve the need of users who wanted information on other users of the network.
•
The Morris worm, in 1988, exploited an overflow vulnerability in fingerd
(among others) to spread.
Transmission Control Protocol | File Transfer Protocol | Session Initiation Protocol | User Datagram Protocol | BitTorrent (protocol) | Kyoto Protocol | Internet Protocol | Post Office Protocol | Program and System Information Protocol | Simple Network Management Protocol | Internet Message Access Protocol | Network File System (protocol) | Hypertext Transfer Protocol | Lightweight Directory Access Protocol | Five Finger Death Punch | Secure Real-time Transport Protocol | Real-time Transport Protocol | Simple Mail Transfer Protocol | Montreal Protocol | Finger Lakes | Communications protocol | Wireless Application Protocol | SSH File Transfer Protocol | Bill Finger | Six Finger Satellite | Remote Desktop Protocol | Point-to-Point Protocol | Internet protocol | Dynamic Host Configuration Protocol | tunneling protocol |