2007: Skype Down and Out
The bug: Throughout the blackout, Skype employees blogged frequently and openly about their attempts to put things right again. But it was only after they managed to restore service that they explained what had happened: Microsoft's Windows Update had patched the PCs of vast numbers of Skype users all at once, forcing their computers to reboot. Once all those PCs restarted, they tried to log in to Skype simultaneously. In theory the service shouldn't have been fazed, but the mass connection attempts revealed a debilitating bug in its resource-allocation algorithm. In a follow-up post, the company said it didn't blame Microsoft. But given that the Windows Update patches that triggered the problem were designed to fix Windows bugs, the saga remains a fascinating example of how exterminating bugs can be as dangerous as leaving them alone.
2007: Pirates, Pirates Everywhere
The bug: In a post-recovery blog article, Microsoft's Alex Kochis said the company had accidentally sent preproduction code to WGA servers that authenticated copies of Windows as genuine. The preproduction code assumed the presence of software that provided extra-strong encryption of Windows license codes, but that software hadn't been rolled out yet. The cocktail of beta code and unreleased software proved poisonous, and WGA began rejecting legitimate Windows licenses as fakes. It wasn't the only time that WGA misbehaved, but it was unquestionably the technology's low point. Possibly as a response, Microsoft has since made WGA less punitive. (It also recently renamed the function Windows Activation Technologies.)
2008: Easier Than <Ctrl>-<Alt>-<Del>
The bug: Android, which is based on Linux, shipped with a geeky feature designed to let programmers log in with the highest privileges and issue command-line instructions to the phone from remote devices. Unfortunately the feature was so buggy that the phone always accepted the commands, regardless of privilege level. And if no remote device was found, it simply executed commands that it noticed being typed on the keyboard at any time. Beyond the undesired reboots, the flaw opened a security hole of potentially massive proportions; Google admitted as much when it patched Android to eliminate the flaw.
2008: The Day the Zunes Stood Still
The bug: Leap years may have been around since Julius Caesar invented them in 45 B.C., but software developers still don't seem to understand them. The Zunes refused to start up because of an error in the way the devices dealt with leap years--one of many examples of software having trouble with the concept of a year with an extra day. Fortunately, the fix was simple: Rebooting Zunes on January 1 brought them back to life. Kind of a drag for anybody who had been planning to use one to liven up a New Year's Eve party, though.
2009: Malware Everywhere
The bizarre symptom: Ever do a search on Google and notice that one of the listings in the results is accompanied by a warning that Google believes it may be laden with malware? If you Googled bright and early on January 31, you might have. For 55 minutes that morning, Google results flagged every site as hazardous to your PC. That's every site as in the whole darn Internet, including all of Google's own sites and services.
The bug: As Google's Marissa Mayer explained in a blog post, the malware-detection feature identifies dangerous sites by looking them up on a list of known offenders. On the morning of January 31, an update to that list accidentally included a slash ("/"). All URLs include a slash, and the antimalware feature interpreted the slash as meaning that all URLs were suspect, and therefore it blithely attached warnings to every site that surfaced in results. Many software errors stem from typos, but it's rare to see one so simple have results so sweeping and strange.
Former PC World editor in chief Harry McCracken now blogs at Technologizer.