Monday, March 23, 2009

20 virus in history

1.CREEPER (1971).
Internet worm program, the first occurred on Dec. 10 in a computer operating system TOPS TEN.

2.ELK CLONER (1985).
First personal computer virus that caused the Apple IIe as a result of high school students (grade 9).

3.THE INTERNET WORM (1985).
Written by university personnel and Oil Corp. has highlighted the effects of Internet use.

4.PAKISTANI BRAIN (1988).
Contaminated with the virus first IBM PC. Posted by Sagpiengag from Pakistan. Virus is the first widespread media focus.

5.JERUSALEM FAMILY (1990).
Strains are approximately 50 different species believed to have origins from the University Eirosaelem.

6.STONED (1989).
Most viruses spread heavy first period of ten years. Infection in the system boot /. Mbr sent to reboot the system several times and also displays a message that "your computer is now stoned".

7.DARK AVENGER MUTATION ENGINE (1990).
Writing last year in 1988 but used the first time early in the year 1990 the same virus POGUE COFFEESHOP mechanism of mutation and the variety of this virus. Viruses can make work at any time.

8.MICHEANGELO (1992).
STONED strains capable of high destruction by date March 6 the virus will delete Technologies first set of 100 hard drive that does not work.

9.WORLD CONCEPT (1995).
Microsoft Word Macro virus first spread to the outside world. With stealing text that "That" s enough to prove my point "is opening a new era in the second generation of computer viruses. And a major computer virus caused by hackers who have very little skills.

10.CIH/CHERNOBYL (1998).
Chernobyl virus is the most destructive virus ever found. Launch destroyed when the calendar is based on conditions in the computer matches the date in the 26 months to destroy all data on your hard disk. And destroy data stored in the BIOS to boot. The flash BIOS with garbage data to send information. Ever become a show at the boot of a blank page. And can not be called up to work longer.

11.MELISSA (1999).
The first significant virus spread through e - mail. And the start of the Internet generation really even Melissa virus was not designed to destroy. But cause nuisance to users as it allows e box - all in the mail full of infection.

12.LOVEBUG (2001).
Worms e - mail is the most popular. Is a form of online social networking community to benefit.

13.Code RED (2001).
Name the drink that is high caffeine popular. The network virus resides in a computer security breach. And spread by itself.

14.NIMDA (2001).
Known "Swiss Army Knife" or the versatility of the virus. Which will use several ways to access the network. Whether a memory overflow e - mail. Using a network share. And other methods. Ten is another way.

15.BAGEL/NETSKY (2004).
The virus is designed to correlate with กัน. And fight each other. Each other to create strains from hundreds of strains. And use new technologies. The success of the spread significantly. Worms both stuck in this information throughout the year.


16.BOTNETS (2004).
Zombie fighter in the Internet world these cyber criminals with the help of accumulation. Computer citizens are infected with a dateless. The cyber criminals will be able to configure new computers to the network. To send spam to. Add infected victims. And steal information.

17.ZOTOB (2005).
Worms are the only systems with Windows 2000 does not install the fixes. But the outstanding ability. Control site of several major media. Including CNN and the New York Times.

18.ROOTKITS (2005).
One in the most popular in the world of malicious code. Which is used to make other malware can hide in the computer. The malware is hidden in the backstage work that is dangerous.

19.STORM WORM (2007).
Viruses that occur catchy repeated thousands of times and ultimately will create a net บ็ been the largest in the world. The belief that computers are infected at the same time more than 15 million units and is under the control of the criminal underground.

20.ITALIAN JOB (2007).
Malware is not a single other tool. But an attack together with a set of tools prepared or pre-known MPACK to create new malware to steal information comes. And went to the site more than ten thousand victims.

Antivirus-News.com

F-Secure Antivirus Research Weblog

Blog: No Adware Spyware Tool