ALL >> Computers >> View Article
The Evolution Of The Computer Virus - From Melissa To Loveletter
Like any other field in computer science, viruses have evolved over the years. The term computer virus is sometimes used as a phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, and spyware), including malicious and unwanted software.
It was in 1949 that Mathematician John Von Neumann described self-replicating programs, which could resemble computer viruses, as they are known today. However, it was not until the 60s that is found as the predecessor of current viruses. It was only in 1983 that one of these programmers announced the existence of Core Wars.
MS-DOS was starting to become the superlative operating system worldwide. The new operating system became the target of a virus in 1986. Brain, a malicious code created in Pakistan, which infected boot sectors of disks so that their contents could not be accessed. Trojan, an application called PC-Write evolved same year. Virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared which infected COM files and opened the door to the infamous ...
... viruses Jerusalem or Viernes 13. In 1988, ‘Morris worm' appeared which infected 6,000 computers.
From that date up to 1995 the types of malicious codes that are known today started being developed. The first macro viruses appeared as polymorphic viruses. Some of these even triggered epidemics, such as Michael Angelo. However, the massive usage of the Internet and e-mail changed the virus scenario worldwide.
When the Win32 platform was implemented, the first script viruses also appeared. A malware inside a simple text file not only demonstrates executable files (.EXE and .COM files) could carry viruses. The first viruses that infected the macros included in Microsoft Office emerged. The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer.
Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express.
VBS/LoveLetter, more commonly known as ‘I love You', which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million Euros. In order to get the user's attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU' and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS'. When the user opened the attachment, the computer was infected.
About the Author:
Computer Juice offers a community of like minded individuals so you can get help for your computer problems. Visit us at - http://www.computer-juice.com/forums/ or http://www.computer-juice.com/forums/.
Add Comment
Computers Articles
1. Why Your Institution Needs A Scholarship Management SoftwareAuthor: Brenda Joyce
2. The Future Of Digital Solutions: Adopting Progressive Web App Development
Author: Elite_m_commerce
3. Web Design And Development Full Service Agency
Author: Web Design And Development Full Service Agency
4. Data Analytics: Turning Raw Data Into Actionable Insights
Author: John Mathew
5. Python Full Stack Development: Bridging The Frontend And Backend
Author: John Mathew
6. Java: The Timeless Programming Language
Author: John Mathew
7. Power Bi: Transforming Data Into Insights
Author: John Mathew
8. Data Science: Unlocking The Power Of Data
Author: John Mathew
9. Understanding Devops: Revolutionizing Software Development And Delivery
Author: John Mathew
10. Why Modern Businesses Should Enable Sso Support On Enterprise Apps?
Author: Kalyani Badkas
11. Ai-powered Anomaly Detection: Definition, Types And Examples
Author: TechDogs
12. Top Mobile App Development Solutions Platform
Author: goodcoders
13. Useful Angularjs Development Tools For Developers
Author: goodcoders
14. Top Reason To Choose Web Design
Author: goodcoders
15. It Network Support Trends In Singapore: What Businesses Need To Know
Author: Entrust Network Services