SlideShare a Scribd company logo
The History and Details of
Computer Viruses
With Chuck Easttom
http://www.chuckeasttom.com
chuck@chuckeasttom.com
Terms

•What is a virus
•What is a worm
•What is a Trojan horse
The History of Computer Viruses
•1981 Apple Viruses 1, 2, & 3
•1980’s Fred Cohen
•1987 Lehigh Virus
•1988 The first anti virus software
•1990 The first polymorphic viruses
•1991 Symantec releases Norton Anti Virus
•1992 The Michelangelo Virus
•1994 Kaos4 virus spreads via adult websites.
•1996 The Concept virus
The History of Computer Viruses II
•1999 The Melissa Virus
•2000 The I Love You Virus
•2001 The Code Red Worm
•2003 The Slammer Worm.
•2004 MyDoom
The History of Computer Viruses Details
1981 Apple Viruses 1, 2, and 3 are some of the
first viruses "in the wild" or public domain.
Found on the Apple II operating system, the
viruses spread through Texas A&M via pirated
computer games.
The History of Computer Viruses Details
1980’s In the early 1980s, Fred Cohen did
extensive theoretical research, as well as setting
up and performing numerous practical
experiments, regarding viral type programs. His
dissertation was presented in 1986 as part of the
requirements for a doctorate in electrical
engineering from the University of Southern
California. This work is foundational, and any
serious student of viral programs disregards it at
his own risk Dr. Cohen's definition of a
computer virus as "a program that can 'infect'
other programs by modifying them to include a
version of itself
The History of Computer Viruses Details
1987 In November, the Lehigh virus was
discovered at Lehigh University in the U.S. It
was the first "memory resident file infector". A
file-infecting virus attacks executable files. It
gets control when the file is opened. The Lehigh
virus attacked a file called COMMAND.COM.
When the file was run (usually by booting from
an infected disk), the virus stayed in the resident
memory.
The History of Computer Viruses Details
1988 In March, the first anti-virus software was
written. It was designed to detect and remove
the Brain virus and immunized disks against
Brain infection.
The History of Computer Viruses Details
1990 Viruses combining various characteristics
spring up. They included Polymorphism
(involves encrypted viruses where the
decryption routine code is variable), Armoring
(used to prevent anti-virus researchers from
dissembling a virus) and Multipartite (can
infect both programs and boot sectors).
The History of Computer Viruses Details
1991 Symantec releases Norton Anti-Virus
software.
1992 Media mayhem greeted the virus
Michaelangelo in March. Predictions of
massive disruptions were made and anti-virus
software sales soared. As it turned out, the cases
of the virus were far and few between.
The History of Computer Viruses Details
1994 A virus called Kaos4 was posted on a
pornography news group file. It was encoded as
text and downloaded by a number of users.
1996 Concept, a macro-virus, becomes the most
common virus in the world.
1998 - The "RedTeam" virus infects Windows
executables dispatches the infected files through
Eudora e-mail.
The History of Computer Viruses Details
1998: The emergence of the sensational
"BackOrifice" ("Backdoor.BO") - utility of that
allowed hackers management of remote
computers and networks.
1999 The Melissa virus, a macro, appears. It
uses Microsoft Word to infect computers and is
passed on to others through Microsoft Outlook
and Outlook Express e-mail programs.
The History of Computer Viruses Details
2000 The "I Love You Virus" wreaks havoc around the
world. It is transmitted by e-mail and when opened, is
automatically sent to everyone in the user's address book
July 2001: The Code Red worm infects tens of thousands of
systems running Microsoft Windows NT and Windows 2000
server software, causing an estimated $2 billion in damages.
The worm is programmed to use the power of all infected
machines against the White House Web site at a
predetermined date. In an ad hoc partnership with virus
hunters and technology companies, the White House
deciphers the virus's code and blocks traffic as the worm
begins its attack.
.
The History of Computer Viruses Details
2002: Melissa virus author David L. Smith, 33,
is sentenced to 20 months in federal prison
Jan. 2003: The "Slammer" worm infects
hundreds of thousands of computers in less than
three hours. The fastest-spreading worm ever
wreaks havoc on businesses worldwide,
knocking cash machines offline and delaying
airline flights.
The History of Computer Viruses Details
2004: The "MyDoom" worm becomes the
fastest-spreading e-mail worm as it causes
headaches -- but very little damage -- almost a
year to the day after Slammer ran rampant in
late January 2003. MyDoom uses "social
engineering," or low-tech psychological tricks,
to persuade people to open the e-mail
attachment that contains the virus. It claims to
be a notification that an e-mail message sent
earlier has failed, and prompts the user to open
the attachment to see what the message text
originally said. Many people fall for it.
The History of Computer Viruses Details
2007: A new virus called "Storm Worm." is
released. This fast-spreading email spammer
disguises itself as a news email and asks you to
download film. The "Storm Worm" gathers
infected computers into a botnet, which it uses
to infect other machines. It was first identified
on Jan. 17 and within 13 days had infected 1.7
million computers
The History of Computer Viruses Details
2009 9 million computers running on Windows
operating system were hit with "Conficker"
worm. The malware spread via the Internet and
the main tools that helped the worm spread
were unpatched corporate networks and USB
memory sticks. First discovered last October, it
loads itself on to a computer by exploiting a
weakness in Windows servers. Once it has
infected a machine, the software also tries to
connect to up to 250 different domains with
random names every day.
The mechanics of Viruses
•Delivery
a. Via email
b. Copying over a network
c. Direct communication with exposed ports.
•Payload
•Types of Viruses
•Macro virus
•Script Virus
•Executable Virus
How Anti Virus Software Works
• Scanning for known files
•Scanning for worm infection vectors
•Heuristic scanning
Current Active Viruses
As of 13 November 2005

•Sober.S first noticed October 13, 2005
•Bagle variant started September 19, 2005
•Zotob-D August 16th, 2005
Rules for preventing viruses
Keep operating system and all software updated/patched
Use a virus scanner. McAffee and Norton are the two most widely
accepted and used virus scanners. It costs about $30 a year to keep
your virus scanner updated. Do it.
If you are not sure about an attachment, don’t open it.
You might even exchange a code word with friends and colleagues.
Tell them that if they wish to send you an attachment, to put the
code word in the title of the message. Without seeing the code
word, you will not open any attachment.
Don’t believe “security alerts” that you are sent. Microsoft does
not send out things in this manner. Go check the Microsoft website
regularly, as well as one of the anti-virus websites previously
mentioned.
Anti Virus Information Web Sites

http://www.f-secure.com/virus-info/virus-news/
http://www.cert.org/nav/index_red.html
http://securityresponse.symantec.com/

More Related Content

What's hot

Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
Smart Technology Services, Inc.
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Documentshoib_245
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
Study Hub
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
Mohsin Dahar
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
Stefan Andrei
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Virus
VirusVirus
Virus
sushant292
 
Computer virus
Computer virusComputer virus
Computer virus
Shailendra Gohil
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant VirusesManish Prasad
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Wanna cry
Wanna cryWanna cry
Wanna cry
Riyaz Walikar
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 

What's hot (19)

Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
Conficker
ConfickerConficker
Conficker
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer worm
Computer wormComputer worm
Computer worm
 

Viewers also liked (9)

Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Antivirus
AntivirusAntivirus
Antivirus
 
It kamus jaringan
It kamus jaringanIt kamus jaringan
It kamus jaringan
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Keamanan si (ugm)
Keamanan si (ugm)Keamanan si (ugm)
Keamanan si (ugm)
 
Linux dan security
Linux dan securityLinux dan security
Linux dan security
 
It menjaga keamanan sistem artikel
It menjaga keamanan sistem artikelIt menjaga keamanan sistem artikel
It menjaga keamanan sistem artikel
 
It keamanan sis inf berbasis internet
It keamanan sis inf berbasis internetIt keamanan sis inf berbasis internet
It keamanan sis inf berbasis internet
 
It keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom uiIt keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom ui
 

Similar to Historyofviruses

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Viruses
VirusesViruses
Viruses
yuvan80
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
mkgspsu
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 

Similar to Historyofviruses (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer worm
Computer wormComputer worm
Computer worm
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 

More from Fathoni Mahardika II

It keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internetIt keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internetFathoni Mahardika II
 
It domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom uiIt domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom uiFathoni Mahardika II
 
Mohiqbal security act dan kriptografi 2011
Mohiqbal   security act dan kriptografi 2011Mohiqbal   security act dan kriptografi 2011
Mohiqbal security act dan kriptografi 2011Fathoni Mahardika II
 
Mohiqbal pengantar keamanan sis inf 2011
Mohiqbal   pengantar keamanan sis inf 2011Mohiqbal   pengantar keamanan sis inf 2011
Mohiqbal pengantar keamanan sis inf 2011Fathoni Mahardika II
 

More from Fathoni Mahardika II (12)

It lubang keamanan
It lubang keamananIt lubang keamanan
It lubang keamanan
 
It komdat 10 keamanan sistem
It komdat 10 keamanan sistemIt komdat 10 keamanan sistem
It komdat 10 keamanan sistem
 
It keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internetIt keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internet
 
It keamanan sistem informasi
It keamanan sistem informasiIt keamanan sistem informasi
It keamanan sistem informasi
 
It kamus istilah komputer good
It kamus istilah komputer goodIt kamus istilah komputer good
It kamus istilah komputer good
 
It domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom uiIt domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom ui
 
It 15 jenis serangan cracker
It 15 jenis serangan crackerIt 15 jenis serangan cracker
It 15 jenis serangan cracker
 
Diktat kuliah keamanan komputer
Diktat kuliah keamanan komputerDiktat kuliah keamanan komputer
Diktat kuliah keamanan komputer
 
Mohiqbal security act dan kriptografi 2011
Mohiqbal   security act dan kriptografi 2011Mohiqbal   security act dan kriptografi 2011
Mohiqbal security act dan kriptografi 2011
 
Mohiqbal pengantar keamanan sis inf 2011
Mohiqbal   pengantar keamanan sis inf 2011Mohiqbal   pengantar keamanan sis inf 2011
Mohiqbal pengantar keamanan sis inf 2011
 
Keamanan password dan enkripsi
Keamanan password dan enkripsiKeamanan password dan enkripsi
Keamanan password dan enkripsi
 
Mohiqbal net and database 2011
Mohiqbal   net and database 2011Mohiqbal   net and database 2011
Mohiqbal net and database 2011
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
amberjdewit93
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Historyofviruses

  • 1. The History and Details of Computer Viruses With Chuck Easttom http://www.chuckeasttom.com chuck@chuckeasttom.com
  • 2. Terms •What is a virus •What is a worm •What is a Trojan horse
  • 3. The History of Computer Viruses •1981 Apple Viruses 1, 2, & 3 •1980’s Fred Cohen •1987 Lehigh Virus •1988 The first anti virus software •1990 The first polymorphic viruses •1991 Symantec releases Norton Anti Virus •1992 The Michelangelo Virus •1994 Kaos4 virus spreads via adult websites. •1996 The Concept virus
  • 4. The History of Computer Viruses II •1999 The Melissa Virus •2000 The I Love You Virus •2001 The Code Red Worm •2003 The Slammer Worm. •2004 MyDoom
  • 5. The History of Computer Viruses Details 1981 Apple Viruses 1, 2, and 3 are some of the first viruses "in the wild" or public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
  • 6. The History of Computer Viruses Details 1980’s In the early 1980s, Fred Cohen did extensive theoretical research, as well as setting up and performing numerous practical experiments, regarding viral type programs. His dissertation was presented in 1986 as part of the requirements for a doctorate in electrical engineering from the University of Southern California. This work is foundational, and any serious student of viral programs disregards it at his own risk Dr. Cohen's definition of a computer virus as "a program that can 'infect' other programs by modifying them to include a version of itself
  • 7. The History of Computer Viruses Details 1987 In November, the Lehigh virus was discovered at Lehigh University in the U.S. It was the first "memory resident file infector". A file-infecting virus attacks executable files. It gets control when the file is opened. The Lehigh virus attacked a file called COMMAND.COM. When the file was run (usually by booting from an infected disk), the virus stayed in the resident memory.
  • 8. The History of Computer Viruses Details 1988 In March, the first anti-virus software was written. It was designed to detect and remove the Brain virus and immunized disks against Brain infection.
  • 9. The History of Computer Viruses Details 1990 Viruses combining various characteristics spring up. They included Polymorphism (involves encrypted viruses where the decryption routine code is variable), Armoring (used to prevent anti-virus researchers from dissembling a virus) and Multipartite (can infect both programs and boot sectors).
  • 10. The History of Computer Viruses Details 1991 Symantec releases Norton Anti-Virus software. 1992 Media mayhem greeted the virus Michaelangelo in March. Predictions of massive disruptions were made and anti-virus software sales soared. As it turned out, the cases of the virus were far and few between.
  • 11. The History of Computer Viruses Details 1994 A virus called Kaos4 was posted on a pornography news group file. It was encoded as text and downloaded by a number of users. 1996 Concept, a macro-virus, becomes the most common virus in the world. 1998 - The "RedTeam" virus infects Windows executables dispatches the infected files through Eudora e-mail.
  • 12. The History of Computer Viruses Details 1998: The emergence of the sensational "BackOrifice" ("Backdoor.BO") - utility of that allowed hackers management of remote computers and networks. 1999 The Melissa virus, a macro, appears. It uses Microsoft Word to infect computers and is passed on to others through Microsoft Outlook and Outlook Express e-mail programs.
  • 13. The History of Computer Viruses Details 2000 The "I Love You Virus" wreaks havoc around the world. It is transmitted by e-mail and when opened, is automatically sent to everyone in the user's address book July 2001: The Code Red worm infects tens of thousands of systems running Microsoft Windows NT and Windows 2000 server software, causing an estimated $2 billion in damages. The worm is programmed to use the power of all infected machines against the White House Web site at a predetermined date. In an ad hoc partnership with virus hunters and technology companies, the White House deciphers the virus's code and blocks traffic as the worm begins its attack. .
  • 14. The History of Computer Viruses Details 2002: Melissa virus author David L. Smith, 33, is sentenced to 20 months in federal prison Jan. 2003: The "Slammer" worm infects hundreds of thousands of computers in less than three hours. The fastest-spreading worm ever wreaks havoc on businesses worldwide, knocking cash machines offline and delaying airline flights.
  • 15. The History of Computer Viruses Details 2004: The "MyDoom" worm becomes the fastest-spreading e-mail worm as it causes headaches -- but very little damage -- almost a year to the day after Slammer ran rampant in late January 2003. MyDoom uses "social engineering," or low-tech psychological tricks, to persuade people to open the e-mail attachment that contains the virus. It claims to be a notification that an e-mail message sent earlier has failed, and prompts the user to open the attachment to see what the message text originally said. Many people fall for it.
  • 16. The History of Computer Viruses Details 2007: A new virus called "Storm Worm." is released. This fast-spreading email spammer disguises itself as a news email and asks you to download film. The "Storm Worm" gathers infected computers into a botnet, which it uses to infect other machines. It was first identified on Jan. 17 and within 13 days had infected 1.7 million computers
  • 17. The History of Computer Viruses Details 2009 9 million computers running on Windows operating system were hit with "Conficker" worm. The malware spread via the Internet and the main tools that helped the worm spread were unpatched corporate networks and USB memory sticks. First discovered last October, it loads itself on to a computer by exploiting a weakness in Windows servers. Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day.
  • 18. The mechanics of Viruses •Delivery a. Via email b. Copying over a network c. Direct communication with exposed ports. •Payload •Types of Viruses •Macro virus •Script Virus •Executable Virus
  • 19. How Anti Virus Software Works • Scanning for known files •Scanning for worm infection vectors •Heuristic scanning
  • 20. Current Active Viruses As of 13 November 2005 •Sober.S first noticed October 13, 2005 •Bagle variant started September 19, 2005 •Zotob-D August 16th, 2005
  • 21. Rules for preventing viruses Keep operating system and all software updated/patched Use a virus scanner. McAffee and Norton are the two most widely accepted and used virus scanners. It costs about $30 a year to keep your virus scanner updated. Do it. If you are not sure about an attachment, don’t open it. You might even exchange a code word with friends and colleagues. Tell them that if they wish to send you an attachment, to put the code word in the title of the message. Without seeing the code word, you will not open any attachment. Don’t believe “security alerts” that you are sent. Microsoft does not send out things in this manner. Go check the Microsoft website regularly, as well as one of the anti-virus websites previously mentioned.
  • 22. Anti Virus Information Web Sites http://www.f-secure.com/virus-info/virus-news/ http://www.cert.org/nav/index_red.html http://securityresponse.symantec.com/