SlideShare a Scribd company logo
1 of 5
Download to read offline
Computer viruses. - Free Online Library 
Another drawback of Samsung NC10 we understood is that, the netbook battery is attached out of 
the base by an additional 5mm to the netbook depth. Saving money and time is as easy as point and 
click, open a totally free online checking account. The dv9000t has a 2.16-GHz Intel Core 2 Duo 
processor that provides excellent performance without being stunning. Get your favourite books at 
your doorsteps while buying them online. This is a safe, encrypted connection and is a great way to 
go when linking to the web through a public access point. Have you ever needed to miss out on a 
major televised sporting event, a tv unique, and even an episode of your favorite TELEVISION drama 
since you were at work or away on business? 
Do computers get sick? You bet. They laid low--by a virus!
So, the chances are really that you are most likely to be attacked by malware. Any information about 
you that is public need to not form the basis of your password. You can type in the URL  address of 
a website to either block or add it to your harmful or safe zone respectively. Afterwards, an USB 
gadget or CD could be used to transfer the program to the contaminated computer system. Windows 
users need to likewise make sure that Windows Update is made it possible for. See to it you have an 
approximately date security bundle on your PC. 
You switch on your computer, eager for it to boot up so you can join thrill-seeker Lara Croft as she 
searches for the ancient Emperor's palace in the Great Wall of China in Tomb Raider II. Wait! 
Where's the familiar green screen? Something's wrong. Ding! Whrrrr! Crrrrrash! You turfi off the 
computer, then on again. This time--NOTHING. 
What happened? 
Your computer has just been zapped by a computer virus--a malicious program that at worst could 
wipe out all your computer files. Gone is your dog Frosty's photo. Gone is Lara. And erased is every 
homework assignment, including the American History term paper that took a week to grind out. 
Could this really happen to you? You bet. And getting a computer virus has become much easier 
than before. 
NASTY NEWS 
As recently as five years ago, a virus could spread from computer to computer mainly through 
shared floppy disks. Now, just opening up your electronic mail, or e-mail, can launch a nasty virus 
into your system. 
Last summer, headlines proclaimed that widely popular e-mail programs like Microsoft's Outlook 98 
and Outlook Express, as well as Netscape Mail, and Qualcomm's Eudora, are vulnerable to virus 
attacks. "You can get an e-mail that looks like any other e-mail," explains Alex Haddox, head of 
Symantec AntiVirus Research Center in Santa Monica, California. "Except when you open up the e-mail 
itself, by the time you read it, it's too late." You've got a virus! 
Who would perpetrate such a potentially harmful trick? Virus writers are mostly males age 14 to 24. 
For these digital delinquents, unleashing a new virus is an ego trip, says Haddox: "'Can I do it? Can I 
push the limits of technology?' Their greatest thrill is to have their name or their virus posted in the 
news worldwide." 
One 26-year-old British virus writer who identifies himself only as Rajaat admits, "I do get personal 
gratification out of it. For me, it's a challenge to see if I can outsmart antivirus software, and to try 
to think of innovative ways to do this." 
NO EASY TRICK 
Creating a computer virus is no easy trick. Just like computer games and word-processing software, 
a virus is a program--step-by-step instructions that tell a computer what to do. Unlike games and 
other software, however, a virus attaches itself to other programs in your computer. "It's essentially 
a digital parasite," explains Haddox. 
A virus contains instructions that tell it to self-replicate, or copy itself over and over again. When it 
first enters your computer--through an infected floppy disk, e-mail, or a program downloaded from
the Internet--the virus copies itself to your computer's memory (see computer diagram, below). From 
there, it attaches itself to any program you open up. "The virus actually rewrites a program to 
incorporate itself into the program," says Haddox. "It rewrites the program so the virus will run 
first." 
Every time you open up another file or program, the virus plants itself into that file and takes over. 
In the process, it can cripple your machine's ability to find the files it needs to start up or operate. 
The infection doesn't end there. A computer virus, like the common cold, is highly contagious. Its 
primary purpose is to spread to as many computers as fast as possible, says Haddox. 
Computer virologists, programmers who try to combat the digital plague, say 10 to 15 new viruses 
are launched every day. The virus population, currently about 18,000, nearly doubles every year. 
Today, the sneaks invade 35 of every 1,000 computers each month. (About 200 million personal 
computers are in use today.) And thanks to the Internet, the "information superhighway" that 
connects computers worldwide, outbreaks go global in just weeks or less. With Internet usage 
exploding, the average user is now 20 times more likely to contract a computer virus. 
COMPUTER PERIL 
Most viruses are actually harmless, merely displaying silly messages ("I feel good!") or tunes 
("Yankee Doodle Dandy") when you boot up. But destructive viruses have swelled to 35 percent of all 
computer invaders, up from 10 percent just six years ago. The worst of them garble data, hinder 
printing, or wipe out entire hard drives. The most common computer culprit is the macro virus--a 
type of virus that infects data documents like letters and spreadsheets--which accounts for more 
than 80 percent of all computer viruses. A macro is a legitimate mini-program, or procedure list, 
embedded in popular wordprocessing and spread sheet software, like Microsoft Word and Excel. It 
enables a user to write a simple program that executes a series of commands within a document, 
like automatically adding up numbers and presenting a total. Because macros were meant to be 
written by the average computer user, they're very easy to learn. 
"I call the macro virus the `every man's virus'," Haddox says, Anyone with ill-intent can easily write a 
virus using macros. In fact, one macro virus, called Format_C, formats, or erases, your hard drive 
with just three lines of instructions. 
PREVENTIVE MEDICINE 
So how can you protect your machine from a virus? Several antivirus software programs (costing 
between $30 and $60 each), available in computer stores, locate and remove viruses from your 
computer. Most viruses are easy to detect because they follow a specific sequence of instructions, 
and the first part is always self-replication. Antivirus products periodically check files for suspicious 
strands of software code, especially in the critical parts of a hard drive that contain operational 
instructions. 
While an antivirus software is an essential tool, preventive medicine is always best. Download 
programs only from reliable sites on the Internet, like well-known companies or organizations; avoid 
downloading material from personal Web pages. Find out where floppy disks have been before 
swapping them with friends. And beware of junk e-mail, or spams. They could contain a virus. 
Catching a virus is as easy as, well, catching a cold. 
RELATED ARTICLE: FROM PLAYFUL TO DANGEROUS
As long ago as 1949, computer pioneer John von Neumann speculated that a program could 
reproduce itself. Three programmers at AT&T'S Bell Laboratories proved him right. They hatched 
self-replicating electronic "organisms." The programmers watched their creations fight for control of 
a computer in a bizarre after-hours experiment called "Core Wars." 
In 1986, a University of Southern California student named Fred Cohen coined the term "computer 
virus." He observed that electronic viruses, like their biological counterparts, attach themselves to 
hosts and replicate. 
The first computer viruses were playful. An early strain that surfaced on college campuses, for 
example, flashed the screen message: "I want a cookie." But it didn't disrupt a computer's operation 
in any way. 
Real damage hit computers in 1987, when a snippet of code known as the Brain erased hard-drive 
data on some 100,000 IBMPCs--including 10,000 at George Washington University alone. The 
"Brain" was traced to two brothers who ran a discount computer store in Lahore, Pakistan. They 
later admitted to injecting the virus into computers they sold to bargain-hunting tourists. The Brain 
was followed by a swarm of malignant strains like Jerusalem, which trashed any program run on a 
Friday the 13th. 
Finally, in 1992, "Michelangelo" became the first virus to threaten large numbers of home users. 
Headlines predicted it would erase millions of IBM-compatible computers on March 6, the Italian 
artist's birthday. In the end, the bug's bark was worse than its bite--though it did wipe out thousands 
of computers worldwide. 
RELATED ARTICLE: HOT JOBS VIRUS HUNTER 
Name: Alex Haddox 
Hot Job: Product Manager 
Where: Symantec AntiVirus Research Center 
Computer history: I bought my first computer, an AppleIIC, while at Santa Monica High [Santa 
Monica, California] back in the '80s. It actually sat on my desk for an entire year before I ever turned 
it on. 
What hooked you? Games. I've never been what you might call a true programmer. I tinkered with 
computer programming, but my real interest is more in the theories of how things work, rather than 
the actual hands-on part. 
College major? English. I went to several colleges. 
Why the interest in computer viruses? My first PC (non-Apple computer) came complete with two 
viruses. It was a brand new computer, but the store had pre-installed a whole bunch of software for 
me. 
How old were you when you started at Symantec? Barely 21. I worked full-time and went to college 
part-time. I'm only 28 and I've done about everything at the company except be president.
So what do you do now? I analyze virus outbreaks in various parts of the world, and supervise a 
research team who writes anti-virus programs. 
Is virus hunting exciting?. It's almost like being in an emergency room. Every day there is some virus 
outbreak with some company in the world that we're called on to help. We need to make sure we 
stay one step ahead of the problem. If our research takes a wrong turn, a lot of computers will be 
hurt. I really feel I make a big difference. 
Advice to young computer fanatics? Take advanced computer science courses in college. The 
computer field is a great one to work in. 
Thanks, Alex. We'll call you if we have a computer virus. By the way, do you make house calls? 
COPYRIGHT 1998 Scholastic, Inc. 
No portion of this article can be reproduced without the express written permission from the 
copyright holder. 
Copyright 1998, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

More Related Content

What's hot

Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickStefan Tanase
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 

What's hot (20)

La pecera 3
La pecera 3La pecera 3
La pecera 3
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 
Computervirus
Computervirus Computervirus
Computervirus
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Viruses
VirusesViruses
Viruses
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
viruses
virusesviruses
viruses
 
Spo2 w22
Spo2 w22Spo2 w22
Spo2 w22
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Virus presentation
Virus presentationVirus presentation
Virus presentation
 
Christine
ChristineChristine
Christine
 

Viewers also liked

新生兒準備物品5大類(食衣住行育樂)-1
新生兒準備物品5大類(食衣住行育樂)-1新生兒準備物品5大類(食衣住行育樂)-1
新生兒準備物品5大類(食衣住行育樂)-1Hanna Lin
 
8decologicalrelationships 120607150803-phpapp01
8decologicalrelationships 120607150803-phpapp018decologicalrelationships 120607150803-phpapp01
8decologicalrelationships 120607150803-phpapp01SUSAN MATHEW
 
Camera angles and movements
Camera angles and movementsCamera angles and movements
Camera angles and movementsSumbul Khan
 
Character costumes
Character costumesCharacter costumes
Character costumeslukej123
 
Knvkchaitanya visual cv
Knvkchaitanya visual cvKnvkchaitanya visual cv
Knvkchaitanya visual cvknvk chaitanya
 
горе от ума интеллект-турнир
горе от ума интеллект-турниргоре от ума интеллект-турнир
горе от ума интеллект-турнирZhanna Gennadievna Rodina
 
collin decker unit 1 photography basics
collin decker unit 1 photography basicscollin decker unit 1 photography basics
collin decker unit 1 photography basicscollindecker
 
Internetový marketing - tvorba webových stránek
Internetový marketing - tvorba webových stránekInternetový marketing - tvorba webových stránek
Internetový marketing - tvorba webových stránekSportCentral
 
Branný pretek pravidla
Branný pretek pravidlaBranný pretek pravidla
Branný pretek pravidlaPavol Varačka
 
Unit 4 photography
Unit 4 photographyUnit 4 photography
Unit 4 photographycollindecker
 

Viewers also liked (16)

Brochure
BrochureBrochure
Brochure
 
prakarya - manisan nanas
prakarya - manisan nanasprakarya - manisan nanas
prakarya - manisan nanas
 
新生兒準備物品5大類(食衣住行育樂)-1
新生兒準備物品5大類(食衣住行育樂)-1新生兒準備物品5大類(食衣住行育樂)-1
新生兒準備物品5大類(食衣住行育樂)-1
 
8decologicalrelationships 120607150803-phpapp01
8decologicalrelationships 120607150803-phpapp018decologicalrelationships 120607150803-phpapp01
8decologicalrelationships 120607150803-phpapp01
 
Meiosis
Meiosis   Meiosis
Meiosis
 
Camera angles and movements
Camera angles and movementsCamera angles and movements
Camera angles and movements
 
Character costumes
Character costumesCharacter costumes
Character costumes
 
Knvkchaitanya visual cv
Knvkchaitanya visual cvKnvkchaitanya visual cv
Knvkchaitanya visual cv
 
горе от ума интеллект-турнир
горе от ума интеллект-турниргоре от ума интеллект-турнир
горе от ума интеллект-турнир
 
Modul 3
Modul 3Modul 3
Modul 3
 
collin decker unit 1 photography basics
collin decker unit 1 photography basicscollin decker unit 1 photography basics
collin decker unit 1 photography basics
 
sss
ssssss
sss
 
Internetový marketing - tvorba webových stránek
Internetový marketing - tvorba webových stránekInternetový marketing - tvorba webových stránek
Internetový marketing - tvorba webových stránek
 
Branný pretek pravidla
Branný pretek pravidlaBranný pretek pravidla
Branný pretek pravidla
 
Unit 3 project
Unit 3 projectUnit 3 project
Unit 3 project
 
Unit 4 photography
Unit 4 photographyUnit 4 photography
Unit 4 photography
 

Similar to Computer Viruses Explained (20)

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Anti virus
Anti virusAnti virus
Anti virus
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Computer Virus.pptx
Computer Virus.pptxComputer Virus.pptx
Computer Virus.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 

Computer Viruses Explained

  • 1. Computer viruses. - Free Online Library Another drawback of Samsung NC10 we understood is that, the netbook battery is attached out of the base by an additional 5mm to the netbook depth. Saving money and time is as easy as point and click, open a totally free online checking account. The dv9000t has a 2.16-GHz Intel Core 2 Duo processor that provides excellent performance without being stunning. Get your favourite books at your doorsteps while buying them online. This is a safe, encrypted connection and is a great way to go when linking to the web through a public access point. Have you ever needed to miss out on a major televised sporting event, a tv unique, and even an episode of your favorite TELEVISION drama since you were at work or away on business? Do computers get sick? You bet. They laid low--by a virus!
  • 2. So, the chances are really that you are most likely to be attacked by malware. Any information about you that is public need to not form the basis of your password. You can type in the URL address of a website to either block or add it to your harmful or safe zone respectively. Afterwards, an USB gadget or CD could be used to transfer the program to the contaminated computer system. Windows users need to likewise make sure that Windows Update is made it possible for. See to it you have an approximately date security bundle on your PC. You switch on your computer, eager for it to boot up so you can join thrill-seeker Lara Croft as she searches for the ancient Emperor's palace in the Great Wall of China in Tomb Raider II. Wait! Where's the familiar green screen? Something's wrong. Ding! Whrrrr! Crrrrrash! You turfi off the computer, then on again. This time--NOTHING. What happened? Your computer has just been zapped by a computer virus--a malicious program that at worst could wipe out all your computer files. Gone is your dog Frosty's photo. Gone is Lara. And erased is every homework assignment, including the American History term paper that took a week to grind out. Could this really happen to you? You bet. And getting a computer virus has become much easier than before. NASTY NEWS As recently as five years ago, a virus could spread from computer to computer mainly through shared floppy disks. Now, just opening up your electronic mail, or e-mail, can launch a nasty virus into your system. Last summer, headlines proclaimed that widely popular e-mail programs like Microsoft's Outlook 98 and Outlook Express, as well as Netscape Mail, and Qualcomm's Eudora, are vulnerable to virus attacks. "You can get an e-mail that looks like any other e-mail," explains Alex Haddox, head of Symantec AntiVirus Research Center in Santa Monica, California. "Except when you open up the e-mail itself, by the time you read it, it's too late." You've got a virus! Who would perpetrate such a potentially harmful trick? Virus writers are mostly males age 14 to 24. For these digital delinquents, unleashing a new virus is an ego trip, says Haddox: "'Can I do it? Can I push the limits of technology?' Their greatest thrill is to have their name or their virus posted in the news worldwide." One 26-year-old British virus writer who identifies himself only as Rajaat admits, "I do get personal gratification out of it. For me, it's a challenge to see if I can outsmart antivirus software, and to try to think of innovative ways to do this." NO EASY TRICK Creating a computer virus is no easy trick. Just like computer games and word-processing software, a virus is a program--step-by-step instructions that tell a computer what to do. Unlike games and other software, however, a virus attaches itself to other programs in your computer. "It's essentially a digital parasite," explains Haddox. A virus contains instructions that tell it to self-replicate, or copy itself over and over again. When it first enters your computer--through an infected floppy disk, e-mail, or a program downloaded from
  • 3. the Internet--the virus copies itself to your computer's memory (see computer diagram, below). From there, it attaches itself to any program you open up. "The virus actually rewrites a program to incorporate itself into the program," says Haddox. "It rewrites the program so the virus will run first." Every time you open up another file or program, the virus plants itself into that file and takes over. In the process, it can cripple your machine's ability to find the files it needs to start up or operate. The infection doesn't end there. A computer virus, like the common cold, is highly contagious. Its primary purpose is to spread to as many computers as fast as possible, says Haddox. Computer virologists, programmers who try to combat the digital plague, say 10 to 15 new viruses are launched every day. The virus population, currently about 18,000, nearly doubles every year. Today, the sneaks invade 35 of every 1,000 computers each month. (About 200 million personal computers are in use today.) And thanks to the Internet, the "information superhighway" that connects computers worldwide, outbreaks go global in just weeks or less. With Internet usage exploding, the average user is now 20 times more likely to contract a computer virus. COMPUTER PERIL Most viruses are actually harmless, merely displaying silly messages ("I feel good!") or tunes ("Yankee Doodle Dandy") when you boot up. But destructive viruses have swelled to 35 percent of all computer invaders, up from 10 percent just six years ago. The worst of them garble data, hinder printing, or wipe out entire hard drives. The most common computer culprit is the macro virus--a type of virus that infects data documents like letters and spreadsheets--which accounts for more than 80 percent of all computer viruses. A macro is a legitimate mini-program, or procedure list, embedded in popular wordprocessing and spread sheet software, like Microsoft Word and Excel. It enables a user to write a simple program that executes a series of commands within a document, like automatically adding up numbers and presenting a total. Because macros were meant to be written by the average computer user, they're very easy to learn. "I call the macro virus the `every man's virus'," Haddox says, Anyone with ill-intent can easily write a virus using macros. In fact, one macro virus, called Format_C, formats, or erases, your hard drive with just three lines of instructions. PREVENTIVE MEDICINE So how can you protect your machine from a virus? Several antivirus software programs (costing between $30 and $60 each), available in computer stores, locate and remove viruses from your computer. Most viruses are easy to detect because they follow a specific sequence of instructions, and the first part is always self-replication. Antivirus products periodically check files for suspicious strands of software code, especially in the critical parts of a hard drive that contain operational instructions. While an antivirus software is an essential tool, preventive medicine is always best. Download programs only from reliable sites on the Internet, like well-known companies or organizations; avoid downloading material from personal Web pages. Find out where floppy disks have been before swapping them with friends. And beware of junk e-mail, or spams. They could contain a virus. Catching a virus is as easy as, well, catching a cold. RELATED ARTICLE: FROM PLAYFUL TO DANGEROUS
  • 4. As long ago as 1949, computer pioneer John von Neumann speculated that a program could reproduce itself. Three programmers at AT&T'S Bell Laboratories proved him right. They hatched self-replicating electronic "organisms." The programmers watched their creations fight for control of a computer in a bizarre after-hours experiment called "Core Wars." In 1986, a University of Southern California student named Fred Cohen coined the term "computer virus." He observed that electronic viruses, like their biological counterparts, attach themselves to hosts and replicate. The first computer viruses were playful. An early strain that surfaced on college campuses, for example, flashed the screen message: "I want a cookie." But it didn't disrupt a computer's operation in any way. Real damage hit computers in 1987, when a snippet of code known as the Brain erased hard-drive data on some 100,000 IBMPCs--including 10,000 at George Washington University alone. The "Brain" was traced to two brothers who ran a discount computer store in Lahore, Pakistan. They later admitted to injecting the virus into computers they sold to bargain-hunting tourists. The Brain was followed by a swarm of malignant strains like Jerusalem, which trashed any program run on a Friday the 13th. Finally, in 1992, "Michelangelo" became the first virus to threaten large numbers of home users. Headlines predicted it would erase millions of IBM-compatible computers on March 6, the Italian artist's birthday. In the end, the bug's bark was worse than its bite--though it did wipe out thousands of computers worldwide. RELATED ARTICLE: HOT JOBS VIRUS HUNTER Name: Alex Haddox Hot Job: Product Manager Where: Symantec AntiVirus Research Center Computer history: I bought my first computer, an AppleIIC, while at Santa Monica High [Santa Monica, California] back in the '80s. It actually sat on my desk for an entire year before I ever turned it on. What hooked you? Games. I've never been what you might call a true programmer. I tinkered with computer programming, but my real interest is more in the theories of how things work, rather than the actual hands-on part. College major? English. I went to several colleges. Why the interest in computer viruses? My first PC (non-Apple computer) came complete with two viruses. It was a brand new computer, but the store had pre-installed a whole bunch of software for me. How old were you when you started at Symantec? Barely 21. I worked full-time and went to college part-time. I'm only 28 and I've done about everything at the company except be president.
  • 5. So what do you do now? I analyze virus outbreaks in various parts of the world, and supervise a research team who writes anti-virus programs. Is virus hunting exciting?. It's almost like being in an emergency room. Every day there is some virus outbreak with some company in the world that we're called on to help. We need to make sure we stay one step ahead of the problem. If our research takes a wrong turn, a lot of computers will be hurt. I really feel I make a big difference. Advice to young computer fanatics? Take advanced computer science courses in college. The computer field is a great one to work in. Thanks, Alex. We'll call you if we have a computer virus. By the way, do you make house calls? COPYRIGHT 1998 Scholastic, Inc. No portion of this article can be reproduced without the express written permission from the copyright holder. Copyright 1998, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.