Anti
Virus made to fight computer viruses, even though many parties have
agreed that the worms and trojans can not be categorized as a virus, but
in history, giving the virus will travel history is always accompanied
by stories about the appearance and actions of other malware , worms and trojans. It can not be avoided because the 'creature' two born as a result of the ability of the virus itself.
1981 : First computer virus (viral ancestor), In 1981, a program called Elk Cloner appears on the Apple II computer. This program (year term computer virus has not been found) displays six lines on a computer monitor as follows : Is it going to get on your disk will infiltrate your chips Yes it's Cloner! Will it stick to you like glue Does it change the ram too Send in the Cloner!
1983 : Documentation of the first computer virus in 1983, documentation of test virus was first performed by Fred Cohen. S3 Cohen was a student and researcher in theoretical and scientific experiments can provide insight and understanding to the world that there will be a 'new creature' around our potential to be 'troublemakers' in the times of computers and telecommunications.
1986: The first virus on 'The Brain' PC is named for the first known virus that infects a PC. The virus was created by two brothers from Pakistan, Basit and Amjad, in 1986. These viruses infect floppy disk inserted into the PC operating system MS-DOS. Seiap infected floppy will have a volume label: "© Brain". 'Brain' is also often referred to as the first stealth computer virus because the virus is able to control the interrupt table in DOS (Interrupt interceptor). The virus is able to control the DOS level instructions and they are usually hidden either as full names or sizes.
1987: The virus attacks the extension *. COM This year is a virus file. This variant specifically attack all files with the extension *. COM. Command.com file with the subject attacked the attackers named Lehigh virus. Besides attacking *. COM, at the time the virus is also capable of attacking. * EXE file, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss the rush of the virus to turn on the computer system at the time. Recorded in history that this year the term "The Worm IBM Christmas" as a result of large IBM mainframe worm attack.
1988 : Virus for Macintosh, create ARPANET worm, antivirus for 'brain', and .... This year a celebrity macintosh began infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the 6000 collapse of the computers in the network, the ARPANET was caused by 'a' Robert Morris worm (he was only 23 years old at the time). The worm works by replicating and settled in computer memory. Funnily enough, the worm he created just to kill boredom. Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. The bad news is the birth of 'Jerusalem' and 'Cascade'. Jerusalem virus is only active / live on Friday the 13th day (Friday the 13th) and infected two extensions at once, ie. EXE **. And COM. Remarkably, all infected computers will lose their programs when run on that date. While the cascade was discovered by German is the first virus that encrypted (encrypted virus) that can not be altered or removed for that time. Except by those who know the encryption code-behind (decode) course. For example, the creator of the virus itself. Historical re-occur, the first antivirus finally emerged. Antivirus is designed to detect and remove viruses 'The Brain' which infect floppy disks. Plus the ability to immunize (immunize) to disk in order not to be taken by the 'Brain'. This means that, technically, the computer, antivirus algorithm is an algorithm that can destroy viruses running algorithms. The number of major events caused by computer viruses this year made popular moves and start filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That was cool.
1989: Dark Avenger Trojan AIDS and AIDS spreads as a Trojan program that can store data information AIDS (Acquired Immuno Deficiency Syndrome) in dijangkitinya computer. This may be useful if you are on your hard drive the doctors and health practitioners, but other problems with math and banking practitioners.
By September 17th, the Washington Post reported on a virus they called the language of journalists: "virus which lives and destroyed on Friday the 13th has bolted". This virus works like Jerusalem, his name DataCrime. The model introduces a new style of attack by the Dark Avenger virus. The virus is designed to destroy computer system gradually. Thus, initially the user will not be aware that their computer got a virus, until the time comes when the computer will run slower, slower, and slower.
In October in Israel soon be a virus called Frodo. This virus is a virus that is programmed to destroy the hard drive (hard drive) running on September 22 or thereafter in each year.
1990: Virus Exchange, a book about viruses and antivirus highlights Bulgaria emerged from a virus that can swap and change the code itself, it was the virus exchange (VX) BBS. Mark Ludwig registered himself as a writer who published a book about viruses. IBM, McAfee, Digital Dispatch and Iris antivirus problem. New in the IT business arena, making the program (toolkit) antivirus. In a variant of the virus in circulation and more intense. One is a combination of the virus the ability not only to hide (stealth virus), but is also capable of changing its own structure to outwit antivirus program (polymorphic virus) and infected two popular types of extensions, ie. EXE **. and COM and infect the boot sector.
1991: Symantec releases antivirus and Tequilla not want to miss the major vendors who have made antivirus, Symantec antivirus label finally released Norton Antivirus. Products that to this day continues to dominate the world antivirus market. The surprise this year was when Tequilla found. This virus has the three magic at once, which can hide (stealth), can be polymorphic and multipartite. 1992: Toolkit makers of The Dark Avenger virus mutation Enginge (DAME) being the creator of the first virus toolkit that can transform ordinary viruses into polymorphic viruses. Besides DAME born too VCL (Virus Creation Laboratory), who became the first virus creators. In March Michelangelo virus emerged, the news spread by the media about this virus makes antivirus sales rose sharply. Statistics notes that there are about 1300 virus this year. An increase of 420% since December 1990.
1993: Viruses are good and Satan Bug virus Cruncher is often regarded as a good thing because each infected file compresses. So, he is regarded as the savior of storage capacity as well. Meanwhile, in another place for a big surprise there. Satan Bug virus makers that the arrest by the FBI using antivirus vendor support are just kids.
1994: Good Times, which makes the bad times, the first time a good Hoax is a virus that spreads via e-mail with the subject as the name itself. The contents of the message he mentioned that just by reading or viewing the message bersubject "good times" on the computer then the contents of the hard drive of the computer will be lost and even damage the processor. Having carefully examined, it turns out the contents of the message is a hoax (hoax) only. Both times it is true that this virus replicate itself like other viruses.
1995: Windows 95 and the first Macro virus emergence of Windows 95 made many antivirus vendors are worried that their products will eventually not work anymore and no one is buying. However, the macro virus first appeared, called Concept. The virus is not a DOS attack but attack the most popular word processor application that time, MS-Word. Antivirus vendors such as getting fruit simalakama, one hand they are happy, the other they are not. Since their enemies grow again.
1996: virus for windows 95, linux, and Excel A year after its emergence, the more popular Concept diseantero world. Ms Excel eventually also be obtained before the Laroux virus. No lag, and Staog Boza virus became the first virus for Windows 95 and the open-source OS: Linux. After the producers were investigated and Staog Boza is the same group.
1998: Virus Java, Back Orifice, and Solar Sunrise Strange Brew is a virus that attacks the java file for the first time, but the damage is not too 'proud'. This year till now legendary Trojan, Back Orifice, a remote control device (remote administration) that would allow someone to take someone else's computer specialists over a network, either a local network or the Internet. Access macro viruses started to appear later this year. One of the most tumultuous events of this year is when two teenagers from California managed to infiltrate and control the computer systems of the Department of Defense, USA, government offices, private and public institutions. The accident was popular with the 'Solar Sunrise' term for the OS that is widely used by Sun Solaris computer is compromised. In addition, the emergence of this year is also the year of Chernobyl, a virus that damages the hard drive storage system and be able to disrupt the system. In China alone, losses reached 120 million U.S. dollars. Fortunately, the virus attacks the Windows OS and not attack a variety of OS Unix and Novell Netware. If only the OS later also infected with the losses could be greater because of Unix and Netware are widely used in the banking sector, government, securities, aviation, and telecommunications. 1999: Please come .. Melissa This year truly belongs to Melissa macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa into a virus that spreads faster than the virus before and certainly most antivirus catalyst sales worldwide.
Bubble Boy emerged and became the first virus that does not rely on the user to perform an action. So, when the recipient opens the attachment Boy bubble letters such as Ms Outlook program manager, so the virus does not have to wait to open the attached file first. Corner virus appears complete line of malware that infects liked prodik-Microsoft products. This time the target is Ms Project.
Tristate became the first virus capable of infecting three variants of MS Office as well, a point that Ms Word, Excel, and Power.
2000: time to say love with 'I love you' A young Filipino creator of the virus known as the 'I love you'. The workings of this virus like Melissa but more sophisticated and more damaging than his own Melissa. If Melissa only took 50 e-mail list on the infected computer and then send it to another computer via the internet, then I love you not only take 50, but all. Remarkably, all the information about the e-mail address book is taken from a computer, such as your username and password will be sent to the address of the author of the virus. Plus the ability to delete a file with the extension *. MP3, *. MP2, *. JPG and. 2001: Kournikova, Code Red and Nimda. Virus 'Anna Kournikova' to use young players shining image of Russia as a bait works by sending itself to e-mail in MS Outlook Address Book. The emergence of this virus makes security analysts worry that might be out there the virus makers no longer need to bother thinking of a complicated algorithm in the manufacturing process due to the unavailability of the virus to produce virus tools are easily available on the internet.
Code Red makes the world scene when power (resources) of all computers that successfully dijangkitinya he can use to make the collapse of the system on the website of the White House (White House). Losses generated by this virus in the United States totaled about $ 2 billion. In fact, computers are being attacked by a virus is a computer running Windows 2000 Server and Windows NT as the OS.
Exactly one day after the destruction of the WTC on 11 September 2001 came the Nimda. The virus is considered to be one of the smartest virus in history the history of the virus because it has five different ways / methods for infecting systems and replicating itself.
At this year's Melissa virus author David L. Smith (33 years), finally captured and put into the U.S. federal prison for 20 years.
2002: Klez worm Klez and superstar, malignant worm that spreads via the Internet. Interestingly, after he sends copies of itself to all the victims, that all e-mails within the folder Ms Outlook, Klez then create a hidden copy of the original file dijangkitinya. In addition, the popular worm is also able to disable some antivirus product is installed on your computer first victim.
Continuing a successful virtual world virus 'Anna Kournikova' capable of horrendous previous philosophy, there are so few viruses that use the name Hollywood celebrities as the 'detonator' it. Among other celebrities, Britney Spears, Shakira, and Jennifer Lopez.
2003: Slammer and Sobig, another worm, worms. worm 'Slammer' worm is actually a relatively friendly and relaxed. However, power attacked (spread) and speed duplikasinya (replication occurs every 8.5 seconds) is really able to shake the world. Within 10 minutes after its appearance, it is able to infect 75,000 computers. They lead to significant damage to the business world, including melumpuhnya cash machines owned by a bank that can not be online and delaying some airline ticket arrangements performed by a computer that has been infected. And it turns out, also Sobig worm. This worm was recorded as a 'worm' favored by spammers. Why? Because Sobig he can make a computer relay point jangkiti (baton) for spammers to spread replicas separately Sobig mass to the victim to be addressed.
2004: MyDoom, Netsky, Bagle and Sasser. no matter who wins, loses, We Are! Novarg Aka known as the MyDoom virus spread fastest in the virus world history, ahead of Melissa popular in 1999. The virus is spread through e-mail and file sharing software. He lure potential victims by telling them that one of the e-mail they had sent earlier had failed messages. This is a clever trick to deceive the victim nan simple. The real motive of this virus as a tool for hackers to launch DoS attacks (Denial of Service) to a computer server Inc SCO. (Santa Cruz Operation), and succeeded.
1981 : First computer virus (viral ancestor), In 1981, a program called Elk Cloner appears on the Apple II computer. This program (year term computer virus has not been found) displays six lines on a computer monitor as follows : Is it going to get on your disk will infiltrate your chips Yes it's Cloner! Will it stick to you like glue Does it change the ram too Send in the Cloner!
1983 : Documentation of the first computer virus in 1983, documentation of test virus was first performed by Fred Cohen. S3 Cohen was a student and researcher in theoretical and scientific experiments can provide insight and understanding to the world that there will be a 'new creature' around our potential to be 'troublemakers' in the times of computers and telecommunications.
1986: The first virus on 'The Brain' PC is named for the first known virus that infects a PC. The virus was created by two brothers from Pakistan, Basit and Amjad, in 1986. These viruses infect floppy disk inserted into the PC operating system MS-DOS. Seiap infected floppy will have a volume label: "© Brain". 'Brain' is also often referred to as the first stealth computer virus because the virus is able to control the interrupt table in DOS (Interrupt interceptor). The virus is able to control the DOS level instructions and they are usually hidden either as full names or sizes.
1987: The virus attacks the extension *. COM This year is a virus file. This variant specifically attack all files with the extension *. COM. Command.com file with the subject attacked the attackers named Lehigh virus. Besides attacking *. COM, at the time the virus is also capable of attacking. * EXE file, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss the rush of the virus to turn on the computer system at the time. Recorded in history that this year the term "The Worm IBM Christmas" as a result of large IBM mainframe worm attack.
1988 : Virus for Macintosh, create ARPANET worm, antivirus for 'brain', and .... This year a celebrity macintosh began infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the 6000 collapse of the computers in the network, the ARPANET was caused by 'a' Robert Morris worm (he was only 23 years old at the time). The worm works by replicating and settled in computer memory. Funnily enough, the worm he created just to kill boredom. Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. The bad news is the birth of 'Jerusalem' and 'Cascade'. Jerusalem virus is only active / live on Friday the 13th day (Friday the 13th) and infected two extensions at once, ie. EXE **. And COM. Remarkably, all infected computers will lose their programs when run on that date. While the cascade was discovered by German is the first virus that encrypted (encrypted virus) that can not be altered or removed for that time. Except by those who know the encryption code-behind (decode) course. For example, the creator of the virus itself. Historical re-occur, the first antivirus finally emerged. Antivirus is designed to detect and remove viruses 'The Brain' which infect floppy disks. Plus the ability to immunize (immunize) to disk in order not to be taken by the 'Brain'. This means that, technically, the computer, antivirus algorithm is an algorithm that can destroy viruses running algorithms. The number of major events caused by computer viruses this year made popular moves and start filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That was cool.
1989: Dark Avenger Trojan AIDS and AIDS spreads as a Trojan program that can store data information AIDS (Acquired Immuno Deficiency Syndrome) in dijangkitinya computer. This may be useful if you are on your hard drive the doctors and health practitioners, but other problems with math and banking practitioners.
By September 17th, the Washington Post reported on a virus they called the language of journalists: "virus which lives and destroyed on Friday the 13th has bolted". This virus works like Jerusalem, his name DataCrime. The model introduces a new style of attack by the Dark Avenger virus. The virus is designed to destroy computer system gradually. Thus, initially the user will not be aware that their computer got a virus, until the time comes when the computer will run slower, slower, and slower.
In October in Israel soon be a virus called Frodo. This virus is a virus that is programmed to destroy the hard drive (hard drive) running on September 22 or thereafter in each year.
1990: Virus Exchange, a book about viruses and antivirus highlights Bulgaria emerged from a virus that can swap and change the code itself, it was the virus exchange (VX) BBS. Mark Ludwig registered himself as a writer who published a book about viruses. IBM, McAfee, Digital Dispatch and Iris antivirus problem. New in the IT business arena, making the program (toolkit) antivirus. In a variant of the virus in circulation and more intense. One is a combination of the virus the ability not only to hide (stealth virus), but is also capable of changing its own structure to outwit antivirus program (polymorphic virus) and infected two popular types of extensions, ie. EXE **. and COM and infect the boot sector.
1991: Symantec releases antivirus and Tequilla not want to miss the major vendors who have made antivirus, Symantec antivirus label finally released Norton Antivirus. Products that to this day continues to dominate the world antivirus market. The surprise this year was when Tequilla found. This virus has the three magic at once, which can hide (stealth), can be polymorphic and multipartite. 1992: Toolkit makers of The Dark Avenger virus mutation Enginge (DAME) being the creator of the first virus toolkit that can transform ordinary viruses into polymorphic viruses. Besides DAME born too VCL (Virus Creation Laboratory), who became the first virus creators. In March Michelangelo virus emerged, the news spread by the media about this virus makes antivirus sales rose sharply. Statistics notes that there are about 1300 virus this year. An increase of 420% since December 1990.
1993: Viruses are good and Satan Bug virus Cruncher is often regarded as a good thing because each infected file compresses. So, he is regarded as the savior of storage capacity as well. Meanwhile, in another place for a big surprise there. Satan Bug virus makers that the arrest by the FBI using antivirus vendor support are just kids.
1994: Good Times, which makes the bad times, the first time a good Hoax is a virus that spreads via e-mail with the subject as the name itself. The contents of the message he mentioned that just by reading or viewing the message bersubject "good times" on the computer then the contents of the hard drive of the computer will be lost and even damage the processor. Having carefully examined, it turns out the contents of the message is a hoax (hoax) only. Both times it is true that this virus replicate itself like other viruses.
1995: Windows 95 and the first Macro virus emergence of Windows 95 made many antivirus vendors are worried that their products will eventually not work anymore and no one is buying. However, the macro virus first appeared, called Concept. The virus is not a DOS attack but attack the most popular word processor application that time, MS-Word. Antivirus vendors such as getting fruit simalakama, one hand they are happy, the other they are not. Since their enemies grow again.
1996: virus for windows 95, linux, and Excel A year after its emergence, the more popular Concept diseantero world. Ms Excel eventually also be obtained before the Laroux virus. No lag, and Staog Boza virus became the first virus for Windows 95 and the open-source OS: Linux. After the producers were investigated and Staog Boza is the same group.
1998: Virus Java, Back Orifice, and Solar Sunrise Strange Brew is a virus that attacks the java file for the first time, but the damage is not too 'proud'. This year till now legendary Trojan, Back Orifice, a remote control device (remote administration) that would allow someone to take someone else's computer specialists over a network, either a local network or the Internet. Access macro viruses started to appear later this year. One of the most tumultuous events of this year is when two teenagers from California managed to infiltrate and control the computer systems of the Department of Defense, USA, government offices, private and public institutions. The accident was popular with the 'Solar Sunrise' term for the OS that is widely used by Sun Solaris computer is compromised. In addition, the emergence of this year is also the year of Chernobyl, a virus that damages the hard drive storage system and be able to disrupt the system. In China alone, losses reached 120 million U.S. dollars. Fortunately, the virus attacks the Windows OS and not attack a variety of OS Unix and Novell Netware. If only the OS later also infected with the losses could be greater because of Unix and Netware are widely used in the banking sector, government, securities, aviation, and telecommunications. 1999: Please come .. Melissa This year truly belongs to Melissa macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa into a virus that spreads faster than the virus before and certainly most antivirus catalyst sales worldwide.
Bubble Boy emerged and became the first virus that does not rely on the user to perform an action. So, when the recipient opens the attachment Boy bubble letters such as Ms Outlook program manager, so the virus does not have to wait to open the attached file first. Corner virus appears complete line of malware that infects liked prodik-Microsoft products. This time the target is Ms Project.
Tristate became the first virus capable of infecting three variants of MS Office as well, a point that Ms Word, Excel, and Power.
2000: time to say love with 'I love you' A young Filipino creator of the virus known as the 'I love you'. The workings of this virus like Melissa but more sophisticated and more damaging than his own Melissa. If Melissa only took 50 e-mail list on the infected computer and then send it to another computer via the internet, then I love you not only take 50, but all. Remarkably, all the information about the e-mail address book is taken from a computer, such as your username and password will be sent to the address of the author of the virus. Plus the ability to delete a file with the extension *. MP3, *. MP2, *. JPG and. 2001: Kournikova, Code Red and Nimda. Virus 'Anna Kournikova' to use young players shining image of Russia as a bait works by sending itself to e-mail in MS Outlook Address Book. The emergence of this virus makes security analysts worry that might be out there the virus makers no longer need to bother thinking of a complicated algorithm in the manufacturing process due to the unavailability of the virus to produce virus tools are easily available on the internet.
Code Red makes the world scene when power (resources) of all computers that successfully dijangkitinya he can use to make the collapse of the system on the website of the White House (White House). Losses generated by this virus in the United States totaled about $ 2 billion. In fact, computers are being attacked by a virus is a computer running Windows 2000 Server and Windows NT as the OS.
Exactly one day after the destruction of the WTC on 11 September 2001 came the Nimda. The virus is considered to be one of the smartest virus in history the history of the virus because it has five different ways / methods for infecting systems and replicating itself.
At this year's Melissa virus author David L. Smith (33 years), finally captured and put into the U.S. federal prison for 20 years.
2002: Klez worm Klez and superstar, malignant worm that spreads via the Internet. Interestingly, after he sends copies of itself to all the victims, that all e-mails within the folder Ms Outlook, Klez then create a hidden copy of the original file dijangkitinya. In addition, the popular worm is also able to disable some antivirus product is installed on your computer first victim.
Continuing a successful virtual world virus 'Anna Kournikova' capable of horrendous previous philosophy, there are so few viruses that use the name Hollywood celebrities as the 'detonator' it. Among other celebrities, Britney Spears, Shakira, and Jennifer Lopez.
2003: Slammer and Sobig, another worm, worms. worm 'Slammer' worm is actually a relatively friendly and relaxed. However, power attacked (spread) and speed duplikasinya (replication occurs every 8.5 seconds) is really able to shake the world. Within 10 minutes after its appearance, it is able to infect 75,000 computers. They lead to significant damage to the business world, including melumpuhnya cash machines owned by a bank that can not be online and delaying some airline ticket arrangements performed by a computer that has been infected. And it turns out, also Sobig worm. This worm was recorded as a 'worm' favored by spammers. Why? Because Sobig he can make a computer relay point jangkiti (baton) for spammers to spread replicas separately Sobig mass to the victim to be addressed.
2004: MyDoom, Netsky, Bagle and Sasser. no matter who wins, loses, We Are! Novarg Aka known as the MyDoom virus spread fastest in the virus world history, ahead of Melissa popular in 1999. The virus is spread through e-mail and file sharing software. He lure potential victims by telling them that one of the e-mail they had sent earlier had failed messages. This is a clever trick to deceive the victim nan simple. The real motive of this virus as a tool for hackers to launch DoS attacks (Denial of Service) to a computer server Inc SCO. (Santa Cruz Operation), and succeeded.
After
a DoS attack occurs, ie on 1 September 2004, the company website is
hated among open source has a chance to be offline a few days. Because
of the seriousness, the SCO will be awarded for $ 250,000.00 reward for
those who can tell who is behind the creation of this virus. Sven Jaschan, a German high school teenager admitted writing Sasser. This
worm does not cause technical damage to the computer, it's just that he
was able to lead some of the infected computer becomes slow and reboots
itself without desired by the user. Noted, some big companies are victims of this worm. As
a proud British airlines, British Airways, British Coast Guard,
RailCorp Australia, and even the two hospitals in Sweden failed online
5000 their computers because of this worm.
When
asked by the German police about the motives behind the making of this
worm, Jaschan replied that Sasser was written to deal with the spammers
who were behind Baggle manufacture and MyDoom. Netsky written by Jaschan to deal with attacks that spammers use Bagle and MyDoom. So
when Bagle and MyDoom is preparing measures to make each infected
computer as a mass mailing disposal, the Netsky will do the opposite.
Great
history occurred in June this year when the first mobile phone virus,
Cabir, appeared as a candidate frightening specter for mobile users
based on Symbian OS Bluetooth enabled. Followed by attacks DUTs Pocket PC and PDA.