Although many parties have agreed that worms and trojans can not be categorized as a virus, but in its history, delivering the virus will travel history is always accompanied by stories about the emergence and actions of other malware, the worms and trojans. It is indeed not be avoided because the two 'creatures' is born as the impact of the ability of the virus itself.
1981: First in the computer virus (virus ancestor) In 1981, a program called Elk Cloner appear on the Apple II computer. This program (this year the term computer virus has not been found) displays six lines on a computer monitor as follows: Will it get on your disk Will it infiltrate your chips Yes it's Cloner! Will it stick to you like glue Will it modify ram too Send in the Cloner!
1983: Documentation of the first computer virus In 1983, documentation of test virus was first performed by Fred Cohen. S3 Cohen was a student and researcher who theoretically and with a variety of scientific experiments can provide insight and understanding to the world that there will be 'new creature' around us with huge potential to be 'troublemakers' in the development of the computer age and telecommunications.
1986: The first virus on a PC 'The Brain' is the name for the first time unknown viruses that infect the PC. The virus is made by two brothers from Pakistan, Basit and Amjad, in 1986. These viruses infect floppy disk that is inserted in the PC operating system MS-DOS. Seiap diskettes that have been infected will have a volume label: "© Brain". 'The Brain' is also often referred to as the first computer stealth virus because the virus is able to master tables in the DOS interrupt (Interrupt interceptor). The virus is capable of controlling the DOS level instructions and usually they are hidden as either full name or size.1987: The virus attacks the extension *. COM This year is the year the virus file. These variants are specifically attacking all files with extension *. COM. Common file command.com with the subject attacked the attacker named Lehigh virus. In addition to attacking *. COM, at the time the virus has also been able to attack .* EXE file, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss the rush of the virus to animate a computer system at the time. Recorded in history that this year the term "The IBM Christmas Worm" as the impact of IBM's mainframe large worm attacked.
1988: Virus for the Macintosh, created the ARPANET worm, antivirus for 'the brain', and .... become celebrities In this year began macintosh infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the collapse of the 6000 computers in the network, ARPANET was caused by 'a' worm Robert Morris (he was only 23 years old at the time). The worm works its way to duplicate himself and settle in the computer memory. Funnily enough, the worm he created just to kill boredom.
Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. Other bad news is the birth of 'Jerusalem' and 'Cascade'. Jerusalem virus is only active / live on the 13th day of Friday (Friday the 13th) and infect the two extensions at once, namely .* .* EXE and COM. Remarkably, all infected computers will lose their programs if run on that date.
While the cascade are discovered by the Germans was the first virus that is encrypted (encrypted viruses) that can not be changed or eliminated for that era.
Except by those who know the encryption code-behind (decode) course. For example the creator of the virus itself. History re-occur, the first antiviral finally emerged. Antivirus is designed to detect as well as remove the virus 'The Brain' which infect the diskette. Plus the ability to immunize (give immunity) to the diskette from being seized by 'The Brain'. This means, technically a computer, the antivirus algorithm is an algorithm that can damage the course of the algorithm of the virus. The number of major events caused by computer viruses this year made him popular move and start filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That's cool.
1989: Trojan AIDS and Dark Avenger AIDS spread as a Trojan program that can hold data information of AIDS (Acquired Immuno Deficiency Syndrome) in the computer dijangkitinya. It may be useful if you are on your hard drive the doctors and health practitioners, but another problem with the mathematician and banking practitioners. In the month of September the 17th, the Washington Post reported about a virus which they called the language of the journalist: "a virus that lives and destroyed on Friday the 13th has been blurred". This virus works like Jerusalem, his name is DataCrime. Model introduced a new style of attack by the Dark Avenger virus. The virus is designed to destroy the computer system slowly. So, at first the user will not realize that their computer got a virus, until the time arrives when the computer will run slower, slower, and slower. In the month of October in Israel emerged virus called Frodo. This virus is a virus that is programmed to damage the hard drive (hard drive) running on September 22 or thereafter in any year.
1990: Virus Exchange, a book about viruses, and antivirus highlights Bulgaria emerged from a virus that can swap and change its own code, his name is a virus exchange (VX) BBS. Mark Ludwig enlisting as a writer who published a book about the virus. IBM, McAfee, Digital Dispatch, and Iris antivirus issue. The new arena in the IT business, making the program (toolkit) antivirus. In this variant of the virus in circulation and more intense. One of them is a combination of viruses that ability not just to hide (stealth virus), but also capable of changing its own structure to outwit antivirus program (polymorphic viruses) and infect the two types of popular extensions, namely .* .* EXE and COM as well as to infect the boot sector .
1991: Symantec releases antivirus and Tequilla Do not want to miss the big vendors who have made antivirus, Symantec finally released labeled antivirus Norton Antivirus. Products that to this day continues to rule the world antivirus market. The surprise this year was when Tequilla found. This virus has three magic power at once, which could hide (stealth), can be polymorphic and multipartite. 1992: Toolkit virus maker The Dark Avenger Mutation Enginge (DAME) became the first virus creator toolkit that can transform ordinary viruses into polymorphic viruses. Besides DAME born too VCL (Virus Creation Laboratory), which became the first virus creator. In March Michelangelo virus emerged, the news spread by the media regarding this virus makes antivirus sales rose sharply. Statistics noted that there were already about 1300 virus this year. Means increased 420% since December 1990.
1993: The virus is good and Satan Bug Cruncher is often regarded as a good virus because it compress each file the infected. So, he was regarded also as the savior of storage capacity. Meanwhile, in another place for a big surprise there. The makers of The Satan Bug virus that arrest by the FBI using the help of antivirus vendors were just a kid.
1994: Good Times, which makes the bad times; first Hoax Good Times is a virus that spread through e-mail with the subject as his own name. The content of his message he mentioned that just by reading or viewing the message bersubject "good times" on the computer then the contents of computer hard drives will disappear and even damage the processor. Having examined carefully, it turns out the contents of the message is hoax (hoax) alone. Good times true that the virus is replicating itself Like the other viruses.
1995: Windows 95 and the first Macro virus The advent of Windows 95 made a lot of antivirus vendors are worried that their products will eventually not work anymore and nobody buys. However, the first macro virus appeared, called Concept. This virus is not a DOS attack but attacking the application of the most famous word processor at that time, MS-Word. Antivirus vendors like getting fruit simalakama, one side they are happy, the other hand they do not. Because of their enemies grow again.
1996: virus for windows 95, linux, and Excel A year after its emergence, Concept diseantero world increasingly popular. Ms Excel eventually also acquired the virus in the presence of Laroux. No lag, and Staog Boza virus became the first virus for Windows 95 and open-source OS: Linux. After the manufacturer was investigated and Staog Boza is the same group.
1998: Virus Java, Back Orifice, and Solar Sunrise Strange Brew is a virus that attacks the java file for the first time, but the damage is not too 'proud'. In this year until now the legendary Trojan, Back Orifice, a remote control tool (remote administration) that would allow someone to take someone else's computer specialists via a network, whether local network or Internet network. Access macro viruses started to emerge later this year. One of the most tumultuous events this year is when two teenagers from California managed to infiltrate and control the computer systems belonging to the Department of Defense, USA, government offices, private and public institutions. The accident was popular with the term 'Solar Sunrise' because the OS that is widely used by a compromised computer is a Sun Solaris. In addition, this year's emergence is also the year of Chernobyl, a virus that damages the hard drive storage system and able to disrupt the system. In China alone, the losses reached 120 million U.S. dollars.
Fortunately, the virus attacks the Windows OS only and are not attacking the OS range of Unix and Novell Netware. If only the OS later also infected with the losses that occur could be even greater because of Unix and Netware are widely used in the banking sector, government, securities, aviation, and telecommunications.
1999: Please welcome .. Melissa This year truly belonged to Melissa, a macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa became a virus that spreads faster than most previous viruses and of course a catalyst antivirus sales worldwide. Bubble Boy emerged and became the first virus that does not depend on the user to perform an action. So, when a recipient opens the attachment Bubble Boy his mail program managers like Ms. Outlook, so the virus does not have to wait to open his first attachment file. Virus Corner appears complete line of malware that infects fond prodik-Microsoft products. This time the target was Ms Project. Tristate became the first virus capable of infecting three variants of MS Office as well, ie Ms Word, Excel, and Power Point.
2000: time to say in love with 'I Love You' A young Filipino creator of the virus known as 'I Love You'. Mode of action of this virus-like Melissa but more sophisticated and more destructive than Melissa's own. If Melissa was only taking 50 e-mail list on the infected computer and then send it to other computers via the internet, then I Love You not only take 50, but all. Amazingly, all the information about e-mail address book taken from the computer, such as your username and password will be sent to the address of the author of the virus. Plus the ability to delete files with extension *. MP3, *. MP2, *. JPG and. 2001: Kournikova, Code Red and Nimda. Virus 'Anna Kournikova' to use young players shining image of Russia as a bait works by sending itself to e-mail in MS Outlook Address Book. The emergence of this virus makes security analysts worry that maybe out there the virus makers no longer have to bother to think about complex algorithms in the manufacturing process due to the virus by the availability of tools to manufacture the virus is easily available on the internet. Code Red makes the world scene when the power (resources) of all computers which successfully dijangkitinya can he used to make the system fall on the website of the White House (White House). Losses generated by this virus in the United States reached about $ 2 billion. In fact, computers are being attacked by the virus is a computer that uses Windows 2000 server and Windows NT as the OS.
Exactly a day after the destruction of the WTC on 11 September 2001 came the Nimda. The virus is regarded as one of the smartest virus in history history of the virus because it has five kinds of ways / methods to infect systems and replicating itself. In this year's Melissa virus author David L. Smith (33 years), finally got arrested and put into the United States federal prison for 20 years.
1986: The first virus on a PC 'The Brain' is the name for the first time unknown viruses that infect the PC. The virus is made by two brothers from Pakistan, Basit and Amjad, in 1986. These viruses infect floppy disk that is inserted in the PC operating system MS-DOS. Seiap diskettes that have been infected will have a volume label: "© Brain". 'The Brain' is also often referred to as the first computer stealth virus because the virus is able to master tables in the DOS interrupt (Interrupt interceptor). The virus is capable of controlling the DOS level instructions and usually they are hidden as either full name or size.1987: The virus attacks the extension *. COM This year is the year the virus file. These variants are specifically attacking all files with extension *. COM. Common file command.com with the subject attacked the attacker named Lehigh virus. In addition to attacking *. COM, at the time the virus has also been able to attack .* EXE file, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss the rush of the virus to animate a computer system at the time. Recorded in history that this year the term "The IBM Christmas Worm" as the impact of IBM's mainframe large worm attacked.
1988: Virus for the Macintosh, created the ARPANET worm, antivirus for 'the brain', and .... become celebrities In this year began macintosh infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the collapse of the 6000 computers in the network, ARPANET was caused by 'a' worm Robert Morris (he was only 23 years old at the time). The worm works its way to duplicate himself and settle in the computer memory. Funnily enough, the worm he created just to kill boredom.
Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. Other bad news is the birth of 'Jerusalem' and 'Cascade'. Jerusalem virus is only active / live on the 13th day of Friday (Friday the 13th) and infect the two extensions at once, namely .* .* EXE and COM. Remarkably, all infected computers will lose their programs if run on that date.
While the cascade are discovered by the Germans was the first virus that is encrypted (encrypted viruses) that can not be changed or eliminated for that era.
Except by those who know the encryption code-behind (decode) course. For example the creator of the virus itself. History re-occur, the first antiviral finally emerged. Antivirus is designed to detect as well as remove the virus 'The Brain' which infect the diskette. Plus the ability to immunize (give immunity) to the diskette from being seized by 'The Brain'. This means, technically a computer, the antivirus algorithm is an algorithm that can damage the course of the algorithm of the virus. The number of major events caused by computer viruses this year made him popular move and start filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That's cool.
1989: Trojan AIDS and Dark Avenger AIDS spread as a Trojan program that can hold data information of AIDS (Acquired Immuno Deficiency Syndrome) in the computer dijangkitinya. It may be useful if you are on your hard drive the doctors and health practitioners, but another problem with the mathematician and banking practitioners. In the month of September the 17th, the Washington Post reported about a virus which they called the language of the journalist: "a virus that lives and destroyed on Friday the 13th has been blurred". This virus works like Jerusalem, his name is DataCrime. Model introduced a new style of attack by the Dark Avenger virus. The virus is designed to destroy the computer system slowly. So, at first the user will not realize that their computer got a virus, until the time arrives when the computer will run slower, slower, and slower. In the month of October in Israel emerged virus called Frodo. This virus is a virus that is programmed to damage the hard drive (hard drive) running on September 22 or thereafter in any year.
1990: Virus Exchange, a book about viruses, and antivirus highlights Bulgaria emerged from a virus that can swap and change its own code, his name is a virus exchange (VX) BBS. Mark Ludwig enlisting as a writer who published a book about the virus. IBM, McAfee, Digital Dispatch, and Iris antivirus issue. The new arena in the IT business, making the program (toolkit) antivirus. In this variant of the virus in circulation and more intense. One of them is a combination of viruses that ability not just to hide (stealth virus), but also capable of changing its own structure to outwit antivirus program (polymorphic viruses) and infect the two types of popular extensions, namely .* .* EXE and COM as well as to infect the boot sector .
1991: Symantec releases antivirus and Tequilla Do not want to miss the big vendors who have made antivirus, Symantec finally released labeled antivirus Norton Antivirus. Products that to this day continues to rule the world antivirus market. The surprise this year was when Tequilla found. This virus has three magic power at once, which could hide (stealth), can be polymorphic and multipartite. 1992: Toolkit virus maker The Dark Avenger Mutation Enginge (DAME) became the first virus creator toolkit that can transform ordinary viruses into polymorphic viruses. Besides DAME born too VCL (Virus Creation Laboratory), which became the first virus creator. In March Michelangelo virus emerged, the news spread by the media regarding this virus makes antivirus sales rose sharply. Statistics noted that there were already about 1300 virus this year. Means increased 420% since December 1990.
1993: The virus is good and Satan Bug Cruncher is often regarded as a good virus because it compress each file the infected. So, he was regarded also as the savior of storage capacity. Meanwhile, in another place for a big surprise there. The makers of The Satan Bug virus that arrest by the FBI using the help of antivirus vendors were just a kid.
1994: Good Times, which makes the bad times; first Hoax Good Times is a virus that spread through e-mail with the subject as his own name. The content of his message he mentioned that just by reading or viewing the message bersubject "good times" on the computer then the contents of computer hard drives will disappear and even damage the processor. Having examined carefully, it turns out the contents of the message is hoax (hoax) alone. Good times true that the virus is replicating itself Like the other viruses.
1995: Windows 95 and the first Macro virus The advent of Windows 95 made a lot of antivirus vendors are worried that their products will eventually not work anymore and nobody buys. However, the first macro virus appeared, called Concept. This virus is not a DOS attack but attacking the application of the most famous word processor at that time, MS-Word. Antivirus vendors like getting fruit simalakama, one side they are happy, the other hand they do not. Because of their enemies grow again.
1996: virus for windows 95, linux, and Excel A year after its emergence, Concept diseantero world increasingly popular. Ms Excel eventually also acquired the virus in the presence of Laroux. No lag, and Staog Boza virus became the first virus for Windows 95 and open-source OS: Linux. After the manufacturer was investigated and Staog Boza is the same group.
1998: Virus Java, Back Orifice, and Solar Sunrise Strange Brew is a virus that attacks the java file for the first time, but the damage is not too 'proud'. In this year until now the legendary Trojan, Back Orifice, a remote control tool (remote administration) that would allow someone to take someone else's computer specialists via a network, whether local network or Internet network. Access macro viruses started to emerge later this year. One of the most tumultuous events this year is when two teenagers from California managed to infiltrate and control the computer systems belonging to the Department of Defense, USA, government offices, private and public institutions. The accident was popular with the term 'Solar Sunrise' because the OS that is widely used by a compromised computer is a Sun Solaris. In addition, this year's emergence is also the year of Chernobyl, a virus that damages the hard drive storage system and able to disrupt the system. In China alone, the losses reached 120 million U.S. dollars.
Fortunately, the virus attacks the Windows OS only and are not attacking the OS range of Unix and Novell Netware. If only the OS later also infected with the losses that occur could be even greater because of Unix and Netware are widely used in the banking sector, government, securities, aviation, and telecommunications.
1999: Please welcome .. Melissa This year truly belonged to Melissa, a macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa became a virus that spreads faster than most previous viruses and of course a catalyst antivirus sales worldwide. Bubble Boy emerged and became the first virus that does not depend on the user to perform an action. So, when a recipient opens the attachment Bubble Boy his mail program managers like Ms. Outlook, so the virus does not have to wait to open his first attachment file. Virus Corner appears complete line of malware that infects fond prodik-Microsoft products. This time the target was Ms Project. Tristate became the first virus capable of infecting three variants of MS Office as well, ie Ms Word, Excel, and Power Point.
2000: time to say in love with 'I Love You' A young Filipino creator of the virus known as 'I Love You'. Mode of action of this virus-like Melissa but more sophisticated and more destructive than Melissa's own. If Melissa was only taking 50 e-mail list on the infected computer and then send it to other computers via the internet, then I Love You not only take 50, but all. Amazingly, all the information about e-mail address book taken from the computer, such as your username and password will be sent to the address of the author of the virus. Plus the ability to delete files with extension *. MP3, *. MP2, *. JPG and. 2001: Kournikova, Code Red and Nimda. Virus 'Anna Kournikova' to use young players shining image of Russia as a bait works by sending itself to e-mail in MS Outlook Address Book. The emergence of this virus makes security analysts worry that maybe out there the virus makers no longer have to bother to think about complex algorithms in the manufacturing process due to the virus by the availability of tools to manufacture the virus is easily available on the internet. Code Red makes the world scene when the power (resources) of all computers which successfully dijangkitinya can he used to make the system fall on the website of the White House (White House). Losses generated by this virus in the United States reached about $ 2 billion. In fact, computers are being attacked by the virus is a computer that uses Windows 2000 server and Windows NT as the OS.
Exactly a day after the destruction of the WTC on 11 September 2001 came the Nimda. The virus is regarded as one of the smartest virus in history history of the virus because it has five kinds of ways / methods to infect systems and replicating itself. In this year's Melissa virus author David L. Smith (33 years), finally got arrested and put into the United States federal prison for 20 years.
2002: Klez worm and its superstars Klez, malignant worm that spreads via the Internet. Uniquely, after he sent copies of itself to all the victims, that all e-mails that are in Ms Outlook folders, Klez then create a hidden copy of the original file dijangkitinya. In addition, the popular worm is also able to disable some antivirus products are already installed on your computer first victim. Continuing a successful virus' Anna Kournikova 'virtual worlds are capable of horrendous previous philosophy, exists then some viruses that use the name Hollywood celebrities as' detonator' it. Among other celebrities, Britney Spears, Shakira, and Jennifer Lopez.
2003: Slammer and Sobig, another worm, worms. worm 'Slammer' worm is actually the relatively friendly and casual. However, power serangnya (spread) and speed duplikasinya (replication occurs every 8.5 seconds) is really able to shake the world. Within 10 minutes since its emergence, it is capable of infecting 75,000 computers. These worms cause significant damage to the business world, including the melumpuhnya cash machines owned by banks so as not to get online and delayed some flights that the maintenance of the tickets is done by computers that have been infected. And it turns out, also Sobig worm. worm is noted as 'worms' who favored by spammers. Why? Because Sobig can make any computer that he jangkiti point relays (the baton) for spammers to spread replicas separately Sobig mass to the victims to be addressed.
2004: MyDoom, Netsky, Bagle, and Sasser. whoever win, lose, We Are! Aka Novarg known as MyDoom virus spreads fastest in the history of the virus world, ahead of the popular Melissa in 1999.
This virus spreads via e-mail and file sharing software. He lure potential victims by telling them that one of the e-mails they had sent earlier had failed messages. This is a clever trick to fool the simple nan victims. The real motive of this virus is as a tool for hackers to launch DoS attacks (Denial of Service) to SCO Inc. computer servers. (Santa Cruz Operation), and succeeded. After a DoS attack occurs, ie on September 1, 2004, the site of the hated company among open source had a chance to offline a few days. Because of the seriousness, the SCO would have given for $ 250,000.00 reward for those who can tell who is behind making this virus. Sven Jaschan, a German high school teenagers admitted writing Sasser.
This worm does not cause technical damage to the computer, only she was able to lead some of the infected computer to be slow and reboots itself without desired by the user. Noted, some big companies become victims of this worm. As the pride of British airlines, British Airways, Britain's Coast Guard, RailCorp Australia, and even the two hospitals in Sweden failed to online the 5000 their computers because of this worm. When questioned by German police about the motive behind the creation of this worm, Jaschan replied that Sasser was written to deal with the spammers who are behind the manufacture Baggle and MyDoom.
Netsky was written by Jaschan to face the attack spammers who use the Bagle and MyDoom. So when the Bagle and MyDoom are being set up actions to make each of the infected computer as a place of disposal of bulk mail, the Netsky will do the opposite. Great history occurred in June this year when the first mobile phone virus, Cabir, appeared to be candidates for a frightening specter for mobile users based on Symbian OS Bluetooth enabled. Followed by an attack Duts Pocket PCs and PDAs.
2003: Slammer and Sobig, another worm, worms. worm 'Slammer' worm is actually the relatively friendly and casual. However, power serangnya (spread) and speed duplikasinya (replication occurs every 8.5 seconds) is really able to shake the world. Within 10 minutes since its emergence, it is capable of infecting 75,000 computers. These worms cause significant damage to the business world, including the melumpuhnya cash machines owned by banks so as not to get online and delayed some flights that the maintenance of the tickets is done by computers that have been infected. And it turns out, also Sobig worm. worm is noted as 'worms' who favored by spammers. Why? Because Sobig can make any computer that he jangkiti point relays (the baton) for spammers to spread replicas separately Sobig mass to the victims to be addressed.
2004: MyDoom, Netsky, Bagle, and Sasser. whoever win, lose, We Are! Aka Novarg known as MyDoom virus spreads fastest in the history of the virus world, ahead of the popular Melissa in 1999.
This virus spreads via e-mail and file sharing software. He lure potential victims by telling them that one of the e-mails they had sent earlier had failed messages. This is a clever trick to fool the simple nan victims. The real motive of this virus is as a tool for hackers to launch DoS attacks (Denial of Service) to SCO Inc. computer servers. (Santa Cruz Operation), and succeeded. After a DoS attack occurs, ie on September 1, 2004, the site of the hated company among open source had a chance to offline a few days. Because of the seriousness, the SCO would have given for $ 250,000.00 reward for those who can tell who is behind making this virus. Sven Jaschan, a German high school teenagers admitted writing Sasser.
This worm does not cause technical damage to the computer, only she was able to lead some of the infected computer to be slow and reboots itself without desired by the user. Noted, some big companies become victims of this worm. As the pride of British airlines, British Airways, Britain's Coast Guard, RailCorp Australia, and even the two hospitals in Sweden failed to online the 5000 their computers because of this worm. When questioned by German police about the motive behind the creation of this worm, Jaschan replied that Sasser was written to deal with the spammers who are behind the manufacture Baggle and MyDoom.
Netsky was written by Jaschan to face the attack spammers who use the Bagle and MyDoom. So when the Bagle and MyDoom are being set up actions to make each of the infected computer as a place of disposal of bulk mail, the Netsky will do the opposite. Great history occurred in June this year when the first mobile phone virus, Cabir, appeared to be candidates for a frightening specter for mobile users based on Symbian OS Bluetooth enabled. Followed by an attack Duts Pocket PCs and PDAs.
