In The Name Of Virus

Bookmark and Share
The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s.Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971.Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.

A program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.This virus was created as a practical joke when Richard Skrenta was still in high school. It was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality."

The first PC virus in the wild was a boot sector virus dubbed Brain, created in 1986 by the Farooq Alvi Brothers, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.

Some viruses try to trick anti-virus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is "clean". Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean. read more

{ 3 comments... Views All / Send Comment! }

Anonymous said...

I pay a quick visit everyday a few sites and sites to read content, however this
webpage gives quality based writing.

Also visit my homepage; buy penny stocks

Guzzi sager said...

Very informative and worthy post. Thanks for the sharing such a precious updates with us.

Lenovo - 15.6" Laptop - 2GB Memory - 320GB Hard Drive - Black

Lenovo - IdeaPad Yoga Convertible Ultrabook 13.3" Touch-Screen Laptop - 4GB Memory - Clementine Orange

Julia David said...

Thanks for giving me information about my problem. I was searching the NET and here I found. Also if you want more work just click
access Torrent Downloads in UK

Post a Comment