SlideShare una empresa de Scribd logo
1 de 22
The History and Details of
Computer Viruses
With Chuck Easttom
http://www.chuckeasttom.com
chuck@chuckeasttom.com
Terms

•What is a virus
•What is a worm
•What is a Trojan horse
The History of Computer Viruses
•1981 Apple Viruses 1, 2, & 3
•1980’s Fred Cohen
•1987 Lehigh Virus
•1988 The first anti virus software
•1990 The first polymorphic viruses
•1991 Symantec releases Norton Anti Virus
•1992 The Michelangelo Virus
•1994 Kaos4 virus spreads via adult websites.
•1996 The Concept virus
The History of Computer Viruses II
•1999 The Melissa Virus
•2000 The I Love You Virus
•2001 The Code Red Worm
•2003 The Slammer Worm.
•2004 MyDoom
The History of Computer Viruses Details
1981 Apple Viruses 1, 2, and 3 are some of the
first viruses "in the wild" or public domain.
Found on the Apple II operating system, the
viruses spread through Texas A&M via pirated
computer games.
The History of Computer Viruses Details
1980’s In the early 1980s, Fred Cohen did
extensive theoretical research, as well as setting
up and performing numerous practical
experiments, regarding viral type programs. His
dissertation was presented in 1986 as part of the
requirements for a doctorate in electrical
engineering from the University of Southern
California. This work is foundational, and any
serious student of viral programs disregards it at
his own risk Dr. Cohen's definition of a
computer virus as "a program that can 'infect'
other programs by modifying them to include a
version of itself
The History of Computer Viruses Details
1987 In November, the Lehigh virus was
discovered at Lehigh University in the U.S. It
was the first "memory resident file infector". A
file-infecting virus attacks executable files. It
gets control when the file is opened. The Lehigh
virus attacked a file called COMMAND.COM.
When the file was run (usually by booting from
an infected disk), the virus stayed in the resident
memory.
The History of Computer Viruses Details
1988 In March, the first anti-virus software was
written. It was designed to detect and remove
the Brain virus and immunized disks against
Brain infection.
The History of Computer Viruses Details
1990 Viruses combining various characteristics
spring up. They included Polymorphism
(involves encrypted viruses where the
decryption routine code is variable), Armoring
(used to prevent anti-virus researchers from
dissembling a virus) and Multipartite (can
infect both programs and boot sectors).
The History of Computer Viruses Details
1991 Symantec releases Norton Anti-Virus
software.
1992 Media mayhem greeted the virus
Michaelangelo in March. Predictions of
massive disruptions were made and anti-virus
software sales soared. As it turned out, the cases
of the virus were far and few between.
The History of Computer Viruses Details
1994 A virus called Kaos4 was posted on a
pornography news group file. It was encoded as
text and downloaded by a number of users.
1996 Concept, a macro-virus, becomes the most
common virus in the world.
1998 - The "RedTeam" virus infects Windows
executables dispatches the infected files through
Eudora e-mail.
The History of Computer Viruses Details
1998: The emergence of the sensational
"BackOrifice" ("Backdoor.BO") - utility of that
allowed hackers management of remote
computers and networks.
1999 The Melissa virus, a macro, appears. It
uses Microsoft Word to infect computers and is
passed on to others through Microsoft Outlook
and Outlook Express e-mail programs.
The History of Computer Viruses Details
2000 The "I Love You Virus" wreaks havoc around the
world. It is transmitted by e-mail and when opened, is
automatically sent to everyone in the user's address book
July 2001: The Code Red worm infects tens of thousands of
systems running Microsoft Windows NT and Windows 2000
server software, causing an estimated $2 billion in damages.
The worm is programmed to use the power of all infected
machines against the White House Web site at a
predetermined date. In an ad hoc partnership with virus
hunters and technology companies, the White House
deciphers the virus's code and blocks traffic as the worm
begins its attack.
.
The History of Computer Viruses Details
2002: Melissa virus author David L. Smith, 33,
is sentenced to 20 months in federal prison
Jan. 2003: The "Slammer" worm infects
hundreds of thousands of computers in less than
three hours. The fastest-spreading worm ever
wreaks havoc on businesses worldwide,
knocking cash machines offline and delaying
airline flights.
The History of Computer Viruses Details
2004: The "MyDoom" worm becomes the
fastest-spreading e-mail worm as it causes
headaches -- but very little damage -- almost a
year to the day after Slammer ran rampant in
late January 2003. MyDoom uses "social
engineering," or low-tech psychological tricks,
to persuade people to open the e-mail
attachment that contains the virus. It claims to
be a notification that an e-mail message sent
earlier has failed, and prompts the user to open
the attachment to see what the message text
originally said. Many people fall for it.
The History of Computer Viruses Details
2007: A new virus called "Storm Worm." is
released. This fast-spreading email spammer
disguises itself as a news email and asks you to
download film. The "Storm Worm" gathers
infected computers into a botnet, which it uses
to infect other machines. It was first identified
on Jan. 17 and within 13 days had infected 1.7
million computers
The History of Computer Viruses Details
2009 9 million computers running on Windows
operating system were hit with "Conficker"
worm. The malware spread via the Internet and
the main tools that helped the worm spread
were unpatched corporate networks and USB
memory sticks. First discovered last October, it
loads itself on to a computer by exploiting a
weakness in Windows servers. Once it has
infected a machine, the software also tries to
connect to up to 250 different domains with
random names every day.
The mechanics of Viruses
•Delivery
a. Via email
b. Copying over a network
c. Direct communication with exposed ports.
•Payload
•Types of Viruses
•Macro virus
•Script Virus
•Executable Virus
How Anti Virus Software Works
• Scanning for known files
•Scanning for worm infection vectors
•Heuristic scanning
Current Active Viruses
As of 13 November 2005

•Sober.S first noticed October 13, 2005
•Bagle variant started September 19, 2005
•Zotob-D August 16th, 2005
Rules for preventing viruses
Keep operating system and all software updated/patched
Use a virus scanner. McAffee and Norton are the two most widely
accepted and used virus scanners. It costs about $30 a year to keep
your virus scanner updated. Do it.
If you are not sure about an attachment, don’t open it.
You might even exchange a code word with friends and colleagues.
Tell them that if they wish to send you an attachment, to put the
code word in the title of the message. Without seeing the code
word, you will not open any attachment.
Don’t believe “security alerts” that you are sent. Microsoft does
not send out things in this manner. Go check the Microsoft website
regularly, as well as one of the anti-virus websites previously
mentioned.
Anti Virus Information Web Sites

http://www.f-secure.com/virus-info/virus-news/
http://www.cert.org/nav/index_red.html
http://securityresponse.symantec.com/

Más contenido relacionado

La actualidad más candente

New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Documentshoib_245
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurMohsin Dahar
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer virusesStefan Andrei
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant VirusesManish Prasad
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 

La actualidad más candente (19)

Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Most Malignant Viruses
Most Malignant VirusesMost Malignant Viruses
Most Malignant Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
Conficker
ConfickerConficker
Conficker
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer worm
Computer wormComputer worm
Computer worm
 

Destacado (9)

Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Antivirus
AntivirusAntivirus
Antivirus
 
It kamus jaringan
It kamus jaringanIt kamus jaringan
It kamus jaringan
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Keamanan si (ugm)
Keamanan si (ugm)Keamanan si (ugm)
Keamanan si (ugm)
 
Linux dan security
Linux dan securityLinux dan security
Linux dan security
 
It menjaga keamanan sistem artikel
It menjaga keamanan sistem artikelIt menjaga keamanan sistem artikel
It menjaga keamanan sistem artikel
 
It keamanan sis inf berbasis internet
It keamanan sis inf berbasis internetIt keamanan sis inf berbasis internet
It keamanan sis inf berbasis internet
 
It keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom uiIt keamanan sistem informasi ilkom ui
It keamanan sistem informasi ilkom ui
 

Similar a Historyofviruses

Similar a Historyofviruses (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer worm
Computer wormComputer worm
Computer worm
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 

Más de Fathoni Mahardika II

Más de Fathoni Mahardika II (12)

It lubang keamanan
It lubang keamananIt lubang keamanan
It lubang keamanan
 
It komdat 10 keamanan sistem
It komdat 10 keamanan sistemIt komdat 10 keamanan sistem
It komdat 10 keamanan sistem
 
It keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internetIt keamanan sistem informasi berbasis internet
It keamanan sistem informasi berbasis internet
 
It keamanan sistem informasi
It keamanan sistem informasiIt keamanan sistem informasi
It keamanan sistem informasi
 
It kamus istilah komputer good
It kamus istilah komputer goodIt kamus istilah komputer good
It kamus istilah komputer good
 
It domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom uiIt domain keamanan sistem informasi ilkom ui
It domain keamanan sistem informasi ilkom ui
 
It 15 jenis serangan cracker
It 15 jenis serangan crackerIt 15 jenis serangan cracker
It 15 jenis serangan cracker
 
Diktat kuliah keamanan komputer
Diktat kuliah keamanan komputerDiktat kuliah keamanan komputer
Diktat kuliah keamanan komputer
 
Mohiqbal security act dan kriptografi 2011
Mohiqbal   security act dan kriptografi 2011Mohiqbal   security act dan kriptografi 2011
Mohiqbal security act dan kriptografi 2011
 
Mohiqbal pengantar keamanan sis inf 2011
Mohiqbal   pengantar keamanan sis inf 2011Mohiqbal   pengantar keamanan sis inf 2011
Mohiqbal pengantar keamanan sis inf 2011
 
Keamanan password dan enkripsi
Keamanan password dan enkripsiKeamanan password dan enkripsi
Keamanan password dan enkripsi
 
Mohiqbal net and database 2011
Mohiqbal   net and database 2011Mohiqbal   net and database 2011
Mohiqbal net and database 2011
 

Último

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Último (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Historyofviruses

  • 1. The History and Details of Computer Viruses With Chuck Easttom http://www.chuckeasttom.com chuck@chuckeasttom.com
  • 2. Terms •What is a virus •What is a worm •What is a Trojan horse
  • 3. The History of Computer Viruses •1981 Apple Viruses 1, 2, & 3 •1980’s Fred Cohen •1987 Lehigh Virus •1988 The first anti virus software •1990 The first polymorphic viruses •1991 Symantec releases Norton Anti Virus •1992 The Michelangelo Virus •1994 Kaos4 virus spreads via adult websites. •1996 The Concept virus
  • 4. The History of Computer Viruses II •1999 The Melissa Virus •2000 The I Love You Virus •2001 The Code Red Worm •2003 The Slammer Worm. •2004 MyDoom
  • 5. The History of Computer Viruses Details 1981 Apple Viruses 1, 2, and 3 are some of the first viruses "in the wild" or public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
  • 6. The History of Computer Viruses Details 1980’s In the early 1980s, Fred Cohen did extensive theoretical research, as well as setting up and performing numerous practical experiments, regarding viral type programs. His dissertation was presented in 1986 as part of the requirements for a doctorate in electrical engineering from the University of Southern California. This work is foundational, and any serious student of viral programs disregards it at his own risk Dr. Cohen's definition of a computer virus as "a program that can 'infect' other programs by modifying them to include a version of itself
  • 7. The History of Computer Viruses Details 1987 In November, the Lehigh virus was discovered at Lehigh University in the U.S. It was the first "memory resident file infector". A file-infecting virus attacks executable files. It gets control when the file is opened. The Lehigh virus attacked a file called COMMAND.COM. When the file was run (usually by booting from an infected disk), the virus stayed in the resident memory.
  • 8. The History of Computer Viruses Details 1988 In March, the first anti-virus software was written. It was designed to detect and remove the Brain virus and immunized disks against Brain infection.
  • 9. The History of Computer Viruses Details 1990 Viruses combining various characteristics spring up. They included Polymorphism (involves encrypted viruses where the decryption routine code is variable), Armoring (used to prevent anti-virus researchers from dissembling a virus) and Multipartite (can infect both programs and boot sectors).
  • 10. The History of Computer Viruses Details 1991 Symantec releases Norton Anti-Virus software. 1992 Media mayhem greeted the virus Michaelangelo in March. Predictions of massive disruptions were made and anti-virus software sales soared. As it turned out, the cases of the virus were far and few between.
  • 11. The History of Computer Viruses Details 1994 A virus called Kaos4 was posted on a pornography news group file. It was encoded as text and downloaded by a number of users. 1996 Concept, a macro-virus, becomes the most common virus in the world. 1998 - The "RedTeam" virus infects Windows executables dispatches the infected files through Eudora e-mail.
  • 12. The History of Computer Viruses Details 1998: The emergence of the sensational "BackOrifice" ("Backdoor.BO") - utility of that allowed hackers management of remote computers and networks. 1999 The Melissa virus, a macro, appears. It uses Microsoft Word to infect computers and is passed on to others through Microsoft Outlook and Outlook Express e-mail programs.
  • 13. The History of Computer Viruses Details 2000 The "I Love You Virus" wreaks havoc around the world. It is transmitted by e-mail and when opened, is automatically sent to everyone in the user's address book July 2001: The Code Red worm infects tens of thousands of systems running Microsoft Windows NT and Windows 2000 server software, causing an estimated $2 billion in damages. The worm is programmed to use the power of all infected machines against the White House Web site at a predetermined date. In an ad hoc partnership with virus hunters and technology companies, the White House deciphers the virus's code and blocks traffic as the worm begins its attack. .
  • 14. The History of Computer Viruses Details 2002: Melissa virus author David L. Smith, 33, is sentenced to 20 months in federal prison Jan. 2003: The "Slammer" worm infects hundreds of thousands of computers in less than three hours. The fastest-spreading worm ever wreaks havoc on businesses worldwide, knocking cash machines offline and delaying airline flights.
  • 15. The History of Computer Viruses Details 2004: The "MyDoom" worm becomes the fastest-spreading e-mail worm as it causes headaches -- but very little damage -- almost a year to the day after Slammer ran rampant in late January 2003. MyDoom uses "social engineering," or low-tech psychological tricks, to persuade people to open the e-mail attachment that contains the virus. It claims to be a notification that an e-mail message sent earlier has failed, and prompts the user to open the attachment to see what the message text originally said. Many people fall for it.
  • 16. The History of Computer Viruses Details 2007: A new virus called "Storm Worm." is released. This fast-spreading email spammer disguises itself as a news email and asks you to download film. The "Storm Worm" gathers infected computers into a botnet, which it uses to infect other machines. It was first identified on Jan. 17 and within 13 days had infected 1.7 million computers
  • 17. The History of Computer Viruses Details 2009 9 million computers running on Windows operating system were hit with "Conficker" worm. The malware spread via the Internet and the main tools that helped the worm spread were unpatched corporate networks and USB memory sticks. First discovered last October, it loads itself on to a computer by exploiting a weakness in Windows servers. Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day.
  • 18. The mechanics of Viruses •Delivery a. Via email b. Copying over a network c. Direct communication with exposed ports. •Payload •Types of Viruses •Macro virus •Script Virus •Executable Virus
  • 19. How Anti Virus Software Works • Scanning for known files •Scanning for worm infection vectors •Heuristic scanning
  • 20. Current Active Viruses As of 13 November 2005 •Sober.S first noticed October 13, 2005 •Bagle variant started September 19, 2005 •Zotob-D August 16th, 2005
  • 21. Rules for preventing viruses Keep operating system and all software updated/patched Use a virus scanner. McAffee and Norton are the two most widely accepted and used virus scanners. It costs about $30 a year to keep your virus scanner updated. Do it. If you are not sure about an attachment, don’t open it. You might even exchange a code word with friends and colleagues. Tell them that if they wish to send you an attachment, to put the code word in the title of the message. Without seeing the code word, you will not open any attachment. Don’t believe “security alerts” that you are sent. Microsoft does not send out things in this manner. Go check the Microsoft website regularly, as well as one of the anti-virus websites previously mentioned.
  • 22. Anti Virus Information Web Sites http://www.f-secure.com/virus-info/virus-news/ http://www.cert.org/nav/index_red.html http://securityresponse.symantec.com/