Viruses
Viruses
Viruses
Samson Kalla
Definition of Virus
A virus is a small piece of software that
piggybacks on real programs in order to get
executed
Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
Computer Virus Timeline
1949
Theories for self-replicating programs are first developed.
1981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on
the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
1983
Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer
program that can affect other computer programs by modifying them in such a way as to include a
(possibly evolved) copy of itself.”
1986
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy
disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies
had “© Brain” for a volume label.
1987
The Lehigh virus, one of the first file viruses, infects command.com files.
1988
One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus
affects both .exe and .com files and deletes any programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.
…
Worms
Worm - is a self-replicating program,
similar to a computer virus. A virus attaches
itself to, and becomes part of, another
executable program; however, a worm is
self-contained and does not need to be part
of another program to propagate itself.
History of Worms
The first worm to attract wide attention, the Morris
worm, was written by Robert Tappan Morris, who
at the time was a graduate student at Cornell
University.
It was released on November 2, 1988
Morris himself was convicted under the US
Computer Crime and Abuse Act and received three
years probation, community service and a fine in
excess of $10,000.
Xerox PARC
Worms…
Worms – is a small piece of software that uses
computer networks and security holes to replicate
itself. A copy of the worm scans the network for
another machine that has a specific security hole.
It copies itself to the new machine using the
security hole, and then starts replicating from
there, as well.
They are often designed to exploit the file
transmission capabilities found on many
computers.
Zombies
Infected computers — mostly Windows
machines — are now the major delivery
method of spam.
e.g. UNIX
Reference
http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
http://www.factmonster.com/ipka/A0872842.html
http://www.faqs.org/faqs/computer-virus/new-users/
http://www.mines.edu/academic/computer/viri-sysadmin.htm