1. Creeper (1971), the first virus program running on the computer Dec. 10 under the operating system Tops Ten.
2. Elk Cloner (1985), the first personal computer virus on the Apple IIe which was created by ninth graders.
3. The Internet Worm (1985), written by someone at Cornell University who brought the Internet
4. Pakistani Brain (1988), this is the first virus that infects IBM PC. Written by two brothers from Pakistan and was covered extensively by the media.
5. Jerusalem Family (1990), about fifty different strains of the virus is believed to have originated from the University of Jerusalem.
6. Stoned (1989), is a virus that is widely known in the first decade of the virus. Stoned is the boot sector / infector. Mbr reboot that will count the number of the original infection and displays the phrase 'your computer is now stoned'.
7. Mutation Engine Dark Anger (1990), was actually written in 1988, but was first used in the early nineties in viruses like Pogue danCoffeeshop.
8. Micheangelo (1992), a variant of the Stoned, with a destructive payload.
9. World Concept (1995), macro viruses in Microsoft Word first. Word Concept will issue a phrase, 'That's enough to PROVE my point' and is present in the second era of computer viruses.
10. Cih / Chernobyl (1998), is the most destructive virus ever. Occurred on the 26th of each month (depending on which version is involved), remove the hard drive, and eliminate the flash ROM BIOS of the computer user.
11. Melissa (1999), the first major virus that spreads via email, at the beginning of the era of Internet viruses.
12. Lovebug (2001), the most popular e-mail worm ever.
13. Code Red (2001), named for a high-caffeine drinks, the virus is not spread through the network email or web page.
14. Nimda (2000), a virus dubbed 'Swiss Army Knife', used as buffer overflows, email, network share, and ten other methods to get into the network
15. Bagel Netsky (2004) the virus is designed to show a fake competition, or battle each other.
16. Botnets (2004), infected computers that can be repeated in the network to run the spam, infect new people, and steal data.
17. Zotob (2005), this worm only affects unpatched Windows 2000 systems, but managed to take some major media sites, including CNN and the New York Times.
18. Rootkit (2005), they have become one of the most popular means of stealth in malicious code. It is used to make other malware invisible to the operating system.
19. Storm Worm (2007), viruses go through thousands of iterations eventually creating the largest botnet in the world. At one time it was believed that more than fifteen million infected machines at the same time, and under the control of the criminal world.
20. Italian Job (2007), more than malware. Italian Job is a coordinated attack using a packaging tool kit known as MPack.
detiknet
0 comments:
Post a Comment