Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Timeline of notable computer viruses and worms


Related Topics

  
  Timeline of notable computer viruses and worms - Wikipedia, the free encyclopedia
September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities described in MS01-044 and backdoors left by Code Red II and Sadmind worm.
August 16: The Zotob worm and several variations of malware exploiting the vulnerability described in MS05-039 are discovered.
October 13: The Samy worm became the fastest spreading worm as of 2006.
en.wikipedia.org /wiki/Timeline_of_notable_computer_viruses_and_worms   (876 words)

  
 Computer virus - Wikipedia, the free encyclopedia
Computer viruses cannot come into existence spontaneously, nor can they be created by bugs in regular programs.
Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses.
Viruses that use this technique are said to be metamorphic.
en.wikipedia.org /wiki/Computer_virus   (4870 words)

  
 Computer virus - Biocrawler   (Site not responding. Last check: 2007-10-21)
Viruses are one of the several types of malware or malicious software.
Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk.
Unlike biological viruses, computer viruses do not simply evolve by themselves, except in the cases where copying errors and recombination have led to actual evolution of computer viruses; however, these cases are very rare compared to the rapid generation of new malware by human programmers.
www.biocrawler.com /encyclopedia/Computer_virus   (4222 words)

  
 [No title]   (Site not responding. Last check: 2007-10-21)
The spread of viruses using e-mail as their infection vector could be inhibited far more inexpensively and effectively, without the need to install additional antivirus software; if bugs in e-mail clients, which allow the unauthorized execution of code, were fixed.
Computer users should not always run with administrator access to their own machine.
From an epidemiological viewpoint, he was able to determine how these viruses were affecting systems within the computer (the boot-sector was affected by the Brain virus, the.com files were affected by the Lehigh virus, and both.com and.exe files were affected by the Jerusalem virus).
www.gamecheatz.net /games.php?title=Anti-virus   (1207 words)

  
 Computer Consultants - Austin, Texas   (Site not responding. Last check: 2007-10-21)
The difference between a virus and a worm is that a worm operates more or less independently of other files, whereas a virus depends on hosts to spread itself.
When computer viruses first originated, common targets were executable files that are part of application programs and the boot sectors of floppy disks.
Computer worms are similar to viruses but are stand-alone software and thus do not require host files (or other types of host code) to spread themselves.
www.centralcomputerconsulting.com /c3_vital_reading.htm   (1608 words)

  
 Encyclopedia :: encyclopedia : Viruses   (Site not responding. Last check: 2007-10-21)
August 16th: The Zotob Worm and several variations of malware exploiting the vulnerability described in United States media outlets were infected.
September 18th: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities described in Sadmind worm.
January: A worm strikingly similar to the Morris worm, named the Raman worm infected only Red Hat Linux machines running version 6.2 and 7.0, using three vulnerabilities in wu-ftpd, rpc-statd and lpd respectivley.
www.hallencyclopedia.com /Viruses   (1101 words)

  
 Computer Virus Worms Online   (Site not responding. Last check: 2007-10-21)
Worms, on the other hand, are insidious because they rely less (or not at all) upon.
Long essay that describes harm done by major computer viruses or worms, and discusses the nonexistent or lenient punishment for the authors or distributors of these malicious programs.
Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a.
virus1.lateststuff.info /vd/computer-virus-worms.html   (365 words)

  
 [No title]   (Site not responding. Last check: 2007-10-21)
A computer worm is a self-replicating computer program, similar to a computer virus.
In addition to replication, a worm may be designed to do any number of things, such as delete files on a host system or send documents via email.
A common payload is for a worm to install a backdoor in the infected computer, as was done by Sobig and Mydoom.
www.brujula.net /english/wiki/Computer_worm.html   (487 words)

  
 computer virus resource page - computer viris
In a common parlance, the term virus is often extended to refer to worms, trojan horses and other sorts of malware; however, this can confuse computer users, since viruses in the narrow sense of the word are less common than they used to be, compared to other forms of malware.
A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium.
But, before computers were networked together, the only way a virus would activate(excluding boot sector viruses) was by user activation, so this never was part of the definition of a virus.
www.cydaily.com /Vir-Virus/computer_virus.html   (4505 words)

  
 List of computer viruses   (Site not responding. Last check: 2007-10-21)
To aid the fight against viruses and other malware many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases it is often renamed.
In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believep not be in active circulation (also called "zoo viruses").
www.tocatch.info /en/ETC_Virus.htm   (292 words)

  
 Viruses Worms -- Recommendations and Resources   (Site not responding. Last check: 2007-10-21)
March 19: Witty was the fastest produced worm to date, with a one day window from advisory to release.
The worms have also had political consequences as many companies in several countries start to call for government action to prevent further damages from Windows worms.
"Viruses of the Mind" (1993) is a controversial essay by Richard Dawkins using memetics, epidemiology, and an analogy with computer viruses to analyse the propagation of religious beliefs.
www.becomingapediatrician.com /health/161/viruses-worms.html   (597 words)

  
 Help with Viruses & worms - Bizgrok tech support, Connecticut
Viruses and worms are computer programs that spreads from computer to computer, network to network by replicating.
Worms are designed to create exact copies of themselves and then, spread between computers connected or communicating with one another.
Well, viruses and worms can be just annoying or deadly - the effects range from being embarrassed when your name shows up on a porn site to damaging your reputation, and costing big bucks.
bizgrok.com /help/virushelp   (525 words)

  
 Encyclopedia: Index
Timeline of U.S. attack on Afghanistan in December 2001
Timeline of states of matter and phase transitions
Timeline of the 2004 U.S. presidential election controversy and irregularities
encyclopedie-en.snyke.com /ndx/page_1114.html   (71 words)

  
 Computer Viruses - Timeline Of Computer Viruses
The number of distinct strains of computer virus has grown from 5 in early 1988 to over 1000 by early 1992.
CPSR Washington Director Marc Rotenberg testifies before Congress on such issues as computer viruses, the need for a data protection board, and access to...
There are now about 1000 known computer viruses, up from 5 in 1988.
www.computervirushelper.com /timelineofcomputerviruses   (723 words)

  
 Google Search: worms +computers +definition -"anti-virus software"
and worm computer new worm definition of computer...
Computer viruses, worms, and other threats to computers are often...
Viruses, Worms, Trojan Horses and Zombies - Computerworld
athene.riv.csu.edu.au /~jknitt01/google-worms-results3.htm   (211 words)

  
 math lessons - Sasser worm
The Sasser worm is a computer worm that spreads on computers running the Microsoft operating systems Windows XP and Windows 2000.
The worm scans different ranges of IP addresses and connects to victims' computers primarily through TCP port 445.
Some technology specialists have speculated that the worm writers reverse-engineered the patch to discover the vulnerability, which would open millions of computers whose operating system have not been upgraded with the security update.
www.mathdaily.com /lessons/Sasser   (517 words)

  
 Google Search: worms +computers +definition -"anti-virus software" -products +web
See also: Timeline of notable computer viruses and worms...
This is most frequently the case for computers on networks and...
Notable computer viruses and worms Definition Meaning Information...
athene.riv.csu.edu.au /~jknitt01/google-worms-results5.htm   (269 words)

  
 Computer Viruses And Worms Setting Up A Wireless Network   (Site not responding. Last check: 2007-10-21)
Most people who use a computer and the Internet for business and/or personal activities are familiar with the potential havoc that can be wrought by...(Continue Reading)
Computer viruses range from pesky to outright dangerous.
Worms - A worm is a small piece of software that uses computer networks and security holes to...
dir1.hamilton.on.ca /computer-viruses-and-worms.htm   (305 words)

  
 poke - Article and Reference from OnPedia.com
POKE commands are inherently not portable and thus they almost always will not work on any other system than the one the program was written for.
Sometimes POKE is used as a generic term to refer to any direct manipulation of the contents of memory, rather than just via BASIC, particularly among people who learned computing on the 8-bit microcomputers of the late 70s and early 80s.
BASIC was often the only language available on those machines, usually present on ROM, and therefore the simplest way to do machine language programming was to use BASIC as a wrapper to POKE the machine language program into memory and then jump to it.
www.onpedia.com /encyclopedia/POKE   (202 words)

  
 What is Elk Cloner? - a definition from Whatis.com - see also: first computer virus
In 1982, Richard Skrenta, then fifteen years old, wrote the virus for the Apple II operating system, which was stored on floppy diskettes.
When a computer booted from a floppy disk infected with Elk Cloner, the virus would start, and would subsequently copy itself to any uninfected floppy disk that was accessed.
Because computers of that time had dual floppy disk drives, and because diskettes were often passed around among friends, the virus was frequently copied.
searchsecurity.techtarget.com /sDefinition/0,,sid14_gci989616,00.html   (401 words)

  
 Computer Worms   (Site not responding. Last check: 2007-10-21)
Worms are malicious software applications designed to spread via computer networks.
Worms easily penetrate most firewalls and other network security measures.
Viruses in the Wild.....but they are frequently used...
www.auction4winning.com /auctions/computer-worms.shtml   (747 words)

  
 List Computer Viruses Directory
It helps guard your computer against malicious users and many computer viruses and worms.
Many computer viruses turn out to be hoaxes or myths.
Malware List of computer viruses List of computer virus hoaxes List of trojan horses Timeline of notable computer viruses and worms Turing completeness Cracking Security through obscurity Spam Melissa worm,.
virus.itconn.info /ov/list-computer-viruses.html   (298 words)

  
 Computer Worms   (Site not responding. Last check: 2007-10-21)
The 'Anthrax' Computer Virus - A Bug in the Worm (24-Oct-01) Code Errors Stall Spread of Computer Worms (17-Oct-01) (7-Mar-05)
In computer security technology, a virus is a self-replicating program that spreads by inserting copies of...
This is the number one site on the web for all your computer worms strategies.
www.auctions4today.com /directory/computer-worms.html   (403 words)

  
 FlexFinder - Search for: computer viruses
We carry many brand name digital, electronic and computer products at discounted prices.
Get your computer fixed remotely and over the phone.
Shop and compare great deals on Computer Viruses and millions of other art related items at MonsterMarketplace.
www.flexfinder.com /php/search.php?query=computer%20viruses   (294 words)

  
 computer viruses resource page - latest computer virises
computer viruses resource page - latest computer virises
Article "Inject your code to a Portable Executable file" by Ashkbiz Danehkar
Thank you for reading the computer viruses Resource Page - latest computer virises.
www.cydaily.com /Vir-Virus/computer_viruses.html   (4514 words)

  
 anne geddes computer wallpaperapple computer wallpaper   (Site not responding. Last check: 2007-10-21)
Computer Virus FAQThough most viruses infect Windows computers only Mac users are susceptible toOpen Directory Computers Security Malicious Software VirusesDetailed information on a number of older computer viruses When certainconditions are met virus alerts are generated and can be emailed ComputersSecurityMaliciousSoftwareViruses
Computer parts accessories components consumer electronic Computers n Parts is an online resource for computer parts laptop computersdestop computers and consumer electronic products and their ersnparts NovMacMall Misc Carrying CasesThe computer carrying case that does not loo lie one MacMall Part middotMfg Part PC Mac SIMPLY PORTABLE EXECUTIVE CASE lmallsearch search~id~~search~Misc+Carrying+Cases
Computer Programming Careers Jobs and Training Information Computer programming careers jobs and training information for aspiring computerprogrammers and IT professionalsoverview computerprogrammingcareersMacAddict Meanwhile a potential Apple rival says it was all a misunderstanding Contrary flash memory to cut startup times for both applications and the computer ict Nov
www.hdkkorea.co.kr   (1432 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.