The Origin Of Computer Viruses

1331 Words3 Pages

Same as any other area in computer science, viruses become a great deal indeed throughout the years. Return to the origin of computer viruses, although there were no viruses or worms developed, Mathematician John Von Neumann had described the theories of self-replicating programs in 1949. In 1971, Bob Thomas has developed “The Creeper Virus”. It was an experimental self-replicating program. It infected DEC PDP-10 Computers to run the TENEX Operating System. The Reaper program was later developed to delete this virus. In 1974, a virus called the Rabbit (or Wabbit) is written. The Rabbit virus made multiple copies of itself at a high speeds until it clogs the system and finally crashing the computer system. In 1975, John Walker has developed the ANIMAL for the UNIVAC. It spread to others multi-user UNIVACs when computer users discovered the game due to overlapping permissions when tapes were shared. John Brunner has published the novel called “Snockwave Rider” that coining the word “worm” to explain a program that circulates itself via a computer network. In 1981, a program called “Elk Cloner” has created by Richard Skrenta for Apple II System. The Apple DOS 3.3 was infected and propagates to others computers by floppy disk transfer. “Elk Cloner” was the first computer virus outbreak in history. In 1983, Frederick Cohen has coined the word “virus” in explaining self-replicating computer programs. In 1986, a path to displace the executable code found in the floppy disk was found by two programmers from Pakistan. On January, the Brain boot sector virus which also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu is released. In 1987, Yale University has developed a virus called Lehigh. It infected command.files and was i... ... middle of paper ... ...as found in a digital photo frame. Another Trojan horse known as Torpig affects Windows by turning off anti-virus applications. In July of 2009, cyber attacks occur and the W32.Dozer attack the United States and South Korea. Passwords for online games were steeled by the Daprosy Worm. It intercepts all keystrokes and sends to its author which is a very dangerous worm that can affect business-to-business systems. In June of 2010, a Windows Trojan called Stuxnet was found. It was the first worm to attack the SCADA systems. In September, the Kenzero virus spreads online form peer to peer. In 2011, SpyEye and Zeus merged was appear. It uses to attack mobile phones to obtain banking information. A Trojan horse called Anti-Spyware 2011 attacks newer Windows versions like Vista and XP. It disables the access of internet for virus updates and security for antivirus programs.

More about The Origin Of Computer Viruses

Open Document