As in any other area of computing, viruses have become a widespread reality over the years. Let's go back to the origins of computer viruses, although no viruses or worms were developed, mathematician John Von Neumann had described theories of self-replicating programs in 1949. In 1971, Bob Thomas developed “The Creeper Virus”. It was a self-replicating experimental program. It infected DEC PDP-10 computers to run the TENEX operating system. The Reaper program was later developed to eliminate this virus. In 1974 a virus called Rabbit (or Wabbit) was written. The Rabbit virus created multiple copies of itself at high speed until it clogged the system and eventually crashed the computer system. In 1975, John Walker developed ANIMAL for UNIVAC. It spread to other multi-user UNIVACs as computer users discovered the game due to overlapping permissions when sharing tapes. John Brunner published the novel titled “Snockwave Rider” which coined the word “worm” to explain a program that circulates through a computer network. In 1981, a program called “Elk Cloner” was created by Richard Skrenta for the Apple II System. Apple DOS 3.3 is infected and spreads to other computers via floppy disk transfer. “Elk Cloner” was the first computer virus outbreak in history. In 1983, Frederick Cohen coined the word "virus" to explain self-replicating computer programs. In 1986, a path to replace the executable code found in the floppy disk was found by two Pakistani programmers. In January, the Brain boot sector virus, also known as Lahore, Pakistani, Pakistani Brain, and Pakistani Flu, is released. In 1987, Yale University developed a virus called Lehigh. It infected the command.ed files... in the center of a sheet of paper... like in a digital photo frame. Another Trojan horse known as Torpig affects Windows by disabling antivirus applications. In July 2009, cyber attacks occur and the W32.Dozer attacks the United States and South Korea. Passwords for online games were stolen by the Daprosy Worm. It intercepts all keystrokes and sends its author a very dangerous worm that can affect business-to-business systems. In June 2010, a Windows Trojan called Stuxnet was found. It was the first worm to attack SCADA systems. In September, the Kenzero virus spreads online in peer-to-peer form. In 2011, SpyEye and Zeus merged. Hacks cell phones to obtain banking information. A Trojan horse called Anti-Spyware 2011 attacks newer versions of Windows such as Vista and XP. Disable Internet access for virus updates and antivirus program security.
tags