4,426
4.4K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 4,426
favorite 1
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
2,407
2.4K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 2,407
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
1,574
1.6K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 1,574
favorite 0
comment 0
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
2,373
2.4K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 2,373
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
8,281
8.3K
Feb 24, 2016
02/16
Feb 24, 2016
by
Daniel White
movies
eye 8,281
favorite 3
comment 4
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
1,877
1.9K
Feb 11, 2016
02/16
Feb 11, 2016
by
Mikko Hyppönen
texts
eye 1,877
favorite 3
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
1,292
1.3K
Feb 11, 2016
02/16
Feb 11, 2016
by
Mikko Hyppönen
texts
eye 1,292
favorite 2
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
20,737
21K
Feb 5, 2016
02/16
Feb 5, 2016
by
Mikko Hypponen
movies
eye 20,737
favorite 20
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
17,518
18K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,518
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,244
4.2K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,244
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,748
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,748
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,695
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,695
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,380
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,380
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,744
3.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,744
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,794
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,794
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
5,303
5.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,303
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,708
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,708
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,567
2.6K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,567
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,814
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,814
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,542
2.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,542
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,089
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,089
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
12,242
12K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,242
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
13,881
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 13,881
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
22,681
23K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 22,681
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,786
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,786
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
20,726
21K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 20,726
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
3,380
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,380
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,773
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,773
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
4,517
4.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,517
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
62,040
62K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 62,040
favorite 12
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
16,150
16K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 16,150
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,970
3.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,970
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,827
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,827
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
11,164
11K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 11,164
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
12,588
13K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,588
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,041
4.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,041
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
4,427
4.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,427
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,059
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,059
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,154
5.2K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,154
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
6,254
6.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 6,254
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
24,846
25K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 24,846
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
2,822
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,822
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,859
2.9K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,859
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
49,006
49K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 49,006
favorite 22
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
4,035
4.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,035
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
17,140
17K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,140
favorite 5
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,229
5.2K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,229
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,834
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,834
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
7,855
7.9K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 7,855
favorite 4
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,746
3.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,746
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
36,016
36K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 36,016
favorite 6
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
11,441
11K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 11,441
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
4,995
5.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,995
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
7,379
7.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 7,379
favorite 2
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
12,311
12K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,311
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
6,529
6.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 6,529
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
3,323
3.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,323
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,815
3.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,815
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,789
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,789
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,108
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,108
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,245
3.2K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,245
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
50,676
51K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 50,676
favorite 7
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
4,775
4.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,775
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
13,540
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 13,540
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,731
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,731
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
13,951
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 13,951
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
50,070
50K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 50,070
favorite 7
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
5,051
5.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,051
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
31,959
32K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 31,959
favorite 11
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
8,710
8.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 8,710
favorite 3
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
3,004
3.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,004
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
8,722
8.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 8,722
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,358
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,358
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
17,555
18K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,555
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,287
4.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,287
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.