4,469
4.5K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 4,469
favorite 1
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
2,415
2.4K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 2,415
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
1,574
1.6K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 1,574
favorite 0
comment 0
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
2,387
2.4K
Aug 12, 2016
08/16
Aug 12, 2016
software
eye 2,387
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
8,329
8.3K
Feb 24, 2016
02/16
Feb 24, 2016
by
Daniel White
movies
eye 8,329
favorite 3
comment 4
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
1,889
1.9K
Feb 11, 2016
02/16
Feb 11, 2016
by
Mikko Hyppönen
texts
eye 1,889
favorite 3
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
1,296
1.3K
Feb 11, 2016
02/16
Feb 11, 2016
by
Mikko Hyppönen
texts
eye 1,296
favorite 2
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
20,776
21K
Feb 5, 2016
02/16
Feb 5, 2016
by
Mikko Hypponen
movies
eye 20,776
favorite 20
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
17,525
18K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,525
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,256
4.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,256
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,756
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,756
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,704
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,704
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,410
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,410
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,784
3.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,784
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,801
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,801
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
5,458
5.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,458
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,710
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,710
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,569
2.6K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,569
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,818
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,818
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,550
2.6K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,550
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,109
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,109
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
12,257
12K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,257
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
13,898
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 13,898
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
22,744
23K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 22,744
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,792
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,792
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
20,827
21K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 20,827
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
3,387
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,387
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,778
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,778
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
4,524
4.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,524
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
62,156
62K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 62,156
favorite 12
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
16,166
16K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 16,166
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,978
3.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,978
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,834
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,834
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
11,178
11K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 11,178
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
12,600
13K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,600
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,072
4.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,072
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
4,467
4.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,467
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,067
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,067
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,192
5.2K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,192
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
6,260
6.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 6,260
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
24,932
25K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 24,932
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
2,826
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,826
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,870
2.9K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,870
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
49,259
49K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 49,259
favorite 22
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
4,083
4.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,083
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
17,226
17K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,226
favorite 6
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,279
5.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,279
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,838
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,838
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
7,874
7.9K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 7,874
favorite 4
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,789
3.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,789
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
36,077
36K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 36,077
favorite 6
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
11,479
11K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 11,479
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
5,011
5.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,011
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
7,396
7.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 7,396
favorite 2
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
12,362
12K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 12,362
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
6,544
6.5K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 6,544
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
3,336
3.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,336
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,821
3.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,821
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,791
2.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,791
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,115
3.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,115
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,253
3.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,253
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
50,781
51K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 50,781
favorite 7
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
4,782
4.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,782
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
13,574
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 13,574
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,734
2.7K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 2,734
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
14,015
14K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 14,015
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
50,162
50K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 50,162
favorite 7
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
5,092
5.1K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 5,092
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
32,049
32K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 32,049
favorite 11
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
8,760
8.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 8,760
favorite 3
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
3,015
3.0K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,015
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
8,762
8.8K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 8,762
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,365
3.4K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 3,365
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
17,616
18K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 17,616
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,292
4.3K
Feb 5, 2016
02/16
Feb 5, 2016
software
eye 4,292
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.