8,485
8.5K
Feb 24, 2016
02/16
by
Daniel White
movies
eye 8,485
favorite 3
comment 4
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
20,856
21K
Feb 5, 2016
02/16
by
Mikko Hypponen
movies
eye 20,856
favorite 20
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
1,910
1.9K
Feb 11, 2016
02/16
by
Mikko Hyppönen
texts
eye 1,910
favorite 3
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
1,319
1.3K
Feb 11, 2016
02/16
by
Mikko Hyppönen
texts
eye 1,319
favorite 2
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
11,449
11K
software
eye 11,449
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
12,527
13K
software
eye 12,527
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
50,500
51K
software
eye 50,500
favorite 7
comment 7
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 7 reviews )
2,727
2.7K
software
eye 2,727
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,778
2.8K
software
eye 2,778
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
25,206
25K
software
eye 25,206
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
4,142
4.1K
software
eye 4,142
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
12,648
13K
software
eye 12,648
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,568
2.6K
software
eye 2,568
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,722
2.7K
software
eye 2,722
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
62,506
63K
software
eye 62,506
favorite 12
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
3,040
3.0K
software
eye 3,040
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
17,829
18K
software
eye 17,829
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
74,655
75K
software
eye 74,655
favorite 13
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
6,588
6.6K
software
eye 6,588
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
51,169
51K
software
eye 51,169
favorite 7
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
4,527
4.5K
software
eye 4,527
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,397
3.4K
software
eye 3,397
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
12,291
12K
software
eye 12,291
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
16,203
16K
software
eye 16,203
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,141
3.1K
software
eye 3,141
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,131
3.1K
software
eye 3,131
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
4,817
4.8K
software
eye 4,817
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,336
4.3K
software
eye 4,336
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,284
5.3K
software
eye 5,284
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
17,423
17K
software
eye 17,423
favorite 6
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,900
2.9K
software
eye 2,900
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,437
2.4K
software
eye 2,437
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
7,302
7.3K
software
eye 7,302
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,195
5.2K
software
eye 5,195
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
6,864
6.9K
software
eye 6,864
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
36,304
36K
software
eye 36,304
favorite 7
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
2,856
2.9K
software
eye 2,856
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,841
2.8K
software
eye 2,841
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
8,902
8.9K
software
eye 8,902
favorite 3
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
13,669
14K
software
eye 13,669
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,860
2.9K
software
eye 2,860
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,589
2.6K
software
eye 2,589
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
22,899
23K
software
eye 22,899
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
7,942
7.9K
software
eye 7,942
favorite 4
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,070
5.1K
software
eye 5,070
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
49,945
50K
software
eye 49,945
favorite 22
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
3,379
3.4K
software
eye 3,379
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
63,012
63K
software
eye 63,012
favorite 17
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
3,871
3.9K
software
eye 3,871
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
8,829
8.8K
software
eye 8,829
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,816
2.8K
software
eye 2,816
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,603
4.6K
software
eye 4,603
favorite 1
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
2,830
2.8K
software
eye 2,830
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,761
2.8K
software
eye 2,761
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
5,624
5.6K
software
eye 5,624
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
13,952
14K
software
eye 13,952
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
21,140
21K
software
eye 21,140
favorite 5
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,855
2.9K
software
eye 2,855
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,796
2.8K
software
eye 2,796
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
10,069
10K
software
eye 10,069
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,633
5.6K
software
eye 5,633
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,104
4.1K
software
eye 4,104
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,157
4.2K
software
eye 4,157
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
4,279
4.3K
software
eye 4,279
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
4,559
4.6K
software
eye 4,559
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
3,280
3.3K
software
eye 3,280
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
11,209
11K
software
eye 11,209
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
17,552
18K
software
eye 17,552
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,017
3.0K
software
eye 3,017
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,424
2.4K
software
eye 2,424
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
3,840
3.8K
software
eye 3,840
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
18,938
19K
software
eye 18,938
favorite 4
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
7,303
7.3K
software
eye 7,303
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
84,731
85K
software
eye 84,731
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,860
3.9K
software
eye 3,860
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.