123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Marketing >> View Article

Computer Virus Record

Profile Picture
By Author: David Tang
Total Articles: 223
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission of the user.

Elk Cloner is credited with being the first computer virus to appear "in the wild" -- outside the single computer or lab where it was created. Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written.

Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector.

Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS and modem use, and ...
... software sharing. Bulletin board driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's.

Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well.

A computer virus may also be transmitted through instant messaging. A virus may send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) and follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.

The newest species of the virus family is the cross-site scripting virus. The virus emerged from research and was academically demonstrated in 2005. This virus utilizes cross-site scripting vulnerabilities to propagate. Since 2005 there have been multiple instances of the cross-site scripting viruses in the wild, most notable sites affected have been MySpace and Yahoo.

Total Views: 350Word Count: 397See All articles From Author

Add Comment

Marketing Articles

1. Why Do People Use Social Media Aggregators Like Onstipe, Tweetdeck, Seesmic, And Echofon?
Author: richard

2. Brand Management Director
Author: Barry Elvis

3. What Is Influencer Marketing? How It Will Help To Build The Business Growth?
Author: Kalyani

4. Unleashing The Potential Of Local Seo Packages For Your Business
Author: Shaganasaral

5. Elevate Your Website: 5 Expert Tips To Rank Higher And Secure Google’s #1
Author: Digital Solution World

6. Quality Lead Scoring To Optimize Your Sales Efforts
Author: Surya

7. Revolutionising Finance: The Journey Of Developing Accounting Software
Author: Indazo

8. How Digital Marketing Agencies Harness Data To Drive Effective Strategies
Author: adlerconway

9. Klaviyo Alternative- Webmaxy Egrowth | Marketing Automation Tools
Author: Vilas

10. Maximising Visibility Without Breaking The Bank: Exploring Affordable Search Engine Optimisation Packages In The Uk
Author: Cartoozo

11. How Seo Services In Kerala Revolutionize Online Visibility
Author: James

12. How Do You Scrape Quick Commerce Platforms Data To Monitor The Category Ranking Of Products?
Author: Productdatascrape

13. How To Choose The Right Instagram Widget For Your Needs
Author: richard

14. Leveraging Ivr Service Provider And Lead Tracking Software Integration For Enhanced Conversions
Author: Kuresh

15. Aima's Pgdm Courses
Author: Aima

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: