123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Evolution Of The Computer Virus - From Melissa To Loveletter

Profile Picture
By Author: DJP Hybrid
Total Articles: 4393
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Like any other field in computer science, viruses have evolved over the years. The term computer virus is sometimes used as a phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, and spyware), including malicious and unwanted software.

It was in 1949 that Mathematician John Von Neumann described self-replicating programs, which could resemble computer viruses, as they are known today. However, it was not until the 60s that is found as the predecessor of current viruses. It was only in 1983 that one of these programmers announced the existence of Core Wars.

MS-DOS was starting to become the superlative operating system worldwide. The new operating system became the target of a virus in 1986. Brain, a malicious code created in Pakistan, which infected boot sectors of disks so that their contents could not be accessed. Trojan, an application called PC-Write evolved same year. Virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared which infected COM files and opened the door to the infamous ...
... viruses Jerusalem or Viernes 13. In 1988, ‘Morris worm' appeared which infected 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed. The first macro viruses appeared as polymorphic viruses. Some of these even triggered epidemics, such as Michael Angelo. However, the massive usage of the Internet and e-mail changed the virus scenario worldwide.

When the Win32 platform was implemented, the first script viruses also appeared. A malware inside a simple text file not only demonstrates executable files (.EXE and .COM files) could carry viruses. The first viruses that infected the macros included in Microsoft Office emerged. The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer.

Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express.

VBS/LoveLetter, more commonly known as ‘I love You', which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million Euros. In order to get the user's attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU' and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS'. When the user opened the attachment, the computer was infected.

About the Author:

Computer Juice offers a community of like minded individuals so you can get help for your computer problems. Visit us at - http://www.computer-juice.com/forums/ or http://www.computer-juice.com/forums/.

Total Views: 291Word Count: 522See All articles From Author

Add Comment

Computers Articles

1. Bigbasket Grocery Data Extraction Api In India
Author: FoodDataScrape

2. Odoo Manufacturing In Australia: A Game Changer For Lean Production Management
Author: Alex Forsyth

3. Custom Vs Standard Odoo Implementation: Which Works Best For You?
Author: Alex Forsyth

4. Food Details Data Extraction Api From Swiggy India
Author: FoodDataScrape

5. Erp Software Development Cost Smackdown!
Author: web panel solutions

6. 8 Ways How To Use Chatgpt For Blogging?
Author: brainbell10

7. How Can Generative Al Used In Cybersecurity? A Complete Guide
Author: brainbell10

8. What Are Al Models And How Do They Work? Types, And Uses
Author: brainbell10

9. Extract Grocery Platform Pricing Data For All Locations India
Author: FoodDataScrape

10. Alumni Management Software In Higher Education: Enhancing Alumni Engagement And Institutional Growth
Author: Brenda Joyce

11. Web Scraping Api For Flipkart Grocery Product Data
Author: FoodDataScrape

12. Innovate Your Business Model With A White-label Gojek Clone App
Author: Swiza Joy

13. Mern Stack Kubernetes Deployment: A Practical 2025 Guide
Author: Mukesh Ram

14. How Rp80 Thermal Printers Boost Pos Efficiency
Author: prime pos

15. How To Design A Website That Keeps Visitors Hooked For Longer
Author: peter

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: