Anda di halaman 1dari 15

The major virus in IT

history

Bill
Elk Cloner ( 1982 )
   1`the first global virus
attacking on personal
computers, also, a headache
for all the safety pioneer.

2`through Apple II
floppy disks to spread.
3`The virus was on a
game disk, can be used 49
times. Used in section 50, it
does not run the game,
replaced by a blank screen
opens and shows a ditty.
Brain ( 1986 )
   1`the first viruses to attack
Microsoft's popular operating system
DOS.
2` 360K floppy disks can be
infected with a virus infection, the
virus will fill a floppy disk full of
unused space, which led to it can no
longer be used.
Morr is ( 1988 )
   1`use the weaknesses of the system to
carry out the invasion,.
2`the designed original purpose is not
to sabotage, but used to measure the size of
the network. However, because the
procedure does not deal with the cycle, we
will continue with the implementation of the
computer, copy Morris, ultimately lead to
death.
CI H ( 1998 )
   1` by far the most serious virus, but also the world's
first undermine hardware virus. It attacks not only
undermine the hard disk boot sector and partition table,
and the destruction of the computer system BIOS, resulting
in damage to the motherboard.
2`This virus is transmitted by the Taiwan college
students developed by Ying-hao, who said to develop this
virus to commemorate the disaster in 1986 , so
embarrassing anti-virus software.
Melissa ( 1999 )
   1`one of the first virus spread
via e-mail , when a user opens an e-
mail attachments, the virus will be
automatically sent to the user’s
address book in the first 50
addresses, so the virus within a few
hours around the globe

Lo ve b ug ( 2000 )
   1` has spread through e-mail around, it makes use
of human nature, their courtship disguised as an open
letter to deceive the recipient.
2`The spread of the virus in its speed and scope
makes security experts so surprised. Within a few hours,
this small computer program conquers the whole world
within the scope of the computer system.
Co de Red ( 2001 )
   1`the most expensive in the history of
computer viruses, the self-replicating malicious
code "Code Red" to use the Microsoft IIS server in
a loophole.
2` The worm has a more sinister version
known as Code Red II. In addition to these two
viruses can be modified on the site, the infected
system performance will seriously decrease.
Shock w ave ( 2003 )
   1` is the English name of the virus
Blaster, also known as Lovsan or Lovesan,
it makes use of a Microsoft software defect
on the system ,crazy attack leads to
system crashes.
Sasse r ( 2004 )
   1` another use of defects in the
Windows worm, Sasser can cause
computer crashes and constantly re-
starting.
Panda bu rn in g in ce nse ( 2007 )
   1` all the program icons will become Panda
burning incense, and they can not be applied.
Blast wave(2008)
   1`like the shock wave
and Sasser , is also a use of
loopholes in the procedure
from network intrusion.
2`And during “black
case”, a large number of
users turn off automatic
updates, this is
exacerbated by the spread
of the virus.
3`The virus can lead
to an attacker completely
control the machine .
Mare
Download er( 200 9)
   1`The new virus ,
after the infection , will
produce ranging from
1000 to 2000 Trojan
viruses, resulting in
system crash.
2`In three days ,into
360 security guards to kill
the first top three (now
top)
Nim da
  1` in the history of the spreading
virus, is one of the fastest, online
after 22 minutes , becomes the most
widely spreading virus.
Co nfick er
   1` In March 2009, the virus should has spread to
a large number, and then, in the April 1,
implemented a global attack, causing a global
catastrophe.
2`However, this virus, in fact, did not cause any
damage.

Anda mungkin juga menyukai