History and Future of Computer Viruses

Thursday, February 18, 2010

A computer virus is a small program that can reproduce itself in a computer storage medium. Is formally designated as follows: "A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a viral infection that grows (Fred Cohen). The virus is also able, either directly or indirectly, to infect, copy or distribute the program files that can be executed as well as existing programs in the sector in a storage medium (Notebook, disks, CD-R). The virus can also infect files that can not be executed (data files) by using macros (simple programs that are usually used to perform a command). The point is the ability to stick and infect a program. The virus is not something that happens by accident or weakness of computer devices because in essence, all the viruses is the result of the design of human intelligence after the first few experiments as scientific experiments in other areas. It's all about alghoritm ... .. 2. Differences viruses, worms, and Trojan horses In addition to the virus in the sense mentioned above, we also know the program called Trojan horse (Trojan Horse). Trojan horse is not a virus in real terms, because the program does not have the ability to reproduce itself into other programs. However, this program is no less dangerous when compared to a computer virus program. Trojan horses are generally packaged in the form of an interesting program. But behind the 'magic' software, the hidden other functions to do the destruction. Computer users who get these files are going to come in to run it. As a result of fatal, because then the user has run the destroyer routines that can wreak havoc on computer systems. Trojan first appeared in 1986 in the form of a shareware program called PC-Write. Therefore, the user must ensure shareware or freeware free her from the Trojan type by placing a firewall or antivirus in your computer system. Another source of disaster similar to the virus, but can not be categorized as a virus, a worm. Worm is a program that can duplicate itself without infecting other programs. Common worm spreads through the exchange of data between the hard disk, diskette, or e-mail. The spread through e-mail is usually in the form of a small attachment. Users who are interested will run the program. Furthermore, without preamble, the program will perform the action. Worms will multiply by sending his files automatically via attachment to every address in the address book manager at the victim's mail. Generally not a destructive worm, however, resulted in aggravation in addition to the victim, the worm attacks can be very dangerous for the mailserver. Worm outbreak caused mailserver workload soared up can affect performance. And not just for the mail server, even our personal computers can castrated it. This happens because the worm can duplicate itself in the computer memory in a number of very many. Now imagine if the worm to replicate itself in unison, 'would lemot computer deh'. Generally shaped worm executable file (berekstensi. EXE datau. SCR), which is attached (attach) to the e-mail. However, there are several types of worms in the form of scripts written in Visual Basic (VBScript). Worm attack this type of software in particular is an e-mail Microsoft Outlook Express, but that does not mean other applications are certainly resistant to all kinds of worms. Just like a trojan that can not be repaired (except by the maker himself who knows the source code), to overcome the required antivirus worm attacks that could remove them directly from the computer. 3. History of viruses and other malware Although many parties had agreed that the worms and trojans can not be categorized as a virus, but in its history, delivering the virus travel history will always be accompanied by stories about the emergence and actions of other malware, worms and trojans that. This can not be avoided because the two 'beings' are born as the impact of the virus's ability alone. 1981: First virus on your computer (virus ancestor) In 1981, a program called Elk Cloner appear on the Apple II computer. This program (this year the term computer virus has not been found) displays six lines on a computer monitor as follows: It will get on your disk It will infiltrate your chips Yes it's Cloner! It will stick to you like glue It will modify ram too Send in the Cloner! 1983: Documentation first computer virus 
In 1983, testing documentation virus was first performed by Fred Cohen. Cohen is a S3 student and researcher who theoretically and with a variety of scientific experiments can provide insight and understanding to the world that there will be a 'new creature' all around us the potential to be 'troublemakers' in the development of the computer age and telecommunications. 1986: The first virus on your PC 'The Brain' is the name for the first virus known to infect a PC. The virus is made by two Pakistani brothers, Basit and Amjad, in the year 1986. These viruses infect floppy disks inserted in the PC bersistem MS-DOS. Seiap an infected floppy disk will have a volume label: "© Brain". 'The Brain' is also often referred to as stealth viruses because the first computer virus capable of master table on the DOS interrupt (Interrupt interceptor). The virus is capable to control the level of instructions DOS and hidden as they are usually either full name or size. 1987: The virus attacks the extension *. COM This year is the year the virus files. This variant specifically attacked berekstensi all the files *. COM. Common files command.com attacked is the subject named the virus Lehigh attacker. COM *. In addition to attacking the virus at that time also been able to attack .* EXE files, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss the invasion of the virus to animate a computer system at the time. Recorded in history that this year the term "The IBM Christmas Worm" as the impact of the number of IBM's mainframe worm attacked. 1988: Virus for the Macintosh, created the ARPANET worm, antivirus for 'the brain', and ... ... .. a celebrity At the beginning of this year macintosh infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the collapse of the 6000 computers in the network, ARPANET caused 'a' worm Robert Morris (he was only 23 years old at the time). Worm his work by himself duplication and sediment in the computer memory. The funny thing is, the worm he created just to kill boredom. Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. Another bad news is the birth of 'Jerusalem' and 'Cascade'. Jerusalem virus is only active / live 13 days on Friday (Friday the 13th) and infect the two extensions at once, namely .* .* EXE and COM. Amazingly, all the infected computers will lose their programs if run on that date. While cascade found by the Germans is the first virus that is encrypted (encrypted viruses) that can not be changed or eliminated for the time. Except by those who know the encryption code-behind (decode) course. For example the maker's own virus. History re-occur, the first antiviral finally emerged. Antivirus is designed to detect and remove viruses 'The Brain' which infect the floppy. Plus the ability to immunize (give immunity) to the disk so as not to be plagued by 'The Brain'. This means that, technically a computer, the antivirus algorithm is an algorithm that can destroy the virus path algorithm. The number of major events caused by computer viruses this year made him a popular move and started filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That's cool ... 1989: Trojan AIDS and Dark Avenger AIDS spread as a Trojan program that can hold data information of AIDS (Acquired Immuno Deficiency Syndrome) in the dijangkitinya computer. May be useful if you are in your hard drive the doctors and health practitioners, but another problem with mathematicians and banking practitioners. In the month of September the 17th, the Washington Post reported about a virus which they called the language jurnalisnya: "a virus that lives and destroyed 13 days on Friday had fled". This virus works like Jerusalem, his name is DataCrime. Model introduced a new style of attack by the Dark Avenger virus. The virus is designed to destroy the computer system slowly. So, at first the user will be unaware that their computer got a virus, until the time came when the computer will run more slowly, slow, and slow. In the month of October in Israel emerged virus called Frodo. This virus is a virus that is programmed to damage the hard disk (hard drive) that runs on September 22 or thereafter in any year. 1990: Virus Exchange, Books about viruses, and antivirus gebyar Bulgaria emerged from a virus that can exchange code and change its own purposes, his name is a virus exchange (VX) BBS. Mark Ludwig sign up as an author who published a book about the virus. IBM, McAfee, Digital Dispatch, and Iris antivirus out. New arena in the IT business, making the program (toolkit) antivirus. In this variant viruses and the more powerful. One of them is a combination of viruses is not just his ability to hide (stealth virus), but also capable of changing its structure to deceive their own antivirus program (polymorphic viruses) and infect the two types of popular extensions, namely .* .* EXE and COM as well as to infect the boot sector . 1991: Symantec antivirus and released Tequilla Not want to miss the big vendors who have made antivirus, Symantec finally released labeled antivirusnya Norton Antivirus. Products to this day continue to rule the world antivirus market. The surprise this year was when Tequilla found. This virus has three magic as well, which could hide (stealth), can be polymorphic and multipartite. 1992: Toolkit virus maker The Dark Avenger Mutation Enginge (DAME) became the first virus toolkit makers who can turn ordinary viruses into polymorphic viruses. In addition to birth also DAME VCL (Virus Creation laboratory) who became the first virus maker tool. In March Michelangelo virus emerged, the news spread by the media about this virus makes antivirus sales rose sharply. Statistics noted that already there are about 1300 virus this year. Means increased 420% since December 1990. 1993: The virus is good and Satan Bug Cruncher is often regarded as a good virus because he compress each file diinfeksinya. So, he considered also as the savior of storage capacity. Meanwhile, in another place a big surprise there. The maker The Satan Bug virus that his arrest by the FBI using the antivirus vendors support it was just a kid. 1994: Good Times, which makes bad times; first Hoax Good Times is a virus that spread through e-mail with the subject as his own name. In the message he mentioned that just by reading or viewing messages bersubject "good times" on the computer the contents of computer hard drives will be lost and even damage the processor. After carefully tested, it turns out the contents of the message is just a lie news (hoaxes) only. Good times true that the virus is replicating itself Like other viruses. 1995: Windows 95 and the first Macro virus The emergence of 95 lots of windows make the antivirus vendors worried that their products will eventually not work anymore and no one bought. However, the first macro virus appeared, called Concept. This virus is not a DOS attack, but attacking the application's most popular word processor at the time, the MS-Word. Antivirus vendors like getting fruit simalakama, one side they are happy, the other side they do not. Because they grow more enemies. 1996: virus for windows 95, linux, and Excel A year after its appearance, Concept diseantero world is becoming increasingly popular. Ms Excel also finally gets the virus by the Laroux. No lag, and Staog Boza virus became the first virus for Windows 95 and the open source OS; Linux. Having investigated and proved Staog Boza makers are one the same group. 1998: Virus Java, Back Orifice, and Solar Sunrise  
Strange Brew is a virus that attacks the java files for the first time, but the damage is not too 'proud'. In this year the legendary Trojan until now, Back Orifice, a remote control tool (remote administration) that would allow someone to take someone else's computer specialists via a network, whether local network or Internet network. Access macro viruses started to appear later this year. One of the most shocking incident in this year is when two teenagers from California managed to infiltrate and control the computer system owned by the USA defense department, government offices, and private institutions public. The accident is popular with the term 'Solar Sunrise' because the OS is widely used by the computer is attacked it is Sun Solaris. In addition, this year is also the emergence of Chernobyl, a virus that damaged disk storage systems and can disrupt the system. In China alone, losses reached 120 million U.S. dollars. Fortunately, this virus attacks only Windows OS and does not attack the OS like Unix and Novell Netware. If only the latter two are also infected with the OS then the loss could be even greater because Unix and Netware are widely used in the banking sector, government, securities, aviation, and telecommunications. 1999: Please welcome ... ... Melissa This year truly belonged to Melissa, a macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa became a virus that spreads faster than most viruses before and of course a catalyst antivirus sales worldwide. Bubble Boy emerged and became the first virus that does not depend on the user to perform actions. So, when a recipient of the Bubble Boy attachment is opened the program manager of his mail like Ms. Outlook, so the virus does not have to wait to open the attachment before it. Virus Corner appears complete line of malware that infects liked prodik-Microsoft products. This time the target was Ms Project. Tristate became the first virus capable of infecting three variants as well as Ms Office, namely Ms Word, Excel, and Power Point. 2000: time to say in love with 'I Love You' A young man known as the maker Philippines virus 'I Love You'. Working mode resembles the Melissa virus, but more sophisticated and more damaging than his own Melissa. If Melissa only took 50 e-mail list in the infected computer and then send it to other computers via the internet, then I Love You not only take 50, but all. Best of all, information about e-mail address book taken from the computer, such as your username and password will be sent to the address of the virus writer. Plus the ability to delete files that berekstensi *. MP3, *. MP2, and *. JPG. 2001: Kournikova, Code Red and Nimda Virus 'Anna Kournikova' to use young players shining image of Russia as a bait works by sending itself to e-mail in Outlook Address Book Ms. The emergence of this virus makes security analysts worry that maybe out there in the virus-makers no longer need to be bothered to think about a complex algorithm in the manufacturing process because of the availability of virus tools are easy to manufacture virus found on the Internet. Code Red makes the world scene when the power (resources) of all computers which successfully dijangkitinya can he used to make the system fall on the White House website (White House). Losses generated by this virus in the USA reached about $ 2 billion. In fact, the computer being attacked by the virus is a computer that uses windows 2000 server and Windows NT as its operating system. Exactly a day after the destruction of the WTC buildings on 11 September 2001 came the Nimda. The virus is regarded as one of the smartest virus in history history of the virus because it has five different ways / methods to infect systems and replicating itself. At this year's Melissa virus author David L. Smith (33 years), finally arrested and put into the United States federal prison for 20 years. 2002: Klez worm and the superstar Klez, predatory worms that spread via the internet. Uniquely, after he sent copies of itself to all the victims, that is all e-mails that are in Ms Outlook folder, then create a Klez hidden copy of the original file dijangkitinya. In addition, the worm is also capable of popular disable several antivirus products are already installed on your computer first victim. Continuing success virus' Anna Kournikova 'capable of horrendous previous virtual world, Come and some viruses that use the name as a hollywood celebrities' detonator' it. Are among other celebrities, Britney Spears, Shakira, and Jennifer Lopez. 2003: Slammer and Sobig, another worm, worm ... worm 'Slammer' worm true is relatively friendly and casual. However, attacked the power (distribution) and duplikasinya speed (8.5 seconds occurs every replication) can really shake the world. Within 10 minutes since its appearance, he was able to infect 75,000 computers. These worms caused significant damage to the business world, including the melumpuhnya cash machines owned by banks that can not get online and delayed some flights to the maintenance of the tickets is done by an infected computer. And it turned out, also Sobig worm. This worm was recorded as a 'worm' is preferred by spammers. Why? Because Sobig can make any computer that she becomes the point jangkiti relay (relay rod) for spammers to spread replicas separately Sobig mass to the victims to be addressed. 2004: Mydoom, Netsky, Bagle, and Sasser ... Whoever win, we are lose! Novarg aka Mydoom virus known as the most rapid spread of the virus world history, a popular beat Melissa in 1999. This virus spreads via e-mail and file-sharing software. He attract potential victims by telling them that one of the e-mail that they had failed to submit previously sent. This is a modest nan clever trick to deceive the victims. Real motives of this virus is as a tool for hackers to launch DoS attacks (Denial of Service) to SCO Inc. computer servers. (Santa Cruz Operation), and succeeded. After a DoS attack occurs, ie on September 1, 2004, the hated company website among open source offline a few days time. So serious, SCO would have given $ 250,000.00 reward for those who can tell who is behind the making of the virus. Sven Jaschan, high school teenagers from Germany admitted writing Sasser. This worm does not cause technical damage to the computer, only she was able to cause some computers to be slow and diinfeksinya rebooting itself without desired by the user. Noted, several large companies become victims of this worm. As the pride of British airlines, British Airways, Britain's Coast Guard, RailCorp Australia, and even the two hospitals in Sweden failed to online the their computers for 5000 this worm. When questioned by German police about the motive behind the making of this worm, Jaschan said that Sasser was written to deal with the spammers who were behind the creation Baggle and Mydoom. Netsky was written by Jaschan to deal with attacks that spammers use Bagle and Mydoom. So when the Bagle and Mydoom are set actions to make each computer as a place of exile diinfeksinya bulk mail, Netsky will do the opposite. Great history occurred in June this year when the first mobile phone virus, Cabir, appeared to be a frightening specter candidate for mobile users based on Bluetooth-enabled Symbian OS. Followed by the attack Duts Pocket PC and PDA. 4. Future Computer Viruses A few years from now is already certain that there will be more and more new viruses born. Whether it is malignant, normal, or 'friendly'. Meanwhile, all the experts agree that computer viruses are old or classical will not experience death, it is reasonable and it is in accordance with the properties of biological viruses in reality. It should be remembered by all computer users on the planet Earth that there will be no term 'dead' for computer programs and computer viruses that was true is a computer program that will 'live' or moving according to the compilers of the code (source code) that have been made by the creator. So, if a virus is in an environment that 'right' then he will carry out automatic alghoritma evil indiscriminately. Understandably, the virus was not created for tolerance. However, computer users must also not be 'virusphobia', a very scared, so afraid of holding a single computer. There was no disease there is no cure, in a sense, if we continue to update our antivirus on a regular basis so no one should worry about are exaggerated. Virus in SmartPhone When we tried to see far ahead into the waves of progress IT (Information Technology) will be increasingly clear that the computer is not only a desktop or laptop that has our general met. TabletPC, phone, or PDA that looks compact with any real grip is deservedly called a computer. Particularly for products that have the latest injected with a variant of the operating system Symbian OS or Microsoft Windows Mobile for cell phone, or Palm OS and Microsoft Windows PocketPC for PDAs. Based on the above facts, we may conclude that one day these gadgets-gadget would be plagued by viruses. And proven, right! For SmartPhone, after Cabir present and spread with the help of an infected Bluetooth, menyusullah two new malware, the Mosquito and Skull Trojan. Mosquito is a game that works on Symbian, funny but he can console user is also secretly send a message (sms) to the specific numbers that are the service (service) paid, causing the disappearance of the mobile phone. Skull, unlike a Trojan, shareware programs are downloaded from one of these internet sites can lead to malfunctioning applications running on your smartphone plus a nice trail by replacing the program icons application icons with skull image. The only good thing left by this Trojan horse is when he was still allows you to hallo berhallo-ria, but that's all, that's it. The picture above really can not be underestimated. Especially in this era of mobile, in which the smoothness of the activity has become highly dependent in the presence of these gadgets. Call it mobile banking, which contains the activity gradually money will be used by virus makers to create a variant that is not only damaging the phone system but also capable of sending certain data confidential to the virus creator. The phone number in the phonebook example. Well, should we have to be careful from now on, too. Antivirus for Smartphones In quartal 4 (Q4) of 2004 yesterday, Motorola began to equip their products with antivirus support from big vendors, namely F-Secure. As for the type in question is the Nokia 6670 and Nokia 7710. While F-Secure's own proudly state that their antivirus designed to be able to work in real-time and automatically via sms mechanisms that have been patented. Besides Motorola, antivirus services from F-Secure is also used by Elisa, one of the mobile operators that offer services over a wireless network antivirusnya to its customers. Spamming Computer users in Indonesia may not be trust if 70% of the virus in the world are viruses that spread by spamming techniques. This is reasonable, because the Indonesian Internet penetration rate is very small when compared with countries like the United States, China, and the countries of Western Europe. As a result, most viruses are popular in Indonesia are viruses that attack the floppy disk, although at the beginning of its spread is also using the Internet. Call it from Pesin palembang, the capital of South Sumatra Province. Another story with the big countries are, where viruses are popular among Netsky, Mydoom, Baggle, Sasser, and all the variants. 5. Motivation virus makers According to Mr. Alfons tanujaya Antony, Director of PT Vaksin.com, there are some things that the makers aim to spread the virus when his work. First, self-actualization. This type of virus writers generally have programming skills high enough, he wants the whole world know that he was smart. Second, idly (script kiddie). This typically makes the virus with the help of applications that many virus makers are available on the internet. Third, to show off. Fourth, a campaign. Viruses are written by these four types in addition to damage to the system also aims to promote something you want on sale by the author. An example is the author of C Brain promoting the author's computer store in Pakistan. In addition to the above motivation, there is some other motivation is very troubling that a computer user, among other virus writers who created the virus to transmit computer data are attacked for the sake of evil, virus writers who want to convey certain messages or the contents of his heart to the world, example pesin viruses, etc.

0 comments:

Post a Comment

Antivirus Center

leave a masage


chat Room
©
Theme by New wp themes | Bloggerized by Dhampire