The History of the Computer Viruses

A virus.  The image is used under CC license.
A virus. The image is used under CC license. | Source
Stoned virus
Stoned virus | Source

Computer Viruses

Computer viruses are huge problem in modern society. A virus can harm computers system in various way. They steal data, delete information, harm operating systems and so on. Off course, each new virus that infects your system reveals the vulnerability. But the negative effect of the virus can cost millions of dollars if important information is lost during the infection.

The most known viruses that caused huge harm to various systems are Mydoom (2004), Melissa (1999), ILOVEYOU (2000), Storm (2007). These viruses infected millions of computers. For example, Melissa forced Microsoft to shut down their mailing system temporarily. I bet, that those, who do not like Windows OS were pretty happy. I LOVE YOU virus infected over 50 million of computers. Pretty big number, don't you think so?

If you are afraid of computer viruses, try sit down and relax. Explore the wonderful world of malicious programs and you will be afraid much more than you were before. I am kidding. Or maybe I am not. The idea is that you must explore the history of computer viruses to know their origins and targets. This is the only way to find the best cure for your computer.

Which malware is the most dangerous?

  • Virus
  • E-mail virus
  • Trojan horse
  • Worm
See results without voting
Blaster Virus
Blaster Virus | Source

Classification of Malicious Programs

It is hard to speak only about viruses. Viruses were the first malicious programs. But later, when internet appeared, many other malicious programs were created. here are several types of malicious programs, that are widely spread. All these types of malware act in completely different way. But their aim is similar.

Virus. A computer virus is a computer program that can replicate itself. Another property of virus is that it spread from one computer to another. The virus attach itself to a computer program or application. Every time the user runs a program, the virus is launched too. It replicates itself and attach the code to other programs. When the user downloads the infected program or file and launches it, the system becomes infected. If infected files are copied to other system, it becomes infected too. This is how the virus spread. The viruses do do spread themselves. The user is needed to copy infected files. The virus can do various harm to a computer or system. The virus can make undesirable changes to the system. It can delete files, damage operating system and so on.

E-Mail Virus. E-mail virus is the same virus as written above. The only difference between a virus and e-mail virus is the way how these two kind of programs spread. E-mail virus spread as an attachments to e-mail letters. Once the system is infected, the virus sends automatic copies of itself to all the addresses that are found in an address book. In mostly cases to infect the system attachment with virus must be opened. But there are some cases, when virus replicates itself when the user is reading letter. Famous Skype viruses spread the similar way.

Trojan horse. Do you remember the story about Trojan horse from Greek mythology? This term is associated with ruse. In computer science a Trojan horse is a program, that looks like a normal computer program. The only problem is that the Trojan horse is a program that is stated to do certain things, but instead of that it does another ones. The Trojan horse pretends to be a useful program, but actually it is a malicious program. Let say you have downloaded a game. If it is a Trojan horse, the program may send all you data to somebody. Also it may defect your operating system, open some ports for worms and so on. Trojan horses do not spread automatically too. The user is needed to download or copy it.

Worm. Worms are malicious programs that spread over the network. Worms usually use security holes in computer networks to spread. The worm search the network until find the computer with specific security hole. Once the hole is found, a worm copies itself to a new computer and start new search for other computers to infect. Computer worms are quite nasty thing. The holes they find can be used as backdoor and private data can be stolen. Remember, that the most secured computer in the one, which is not connected to the internet.

(click column header to sort results)
Date  
Virus  
Target or Type  
1970
Creeper
DEC PDP-10 computers
1974
ANIMAL
UNIVAC 1108
1981
Elk Cloner
Apple II
1986
Brain
IBM PC
1989
Ghostball
multipartite virus
1992
Michelangelo
DOS systems
1994
OneHalf
DOS based polymorphic virus
1999
Happy99
Worm
2000
ILOVEYOU
Computers with Windows OS
2004
MyDoom
Mass mailer worm
2006
Nyxem
MS Word files, worm
2008
Koobface
Facebook, Myspace users, worm
2010
Kanzero
P2P sites, virus
2011
Zeus
mobile phone banking information
2012
Flame
Windows systems, computer espionage
History of computer viruses timeline

History of Computer Viruses

The computer viruses appeared since the first computers were created. The theory about self replicated computer programs was developed in 1949. The firs self replicating program was created. This may be considered as the first computer virus ever made, but it was created for scientific purposes. The first computer virus as we know them now appeared in 1970-1972. The Creeper was found on ARPANET network. Later more computer viruses has appeared. They spread via pirated computer games written in 3.5" floppy disks.

The history of computer viruses is very rich. There are viruses that made huge harm to computers, while others were created for fun. The history of computer viruses timeline is shown in the table. It is impossible to talk about every virus ever created, because there are thousands of them. Computer security companies that create antivirus software update their databases for viruses almost every day. It is good to know, that somebody is keeping us save. Off course, there are many conspiracy theories about security companies. It is said, that most of the viruses are created by computer security companies. Personally, I would not believe that. But who knows.

The aims of computer viruses are different. At the moment, most of them are targeted to steal personal data. Personal data is used to make money. This is a crime. There are viruses that are created by geek programmers to check their skills. There are viruses that are made to harm operating system. Check the table for most popular viruses and their targets.

The Creeper - first computer virus

The Creeper virus is considered to be the first computer virus ever. It appeared in 1970-1971. The Creeper was created by Bob Thomas as experimental self replicating program. The name for the virus came from Scooby Doo cartoons. The episode Jeepers, It's the Creeper was aired in 1970. The Creeper spread through the ARPANET and infected DEC PDP-10 computers. This virus displayed the message: "I'm the Creeper, catch me if you can". Also it messed printers. This was experimental program, and it replicated itself. After the replication Creeper deleted the old version of itself. The Creeper was caught by a program called Reaper. This may be considered as the first antivirus program, but the term "virus" was not used at those days until 1983. So the first official antivirus programs came later.

Bitdefender Antivirus Plus 2014 Value M2 (3-PCs/2-Yrs)
Bitdefender Antivirus Plus 2014 Value M2 (3-PCs/2-Yrs)

Bitdefender Antivirus Plus is considered as the best security tool in 2014. Purchase and keep you computer clean from viruses and other malware.

 
Kaspersky Anti-Virus 2015 3 User, 1 Year [Online Code]
Kaspersky Anti-Virus 2015 3 User, 1 Year [Online Code]

Kaspersky Anti-Virus is the second best anti-virus software available in 2014. Choose the best products for you safety.

 

How to Avoid Computer Viruses

The history of computer viruses is very rich. Viruses and other malicious programs evolved as new computer technologies were implemented. The antivirus programs also evolved. Where there is a virus, it must have its cure. There are debates going which was the first antivirus program. G Data and UVK 2000 both were developed in 1987. Now you can find many antivirus products to buy.

There are several things your should/shouldn't do to avoid computer virus infections. You should never click mail attachment or link, if you are not sure about the sender. Avoid files with double extensions, such as filename.jpeg.exe. Check all external storage devices for viruses before using them. Avoid visiting suspicious websites and pop up banners: use filters that are integrated in web browsers. Use antivirus and antispyware program. Update your operating system regularly, because there may be some serious security updates. Use your brains while browsing. The last one is the most important tip I suppose.

It is very hard to choose the best antivirus program, but at the moment these products are worth your attention: BitDefender Antivirus, Norton Antivirus, Kaspersky Antivirus, AVG Antivirus and other. When choosing antivirus program you should be very careful, because there are many suspicious and malicious programs that pretend to be antivirus or antispyware products. Choose the know software.


More by this Author


Comments 2 comments

Silwen profile image

Silwen 3 years ago from Europe Author

rfmoran, I will search for Panetta speech, because it sounds interesting. But I would agree with him, because cyber crime and warfare grows up every year. And the growth is exponential. Everybody who goes online must thing about computer security very carefully, because stealth of information can cost a lot.


rfmoran profile image

rfmoran 3 years ago from Long Island, New York

Thanks for this informative heads up on something we all fear. Sec Def Leon Panetta in a speech yesterday warned that cyber warfare is a real and growing menace. Voted up useful and interesting

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working