ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Subject: I Love You - The Movie and The Most Dreaded Computer Virus

Updated on March 13, 2011

One the 10 Worst Computer Viruses that destroyed almost 10 billion computers worldwide is the I LOVE YOU VIRUS. It was the thesis project of a Filipino programmer named Onel de Guzman and his group who accidentally (it's still being disputed) released it online as an e-mail attachment. With the subject I Love You on e-mail, everyone was overwhelmed of that three words, especially on Valentine’s day. But the vulnerabilities of the said project made it one of the deadliest viruses that graced the World Wide Web (www) and caught the attention of the Pentagon to hire not put behind bar the perpetrator.

Now, after a decade of that cyber-turmoil, it will be released as a very interesting movie titled: Subject: I Love You. With the name of the Superman incarnate: Dean Cain and a local movie idol Jericho Rosales , Filipino moviegoers will be surprised that most of the scenes of the movie were shot here in the Philippines.

The storyline narrates that the "I Love You" virus was released online by the Filipino computer genius in order to track down his American girlfriend. But it 2002, it became a massive malady to computer networks around the world because it almost paralyzed the online operation of big firms that rely mainly on it.

The shooting was not revealed to the public until the finishing touches of the film which will be shown next month (March 2011). Whew! After two years of long wait, still, we're keeping our fingers crossed just to watch this movie.

I'm still wondering why Onel would hunt his American girlfriend (Butterfly) starring Briana Evigan of Step Up 2 by uploading this attachment that almost ruined the world.

Francis dela Torre's "Subject: I Love You" c/o bakitwhycom

The I LOVE YOU virus
The I LOVE YOU virus

10 Worst Computer Viruses

A computer virus must have a host program in order to run properly or self-replicate.

Computer viruses are just one kind of malware. Other types include spyware and some kinds of adware. Spyware spies on what a user does with his or her computer.

Here are some of the viruses that created havoc to the computerlandia for the past decades.

  1. Melissa virus - created by David L. Smith on a Microsoft Word macro. It spread through e-mail messages that created havoc to public and private websites. Although, it didn't cripple the internet industry, this virus was the first to caught the public attention. What happened to Mr. Smith? After the fine of $5,000, the court forbade him to access computer networks, unless with the court authorization.
  2. I Love You virus - is a standalone program that can replicate itself without using a host program.The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting. Onel de Guzman, its creator was charged of theft by the investigating authorities -- at the time the Philippines had no computer espionage or sabotage laws. $10 billion of dollars were wasted due to the damages caused by the virus.
  3. Klez virus - also a worm (was launched in 2001) and like I love You virus, it can paralyze computer's operation. It can spoof e-mail address and the e-mails can consume the space on your provider. It can even act as virus-removal tool which is just a deception that can turn your computer laptop or desktop into a zombie.
  4. Code Red & Code Red II- sprang on  the summer of 2001. It was found on computers operation on Microsoft 2000 and Microsoft NT. The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House (USA) Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. However, the virus was not removed automatically, unless removed by the owner manually.
  5. Nimda - the backward spelling of admin. Or you can call it skull virus because of the series of skull images that can paralyze computer server and cellular phones. The distributed denial of service (DDoS) of nimda caused computer crashes and dubbed as the fastest self-propagating virus of 2001.
  6. SQL Slammer or Sapphire - a Web server virus that started its attack on January 2003. It momentarily paralyzed banking system, electronic ticketing on airports. South Korea was partially isolated during that time because of the virus.
  7. MyDoom - or Novarg is another worm that created a backdoor on the victim's operating system in 2004. It inspired U.S. Senator Chuck Schummer to  propose a National Virus Response Center. Peer-to-peer networks are vulnerable to this kind of virus.
  8. Sasser & Netsky viruses - 17-year old Sven Jaschan of Germany created these two programs. Although undetectable at first, as it attacks the Microsoft Windows vulnerability, the authorities were able to track down the culprit. I never heard of Mac computers being attack by viruses. Only those with Microsoft programs are always on the victims' list.
  9. Leap-A/Oompa-A - the first on Mac computers in 2006. Although the company produces its own hardware and software, it proved that it can still be hacked. The hacker saw its vulnerability on the iChat messaging.
  10. Storm Worm - is a Trojan horse program and the biggest threat to all computer users since 2006. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet.

Recently, I downloaded a free program filling my USB (Universal Serial Bus) drive with these worms (Win32 Storm Worm, etc.). My solution was to re-program it and wipe out all the documents infected by the virus.


    0 of 8192 characters used
    Post Comment
    • travel_man1971 profile imageAUTHOR

      Ireno Alcala 

      6 years ago from Bicol, Philippines

      @crystolite: Whoah! I missed replying on your post. Thanks for the positive feedback. :)

    • crystolite profile image


      8 years ago from Houston TX

      Nice article,thanks

    • travel_man1971 profile imageAUTHOR

      Ireno Alcala 

      8 years ago from Bicol, Philippines

      @Cogerson. You're welcome. I'm getting giddy to wholly watch this movie.

    • travel_man1971 profile imageAUTHOR

      Ireno Alcala 

      8 years ago from Bicol, Philippines

      @dallas: Thanks but flagging is different from rating. Anyways, your presence is much appreciated

    • travel_man1971 profile imageAUTHOR

      Ireno Alcala 

      8 years ago from Bicol, Philippines

      Thanks, Gioia. You should see this movie. It's not some hacker's story but it's got some twists that you will never forget.

    • jackie8hall profile image


      8 years ago

      And new ones are coming out everyday. My home computer the kids use and two employee computers were just infected by "System Tools"

    • Cogerson profile image


      8 years ago from Virginia

      Interesting hub...I am putting this movie on my radar screen...thanks for posting

    • dallas93444 profile image

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Thanks for sharing. Flag up!

    • travel_man1971 profile imageAUTHOR

      Ireno Alcala 

      8 years ago from Bicol, Philippines

      @ Romano Arnesto: I'm not sure of the exact movie date yet. But it will be shown this year. Whew, I'm sure the long wait is over. And the virus has been paralyzed for so long. It's about time to know the story behind that virus.

    • GioiaMulas profile image


      8 years ago

      thanks very interesting ;)

    • Romano Arnesto profile image

      Romano Arnesto 

      8 years ago from Philippines

      Can't wait to watch the movie! When is the exact date? Everyone is clamoring for it here in the Philippines. I heard it from the grapevine that some programmers will make viruses and sell it on the software and hard drive manufacturers. Is it true?


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)