The major virus in IT history Bill
Elk Cloner ( 1982 ) 1`the first global virus attacking on personal computers, also, a headache for all the safety pioneer. 2`through Apple II floppy disks to spread. 3`The virus was on a game disk, can be used 49 times. Used in section 50, it does not run the game, replaced by a blank screen opens and shows a ditty.
Brain ( 1986 ) 1`the first viruses to attack Microsoft's popular operating system DOS. 2` 360K floppy disks can be infected with a virus infection, the virus will fill a floppy disk full of unused space, which led to it can no longer be used.
Morr is ( 1988 ) 1`use the weaknesses of the system to carry out the invasion,. 2`the designed original purpose is not to sabotage, but used to measure the size of the network. However, because the procedure does not deal with the cycle, we will continue with the implementation of the computer, copy Morris, ultimately lead to death.
CI H ( 1998 ) 1` by far the most serious virus, but also the world's first undermine hardware virus. It attacks not only undermine the hard disk boot sector and partition table, and the destruction of the computer system BIOS, resulting in damage to the motherboard. 2`This virus is transmitted by the Taiwan college students developed by Ying-hao, who said to develop this virus to commemorate the disaster in 1986 , so embarrassing anti-virus software.
Melissa ( 1999 ) 1`one of the first virus spread via e-mail , when a user opens an email attachments, the virus will be automatically sent to the user’s address book in the first 50 addresses, so the virus within a few hours around the globe 。
Lo ve b ug ( 2000 ) 1` has spread through e-mail around, it makes use of human nature, their courtship disguised as an open letter to deceive the recipient. 2`The spread of the virus in its speed and scope makes security experts so surprised. Within a few hours, this small computer program conquers the whole world within the scope of the computer system.
Co de Red ( 2001 ) 1`the most expensive in the history of computer viruses, the self-replicating malicious code "Code Red" to use the Microsoft IIS server in a loophole. 2` The worm has a more sinister version known as Code Red II. In addition to these two viruses can be modified on the site, the infected system performance will seriously decrease.
Shock w ave ( 2003 ) 1` is the English name of the virus Blaster, also known as Lovsan or Lovesan, it makes use of a Microsoft software defect on the system ,crazy attack leads to system crashes.
Sasse r ( 2004 ) 1` another use of defects in the Windows worm, Sasser can cause computer crashes and constantly restarting.
Panda bu rn in g in ce nse ( 2007 ) 1` all the program icons will become Panda burning incense, and they can not be applied.
Blast wave(2008) 1`like the shock wave and Sasser , is also a use of loopholes in the procedure from network intrusion. 2`And during “black case”, a large number of users turn off automatic updates, this is exacerbated by the spread of the virus. 3`The virus can lead to an attacker completely control the machine .
Mare Download er( 200 9) 1`The new virus , after the infection , will produce ranging from 1000 to 2000 Trojan viruses, resulting in system crash. 2`In three days ,into 360 security guards to kill the first top three (now top)
Nim da 1` in the history of the spreading virus, is one of the fastest, online after 22 minutes , becomes the most widely spreading virus.
Co nfick er 1` In March 2009, the virus should has spread to a large number, and then, in the April 1, implemented a global attack, causing a global catastrophe. 2`However, this virus, in fact, did not cause any damage.