Go Back   DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts > Computer/MAC Help/Info. & New Technology > General Computer/Android Help, News & Info + New Technology

General Computer/Android Help, News & Info + New Technology Find All The Latest Reports/Reviews in Here. Start a New Thread in Here if You Need Help

IMPORTANT ANNOUNCEMENT
Hallo to All Members. As you can see we regularly Upgrade our Servers, (Sorry for any Downtime during this). We also have added more Forums to help you with many things and for you to enjoy. We now need you to help us to keep this site up and running. This site works at a loss every month and we appeal to you to donate what you can. If you would like to help us, then please just send a message to any Member of Staff for info on how to do this,,,, & Thank You for Being Members of this site.
Post New ThreadReply
 
LinkBack Thread Tools Display Modes
Old 11-12-11, 19:37   #1
 
Ladybbird's Avatar
 
Join Date: Feb 2011
Posts: 34,259
Thanks: 23,074
Thanked 12,658 Times in 8,508 Posts
Ladybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond repute

Awards Showcase
Best Admin Best Admin Gold Medal Gold Medal 
Total Awards: 6

What Was the First Computer Virus?



What Was the First Computer Virus?

1) Creeper
2) Ebola
3) Infectimus Prime
4) Pandemic

The Answer........



The Creeper Virus

While the technical definitions for computer virus, worm, and malware might have a little overlap, it’s generally accepted that the first type of computer “virus” occurred in 1971 on ARPANET, the scientific/military network that preceded the modern internet. Creeper was an experimental self-replicating program that infected DEC computers across the network — this would be considered a computer worm today.

Written by Bob Thomas at the BBN Technologies lab, Creeper propagated itself throughout ARPANET by exploiting a vulnerability in DEC PDP-10 computers running the TENEX operating system. The worm wasn’t malicious and, upon gaining access to a machine and replicating itself, broadcast “I’m the creeper, catch me if you can!” on the terminal screen. The first virus removal program, dubbed The Reaper, soon followed, designed to ferret out Creeper infections.

Note: the term “computer virus” usually means a computer program that can replicate itself and spread from one computer to another. In modern terms, this is usually done by infecting a file, so a worm is not necessarily a virus. The term computer virus is also used in a more broad sense to describe malware, so the Creeper Virus is still a valid choice for the first virus — plus, it was created 10 years before the next viruses (Elk Cloner and Brain), making it a big milestone.

* By Jason Fitzpatrick

.
__________________
Nil Carborundum Illegitemi My Advice is Free My Friendship is Priceless

FREEBIES Continue to be a BURDEN on Our Increasing Server/Privacy Costs. Please DONATE Something to HELP...PM an Admin for Further Info.



& Thanks to Those That Have Taken The Time to Register & Become a Member of ... 1...
Ladybbird is online now  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following 3 Users Say Thank You to Ladybbird For This Useful Post:
backward (04-03-12), BaZZa101 (03-03-12), k00lfire (04-03-12)
Old 01-03-12, 19:38   #2
Visiting Administrator
 
Jenny21's Avatar
 
Join Date: Jan 2012
Location: UK
Posts: 31
Thanks: 53
Thanked 35 Times in 23 Posts
Jenny21 will become famous soon enough
Default Re: What Was the First Computer Virus?

Well I didn't know that.
__________________
Jenny21 is offline  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following User Says Thank You to Jenny21 For This Useful Post:
Ladybbird (06-03-12)
Old 03-03-12, 16:42   #3
 
DMan999's Avatar
 
Join Date: Dec 2011
Location: mm(º,º)mm
Posts: 4,871
Thanks: 660
Thanked 2,511 Times in 1,440 Posts
DMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond repute

Awards Showcase
Gold Medal Gold Medal Gold Medal Gold Medal 
Total Awards: 5

Default Re: What Was the First Computer Virus?

FYI: (C/P - w/slight modification)
-----------------------
Computer worm From Wikipedia, the free encyclopedia

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (usually without any user intervention). This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Payloads
Many worms that have been created are designed only to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm–it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.

Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads better using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005

Worms with good intent
Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user.

Some worms, such as XSS worms, have been written for research to determine the factors of how worms spread, such as social activity and change in user behavior, while other worms are little more than a prank, such as one that sends the popular image macro of an owl with the phrase "O RLY?" to a print queue in the infected computer. Another research proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.

Most security experts regard all worms as malware, whatever their payload or their writers' intentions.

Protecting against dangerous computer worms
Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible.

Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

In the April–June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses. In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.

Mitigation techniques
ACLs in routers and switches
Packet-filters
Nullrouting
TCP Wrapper/libwrap enabled network service daemons

History
The actual term "worm"' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail!"

On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.
__________________
DMan999 is offline  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following 4 Users Say Thank You to DMan999 For This Useful Post:
backward (04-03-12), Jenny21 (03-03-12), Ladybbird (06-03-12), pop (06-03-12)
Old 03-03-12, 18:29   #4
Visiting Administrator
 
Jenny21's Avatar
 
Join Date: Jan 2012
Location: UK
Posts: 31
Thanks: 53
Thanked 35 Times in 23 Posts
Jenny21 will become famous soon enough
Default Re: What Was the First Computer Virus?

Wow information overload hahaha

thanx m8y xxx
__________________
Jenny21 is offline  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following User Says Thank You to Jenny21 For This Useful Post:
Ladybbird (06-03-12)
Old 04-03-12, 03:58   #5
 
DMan999's Avatar
 
Join Date: Dec 2011
Location: mm(º,º)mm
Posts: 4,871
Thanks: 660
Thanked 2,511 Times in 1,440 Posts
DMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond reputeDMan999 has a reputation beyond repute

Awards Showcase
Gold Medal Gold Medal Gold Medal Gold Medal 
Total Awards: 5

Default Re: What Was the First Computer Virus?

Quote:
Originally Posted by Jenny21 View Post
Wow information overload hahaha

thanx m8y xxx

You're welcome. I thought it'd add more to it.
__________________
DMan999 is offline  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following 2 Users Say Thank You to DMan999 For This Useful Post:
Ladybbird (06-03-12), pop (06-03-12)
Old 06-03-12, 20:58   #6
pop
Official Site Mascot/Moderator
 
pop's Avatar
 
Join Date: Jun 2011
Posts: 1,179
Thanks: 2,019
Thanked 1,001 Times in 636 Posts
pop has much to be proud ofpop has much to be proud ofpop has much to be proud ofpop has much to be proud ofpop has much to be proud ofpop has much to be proud ofpop has much to be proud ofpop has much to be proud of

Awards Showcase
Bronze Medal 
Total Awards: 1

Default Re: What Was the First Computer Virus?

FileZilla, its a wormy thing that only works when it wants to worm its way to the server.
pop is offline  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
The Following User Says Thank You to pop For This Useful Post:
Jenny21 (09-03-12)
Post New ThreadReply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2019, vBulletin Solutions Inc.
SEO by vBSEO 3.5.2
Designed by: vBSkinworks