Elk Cloner
1981- The “Elk Cloner” for the Apple II Systems was created by Richard Skrenta. It infected the Apple DOS 3.3 and spread to other computers by floppy disk transfer. The “Elk Virus” was responsible for being the first computer virus to cause a massive outbreak ever in history.
What virus did Rich Skrenta?
Elk Cloner virus
In 1982, at age 15, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II machines. It is widely believed to have been one of the first large-scale self-spreading personal computer viruses ever created.
What did Mydoom do?
Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.
Who created the Creeper virus?
Bob Thomas
As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was possible.
What message did the original virus display?
A computer infected with the original version had a one in eight probability that the screen would declare: “Your PC is now Stoned!”, a phrase found in infected boot sectors of infected floppy disks and master boot records of infected hard disks, along with the phrase “Legalise Marijuana”.
What Worm struck the Internet in 2001?
Code Red
Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft’s IIS web server.
What is Trojan Horse email?
In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user’s computing device.
Where is Onel de Guzman now?
He also created a title for the email attachment that would have global appeal, tempting people across the world to open it.” Now 44 years old, Onel de Guzman runs a small phone repair booth in a shopping mall in Manilla. He never went back to college.
What did the Code Red worm do?
Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft’s IIS web server. It was the first large scale, mixed threat attack to successfully target enterprise networks.
Which worm infected millions of computers in 2004?
MyDoom
The attacks were traced back to China. 6) MyDoom (2004) MyDoom muscled its way into the malware world in 2004, quickly infecting some one million computers and launching a massive distributed denial of service attack, which overwhelms a target by flooding it with information from multiple systems.
What is first virus name?
As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971 by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was possible.
What did Creeper virus do?
The Creeper virus works by infecting one computer, causing it to print a file. It will then stop working while looking for another TENEX system. It establishes a connection with that computer and so on. After it’s done with a system, its final payload or effect is to display its message.
What is Elk Cloner and how was it created?
When Rich Skrenta, created Elk Cloner as a prank in February 1982, he was a 15-year-old high school student with a precocious ability in programming and an overwhelming interest in computers. The boot sector virus was written for Apple II systems, the dominant home computers of the time, and infected floppy discs.
How does the Elk Cloner virus infect a computer?
As soon as a computer boots from a floppy disk carrying the virus, the virus copies itself into the computer’s memory. Later on, when another clean disk is inserted into the computer, the Elk Cloner virus automatically copies itself onto the clean disk, resulting in a network-like infection.
Why does Elk Cloner write a signature byte?
To prevent the DOS from being continually re-written each time the disk was accessed, Elk Cloner also wrote a signature byte to the disk’s directory, indicating that it had already been infected. The poem that Elk Cloner would display was as follows: