Early computers used cathode ray tubes (CRTs) for display. These were basically analog TV sets designed to work with a computer video system. The CRT … [Read more...]
Vulnerabilities
Operating systems and programs are complicated pieces of software with up to millions of lines of source code going into their development. While it … [Read more...]
Batch Files
While not often found, it is possible to write a batch file that contains a virus. In most cases the batch file is used to drop a memory or disk virus … [Read more...]
Macros
As indicated throughout this tutorial, in order for a virus to do anything, first a program of some type must execute. A virus, no matter what type, … [Read more...]
Companion Files
Would you believe that a virus can infect your files without changing a single byte in the infected file? Well, it's true; two different ways in fact! … [Read more...]
Directories (Cluster) Viruses
There is a type of virus known as a "cluster" virus that infects your files not by changing the file or planting extra files but by changing the DOS … [Read more...]
Virus History Summary
Below is an expanded summary of the history of viruses from the start to when I stopped recording "new" events. Narrative histories of the early … [Read more...]
Peer-to-Peer Network
A peer-to-peer (P2P or rarely PtP) computer network uses computers connected to other computers in a network instead of going through a central hub or … [Read more...]
Search Poisoning
Let's face it, users trust search engines like Google and others. Search Poisoning takes advantage of this trust and attempts to lure users to … [Read more...]
Trusted Software or Site
Actually, the summary above about says it all. Floppy disks (back in the old days), CDs (more recently), and downloads of commercial software or … [Read more...]