Screensavers

Early computers used cathode ray tubes (CRTs) for display. These were basically analog TV sets designed to work with a computer video system. The CRT … [Read more...]

Vulnerabilities

Operating systems and programs are complicated pieces of software with up to millions of lines of source code going into their development. While it … [Read more...]

Batch Files

While not often found, it is possible to write a batch file that contains a virus. In most cases the batch file is used to drop a memory or disk virus … [Read more...]

Macros

As indicated throughout this tutorial, in order for a virus to do anything, first a program of some type must execute. A virus, no matter what type, … [Read more...]

Companion Files

Would you believe that a virus can infect your files without changing a single byte in the infected file? Well, it's true; two different ways in fact! … [Read more...]

Directories (Cluster) Viruses

There is a type of virus known as a "cluster" virus that infects your files not by changing the file or planting extra files but by changing the DOS … [Read more...]

Virus History Summary

Below is an expanded summary of the history of viruses from the start to when I stopped recording "new" events. Narrative histories of the early … [Read more...]

Peer-to-Peer Network

A peer-to-peer (P2P or rarely PtP) computer network uses computers connected to other computers in a network instead of going through a central hub or … [Read more...]

Search Poisoning

Let's face it, users trust search engines like Google and others. Search Poisoning takes advantage of this trust and attempts to lure users to … [Read more...]

Trusted Software or Site

Actually, the summary above about says it all. Floppy disks (back in the old days), CDs (more recently), and downloads of commercial software or … [Read more...]