Nimda is one of the more complex virus/worm constructs released. It infects files, spreads itself via E-mail, spreads via Web sites, and spreads via … [Read more...]
Pretty Park
This is a combination beast: a worm, a password-stealing Trojan, and a backdoor. June 1999 it was active across Europe and another outbreak was noted … [Read more...]
Stages
An E-mail worm believed to be the first to use the scrap file format to spread. Before going further, let's first look at what a scrap file … [Read more...]
What Malware Does
I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is … [Read more...]
Denial-of-Service
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to … [Read more...]
Rewrite and Redirect
Most rewrite and redirect attacks are directed against the HOSTS file(s) on infected machines. The HOSTS file is used by an operating system (not just … [Read more...]
Buffer Overflow
A buffer is an area of computer memory set aside for data. Many buffers are fixed length. The proper procedure for inserting data into a buffer is to … [Read more...]
Botnet
Using Trojan Horse programs or worms/viruses, a person (often called a "botmaster" or "herder") can inject malware into a user's computer which opens … [Read more...]
Dr Solomon History
Narrative histories are available from several sources. The information in this section was provided by and used with permission of Dr. Solomon … [Read more...]
1986-1987 The Prologue
It all started in 1986. Basit and Amjad realised that the boot sector of a floppy diskette contained executable code, and this code is run whenever … [Read more...]