A computer virus is a malicious program that can infect computers, devices and systems. The most common way for it to spread is through email attachments, websites and links on social media platforms. A computer virus is a piece of code that gets into your system and starts damaging files or programs by itself. To get rid of these viruses you need anti-virus software like Norton Security or Kaspersky Lab.
A virus is a type of malware that can copy itself and spread to other computers. It’s often associated with the damaging effects it can have on your computer, such as deleting files or causing your computer to slow down. Viruses are often written by human hackers who want to steal information from you or cause chaos on the internet. Fortunately, there are ways to protect yourself against viruses that we will look at later in this article. Let us look at the history of computer viruses, how it all began and what effects it has in the world.
The history of computer viruses goes back to the 1970s, but it wasn’t until 1989 that one caused major damage. Since then, more types of viruses have been created, including some used for espionage or political purposes.
In January 1982, Rick Skrenta wrote and released a program known as Elk Spread or Elk Cloner. The virus was not intended to harm or gain access to sensitive data, it was a simple experiment attempting to spread from Apple II PCs via floppy disks. It was the first virus that spread via computer networks i.e Local Area Networks [LANs] and is considered by many as the first true computer virus ever written. The virus would not only infect the user’s floppy disk but also display a message on screen every time it ran “Elk Cloner: The program with antlers again!”
The history of computer viruses began with no malicious intent; it was written by Rich Skrenta at the age of 15 and only infected a small number of Apple computers. The virus did not attack the data on the computer but instead targeted the boot sector of the floppy disks, hiding itself in a location where it could launch each time a computer started up. This is significant because it made Elk Cloner one of the first viruses to infect computers via a removable drive, which increased its spread exponentially.
The virus was also designed to stay dormant if it was run from within an antivirus program (something that had been done before), so as not to interfere with legitimate software. However, once removed from such an environment and executed on its own, Elk Cloner would activate and infect any floppy disk inserted into an infected drive by writing itself into that computer’s boot sector. Its purpose was not malicious; rather, it was intended as harmless fun for those who were familiar with programming languages like assembly language and machine language (which allowed users access to low-level functions like reading/writing files).
The advent of computer viruses is closely related to the development of computing technology and information security technology. The first generation of computer viruses appeared in the early 1980s, when a number of small-scale malicious software have been found in different countries around the world.
The Elk Cloner virus, written by Rick Skrenta, was the first computer virus to spread across a network via email. In 1981, Elk Hunter was distributed through Bulletin Board Systems [BBS] and infected Apple II CPUs after users downloaded a game he wrote called “Elk Hunter.” It replicated itself across BBS servers and infected any floppy disks that were subsequently inserted into an infected computer.
The Elk Hunter virus was also unique in that it could spread through Microsoft Outlook, Word and Excel—programs which hadn’t been widely used at that time but became common later on. The virus proved more successful than its predecessors and quickly spread around Europe.
It was a macro-based virus, which meant that it could easily be created using the macro programming language in Microsoft Word. In fact, almost anyone with access to Word could write one of these viruses – an example being Melissa (1999), written by David Smith, which infected over half a million computers worldwide in less than 48 hours!
The macro viruses are more dangerous than the normal viruses due to their ability to replicate themselves without any user interaction. They have been observed as being able to spread over networks and removable storage media, such as CD-ROMs or USB flash drives. The main difference between macro viruses and worms is that a worm can replicate itself using many different methods, whereas macro viruses require human intervention from time to time (i.e., when a victim executes infected code in an application).
In the history of computer viruses, Melissa was just a small part of an outbreak of malicious code that swept through networks around the world during the 1990s and early 2000s.
When Melissa was first released in 1999, it was not particularly effective as a means of spreading itself because it required social engineering (tricking users into opening an attachment). The virus’ success came from its ability to generate news coverage that brought many more computers under its control. The Melissa virus infected more than one million systems worldwide within hours after being released into the wild; this included over 100 major corporations and universities plus thousands of home computers — even those running Linux operating systems — proving that all platforms are vulnerable if not properly secured by their owners
The Melissa worm is unlike any other computer virus before it for several reasons:
The Melissa worm is unlike any other computer virus before it for several reasons. First, the success of its propagation was unprecedented at the time. Whereas previous viruses could only spread if users intentionally opened an infected file, Melissa used a trick called “auto-replication” to infect computers autonomously and spread itself through emails in the form of an attachment named “Letter from [name]” with a subject line reading: “Here is that document you asked me to look over.”
Second, rather than simply causing damage or spamming people with ads as many viruses do today, Melissa had malicious intent behind its creation: The worm contained an embedded macro programming language that allowed it to replicate itself via email.
Thirdly—and most importantly—the creator of this virus was never identified; there’s nothing like that in malware history until now!
Although the history of computer viruses go back to 1982. It started to have a significant impact only in the early 1990s.
Like Melissa, Code Red, and ILOVEYOU are collectively known as worms. Worms are computer programs that run on infected computers without the knowledge of the user. They spread themselves to other computers by sending copies of themselves to email addresses found in the infected machine’s address book. Worms can also spread by exploiting weaknesses in network security protocols such as FTP, Telnet, and DNS.
From the the history of computer viruses to come out till date, some of the most destructive ones are :
Computer viruses are not just transmitted through email. They can also be transmitted by visiting malicious websites, downloading infected files, and downloading infected programs. The following is a list of the most common ways that your computer might get infected with a virus:
The history of computer viruses is long and storied, with many different types of malicious code having been released over time. Today, there are hundreds of different types of viruses and malwares that can infect your computer and steal your personal data. With the internet being such an integral part of our lives, it’s important to be aware of these dangers so that we can protect ourselves! However, by taking the right precautions when using the internet and keeping your computer protected with antivirus software, you can ensure that your data is safe from harm.
Neumetric, a cyber security products and services Organisation can help your Organisation remain safe from cyber attacks by implementing security standards and frameworks that make you resilient to cyber attacks. Our ISO 27001, EU GDPR, and other services ensure that we train your employees on how to remain safe from viruses and malware. For more information about our services, click here.
The history of computer viruses go back to the early 1980s where the first ever computer virus was created in 1981 by Rick Skrenta and it was called Elk Cloner. This virus did not attack data but instead targeted the boot sector on floppy disks so that it could run every time a computer started up.
The purpose of a computer virus is to spread from one computer to another without the user’s knowledge. They are malicious programs that function on their own and can cause damage to your computer or even steal personal data like credit card numbers, passwords, etc.