250:
174:
212:
308:
285:
191:
231:
278:
247:
387:
129:
181:
History of
Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.
468:
463:
313:
271:
171:
209:
151:
directories upon execution. Changing an authenticated executable file is detected by most modern computer
397:
392:
458:
372:
427:
422:
362:
437:
417:
8:
377:
115:
402:
195:
152:
108:
412:
254:
235:
216:
178:
148:
114:
written in 1989 by Mark
Washburn. Derived from Ralf Burger's publication of the
334:
111:
228:
452:
133:
118:
407:
367:
339:
121:
382:
263:
137:
140:
349:
432:
326:
125:
68:
144:
57:
229:"Patricia Hoffman's VSUM Virus Information Summary List,"
46:
172:"Threat Assessment of Malicious Code and Human Threats,"
450:
279:
219:, Details and results of V2PX virus analysis.
286:
272:
293:
451:
267:
13:
194:. research.ibm.com. Archived from
143:. Both the 1260 and Vienna infect
14:
480:
241:
222:
203:
184:
165:
16:IBM PC DOS computer file virus
1:
158:
192:"IBM's PC "Virus Timeline,""
7:
10:
485:
348:
325:
299:
210:McAfee Labs Threat Center
90:
82:
74:
64:
52:
42:
34:
26:
21:
248:"1260 (computer virus),"
147:files in the current or
200:IBM research report.
469:Hacking in the 1980s
464:Hacking in the 1990s
294:Hacking in the 1980s
378:Christmas Tree EXEC
198:on 27 October 2012.
124:, the 1260 added a
403:Lamer Exterminator
253:2021-08-17 at the
234:2011-09-27 at the
215:2011-07-28 at the
177:2011-04-23 at the
446:
445:
320:
319:
153:operating systems
98:
97:
476:
459:DOS file viruses
388:Father Christmas
302:
301:
288:
281:
274:
265:
264:
258:
245:
239:
226:
220:
207:
201:
199:
188:
182:
169:
19:
18:
484:
483:
479:
478:
477:
475:
474:
473:
449:
448:
447:
442:
344:
321:
295:
292:
262:
261:
255:Wayback Machine
246:
242:
236:Wayback Machine
227:
223:
217:Wayback Machine
208:
204:
190:
189:
185:
179:Wayback Machine
170:
166:
161:
128:and varied its
38:V2P1, Chameleon
17:
12:
11:
5:
482:
472:
471:
466:
461:
444:
443:
441:
440:
435:
430:
425:
420:
415:
410:
405:
400:
395:
390:
385:
380:
375:
370:
365:
360:
354:
352:
346:
345:
343:
342:
337:
331:
329:
323:
322:
318:
317:
311:
306:
305:← —
300:
297:
296:
291:
290:
283:
276:
268:
260:
259:
240:
221:
202:
183:
163:
162:
160:
157:
112:computer virus
96:
95:
92:
88:
87:
84:
80:
79:
76:
72:
71:
66:
65:Classification
62:
61:
54:
50:
49:
44:
40:
39:
36:
32:
31:
28:
27:Technical name
24:
23:
15:
9:
6:
4:
3:
2:
481:
470:
467:
465:
462:
460:
457:
456:
454:
439:
436:
434:
431:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
389:
386:
384:
381:
379:
376:
374:
371:
369:
366:
364:
361:
359:
356:
355:
353:
351:
347:
341:
338:
336:
333:
332:
330:
328:
324:
316: →
315:
312:
310:
307:
304:
303:
298:
289:
284:
282:
277:
275:
270:
269:
266:
256:
252:
249:
244:
237:
233:
230:
225:
218:
214:
211:
206:
197:
193:
187:
180:
176:
173:
168:
164:
156:
154:
150:
146:
142:
139:
135:
131:
127:
123:
120:
117:
113:
110:
106:
102:
94:Mark Washburn
93:
89:
85:
81:
77:
73:
70:
67:
63:
59:
55:
51:
48:
45:
41:
37:
33:
29:
25:
20:
357:
335:The Analyzer
243:
224:
205:
196:the original
186:
167:
119:Vienna Virus
116:disassembled
104:
100:
99:
56:Nonresident
408:Morris worm
368:Byte Bandit
340:Markus Hess
327:Individuals
238:V2P6 virus.
134:randomizing
122:source code
109:polymorphic
453:Categories
383:Elk Cloner
159:References
138:decryption
438:WANK Worm
413:Ping-Pong
398:Jerusalem
393:Ghostball
141:algorithm
130:signature
60:-Infector
309:Timeline
257:article.
251:Archived
232:Archived
213:Archived
175:Archived
107:, was a
373:Cascade
350:Malware
91:Authors
53:Subtype
433:Virdem
428:Stoned
423:Scores
126:cipher
83:Origin
75:Family
363:Brain
314:1990s
103:, or
69:Virus
35:Alias
358:1260
149:PATH
145:.COM
136:its
105:V2PX
101:1260
58:.COM
43:Type
30:1260
22:1260
418:SCA
132:by
86:USA
78:N/A
47:DOS
455::
155:.
287:e
280:t
273:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.