Knowledge

Ghostball (computer virus)

Source 📝

25: 298: 261: 198: 393: 370: 241: 42: 89: 61: 68: 339: 75: 363: 108: 57: 472: 169: 246: 46: 558: 398: 356: 216:
The virus was written up based on code from two different viruses. The code that is capable of infecting
482: 332: 82: 548: 313: 457: 512: 507: 35: 543: 447: 553: 442: 325: 280: 274: 202: 522: 502: 8: 462: 487: 145: 497: 229: 161: 419: 309: 251: 174: 537: 492: 452: 424: 225: 210: 467: 348: 206: 186: 182: 127: 24: 217: 221: 434: 305: 256: 178: 517: 411: 297: 201:
discovered. The virus was discovered in October 1989, by
150: 220:
is stated to be inspired from a modified version of the
224:
The section of the virus that is capable of infecting
49:. Unsourced material may be challenged and removed. 535: 242:Timeline of notable computer viruses and worms 364: 333: 160:Modified Vienna (COM file-infecting code), 371: 357: 340: 326: 281:Ghostballs Virus Profile & Definition 205:. The virus is capable of infecting both 109:Learn how and when to remove this message 378: 536: 352: 292: 47:adding citations to reliable sources 18: 16:First discovered multipartite virus 13: 14: 570: 296: 23: 164:(boot sector-infecting section) 58:"Ghostball" computer virus 34:needs additional citations for 247:Comparison of computer viruses 1: 267: 312:. You can help Knowledge by 7: 235: 10: 575: 291: 433: 410: 384: 168: 156: 144: 136: 126: 308:-related article is a 228:is extracted from the 181:, multipartite virus, 559:Hacking in the 1980s 379:Hacking in the 1980s 43:improve this article 463:Christmas Tree EXEC 123: 488:Lamer Exterminator 262:Multipartite virus 199:multipartite virus 128:Original author(s) 121: 531: 530: 405: 404: 321: 320: 192: 191: 119: 118: 111: 93: 566: 549:DOS file viruses 473:Father Christmas 387: 386: 373: 366: 359: 350: 349: 342: 335: 328: 300: 293: 283: 278: 203:Friðrik Skúlason 146:Operating system 124: 120: 114: 107: 103: 100: 94: 92: 51: 27: 19: 574: 573: 569: 568: 567: 565: 564: 563: 534: 533: 532: 527: 429: 406: 380: 377: 347: 346: 289: 287: 286: 279: 275: 270: 238: 230:Ping-Pong virus 209:.COM-files and 162:Ping-Pong virus 137:Initial release 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 572: 562: 561: 556: 551: 546: 529: 528: 526: 525: 520: 515: 510: 505: 500: 495: 490: 485: 480: 475: 470: 465: 460: 455: 450: 445: 439: 437: 431: 430: 428: 427: 422: 416: 414: 408: 407: 403: 402: 396: 391: 390:← — 385: 382: 381: 376: 375: 368: 361: 353: 345: 344: 337: 330: 322: 319: 318: 301: 285: 284: 272: 271: 269: 266: 265: 264: 259: 254: 252:Computer virus 249: 244: 237: 234: 197:was the first 190: 189: 175:Computer virus 172: 166: 165: 158: 154: 153: 148: 142: 141: 138: 134: 133: 130: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 571: 560: 557: 555: 552: 550: 547: 545: 544:Malware stubs 542: 541: 539: 524: 521: 519: 516: 514: 511: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 484: 481: 479: 476: 474: 471: 469: 466: 464: 461: 459: 456: 454: 451: 449: 446: 444: 441: 440: 438: 436: 432: 426: 423: 421: 418: 417: 415: 413: 409: 401: → 400: 397: 395: 392: 389: 388: 383: 374: 369: 367: 362: 360: 355: 354: 351: 343: 338: 336: 331: 329: 324: 323: 317: 315: 311: 307: 302: 299: 295: 294: 290: 282: 277: 273: 263: 260: 258: 255: 253: 250: 248: 245: 243: 240: 239: 233: 231: 227: 223: 222:Vienna virus. 219: 214: 212: 208: 204: 200: 196: 188: 184: 180: 176: 173: 171: 167: 163: 159: 155: 152: 149: 147: 143: 139: 135: 131: 129: 125: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 554:Boot viruses 477: 420:The Analyzer 314:expanding it 303: 288: 276: 226:boot sectors 215: 211:boot sectors 194: 193: 140:October 1989 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 493:Morris worm 453:Byte Bandit 425:Markus Hess 412:Individuals 157:Predecessor 538:Categories 468:Elk Cloner 268:References 207:executable 187:boot virus 183:file virus 69:newspapers 523:WANK Worm 498:Ping-Pong 483:Jerusalem 478:Ghostball 218:COM files 195:Ghostball 122:Ghostball 394:Timeline 236:See also 99:May 2008 458:Cascade 435:Malware 306:malware 257:Malware 179:malware 132:Unknown 83:scholar 518:Virdem 513:Stoned 508:Scores 85:  78:  71:  64:  56:  448:Brain 399:1990s 304:This 90:JSTOR 76:books 443:1260 310:stub 170:Type 62:news 503:SCA 151:DOS 45:by 540:: 232:. 213:. 185:, 177:, 372:e 365:t 358:v 341:e 334:t 327:v 316:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Ghostball" computer virus
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Original author(s)
Operating system
DOS
Ping-Pong virus
Type
Computer virus
malware
file virus
boot virus
multipartite virus
Friðrik Skúlason
executable
boot sectors
COM files
Vienna virus.
boot sectors
Ping-Pong virus
Timeline of notable computer viruses and worms
Comparison of computer viruses

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.