67:
When infected, small COM files, less than 11k, grow by 2559 bytes and larger files grow by 1336 bytes. Infected programs ask to guess the user a number between 0 and n such that the number matches the generation number of the virus plus one. A correct guess allows that program to run. Otherwise, it
76:
It doesn't intercept interrupt 24h so a write-protected disk gives an "Abort, Retry, Ignore" message. Read-only files are set to read/write, infected and then not set back to read-only. The virus had two
27:
243:
216:
189:
162:
135:
108:
64:
It infected only files that had a COM extension. When an infected file is run, the next uninfected program becomes infected.
60:
Virdem overwrites the host with its own code and saves the original program at the very end. It was a direct-action virus
206:
233:
179:
152:
125:
98:
277:
49:. The virus could copy itself and attach that copy to any .COM files. Virdem was fairly harmless
262:
8:
42:
31:
239:
212:
185:
158:
131:
104:
271:
181:
Safe and Secure: Secure Your Home
Network, and Protect Your Privacy Online
78:
35:
34:
conference. The virus spread by attaching itself to files with the
46:
23:
41:
In
December 1986, Burger distributed the virus at the
38:extension. It is one of the oldest MS-DOS viruses.
178:Danesh, Arman; Lau, Felix; Mehrassa, Ali (2002).
177:
269:
208:The Art of Computer Virus Research and Defense
123:
100:Secure Java: For Web Application Development
81:instructions at the beginning of the file.
30:in 1986 as a demonstration program for the
238:. Springer Science & Business Media.
157:. Springer Science & Business Media.
55:
235:PC Viruses: Detection, Analysis and Cure
231:
150:
96:
270:
51:as it announces its presence clearly.
204:
124:Skoudis, Ed; Zeltser, Lenny (2004).
71:
13:
14:
289:
255:
127:Malware: Fighting Malicious Code
225:
198:
171:
144:
130:. Prentice Hall Professional.
117:
90:
1:
154:Elements of Computer Security
151:Salomon, David (2010-08-05).
97:Bhargav, Abhay (2010-09-14).
84:
22:was the first file virus for
232:Solomon, Alan (2012-12-06).
7:
10:
294:
205:Szor, Peter (2005-02-03).
62:and did not spread fast.
16:First file virus created
56:Infection and symptoms
211:. Pearson Education.
26:. It was written by
184:. Sams Publishing.
43:Chaos Computer Club
32:Chaos Computer Club
261:Malware Example:
245:978-1-4471-1031-6
218:978-0-672-33390-3
191:978-0-672-32243-3
164:978-0-85729-006-9
137:978-0-13-101405-3
110:978-1-4398-2356-9
72:Technical details
285:
278:Computer viruses
250:
249:
229:
223:
222:
202:
196:
195:
175:
169:
168:
148:
142:
141:
121:
115:
114:
94:
63:
52:
47:Hamburg, Germany
293:
292:
288:
287:
286:
284:
283:
282:
268:
267:
258:
253:
246:
230:
226:
219:
203:
199:
192:
176:
172:
165:
149:
145:
138:
122:
118:
111:
95:
91:
87:
74:
61:
58:
50:
17:
12:
11:
5:
291:
281:
280:
266:
265:
257:
256:External links
254:
252:
251:
244:
224:
217:
197:
190:
170:
163:
143:
136:
116:
109:
88:
86:
83:
73:
70:
57:
54:
45:conference in
15:
9:
6:
4:
3:
2:
290:
279:
276:
275:
273:
264:
260:
259:
247:
241:
237:
236:
228:
220:
214:
210:
209:
201:
193:
187:
183:
182:
174:
166:
160:
156:
155:
147:
139:
133:
129:
128:
120:
112:
106:
103:. CRC Press.
102:
101:
93:
89:
82:
80:
69:
65:
53:
48:
44:
39:
37:
33:
29:
25:
21:
234:
227:
207:
200:
180:
173:
153:
146:
126:
119:
99:
92:
75:
66:
59:
40:
19:
18:
28:Ralf Burger
263:VIRDEM.COM
85:References
36:.COM file
272:Category
68:exits.
242:
215:
188:
161:
134:
107:
24:MS-DOS
20:Virdem
240:ISBN
213:ISBN
186:ISBN
159:ISBN
132:ISBN
105:ISBN
79:NOP
274::
248:.
221:.
194:.
167:.
140:.
113:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.