Computer virus

Viruses, Worms, and Trojans

  • 4K

    4K
    Point of Origin is unknown. Infected COM files and EXE files. First virus to use stealth tactics. Infected systems would freeze after September 22nd every year. The code was intended to display the message "Frodo lives", but also freezes when the computer freezes. Isolated some time in January of 1990.
  • AIDS II

    AIDS II
    A varient of the first virus AIDS, also was a virus that displayed a message upon exicution.
  • AIDS

    AIDS
    Computer virus that made .com files exicute first and therefore corrupting them. When activated it displays the following image to the left. http://upload.wikimedia.org/wikipedia/en/d/d6/Aids_computer_virus.png
  • Ada

    Ada
    Infects .COM and COMMAND.COM files. Memory resistant virus. Adds about 1,600 bytes to a file. Computers infected with it will have a slow clicking noise emitting from the speakers and a "Disk Full" error being displayed even when there is stil disk space. Isolated some time in October of 1990.
  • Ah

    Ah
    Very buggy computer virus that infected COM files. Originated in Italy sometime in May of 1991. Systems infected would experience frequent freezes. The freezes occur so frequently that it is very easy to tell your system has caught Ah. Ah also activates every Tuesday. It was isolated sometime in may of 1991.
  • Back Orifice

    Back Orifice
    Designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location.
  • NetBus

    NetBus
    Trojan that aparently wasn't meant to be harmful, but could be used to get int oand control another persons system.
  • Sub7

    Sub7
    Successor to NetBus. Used to gain unauthorized access to computers.
  • Badtrans

    Badtrans
    Computer worm that Installed a keylogger; distributed logged information.
  • Blaster

    Blaster
    Computer worm that targeted toward Bill Gates; contained message "billy gates why do you make this possible ? Stop making money and fix your software!!".
  • Beast

    Beast
    It is capable of infecting versions of Windows from 95 to XP. Written in Delphi and released first by its author Tataye in 2002, it became quite popular due to its unique features.
  • Brontok

    Brontok
    Computer worm that spread through an Indonesian e-mail headed with "stop the collapse in this country"; destroys firewalls.
  • Zeus

    Zeus
    While it is capable of being used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.
  • Code Red

    Code Red
    This worm allows hackers to hack your complete network from the location. The Heart Bleed virus allows hackers to steal data like credit card numbers, passwords, and other personal information. This worm is critical, it may crash your Operating system and also other devices (such as printer,scanner and tablet,magic jack,Camera) which are connected under the same network
  • Melissa

    Melissa
    Not originally intended as harmful, but crashed servers by flooding them with e-mail