Sections of the site
Editor's Choice:
- Decided to switch from Windows to Mac?
- How to use Google Photos, overview of Google foto login functions
- Payment system Payza (ex-Alertpay) Payza login to your personal account
- How to open APK and how to edit?
- Review of the Alpha GT smartphone from Highscreen Packaging and delivery
- Official LG firmware via KDZ
- What is an SSD and how to install it?
- How to put an accent on a letter in Word
- How to convert images to PNG format?
- Technical problems and their solutions v
Advertising
Computer viruses names and descriptions. What is a computer virus and when did it first appear? |
The key word in defining a virus is “malicious.” The same programs that are called the first viruses did not cause any harm to the computer. It was, for example, computer game“Animal”, which consists of guessing animals and has gathered a countless number of fans. The author of the game was tired of endless requests from users to send them this game (and in 1974 this was not an easy task - it was necessary to record the game on magnetic tape and send it by mail). Therefore, he created a subroutine “Pervade”, which independently “traveled” from computer to computer and recorded the game “Animal” in each of them. It is unlikely that at least one computer suffered from this simple “surprise”.
Creeper, which appeared in the early 1970s, was a self-moving demonstration program: when a new copy of Creeper was launched on a new computer, the previous one would stop working. And her job was simply to display the message “I am a Creeper... catch me if you can” on the screen. Later, the Reaper program was written, which also moved from computer to computer and “hunted” for the Creeper, blocking it. These programs fought with each other, taking up memory space, eliminating the opposite. The techniques used to reproduce programs in memory would lay the foundations for later viruses. This was the first concept of a worm type virus. A small programming error meant that this program was replicated without network-breaking controls, and that another program had to be developed to eliminate it, laying the foundations for the first antivirus. In Apartet you can also see similar programs, purely experimental, that were played on networks. A little more annoying and similar to a real virus was the “Cookie monster”. This program displayed the phrase “Give me a cookie” on the terminal and blocked it until the operator entered the word “cookie”. Real pioneer virusesOne of the real first viruses is considered to be Elk Cloner, written by a 15-year-old schoolboy for personal computers Apple II. It also did not affect the operation of the computer, but it could unintentionally damage disks containing a non-standard DOS image and overwrite backup tracks regardless of their contents. After every 50th download, the virus displayed a rhyme on the screen saying that Elk Cloner is a program with a personality that will “get into all your drives, get into all your chips, stick to you like glue, and change your RAM.” Until this point, the threat had been concentrated on a handful of worms, which, strictly speaking, did not constitute viruses themselves. He was the first to use concealment techniques. Its popularity and usefulness encouraged other programmers, and infection became something relatively normal. Click on the following image to watch the video. The first damage was caused by Lehi. Equipped with a counter, it rewrote random data onto the floppy disk every four executions. Considering its destructive ability to the system that housed it, it did not achieve excessive popularity. Friday the 13th was the first virus to live in memory. Cascade was the first encrypted virus. This, along with the funds mass media, shows that the press created around the virus threat only fueled the imagination of creators to create more and better computer viruses capable of spreading throughout the world and remaining undetected by these early antivirus prototypes. Its contemporary, Virus 1,2,3, acted approximately the same way, although it appeared independently of Cloner. Both viruses were created in 1981. In the mid to late nineties, the Internet became popular and the reputation of previous viruses prompted many programmers to create their own virus, which received its fifteen minutes of fame. They found an opportunity in macro viruses that still coexist with traditional floppy disks. This simple system gave it the opportunity to spread massively and was subsequently imitated by each of the subsequent viruses. They began converting infected systems into proxy servers, zombie computers, to attack other websites or disable certain programs so they would go undetected. Computer virus- a type of malicious software that can create copies of itself and embed itself in the code of other programs, system memory areas, boot sectors, and also distribute its copies through various communication channels. They installed themselves in one of the services and began to reproduce without the need to exploit the security issues of the email client or that the user had viewed or opened anything. They did not require human intervention, but only systems with specific port, where they could eavesdrop on a vulnerable server. As a rule, they usually do not need to be installed on an infected HDD, they simply remained in memory. All this allowed for rapid and endemic expansion on the Internet. Consequently, classical preventative measures were insufficient or useless for these samples, for which the only preventive measure or antidote was a system update or, if this did not exist, a personal firewall that denied access to the systems. problem ports. Until then, there were about a thousand cataloged viruses detected by any antivirus program. Even if the author of the virus has not programmed harmful effects, the virus can cause computer crashes due to errors and unaccounted for subtleties of interaction with the operating system and other programs. In addition, viruses, as a rule, take up space on storage devices and consume some other system resources. Its client-server and formula " malware as a service” are triumphant. It is based on the use of a kit that allows you to create a personalized banking Trojan. This new generation of malware responds to characteristics that are significantly different from those of all its predecessors over the previous 20 years. The spread of new malware variants has literally grown exponentially. Automatic methods are used to obfuscate variants and make it difficult to identify signatures. The current strategy is to use multiple variants instead of a single instance to attract less attention and hinder the antivirus community's ability to respond quickly. Using the Internet as a distribution platform. Economic gain is the only motivation.
In everyday life, all malicious software is called “viruses,” although in fact this is only one type of it. The creation and distribution of malicious programs (including viruses) is prosecuted in Russia according to the Criminal Code of the Russian Federation (). Only administrators who took the greatest precautions could avoid this threat. This meant perfect secure behavior, the dream of every malware creator. Specific Targets: Another characteristic of this type of malware is that it usually has a single target and prevents it from spreading outside that specific area. The Trojan gained access to the management database. Monitoring and data acquisition systems are important industrial manufacturing programs: they take highly sensitive data from plant sensors, for example, and send it to a central system to be monitored. Thus, it is malware targeting a very different profile of the “average” user. In particular, he attacked a very specific version that was being used in an Iranian nuclear plant and managed to paralyze it. Use of valid certificates and sophisticated cryptography. . All these qualities require large investments in research, programming and concealment. Encyclopedic YouTube1 / 2 What's happened computer virus WannaCry virus! How to protect Microsoft Windows(XP, 7, 8, 10) by WannaCry. SubtitlesStoryThe foundations of the theory of self-replicating mechanisms were laid by an American of Hungarian origin, John von Neumann, who in 1951 proposed a method for creating such mechanisms. Working examples of such programs have been known since 1961. Although there has likely never been official confirmation, they suggest that they were not only conceived by an organized mafia like the one that powers the current antivirus industry, but are part of a structure that appears to be affecting high-level areas . It is a term that has recently emerged and describes advanced and persistent threats against a specific target. With a lot of previous information in your hand, an attacker waits for the exact moment to attack in a very specific way on the equipment you want to infect. The first known viruses are Virus 1,2,3 and Elk Cloner for the Apple II PC, which appeared in 1981. In the winter of 1984, the first antivirus utilities- CHK4BOMB and BOMBSQAD by Andy Hopkins Andy Hopkins). In early 1985, Guy Wong Gee Wong) wrote the DPROTECT program - the first resident antivirus. This usually occurs through a custom malware attack that, for example, may combine these characteristics. It is designed to be invisible to the specific security solutions used by the target company. It is sent to what is known as the weakest link in the internal network to launch an infection point. It is sent as a personalized message to infect the first system, and because it knows the internal network, it directly attacks the specific targets it wants. Once you gain control of the internal hardware you need, it remains hidden and remains undetected as long as the attacker deems it necessary to complete their task.
The first viral epidemics date back to -1989: Brain.A (spread in boot sectors floppy disks, caused the largest epidemic), Jerusalem (appeared on Friday May 13, 1988, destroying programs when they were launched), Morris worm (over 6200 computers, most networks were out of order for up to five days), DATACRIME (about 100 thousand infected PCs only in the Netherlands). Lack of diversification increases security risks and facilitates infections with less code diversification. He included a rudimentary antivirus in his system and changed its publicity. Depending on who visited it, malware was downloaded for a particular system. Almost all known examples are proof of concept that barely escaped laboratories or closed environments. He exploited the vulnerability in June. If you take advantage of this flaw, an attacker could compromise the system. At the same time, the main classes of binary viruses took shape: network worms (Morris worm, 1987), Trojan horses (AIDS, 1989), polymorphic viruses (Chameleon, 1990), stealth viruses (Frodo, Whale, 2nd half of 1990). It was completely harmless and only affected files in the directory where it was executed, without any damage and without self-propagating to other systems. This was written directly in assembly language. It was also a rather primitive proof of concept, not optimized for its distribution, which had no disruptive effect. In Spain it was so successful that the messages were adapted to Spanish. There are several reasons, but fundamentally Cell phones and tablets are nothing more than computers today, where they perform the same tasks as on a desktop and with permanent connection, in the same circumstances that allowed Internet malware to be hacked. Several factors have been given for this operating system to become the main target of malware. At the same time, organized movements of both pro- and anti-virus orientation were taking shape: in 1990, a specialized BBS Virus Exchange, “The Little Black Book of Computer Viruses” by Mark Ludwig, and the first commercial antivirus Symantec Norton AntiVirus appeared. In addition, monolithic viruses are largely giving way to complex malware with separation of roles and auxiliary tools (Trojans, downloaders/droppers, phishing sites, spambots and spiders). Social technologies - spam and phishing - are also flourishing as a means of infection that bypasses software security mechanisms. The state of mobile malware is in its infancy, but it shows similarities to the beginnings of “traditional” malware. The most popular malware for mobile devices are those that use premium messages to quickly monetize the infection. The consumer is strongly advised to have their infected computer enter their phone number. Once the attacker controls two devices, he can make transfers. An example of code entered into a browser to infect a phone. Another category would be "spyware" malware, which allows a third party to obtain information about a user's phone or activities. At the beginning based Trojans, and with the development of p2p network technologies - and independently - the most modern type of viruses - botnet worms - is gaining momentum (Rustock, 2006, about 150 thousand bots; Conficker, 2008-2009, more than 7 million bots; Kraken, 2009, about . 500 thousand bots). Viruses, among other malware, are finally being formalized as a means of cybercrime. Etymology of the nameThe computer virus was named by analogy with biological viruses due to a similar mechanism of spread. Apparently, the word “virus” was first used in relation to a program by Gregory Benford in the science fiction story “The Scarred Man,” published in Venture magazine in May 1970. The term “computer virus” was subsequently “discovered” and rediscovered more than once. Thus, the variable in the PERVADE() subroutine, the value of which determined whether the ANIMAL program would be distributed across the disk, was called VIRUS. Also, Joe Dellinger called his programs a virus, and this was probably what was first correctly labeled as a virus. Formal definitionThere is no generally accepted definition of a virus. In an academic environment, the term was used by Fred Cohen in his work “Experiments with Computer Viruses,” where he himself attributes the authorship of the term to Len Edleman. Formally, the virus is defined by Fred Cohen with reference to the Turing machine as follows: M: (S M , I M , O M: S M x I M > I M , N M: S M x I M > S M , D M: S M x I M > d) with a given set of states S M, a set of input symbols I M and mappings (O M, N M, D M), which based on its current state s ∈ S M and input character i ∈ I M, read from a semi-infinite tape, determines: the output symbol o ∈ I M to write to tape, the next state of the machine s" ∈ S M and movements along the tape d ∈ (-1,0,1). For this machine M, sequence of characters v: v i ∈ I M can be considered a virus if and only if the sequence is processed v at a point in time t, entails that at one of the following moments of time t, subsequence v′(not intersecting with v) exists on the tape, and this sequence v′ was recorded M at the point t′, lying between t And t″: ∀ C M ∀ t ∀ j: S M (t) = S M 0 ∧ P M (t) = j ∧ ( C M (t, j) … C M (t, j + |v| - 1)) = v ⇒ ∃ v" ∃ j" ∃ t" ∃ t": t< t" < t" ∧ {j" … j" +|v"|} ∩ {j … j + |v|} = ∅ ∧ { C M (t", j") … C M (t", j" + |v"| - 1)} = v" ∧ P M (t") ∈ { j" … j" + |v"| - 1 }
This definition was given in the context of the viral set VS = (M, V)- a pair consisting of a Turing machine M and many character sequences V: v, v" ∈ V. From this definition It follows that the concept of a virus is inextricably linked with its interpretation in a given context, or environment. It was shown by Fred Cohen that "any self-replicating sequence of symbols: singleton VS, according to which there are an infinite number VS, and not- VS, for which there are machines for which all sequences of characters are a virus, and machines for which no sequence of characters is a virus, makes it possible to understand when any finite sequence of characters is a virus for some machine.” He also provides evidence that in general the question of whether a given pair is (M, X) : X i ∈ I M virus, unsolvable (that is, there is no algorithm that could reliably identify all viruses), by the same means by which the unsolvability of the stopping problem is proven. Other researchers have proven that there are types of viruses (viruses containing a copy of a program that catches viruses) that cannot be accurately identified by any algorithm. ClassificationNowadays, there are many varieties of viruses, differing in the main method of distribution and functionality. If initially viruses were distributed on floppy disks and other media, now viruses spreading via the Internet dominate. The functionality of viruses, which they adopt from other types of programs, is also growing. Does not currently exist unified system classification and naming of viruses (although an attempt to create a standard was made at the CARO meeting in 1991). It is customary to separate viruses: Via the Internet, local networks and removable media. MechanismViruses spread by copying their body and ensuring its subsequent execution: introducing themselves into the executable code of other programs, replacing other programs, registering themselves in autorun, and more. A virus or its carrier can be not only programs containing machine code, but also any information containing automatically executed commands - for example, batch files and Microsoft Word and Excel documents containing macros. In addition, to penetrate a computer, a virus can use vulnerabilities in popular software (for example, Adobe Flash, Internet Explorer, Outlook), for which distributors inject it into ordinary data (pictures, texts, etc.) together with an exploit that uses vulnerability. Channels
|
Read: |
---|
New
- How to use Google Photos, overview of Google foto login functions
- Payment system Payza (ex-Alertpay) Payza login to your personal account
- How to open APK and how to edit?
- Review of the Alpha GT smartphone from Highscreen Packaging and delivery
- Official LG firmware via KDZ
- What is an SSD and how to install it?
- How to put an accent on a letter in Word
- How to convert images to PNG format?
- Technical problems and their solutions v
- Bioshock remastered won't start