-
4K
Point of Origin is unknown. Infected COM files and EXE files. First virus to use stealth tactics. Infected systems would freeze after September 22nd every year. The code was intended to display the message "Frodo lives", but also freezes when the computer freezes. Isolated some time in January of 1990. -
AIDS II
A varient of the first virus AIDS, also was a virus that displayed a message upon exicution. -
AIDS
Computer virus that made .com files exicute first and therefore corrupting them. When activated it displays the following image to the left. http://upload.wikimedia.org/wikipedia/en/d/d6/Aids_computer_virus.png -
Ada
Infects .COM and COMMAND.COM files. Memory resistant virus. Adds about 1,600 bytes to a file. Computers infected with it will have a slow clicking noise emitting from the speakers and a "Disk Full" error being displayed even when there is stil disk space. Isolated some time in October of 1990. -
Ah
Very buggy computer virus that infected COM files. Originated in Italy sometime in May of 1991. Systems infected would experience frequent freezes. The freezes occur so frequently that it is very easy to tell your system has caught Ah. Ah also activates every Tuesday. It was isolated sometime in may of 1991. -
Back Orifice
Designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. -
NetBus
Trojan that aparently wasn't meant to be harmful, but could be used to get int oand control another persons system. -
Sub7
Successor to NetBus. Used to gain unauthorized access to computers. -
Badtrans
Computer worm that Installed a keylogger; distributed logged information. -
Blaster
Computer worm that targeted toward Bill Gates; contained message "billy gates why do you make this possible ? Stop making money and fix your software!!". -
Beast
It is capable of infecting versions of Windows from 95 to XP. Written in Delphi and released first by its author Tataye in 2002, it became quite popular due to its unique features. -
Brontok
Computer worm that spread through an Indonesian e-mail headed with "stop the collapse in this country"; destroys firewalls. -
Zeus
While it is capable of being used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. -
Code Red
This worm allows hackers to hack your complete network from the location. The Heart Bleed virus allows hackers to steal data like credit card numbers, passwords, and other personal information. This worm is critical, it may crash your Operating system and also other devices (such as printer,scanner and tablet,magic jack,Camera) which are connected under the same network -
Melissa
Not originally intended as harmful, but crashed servers by flooding them with e-mail