Now talk about computer viruses, enough to make people talk about "poisonous" color change. The hard drive data is emptied, the network connection is cut off, and the good machine becomes a poison source and begins to infect other computers. In the midst of the virus, the nightmare begins. Although the function of anti-virus software is getting stronger and stronger, but the road is one foot high, the magic height is one foot, there will always be new and more powerful viruses, and the harm is getting bigger and bigger. Some reports show that in 2008 alone, The economic losses caused by computer viruses worldwide are as high as $8.5 billion. Computer viruses have been on the rivers and lakes for many years, dating back to the beginning of computer science, when someone came up with the basic principles of destroying computer systems. In 1949, scientists John & Bull; von & Bull; Neumann claimed that the process of self-replication is not a fantasy. But decades later, hackers began to really make the virus. Until the computer became popular, computer viruses caught the attention of people. Let's take a look at the top 20 computer viruses in global history. 1. Creeper (1971) The earliest computer virus Creeper (named after an image in the old cartoon "Scooby Doo") appeared in 1971, 42 years later. Of course, at that time, Creeper has not yet been called a virus because the computer virus does not yet exist. Creeper was written by BBN technology company programmer Robert & Bull; Robert Thomas, and spread from the company's DEC PDP-10 via ARPANET (predecessor of the Internet), showing "I am Creeper, have the ability to catch me!" (I'm the creeper, catch me if you can!)”. Creeper moves around the network, jumping from one system to another and self-replicating. But once you encounter another Creeper, log it out. 2. Elk Cloner virus (1982) Rich & Bull; Rich Skrenta made the world's first computer virus on an Apple computer. In 1982, Sklenta wrote a virus spread through a floppy disk, which he called "Elk Cloner", when the computer did not have a hard drive. The virus infects thousands of machines, but it is harmless: it just displays a poem on the user's screen, two of which are like this: "It will enter all your disks /it will Enter your chip. “3. Melissa (1999) The Melissa virus, made by David L. Smith, is a rapidly spreading macro virus that spreads as an attachment to e-mail, Melissa The title of a virus email is usually "This is the information you want, don't let anyone see it (Here is that document you asked for, don't show anybody else)". Once the recipient opens the email, the virus replicates itself and sends the same email to the top 50 friends in the user's address book. Because it sends out a large amount of mail to form a huge stream of email traffic, it can stop a business or other mail server program from running, even though the Melissa virus does not destroy files or other resources. It broke out on March 26, 1999 and infected 15%-20% of commercial computers. 4. I love you (2000) A year after the Melissa virus outbreak, a new virus appeared in the Philippines. Unlike Melissa, this time there was a worm, a separate program with self-replication capabilities. The name of this virus is called I love you. The love bug virus was originally spread by mail, and its destructiveness was much stronger than that of Melissa. The title usually states that this is a confession from your crush. The attachment in the mail is the culprit. The original file name for this worm was LOVE-LETTER-FOR-YOU.TXT.vbs. The suffix vbs indicates that the hacker is using the VB script to write this program. Many people suspect that the Philippines is O'Neill & Bull; Di & bull; Guzman made the virus. Since the Philippines did not have a law on computer damage at the time, the authorities only allowed him to be called in the name of theft. Eventually, due to insufficient evidence, the authorities were forced to release Guzman. According to media estimates, the love bug virus caused about $10 billion in losses.
How does the cheetah browser open the mouse gesture? Next, Xiaobian will explain the specific method
DNF86 red eye bloodthirsty 9 no contract brush map plus DNFTB4 red eye brush map plus points Raiders
For confidential documents that contain important information, in order to prevent others from touch
martial arts legendary swordsmanship talent martial arts match experience. In the game of Knights an
WeChat has no sound, how to solve it
How to quickly extract text from the screen
How to share the impression notes to your friends
System home teaches you how to use the homemade skin
Laptop Bluetooth icon is missing. Recover method
How to Record Video with KK Recorder KK Recorder Recording Video Tutorial
World of Warcraft 7.0 Legion Re-release version of the various professional changes introduced
Jian Wang 3 Li Bai and Chang Ge Men disciples dance spoof video
How to uninstall Rising Firewall Rising Firewall Uninstallation Tutorial
The role and use of my world mycelium
How to quickly find the specific location of the win8 system to install the theme file
Win8.1 system to create radar chart graphic tutorial in tabular data
How to clear the browser's plugin
Win10 system quickly switch to the desktop twice method
Configuring DNS for Internet Access in Win 2003
DNF male street fighter second sense skills introduction DNF male street fighter second sense video
Win10 preview version 10122 AMD GPU problem solving method
How to check if Trim function is enabled
Using Windows XP to achieve remote remote shutdown of the network