Computer Viruses and Worms
Robert Slade, Vancouver Institute for Research into User Security, Canada
History of Computer Viruses and Worms
Is My Computer Infected? What Should I Do?
Trojan Horses, Viruses, Worms, RATs, and Other Beasts
Free Technology to Avoid Macro Viruses
The Start of E-Mail Viruses: Melissa
Worms (First and Third Generation)
String Search (Signature-Based)
Change Detection (Integrity Checking)
Activity Monitoring (Behavior-Based)
Prevention and Protection Techniques
INTRODUCTION
Computer viruses are unique among the many security problems in that the fact that someone else is infected increases the risk to you. However, viruses also seem to be surrounded by myths and misunderstandings. It is hoped this chapter will help to set the record straight.
History of Computer Viruses and Worms
Many claims have been made for the existence of viruses prior to the 1980s, but, so far, these claims have not been accompanied by proof. The Core Wars programming contests did involve self-replicating code, but usually within a structured and artificial ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.