To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Virdem was a file virus for MS-DOS. It was the first file virus.[1] It was written by Ralf Burger in 1986 as a demonstration program for Chaos Computer Club conference. The virus spreads by attaching to files with the .COM file extension. It is one of the oldest viruses for MS-DOS computers.[2]

In December 1986, Burger distributed the virus at the Chaos Computer Club conference in Hamburg, Germany.[3] The virus could copy itself and attach that copy to any .COM files. Virdem was fairly harmless as it announces its presence clearly.[failed verification][4]

Infection and symptoms

Virdem overwrites the host with its own code and save the original program at the very end. It was a direct-action virus and did not spread fast.[failed verification] It only infected files that had a COM extension.[5] When an infected file is run, the next uninfected program becomes infected.

When infected, small COM files, less than 11k, grows by 2559 bytes and larger files grow by 1336 bytes. Infected programs asks to guess a number between 0 and n where #[non sequitur] is the generation number of the virus plus one. If you guess correctly, the program runs if not, it returns to DOS.

Technical details

It doesn't intercept interrupt 24h so a write-protected disk will give an "Abort, Retry, Ignore" message. Read-only files are set to read/write, infected and then not set back to read-only. The virus had two NOP instructions at the beginning of the file.[6]

References

  1. ^ Bhargav, Abhay (2010-09-14). Secure Java: For Web Application Development. CRC Press. ISBN 978-1-4398-2356-9.
  2. ^ Skoudis, Ed; Zeltser, Lenny (2004). Malware: Fighting Malicious Code. Prentice Hall Professional. ISBN 978-0-13-101405-3.
  3. ^ Salomon, David (2010-08-05). Elements of Computer Security. Springer Science & Business Media. ISBN 978-0-85729-006-9.
  4. ^ Danesh, Arman; Lau, Felix; Mehrassa, Ali (2002). Safe and Secure: Secure Your Home Network, and Protect Your Privacy Online. Sams Publishing. ISBN 978-0-672-32243-3.
  5. ^ Szor, Peter (2005-02-03). The Art of Computer Virus Research and Defense. Pearson Education. ISBN 978-0-672-33390-3.
  6. ^ Solomon, Alan (2012-12-06). PC Viruses: Detection, Analysis and Cure. Springer Science & Business Media. ISBN 978-1-4471-1031-6.

External links

This page was last edited on 5 April 2024, at 02:14
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.