If you are computer user, you already made aware about the virus. This virus not only infects to your computer or mobile phone, but also it can damage to your server also. Actually they are developed to harm the computer by damaging programs, deleting files, or reformatting the hard drive. Therefore, in order to defeat this threat, there are virus guards created. Even you know about the virus, did you know the date this threat begin? Did you know the person who create this? Well, let’s look into the history of this…

The History of Virus

1949 – 1966 – Self-Reproducing Automata: In 1949, the “Self-replicating programs” were established and there were a large number of viruses produced by that. In 1966, John von Neumann, whose well-known to be the “Father of Cybernetics”, wrote an article of the “Theory of Self-Reproducing Automata”.

1971 – The Creeper; A self-replicating program was developed by Bob Thomas in 1971. And He entered into the ARPANET (The Advanced Research Projects Agency Network) and copied to a remote host systems with TENEX operating system. He copied self-replicating program. And then he kept a message as “I’m the creeper, catch me if you can!”.

1974 – Wabbit (Rabbit): It was the year that the infectious program was developed. And it made multiple copies of itself on a computer. It was clogging the system and reducing the performance of the computer.

1974 – 1975 – ANIMAL: For the UNIVAC 1108, John Walker developed a programme called ANIMAL. And this was known as a non-malicious Trojan also.

1981- Elk Cloner: For the Apple II Systems, Richard Skrenta developed a program called the “Elk Cloner”. And it started to spread through floppy disk.

1983 – Frederick Cohen coined the term computer VIRUS as the first time.

1986 – Brain: Two Pakistani programmers Basit Farooq Alvi, and his Amjad Farooq Alvi developed a virus called “Brain boot sector” for the IBM PC.

1987- Lehigh: IN order to infect files from Yale University, this virus was programmed.

Cascade: This is a self-encrypted file virus. And it was a result of IBM’s own antivirus product.

Jerusalem Virus: This virus was firstly detected the city of Jerusalem. To destroy all files in an infected computers on the thirteenth day, it was produced.

1990 – As the first time, Norton Antivirus Company launched this antivirus program which was called Symantec.

1995 – Concept: This was developed with targeting Microsoft Word documents.

1999 – Happy99: This virus targeted the emails which are mentioned with Happy New Year. The internet Explorer included Outlook Express and Windows 95/98, was attacked by that.

2000 – ILOVEYOU: This was able to delete the JPEGs, MP2 or MP3 files in the computer.

2001 – Anna Kournikova: This was spread via the emails, with an image of popular female tennis player.

2002 – LFM-926: This was developed by targeting Shockware Flash files.

Beast or RAT: This was known as backdoor Trojan horse. It was developed by targeting Windows OS. And it was highly spread.

2004 – MyDoom: This was spread through file and it was helpful to hackers to hack the computers.

2006 – OSX/Leap-A: This was the first virus which was produced to attack Mac OS.

Nyxem: This spread via mass-mailing. And it was capable to delete Microsoft Office files.

2007 – Storm Worm: This was a fast spreading email spamming threat. And it was able to attack millions of systems.

Zeus: This was one type of Trojan. And this was used to steal the login details of bank accounts.

2008 – Koobface: This was aimed to attack Facebook and MySpace.

2013 – Cryptolocker: This is also one type of Trojan. And it was infected machine and to unlock files.

2014 – Backoff: This was developed to attack the Point-of-Sale (POS) systems.

See, what a big history that virus has! And this will not be ended by here. The guys who are developing virus, are trying to attack to machines, files and many equipment and privacy information. So, best thing that we can do is install an antivirus to our computers/laptops and mobile phones.Virus

Leave a Reply

Your email address will not be published. Required fields are marked *