Computer viruses are always nightmare for us. Some of them can wipe out all data stored in hard drive, slower our computer and even steal our important data. These viruses usually use internet to spread into its victims. Even though computer viruses have been around for many years, but until now there is no exact way to protect our device from virus, even if you have installed up-to-date antivirus software. Here we have the information about virus history for you.
Melissa
Melissa is pretty name but this virus created by David L. Smith on 1999. He created it based on Microsoft Word Macro. Melissa is type of virus that could spread through email. This virus replicates email and sends it anonymously to other 50 people in its victim contact list. For his dirty work, David was jailed for 20 months and the court fined him for $5.000 and forbade him to access computer without court authorization.
ILOVEYOU
ILOVEYOU is virus that came in form of worm which can replicate itself. This virus also uses email to spread. The email look not really suspicious, but the attachment is the real danger. ILOVEYOU virus replicates itself for many times and hid the copies on the hard drive of the victims. It also adds new files to victim’s registry keys and the worst is it downloaded a file called WIN-BUGSFIX.EXE and installs it without victim notice. It is not a software to fix bugs, but it is a password-stealing program that emailed victim`s secret data to the hacker.
The Klez Virus
The Klez virus debuted in 2001 and it leads to variation of virus which attack computers. Same like two viruses said earlier, The Klez virus also use email to spread it. Then once they are in, they duplicate itself and send emails contain same virus to people in victim`s contact list. Some of The Klez variation carried harmful programs that could make your computer inoperable. This virus can act as normal virus, worm or Trojan horse and could even poses as virus removal tool too.
Code Red and Code Red II
The Code Red and Code Red II worms happened in 2001. Both worms exploited the operating system vulnerability. The vulnerability was buffer overflow problem which means when your computer running this operating system, it will start to overwrite. The original Code Red worm initiated a distributed denial of service attack on the White House.