Situsku

Articles, News, Tips, Tutorials, and More...

Spyware History and Description

The first known use of the expression “spyware” occurred on October 17th, 1994 in a post that joked about Microsoft's business model. Spyware later came to allude to snoop equipment such as diminutive cameras. In early 2000, the man who started Zone Labs used the term in a press release for a new product. Since then, the computer-community has used the term in its current definition.

Spyware often comes wrapped-in with shareware or other software, and with music CDs. The user installs a program, for example, a file-trading utility or music program. The installer also installs the spyware. Even though the acceptable software itself may not do harm, the wrapped-in spyware does. Occasionally, spyware authors will pay shareware creators to wrap-in spyware with their software. An example is the Gator spyware distributed by Claria. There are instances when spyware authors will repackage desirable free software with destructive installers that add spyware.

Another way of propagating spyware is by tricking users. A program will manipulate a security feature that is supposed to prevent harmful installations. Internet Explorer is designed to stop websites from starting an unwanted download. Alternately, a user action must normally trigger a download (like clicking on a link). Nevertheless, links can prove misleading. For example, a pop-up may look like a normal Windows dialog box. The box contains wording like "Do you want to improve your Internet experience?" with links that look like real buttons reading No and Yes. It doesn’t matter which button the user selects, a malicious download will start, installing the spyware on the user's computer. Newer versions of Internet Explorer offer better security against this tactic.

Many unscrupulous spyware creators infect a computer by going after security weaknesses in the Web browser or in other applications on the targeted computer. When the user arrives at a Web site controlled by the spyware creator, the site includes code that forces the download and installation of spyware or infiltrates the browser. This kind of spyware creator will have broad knowledge of commercial-quality firewall and anti-virus programming. This is commonly known as a “drive-by download”. It leaves the user an unfortunate onlooker to the intrusion. Conventional "browser attacks" target security weaknesses in Microsoft Java Runtime and Internet Explorer.

Another problem in the case of some kinds of spyware programs is that they will replace the banner ads on visited web sites. Spyware that acts like a Browser Helper or web proxy can replace a site's own advertisements with advertisements that benefit the spyware author. This can seriously affect the revenue stream of advertising funded web sites.

There have been instances when a worm or virus has delivered a cargo of spyware. For example, some attackers used the W32.Spybot.Worm to set up spyware that caused pornographic ads to pop up on the screens of an infected system. By re-routing traffic to commercial sites that are set up to funnel funds to the spyware creators, they can profit even by such obviously illegal actions.

Read More...
AddThis Social Bookmark Button

Safe Sex VS Safer Sex

For a time, the use of condoms and other contraceptives was often referred to as "safe sex". It was thought that, as long as you used condoms along with another method of birth control, you were virtually immune from sexually transmitted diseases (STDs) and pregnancy. Nowadays, the only type of safe sex is no sex at all.

What is Safe Sex?

When people speak of "safe sex" today, they are referring to abstinence. Abstaining from sex and sexual play is the only sure method to avoid catching an STD and to prevent an unplanned pregnancy. Although it may not prevent a pregnancy, having sex within a committed, monogamous, long-term relationship with someone who has tested free of any STDs is also generally considered to be safe sex.

So why isn’t using condoms along with other forms of birth control known as "safe sex" anymore but as "safer sex" instead? Because contraceptives can fail, resulting in pregnancy, and condoms cannot provide protection against all forms of STDs. However, condoms are still the only and best protection we have against most STDs. Therefore, it is important to use them every time you have sex.

What’s the Big Deal About STDs Anyway?

While some sexually transmitted diseases, like chlamydia, can be cured, others cannot. HIV is one of the most serious STDs out there and women are one of the fastest growing groups being infected. Moreover, according to UNICEF, half of all new HIV cases worldwide occur in people between the ages of 15 and 24. So if you’re young and sexually active, you’re automatically at a higher risk of being infected with HIV. Although it can be managed through medication, the HIV virus does eventually develop into AIDS leading to death. Other incurable STDs include human papillomavirus (HPV), which is the cause of genital warts and can lead to cervical cancer and even death,hepatitis B and herpes.

Sexually transmitted diseases are dangerous for anyone but they can have especially severe consequences in women. Many STDs can seriously damage your reproductive organs causing you to be infertile. Some, like HPV, have been linked to an increased risk of cervical cancer, a type of cancer that men do not need to worry about. Additionally, if you have an STD while you are pregnant, it is possible to pass the infection on to your baby causing her to become sick or possibly even die.

If you are sexually active, it is imperative that you use condoms each and every time you have sex even though they cannot protect you from every STD. Latex or polyurethane condoms are the most effective at protecting against STDs. However, they cannot provide protection against infections that are transmitted through skin-to-skin contact. Additionally, condoms can break or fall off during sex, putting you at risk of catching an STD. While it was once thought that condoms treated with spermicide helped to kill off STD infections and viruses, current research suggests that spermicides have no such effect. In fact, using spermicides multiple times throughout the day has actually been shown to increase your risk of STDs because the chemicals can irritate your vaginal lining thereby making it easier for an infection to get into your system.

Talking with Your Partner

When you are considering becoming sexually active with someone, talk to them about their sexual history. Remember, when you have sex with someone, you are having sex with every person they have ever had sex with. It is a good idea for both of you to go get tested for STDs so that you can be sure you are both free of any infections. However, some STDs can take as long as six months before they begin to affect you. If your partner has had sex with someone else in the last six months, it is a good idea to either put off having sex or use condoms until he can be retested.

If your partner refuses to get tested or has no desire to talk about his sexual history, you may want to reconsider your choice to have intercourse with him. Never feel guilty for asking about his sexual past. Your health, as well as his, is on the line and you both have a right to know what you’re getting into. Never allow yourself to be pressured, coerced or bullied into a sexual relationship. Do not hesitate to say no. If a your partner forces you to have sex after you’ve said no, that is rape and should be reported to the authorities.

Signs of an STD
If you notice any of the following symptoms, make an appointment with your doctor or gynecologist right away to be tested for STDs:

* Vaginal itching
* Burning sensation when you urinate
* Unusual vaginal discharge
* Blisters around the genital area
* General pain in the pelvic area

Technorati Tags: ,
Source: epigee.org

Read More...
AddThis Social Bookmark Button

The History of Credit Cards

Credit Cards Replacing Paper Money
A credit card is a small piece of rectangular plastic that is no thicker than a sheet of paper, though it cannot be folded. Initially credit cards were metal tokens in the shape of coins, then they changed to metal plates to celluloid then fiber and now plastic with perhaps a photo of the holder and a magnetic strip on the reverse containing security information such as a personal identification number enabling the card to be used at money dispensing machines (ATM’s) and merchant establishments.

What is meant by ‘Credit’?
Credit is the system of buying some produce or service without having to pay for it at the time of the transaction. The payment is made at a pre-determined later date with the addition of a fee to the bill amount. This is like loaning someone money to buy something without actually giving them the cash but instead giving them the product they want to buy. So, the system of credit is not new to humanity in fact, it is as old as civilization itself or perhaps even older. The entrepreneurs of the inhuman kind have been proclaimed responsible for identifying human needs and wants as a rollicking business, and so they invented the credit card system. Though, disputed by many, The Diners Club is credited to be the ones to invent the credit card in 1950.

When Were Credit Cards Invented?
In contradiction to the theory that ‘The Diners Club’ started the credit card system, the Encyclopedia Britannica records the origin of credit cards www.onlinecreditcardsinfo.com in the United States as far back as the 1920’s. During this time firms such as oil companies and hotel chains started issuing credit cards to their regular and valued customers who were free to use their services and pay them at a later date. These cards were only useful for purchasing goods and services from the companies and establishments that issued the card. However, references to credit cards have been found as early as 1890 in Europe. It was only in the late 1930’s that companies started accepting each other’s credit cards and this is when things began to get complicated for accountants.

Computers Promoted The Use Of Credit Cards
In the beginning there were no computers to record the credit card transactions and the process of verifying the credit balance of the card was done manually through a regularly updated credit card directory, much like a telephone directory. This system was time consuming and tedious and provided many loop holes for credit card fraud. Today, with computerization, the use of a credit card is instantaneous. All one needs to do is to ‘swipe’ the card through a slot machine and the amount entered. If there is adequate balance in the account of the holder the transaction is completed and the customer billed a month later. Usually credit cards allow for a 50 day credit free period. If the outstanding bill is paid during this time the customer does not have to pay any interest on the transactions, else there is a whopping 2.9% charge per month on the bill amount.


Who Issues Credit Cards?
Banks and financial institutions are the main issuers and promoters of credit cards. The invention of the first bank-issued credit card is credited to John Biggins of the Flatbush National Bank of Brooklyn in New York. This was the year 1946 and Biggins did not know at the time that he had hit upon an idea that would take the world of credit by storm in times to come. From this first credit card called “Charge-It” many cards have flooded the market such as the all famous “American Express” credit card and the Diners credit card. The Bank of America issued the BankAmericard in 1958. This card is now known as the “VISA” card. Around the same time the popular MasterCard came into being. These are the two prevailing cards being used today. The era of plastic money had begun.
Technorati Tags:



Read More...
AddThis Social Bookmark Button

Internet vs Intranet

Many companies have adopted Internet protocols for their local-area networks; these `Internist' may or may not connect to the Internet. By restricting Intranet access to company personnel only, some of risks described below are decreased. You must keep in mind, however, that threats exist inside the company as well as outside; and normal computer security procedure and personnel screening are still necessary.


  • Word-wide access vs propiertary information. Unless your company is running a completely closed network, you must assume that anything published on the Web can and will be accessible to the world. The UNIX operating system that controls most network servers is insecure by design, and recent attempts to overlay protection have been only partially successful. Password and user authorisation schemes in Web pages stop the casual Web surfer, but they will not stop the CGI scripts and other programs that search the Internet for specific kinds of information. A recent trend toward dynamic Web pages (created only when the user passes the authorisation routine) provides some relief. In general, if your information is business sensitive, don't make it accessible on the Internet.

    Many companies use `firewalls' to protect their internal networks from unwanted external penetration. The firewall is a piece of software that intercepts all incoming and possibly outgoing transmissions. It accepts or rejects the transmission based on an approved list of Internet services. Many firewalls are programmed to allow all e-mail traffic through, but to reject FTP and Telnet requests. In effect, the company picks and chooses which Internet services to allow based on its business needs and risk tolerance. Like any piece of network software, a firewall can be defeated by clever hackers.
  • Security of transmitted responses. The growth of electronic commerce on the Internet has created a profusion of line catalogues, some allowing you to complete an electronic order form. When the form is transmitted back to the vendor, the data is not encrypted or protected to ensure provacy. Since the information may be transmitted through many network nodes, there is always the chance that it will be intercepted by an unintended receiver.

    Recent attempts to add encryption to the Internet have suffered from technical failure (as in the case of public key encryption schemes) and government resistance. such resistance is exemplified by the demand for a `Clipper' chip that allows law enforcement eavesdropping and export ban on the privately developed `Pretty Good Protection' encryption scheme (which was good enough to defeat government attempts to crack it!).

    With a few identification numbers, an individual can tap into extensive marketing databases and learn about someone else's financial and personal history. if they also have a credit card number, they can transact business in someone else's name and disappear. until encryption becomes the rule, it is inadvisable to ask for credit card numbers, social security numbers, and other personal information from your Web page. In addition to being a courtesy to your audience, it also protects your company from losses due to fraudulent electronic transactions and potential third-party liability for such disclosures.
  • Help systems vs. HTML. The simplicity, flexibility, and universality of HTML make it a strong candidate for use in building computer-based training (CBT) and help systems. HTML competes with existing authoring packages and help-file creation software, offering lower cost and potentially wider distribution while sacrificing some advanced features and the familiar `look and feel' of existing help systems. Companies that use the Internet or other wide-area networks to maintain communication among geographically diverse offices and companies that don't have an existing investment in other help systems or CBT technology may find the use of HTML and the Web particularly attractive.
    Technorati Tags:


  • Read More...
    AddThis Social Bookmark Button

    Microsoft: IE6 vs. IE7 vs. IE7 in Vista

    As in the case of the inhouse competition between Windows XP and Windows Vista, due to its prolonged support strategy, Microsoft is also one of its most fierce and stubborn competitors on the browser market.

    The XP vs. Vista race translates here into the face-off between Internet Explorer 6 and Internet Explorer 7. IE6 has become inherently associated with Windows XP SP2, while IE7 is delivered for XP SP2, Windows Server 2003 and Windows Vista. There was a time when Microsoft referred to the IE7 component on Vista together with a "+" label, but the practice has been dropped.

    IE7 was introduced in October 2006 for XP SP2 and in November, 2006 and January, 2007 with Windows Vista. Without a doubt, Internet Explorer 7 is, by all means, a superior product to its predecessor, starting with the graphical user interface and ending up with the security mitigations built into the pr
    oduct. And Microsoft has went ahead and compared the number of fixed vulnerabilities in IE6, IE7 and IE7 in Vista, for the first year on the market.

    "Microsoft shipped Internet Explorer 6 SP2 in August 2004 and in the three years since then has fixed a total of 79 vulnerabilities – 50 High / 24 Medium / 5 Low – or an average of about 2.1 per month. Microsoft shipped Internet Explorer 7 in October 2006 for Windows XP SP2 and in November 2006 as part of Windows Vista. In the nearly one year since release, Microsoft has fixed a total of 17 vulnerabilities in IE7 – 14 High / 3 Medium – or an average of about 1.4 per month. Only 14 of the vulnerabilities have affected the Vista release, so that rate is slightly lower," revealed Jeff Jones, Strategy Director in the Microsoft Security Technology Unit.

    Just take a look at the adjacent image in order to make an idea of the sheer volume of security flaws impacting the three versions of the browser. From Jones' IE vulnerability counting game it is clear that IE7 in Vista, and IE7 for that matter, is an apex of security for the Internet Explorer line-up of products. "The data indicates that the latest version of Internet Explorer has improved security in terms of fewer vulnerabilities than previous releases, with the Vista version being a bit better than the XP SP2 version," Jones added.

    source: news.softpedia.com

    Read More...
    AddThis Social Bookmark Button

    The History Of Computer Viruses

    A Bit of Archeology
    There are lots and lots of opinions on the date of birth of the first computer virus. I know for sure just that there were no viruses on the Babbidge machine, but the Univac 1108 and IBM 360/370 already had them ("Pervading Animal" and "Christmas tree"). Therefore the first virus was born in the very beginning of 1970s or even in the end of 1960s, although nobody was calling it a virus then. And with that consider the topic of the extinct fossil species closed.

    Journey's Start
    Let's talk of the latest history: "Brain", "Vienna", "Cascade", etc. Those who started using IBM PCs as far as in mid-80s might still remember the total epidemic of these viruses in 1987-1989. Letters were dropping from displays, crowds of users rushing towards monitor service people (unlike of these days, when hard disk drives die from old age but yet some unknown modern viruses are to blame). Their computers started playing a hymn called "Yankee Doodle", but by then people were already clever, and nobody tried to fix their speakers - very soon it became clear that this problem wasn't with the hardware, it was a virus, and not even a single one, more like a dozen.

    And so viruses started infecting files. The "Brain" virus and bouncing ball of the "Ping-pong" virus marked the victory of viruses over the boot sector. IBM PC users of course didn't like all that at all. And so there appeared antidotes. Which was the first? I don't know, there were many of them. Only few of them are still alive, and all of these anti-viruses did grow from single project up to the major software companies playing big roles on the software market.

    There is also an notable difference in conquering different countries by viruses. The first vastly spread virus in the West was a bootable one called "Brain", the "Vienna" and "Cascade" file viruses appeared later. Unlike that in East Europe and Russia file viruses came first followed by bootable ones a year later.
    Time went on, viruses multiplied. They all were all alike in a sense, tried to get to RAM, stuck to files and sectors, periodically killing files, diskettes and hard disks. One of the first "revelations" was the "Frodo.4096" virus, which is far as I know was the first invisible virus (Stealth). This virus intercepted INT 21h, and during DOS calls to the infected files it changed the information so that the file appeared to the user uninfected. But this was just an overhead over MS-DOS. In less than a year electronic bugs attacked the DOS kernel ("Beast.512" Stealth virus). The idea of in visibility continued to bear its fruits: in summer of 1991 there was a plague of "Dir_II". "Yeah!", said everyone who dug into it.

    But it was pretty easy to fight the Stealth ones: once you clean RAM, you may stop worrying and just search for the beast and cure it to your hearts content. Other, self encrypting viruses, sometimes appearing in software collections, were more troublesome. This is because to identify and delete them it was necessary to write special subroutines, debug them. But then nobody paid attention to it, until ... Until the new generation of viruses came, those called polymorphic viruses. These viruses use another approach to invisibility: they encrypt themselves (in most cases), and to decrypt themselves later they use commands which may and may not be repeated in different infected files.

    Polymorphism - Viral Mutation
    The first polymorphic virus called "Chameleon" became known in the early '90s, but the problem with polymorphic viruses became really serious only a year after that, in April 1991, with the worldwide epidemic of the polymorphic virus "Tequila" (as far as I know Russia was untouched by the epidemic; the first epidemic in Russia, caused by a polymorphic virus, happened as late as in 1994, in three years, the virus was called "Phantom1").

    The idea of self encrypting polymorphic viruses gained popularity and brought to life generators of polymorphic code - in early 1992 the famous "Dedicated" virus appears, based on the first known polymorphic generator MtE and the first in a series of MtE-viruses; shortly after that there appears the polymorphic generator itself. It is essentially an object module (OBJ file), and now to get a polymorphic mutant virus from a conventional non-encrypting virus it is sufficient to simply link their object modules together - the polymorphic OBJ file and the virus OBJ file. Now to create a real polymorphic virus one doesn't have to dwell on the code of his own encryptor/decryptor. He may now connect the polymorphic generator to his virus and call it from the code of the virus when desired.
    Luckily the first MtE-virus wasn't spread and did not cause epidemics. In their turn the anti-virus developers had sometime in store to prepare for the new attack.

    In just a year production of polymorphic viruses becomes a "trade", followed by their "avalanche" in 1993. Among the viruses coming to my collection the volume of polymorphic viruses increases. It seems that one of the main directions in this uneasy job of creating new viruses becomes creation and debugging of polymorphic mechanism, the authors of viruses compete not in creating the toughest virus but the toughest polymorphic mechanism instead.

    This is a partial list of the viruses that can be called 100 percent polymorphic (late 1993):
    Bootache, CivilWar (four versions), Crusher, Dudley, Fly, Freddy, Ginger, Grog, Haifa, Moctezuma (two versions), MVF, Necros, Nukehard, PcFly (three versions), Predator, Satanbug, Sandra, Shoker, Todor, Tremor, Trigger, Uruguay (eight versions).

    These viruses require special methods of detection, including emulation of the viruses executable code, mathematical algorithms of restoring parts of the code and data in virus etc. Ten more new viruses may be considered non-100 percent polymorphic (that is they do encrypt themselves but in decryption routine there always exist some nonchanging bytes):
    Basilisk, Daemaen, Invisible (two versions), Mirea (several versions), Rasek (three versions), Sarov, Scoundrel, Seat, Silly, Simulation.

    However to detect them and to restore the infected objects code decrypting is still required, because the length of nonchanging code in the decryption routine of those viruses is too small.

    Polymorphic generators are also being developed together with polymorphic viruses. Several new ones appear utilizing more complex methods of generating polymorphic code. They become widely spread over the bulletin board systems as archives containing object modules, documentation and examples of use. By the end of 1993 there are seven known generators of polymorphic code.
    They are:
    MTE 0.90 (Mutation Engine),
    TPE (Trident Polymorphic Engine), four versions
    NED (Nuke Encryption Device),
    DAME (Dark Angel's Multiple Encryptor)
    Since then every year brought several new polymorphic generators, so there is little sense in publishing the entire lists.

    Automating Production and Viral Construction Sets
    Laziness is the moving force of progress (to construct the wheel because that's too lazy to carry mammoths to the cave). This traditional wisdom needs no comments. But only in the middle of 1992 progress in the form of automating production touched the world of viruses. On the fifth of July 1992 the first viral code construction set for IBM PC compatibles called VCL (Virus Creation Laboratory) version 1.00 is declared for production and shipping.

    This set allows to generate well commented source texts of viruses in the form or assembly language texts, object modules and infected files themselves. VCL uses standard windowed interface. With the help of a menu system one can choose virus type, objects to infect (COM or/and EXE), presence or absence of self encryption, measures of protection from debugging, inside text strings, optional 10 additional effects etc. Viruses can use standard method of infecting a file by adding their body to the end of file, or replace files with their body destroying the original content of a file, or become companion viruses.

    And then it became much easier to do wrong: if you want somebody to have some computer trouble just run VCL and within 10 to 15 minutes you have 30-40 different viruses you may then run on computers of your enemies. A virus to every computer!
    The further the better. On the 27th of July the first version of PS-MPC (Phalcon/Skism Mass-Produced Code Generator). This set does not have windowed interface, it uses configuration file to generate viral source code. This file contains description of the virus: the type of infected files (COM or EXE); resident capabilities (unlike VCL, PS-MPC can also produce resident viruses); method of installing the resident copy of the virus; self encryption capabilities; the ability to infect COMMAND.COM and lots of other useful information.

    Another construction set G2 (Phalcon/Skism's G2 0.70 beta) has been created. It supported PS-MPC configuration files, however allowing much more options when coding the same functions.

    The version of G2 I have is dated the first of January 1993. Apparently the authors of G2 spent the New Year's Eve in front of their computers. They'd better have some champagne instead, this wouldn't hurt anyway.
    So in what way did the virus construction sets influence electronic wildlife? In my virus collection there are:

    * several hundreds of VCL and G2 based viruses;
    * over a thousand PS-MPC based viruses.


    So we have another tendency in development of computer viruses: the increasing number of "construction set" viruses; more unconcealably lazy people join the ranks of virus makers, downgrading a respectable and creative profession of creating viruses to a mundane rough trade.

    Outside DOS
    The year 1992 brought more than polymorphic viruses and virus construction sets. The end of the year saw the first virus for Windows, which thus opened a new page in the history of virus making. Being small (less than 1K in size) and absolutely harmless this non resident virus quite proficiently infected executables of new Windows format (NewEXE); a window into the world of Windows was opened with its appearance on the scene.

    After some time there appeared viruses for OS/2, and January 1996 brought the first Windows95 virus. Presently not a single week goes by without new viruses infecting non-DOS systems; possibly the problem of non-DOS viruses will soon become more important than the problem of DOS viruses. Most likely the process of changing priorities will resemble the process of DOS dying and new operating systems gaining strength together with their specific programs. As soon as all the existing software for DOS will be replaced by their Windows, Windows95 and OS/2 analogues, the problem of DOS viruses becomes nonexistent and purely theoretical for computer society.

    The first attempt to create a virus working in 386 protected mode was also made in 1993. It was a boot virus "PMBS" named after a text string in its body. After boot up from infected drive this virus switched to protected mode, made itself supervisor and then loaded DOS in virtual window mode V86. Luckily this virus was born dead - its second generation refused to propagate due to several errors in the code. Besides that the infected system "hanged" if some of the programs tried to reach outside the V86 mode, for example to determine the presence of extended memory.

    This unsuccessful attempt to create supervisor virus remained the only one up to spring of 1997, when one Moscow prodigy released "PM.Wanderer" - a quite successful implementation of a protected mode virus.

    It is unclear now whether those supervisor viruses might present a real problem for users and anti-virus program developers in the future. Most likely not because such viruses must "go to sleep" while new operating systems (Windows 3.xx, Windows95/NT, OS/2) are up and running, allowing for easy detection and killing of the virus. But a full-scale stealth supervisor virus may mean a lot of trouble for "pure" DOS users, because it is absolutely impossible to detect such a stealth virus under pure DOS.

    Macro Virus Epidemics

    August 1995. All the progressive humanity, The Microsoft and Bill Gates personally celebrate the release of a new operating system Windows95. With all that noise the message about a new virus using basically new methods of infection came virtually unnoticed. The virus infected Microsoft Word documents.

    Frankly it wasn't the first virus infecting Word documents. Earlier before anti-virus companies had the first experimental example of a virus on their hands, which copied itself from one document to another. However nobody paid serious attention to that not quite successful experiment. As a result virtually all the anti-virus companies appeared not ready to what came next - macro virus epidemics - and started to work out quick but inadequate steps in order to put an end to it. For example several companies almost simultaneously released documents- anti-viruses, acting along about the same lines as did the virus, but destroying it instead of propagation.

    By the way it became necessary to correct anti-virus literature in a hurry because earlier the question, "Is it possible to infect a computer by simply reading a file" had been answered by a definite "No way!" with lengthy proofs of that.

    As for the virus which by that time got its name, "Concept", continued its ride of victory over the planet. Having most probably been released in some division of Microsoft "Concept" ran over thousands if not millions of computers in no time it all. It's not unusual, because text exchange in the format of Microsoft Word became in fact one of the industry standards, and to get infected by the virus it is sufficient just to open the infected document, then all the documents edited by infected copy of Word became infected too. As a result having received an infected file over the Internet and opened it, the unsuspecting user became "infection peddler", and if his correspondence was made with the help of MS Word, it also became infected! Therefore the possibility of infecting MS Word multiplied by the speed of Internet became one of the most serious problems in all the history of existence of computer viruses.

    In less than a year, sometime in summer of 1996, there appeared the "Laroux" virus, infecting Microsoft Excel spreadsheets. As it had been with "Concept", these new virus was discovered almost simultaneously in several companies.
    The same 1996 witnessed the first macro virus construction sets, then in the beginning of 1997 came the first polymorphic macro viruses for MS Word and the first viruses for Microsoft Office97. The number of various macro viruses also increased steadily reaching several hundreds by the summer of 1997.
    Macro viruses, which have opened a new page in August 1995, using all the experience in virus making accumulated for almost 10 years of continuous work and enhancements, actually do present the biggest problem for modern virology.

    Chronology of Events
    It's time to give a more detailed description of events. Let's start from the very beginning.

    Late 1960s - early 1970s
    Periodically on the mainframes at that period of time there appeared programs called "the rabbit". These programs cloned themselves, occupied system resources, thus lowering the productivity of the system. Most probably "rabbits" did not copy themselves from system to system and were strictly local phenomena - mistakes or pranks by system programmers servicing these computers. The first incident which may be well called an epidemic of "a computer virus", happened on the Univax 1108 system. The virus called "Pervading Animal" merged itself to the end of executable files - virtually did the same thing as thousands of modern viruses do.

    The first half of 1970s
    "The Creeper" virus created under the Tenex operating system used global computer networks to spread itself. The virus was capable of entering a network by itself by modem and transfer a copy of itself to remote system. "The Reeper" anti-virus program was created to fight this virus, it was the first known anti-virus program.

    Early 1980s
    Computers become more and more popular. An increasing number of program appears written not by software companies but by private persons, moreover, these programs may be freely distributed and exchanged through general access servers - BBS. As a result there appears a huge number of miscellaneous "Trojan horses", programs, doing some kind of harm to the system when started.

    1981
    "Elk Cloner" bootable virus epidemics started on Apple II computers. The virus attached itself to the boot sector of diskettes to which there were calls. It showed itself in many ways - turned over the display, made text displays blink and showed various messages.

    1986
    The first IBM PC virus "Brain" pandemic began. This virus infecting 360 KB diskettes became spread over the world almost momentarily. The secret of a "success" like this late probably in total unpreparedness of computer society to such a phenomenon as computer virus.

    The virus was created in Pakistan by brothers Basit and Amjad Farooq Alvi. They left a text message inside the virus with their name, address and telephone number. According to the authors of the virus they were software vendors, and would like to know the extent of piracy in their country. Unfortunately their experiment left the borders of Pakistan.
    It is also interesting that the "Brain" virus was the first stealth virus, too - if there was an attempt to read the infected sector, the virus substituted it with a clean original one.

    Also in 1986 a programmer named Ralph Burger found out that a program can create copies of itself by adding its code to DOS executables. His first virus called "VirDem" was the demonstration of such a capability. This virus was announced in December 1986 at an underground computer forum, which consisted of hackers, specializing at that time on cracking VAX/VMS systems (Chaos Computer Club in Hamburg).

    1987
    "Vienna" virus appears. Ralph Burger, whom we already now, gets a copy of this virus, disassembles it, and publishes the result in his book "Computer Viruses: a High-tech Disease". Burger's book made the idea of writing viruses popular, explained how to do it, and therefore stimulated creating up hundreds and in thousands of computer viruses, in which some of the ideas from his book were implemented.

    Some more IBM PC viruses are being written independently in the same year. They are: "Lehigh", infecting the COMMAND.COM file only; "Suriv-1" a.k.a. "April1st", infecting COM files; "Suriv-2", infecting (for the first time ever) EXE files; and "Suriv-3", infecting both COM and EXE files. There also appear several boot viruses ("Yale" in USA, "Stoned" in New Zealand, "PingPong" in Italy), and the first self encrypting file virus "Cascade".
    Non-IBM computers are also not forgotten: several viruses for Apple Macintosh, Commodore Amiga and Atari ST have been detected.

    In December of 1987 there was the first total epidemics of a network virus called "Christmas Tree", written in REXX language and spreading itself under the VM/CMS operating environments. On the ninth of December this virus was introduced into the Bitnet network in one of West German universities, then via gateway it got into the European Academic Research Network (EARN) and then into the IBM Vnet. In four days (Dec. 13) the virus paralyzed the network, which was overflowing with copies of it (see the desk clerk example several pages earlier). On start-up the virus output an image of the Christmas tree and then sent copies of itself to all the network users whose addresses were in the corresponding system files NAMES and NETLOG.

    1988
    On Friday the 13 1988 several companies and universities in many countries of the world "got acquainted" with the "Jerusalem" virus. On that day the virus was destroying files which were attempted to be run. Probably this is one of the first MS-DOS viruses which caused a real pandemic, there were news about infected computers from Europe, America and the Middle East. Incidentally the virus got its name after one of the places it stroke - the Jerusalem University.

    "Jerusalem" together with several other viruses ("Cascade", "Stoned", "Vienna") infected thousands of computers still being unnoticed - anti-virus programs were not as common then as they are now, many users and even professionals did not believe in the existence of computer viruses. It is notable that in the same year the legendary computer guru Peter Norton announced that computer viruses did not exist. He declared them to be a myth of the same kind as alligators in New York sewers. Nevertheless this delusion did not prevent Symantec from starting its own anti-virus project Norton Anti-virus after some time.

    Notoriously false messages about new computer viruses started to appear, causing panic among the computer users. One of the first virus hoaxes of this kind belongs to a Mike RoChenle (pronounced very much like "Microchannel"), who uploaded a lot of messages to the BBS systems, describing the supposed virus copying itself from one BBS to another via modem using speed 2400 baud for that. Funny as it may seem many users gave up 2000 baud standard of that time and lowered the speed of their modems to 1200 baud. Similar hoaxes appeared even now. The most famous of them so far are GoodTimes and Aol4Free.

    November 1988: a total epidemic of a network virus of Morris (a.k.a. Internet Worm). This virus infected more than 6000 computer systems in USA (including NASA research Institute) and practically paralyzed their work. Because of erratic code of the virus it sent unlimited copies of itself to other network computers, like the "Christmas Tree" worm virus, and for that reason completely paralyzed all the network resources. Total losses caused by the Morris virus were estimated at 96 millions of dollars.
    This virus used errors in operating systems Unix for VAX and Sun Microsystems to propagate. Besides the errors in Unix the virus utilized several more original ideas, for example picking up user passwords. A more detailed story of this virus and the corresponding incidents may be found in a rather detailed and interesting articles.

    December 1988: the season of worm viruses continues this time in DECNet. Worm virus called HI.COM output and image of spruce and informed users that they should "stop computing and have a good time at home!!!"
    There also appeared new anti-virus programs for example, Doctors Solomon's Anti-virus Toolkit, being one of the most powerful anti-virus software presently.

    1989
    New viruses "Datacrime", "FuManchu" appear, as do the whole families like "Vacsina" and "Yankee". The first one acted extremely dangerously - from October 13th to December 31st it formatted hard disks. This virus "broke free" and caused total hysteria in the mass media in Holland and Great Britain.

    September 1989: 1 more anti-virus program begins shipping - IBM Anti-virus.

    October 1989: one more epidemic in DECNet, this time it was worm virus called "WANK Worm".

    December 1989: an incident with a "Trojan horse" called "AIDS". 20,000 copies were shipped on diskettes marked as "AIDS Information Diskette Version 2.0". After 90 boot-ups the "Trojan" program encrypted all the filenames on the disk, making them invisible (setting a "hidden" attribute) and left only one file readable - bill for $189 payable to the address P.O. Box 7, Panama. The author of this program was apprehended and sent to jail.

    One should note that in 1989 there began total epidemics of computer viruses in Russia, caused by the same "Cascade", "Jerusalem" and "Vienna", which besieged the computers of Russian users. Luckily Russian programmers pretty quickly discovered the principles of their work, and virtually immediately there appeared several domestic anti-viruses, and AVP (named "-V") those time, was one of them.

    My first acquaintance with viruses (this was the "Cascade" virus) replaced in the world 1989 when I found virus on my office computer. This particular fact influenced my decision to change careers and create anti-virus programs. In a month the second incident ("Vacsina" virus) was closed with a help of the first version of my anti-virus "-V" (minus-virus), several years later renamed to AVP - AntiViral Toolkit Pro. By the end of 1989 several dozens of viruses herded on Russian lands. They were in order of appearance: two versions of "Cascade", several "Vacsina" and "Yankee" viruses, "Jerusalem", "Vienna", "Eddie", "PingPong".

    1990
    This year brought several notable events. The first one was the appearance of the first polymorphic viruses "Chameleon" (a.k.a. "V2P1", "V2P2", and "V2P6"). Until then the anti-virus programs used "masks" - fragments of virus code - to look for viruses. After "Chameleon"'s appearance anti-virus program developers had to look for different methods of virus detection.

    The second event was the appearance of Bulgarian "virus production factory": enormous amounts of new viruses were created in Bulgaria. Disease wears the entire families of viruses "Murphy", "Nomenclatura", "Beast" (or "512", "Number-of-Beast"), the modifications of the "Eddie" virus etc. A certain Dark Avenger became extremely active, making several new viruses a year, utilizing fundamentally new algorithms of infecting and covering of the tracks in the system. It was also in Bulgaria that the first BBS opens, dedicated to exchange of virus code and information for virus makers.

    In July 1990 there was an incident with "PC Today" computer magazine (Great Britain). It contained a floppy disk infected with "DiskKiller" virus. More than 50,000 copies were sold.

    In the second half of 1990 there appeared two Stealth monsters - "Frodo" and "Whale". Both viruses utilized extremely complicated stealth algorithms; on top of that the 9KB "Whale" used several levels of encrypting and anti-debugging techniques.

    1991
    Computer virus population grows continuously, reaching several hundreds now. Anti-viruses also show increasing activity: two software monsters at once (Symantec and Central Point) issue their own anti-virus programs - Norton Anti-virus and Central Point Anti-virus. They are followed by less known anti-viruses from Xtree and Fifth Generation.

    In April a full-scale epidemic broke out, caused by file and boot polymorphic virus called "Tequila", and in September the same kind of story happened with "Amoeba" virus.

    Summer of 1991: "Dir_II" epidemic. It was a link virus using fundamentally new methods of infecting files.

    1992
    Non-IBM PC and non-MS-DOS viruses are virtually forgotten: "holes" in global access network are closed, errors corrected, and network worm viruses lost the ability to spread themselves. File-, boot- and file-boot viruses for the most widely spread operating system (MS-DOS) on the most popular computer model (IBM PC) are becoming more and more important. The number of viruses increases in geometrical to progression; various virus incidents happen almost every day. Miscellaneous anti-virus programs are being developed, dozens of books and several periodic magazines on anti-viruses are being printed. A few things stand out:

    Early 1992: the first polymorphic generator MtE, serving as a base for several polymorphic viruses which follow almost immediately. Mte was also the prototype for a few forthcoming polymorphic generators.

    March 1992: "Michelangelo" virus epidemics (a.k.a. "March6") and the following hysteria took place. Probably this is the first known case when anti-virus companies made fuss about this virus not to protect users from any kind of danger, but attract attention to their product, that is to create profits. One American anti-virus company actually announced that on the 6th of March the information on over five million computers will be destroyed. As a result of the fuss after that the profits of different anti-virus companies jumped several times; in reality only about 10,000 computers suffered from that virus.

    July 1992: The first virus construction sets were made, VCL and PS-MPC. They made large flow of new viruses even larger. They also stimulated virus makers to create other, more powerful, construction sets, as it was done by MtE in its area.

    Late 1992: The first Windows virus appears, infecting this OS's executables, and starts a new page in virus making.

    1993
    Virus makers are starting to do some serious damage: besides hundreds of mundane viruses which are no different than their counterparts, besides the whole polymorphic generators and construction sets, besides new electronic editions of virus makers there appear more and more viruses, using highly unusual ways of infecting files, introducing themselves into the system etc. The main examples are:

    "PMBS", wording in Intel 80386 protected mode.
    "Strange" (or "Hmm") - a "masterpiece" of Stealth technology, however fulfilled on the level of hardware interrupts INT 0Dh and INT 76h.
    "Shadowgard" and "Carbunkle", which widened debt range of algorithms of companion viruses.
    "Emmie", "Metallica", "Bomber", "Uruguay" and "Cruncher" - the use of fundamentally new techniques of "hiding" of its own code inside the infected files.
    In spring of 1993 Microsoft made its own anti-virus MSAV, based on CPAV by Central Point.

    1994
    The problem of CD viruses is getting more important. Having quickly gained popularity CD disks became one of the main means of spreading viruses. There are several simultaneous cases when a virus got to the master disk when preparing the batch CDs. As a result of that a fairly large number (tens of thousands) of infected CDs hit the market. Of course they cannot be cured, they just have to be destroyed.

    Early in the year in Great Britain there popped out two extremely complicated polymorphic viruses, "SMEG.Pathogen" and "SMEG.Queeg" (even now not all the anti-virus programs are able to give 100% correct detection of these viruses). Their author placed infected files to a BBS, causing real panic and fear of epidemics in mass media.

    Another wave of panic was created by a message about a supposed virus called "GoodTimes", spreading via the Internet and infecting a computer when receiving E-mail. No such virus really existed, but after some time there appeared a usual DOS virus containing text string "Good Times". It was called "GT-Spoof".

    Law enforcement increases its activities: in Summer of 1994 the author of SMEG was "sorted out" and arrested. Approximately at the same time also in Great Britain there was arrested an entire group of virus makers, who called themselves ARCV (Association for Really Cruel Viruses). Some time later one more author of viruses was arrested in Norway.

    There appear some new unusual enough viruses:
    January 1994: "Shifter" - the first virus infecting object modules (OBJ files). "Phantom1" - the cause of the first epidemic of polymorphic virus in Moscow.

    April 1994: "SrcVir" -- the virus family infecting program source code (C and Pascal).

    June 1994: "OneHalf" - one of the most popular viruses in Russia so far starts a total epidemics.

    September 1994: "3APA3A" - a boot-file virus epidemic. This virus uses a highly unusual way of incorporating into MS-DOS. No anti-virus was ready to meet such kind of a monster.

    In 1994 (Spring) one of the anti-virus leaders of that time - Central Point - ceased to exist, acquired by Symantec, which by that time managed to "swallow" several minor companies, working on anti- viruses - Peter Norton Computing, Cetus International and Fifth Generation Systems.

    1995
    Nothing in particular among DOS viruses happens, although there appear several complicated enough monster viruses like "NightFall", "Nostardamus", "Nutcracker", also some funny viruses like "bisexual" virus "RMNS" and BAT virus "Winstart". The "ByWay" and "DieHard2" viruses become widespread, with news about infected computers coming from all over the world.

    February 1995: an incident with Microsoft: Windows95 demos disks are infected by "Form". Copies of these disks were sent to beta testers by Microsoft; one of the testers was not that lazy and tested the disks for viruses.

    Spring 1995: two anti-virus companies - ESaSS (ThunderBYTE anti-virus) and Norman Data Defense (Norman Virus Control) announce their alliance. These companies, each making powerful enough anti- viruses, joined efforts and started working on a joint anti-virus system.

    August 1995: one of the turning points in the history of viruses and anti-viruses: there has actually appeared the first "alive" virus for Microsoft Word ("Concept"). In some month the virus "tripped around the world", pesting the computers of the MS Word users and becoming a firm No. 1 in statistic research held by various computer titles.

    1996
    January 1996: two notable events - the appearance of the first Windows95 virus ("Win95.Boza") and the epidemics of the extremely complicated polymorphic virus "Zhengxi" in St. Petersburg (Russia).

    March 1996: the first Windows 3.x virus epidemic. The name of the virus is "Win.Tentacle". This virus infected a computer network a hospital and in several other institutions in France. This event is especially interesting because this was the FIRST Windows virus on a spree. Before that time (as far as I know) all the Windows viruses had been living only in collections and electronic magazines of virus makers, only boot viruses, DOS viruses and macro viruses were known to ride free.

    June 1996: "OS2.AEP" - the first virus for OS/2, correctly infecting EXE files of this operating system. Earlier under OS/2 there existed only the viruses writing themselves instead of file, destroying it or acting as companions.

    July 1996: "Laroux" - the first virus for Microsoft Excel caught live (originally at the same time in two oil making companies in Alaska and in southern African Republic). The idea of "Laroux", like that of Microsoft Word viruses, was based on the presence of so-called macros (or Basic programs) in the files. Such programs can be included into both electronic spreadsheets of Microsoft Excel and Microsoft Word documents. As it turned out the Basic language built into Microsoft Excel also allows to create viruses.

    December 1996: "Win95.Punch" - the first "memory resident" virus for Windows95. It stays in the Windows memory as a VxD driver, hooks file access and infects Windows EXE files that are opened.

    In general the year 1996 is the start of widespread virus intervention into the Windows32 operating system (Windows95 and WindowsNT) and into the Microfoft Office applications. During this and the next year several dozens of Windows viruses and several hunsdreds of macro viruses appeared. Many of them used new technologies and methods of infection, including stealth and polymorphic abilities. That was the next round of virus evolution. During two years they repeated the way of improving similar to DOS viruses. Step by step they started to use the same features that DOS viruses did 10 years beforehand, but on next technological level.

    1997
    February 1997: "Linux.Bliss" - the first virus for Linux (a Unix clone). This way viruses occupied one more "biological" niche.

    February-April 1997: macro viruses migrated to Office97. The first of them turned out to be only "converted" to the format macro viruses for Microsoft Word 6/7, but also virtually immediately there appeared viruses aimed at Office97 documents exclusively.

    March 1997: "ShareFun" - macro-virus hitting Microsoft Word 6/7. It uses is not only standard features of Microsoft Word to propagate but also sends copies of itself via MS-Mail.

    April 1997: "Homer" - the first network worm virus, using File Transfer Protocol (FTP) for propagation.

    June 1997: There appears the first self encrypting virus for Windows95. This virus of Russian origin has been sent to several BBS is in Moscow which caused an epidemic.

    November 1997: The "Esperanto" virus. This is the first virus that intends to infect not only DOS and Windows32 executable files, but also spreads into the Mac OS (Macintosh). Fortunately, the virus is not able to spread cross the platforms because of bugs.

    December 1997: new virus type, the so-called "mIRC Worms", came into being. The most popular Windows Internet Relay Chat (IRC) utility known as mIRC proved to be "hole" allowing virus scripts to transmit themselves along the IRC-channels. The next IRC version blocked the hole and the mIRC Worms vanished.

    The KAMI ltd. anti-virus department has braked away from the mother company constituting the independent one what, certainly, is considered the main event of 1997. Currently the company known as Kaspersky Labs and proved to be a recognized leader of the anti-virus industry. Since 1994 the AntiViral Toolkit Pro (AVP) anti-virus scanner, main product of the company, constantly shows high results while being tested by various test laboratories of all world. Creation of an independent company gave the chance to the at first small group of developers to gain the lead on the domestic market and prominence on the world one. For short run versions for practically all popular platforms were developed and released, the new anti-virus solutions offered, the international distribution and the product support networks created.

    October 1997: the agreement on licensing of AVP technologies use in F-Secure Anti-Virus (FSAV) was signed. The F-Secure Anti-Virus (FSAV) package was the DataFellows (Finland) new anti-virus product. Before DataFellows was known as the F-PROT anti-virus package manufacturer.

    1997 was also the year of several scandals between the anti-virus main manufacturers in US and Europe. At the year beginning McAfee has announced that its experts have detected a "feature" in the antivirus programs of Dr.Solomon, one of its main competitors. The McAfee testimony stated that if the Dr.Solomon's antivirus while scanning detects several virus-types the program switches to the advanced scanning mode. What means that while scanning some uninfected computer the Dr.Solomon's anti-virus operates in the usual mode and switches to the advanced mode - "cheat mode" according to McAfee - enabling the application to detect the invisible for the usual mode viruses while testing virus collections. Consequently the Dr.Solomon's anti-virus shows both good speed while scanning uninfected disks and good virus detection ability while scanning virus collections.
    A bit later Dr.Solomon stroked back accusing McAfee of the incorrect advertising campaign. The claims were raised to the text - "The Number One Choice Worldwide. No Wonder The Doctor's Left Town". At the same time McAfee was in the court together with Trend Micro, another antivirus software manufacturer, concerning the Internet and e-mail data scanning technology patent violation. Symantec also turned out to be involved in the cause and accused McAfee of using the Symantec codes in the McAfee products. And etc.

    The year completion by one more noteworthy event related to McAfee-name was marked - McAfee Associates and Network General have declared consolidation into the new born Network Associates company and positioning of their services not only on the anti-virus protection software market, but also on the markets of computer safety universal systems, encryption and network administration. From this the virus and anti-virus history point McAfee would correspond to NAI.

    1998
    The virus attack on MS Windows, MS Office and the network applications does not weaken. There arose new viruses employing still more complex strokes while infecting computers and advanced methods of network-to-computer penetration. Besides numerous the so-called Trojans, stealing Internet access passwords, and several kinds of the latent administration utilities came into the computer world. Several incidents with the infected CDs were revealed - Some computer media publishers distributed CIH and Marburg (the Windows viruses) through CDs attached to the covers of their issues, with infected.

    The year beginning: Epidemic of the "Win32.HLLP.DeTroie" virus family, not just infecting Windows32 executed files but also capable to transmit to the "owner" the information on the computer that was infected, shocked the computer world. As the viruses used specific libraries attached only to the French version of Windows, the epidemic has affected just the French speaking countries.

    February 1998: One more virus type infecting the Excel tables "Excel4.Paix" (aka "Formula.Paix) was detected. This type of a macro virus while rooting into the Excel tables does not employ the usual for the kind of viruses macro area but formulas that proved to be capable of the self-reproduction code accommodation.

    February - March 1998: "Win95.HPS" and "Win95.Marburg" - the first polymorphous Windows32-viruses were detected and furthermore they were "in-the-wild". The anti-virus programs developers had nothing to do but rush to adjust the polymorphous viruses detecting technique, designed so far just for DOS-viruses, to the new conditions.

    March 1998: "AccessiV" - the first Microsoft Access virus was born. There was no any boom about that (as it was with "Word.Concept" and "Excel.Laroux" viruses) as the computer society already got used to that the MS Office applications go down thick and fast.

    March 1998: The "Cross" macro-virus, the first virus infecting two different MS Office applications - Access and Word, is detected. Hereupon several more viruses transferring their codes from one MS Office application to the other have emerged.

    May 1998 - The "RedTeam" virus infects Windows EXE-files and dispatches the infected files through Eudora e-mail.

    June 1998 - The "Win95.CIH" virus epidemic at the beginning was mass, then became global and then turned to a kind of computer holocaust - quantity of messages on computer networks and home personal computers infection came to the value of hundreds if not thousands pierces. The epidemic beginning was registered in Taiwan where some unknown hacker mailed the infected files to local Internet conferences. Therefrom virus has made the way to USA where through the staff oversight infected at once several popular Web servers that started to distribute infected game programs. Most likely these infected files on game servers brought about this computer holocaust that dominated the computer world all the year. According to the "popularity" ratings the virus pushed "Word.CAP" and "Excel.Laroux" to second cabin. One should also pay attention to the virus dangerous manifestation - depending on the current date the virus erased Flash BIOS what in some conditions could kill motherboard.

    August 1998: Nascence of the sensational "BackOrifice" ("Backdoor.BO") - utility of latent (hacker's) management of remote computers and networks. After "BackOrifice" some other similar programs - "NetBus", "Phase" and other - came into being.
    Also in August the first virus infecting the Java executed files - "Java.StangeBrew" - was born. The virus was not any danger to the Internet users as there was no way to employ critical for the virus replication functions on any remote computer. However it revealed that even the Web servers browsers could be attacked by viruses.

    November 1998: "VBScript.Rabbit" - The Internet expansion of computer parasites proceeded by three viruses infecting VisualBasic scripts (VBS files), which being actively used in Web pages development. As the logical consequence of VBScript-viruses the full value HTML-virus ("HTML.Internal") was born to life. Virus-writers obviously turned their efforts to the network applications and to the creation of full value Network Worm-Virus that could employ the MS Windows and Office options, infect remote computers and Web-servers or/and could aggressively replicate itself through e-mail.

    The anti-virus manufacturers world was also considerably rearranged. In May 1998 Symantec and IBM announced the union of their forces on the anti-virus market. The collective product would be under the Norton Anti-Virus trade mark distributed and the IBM Anti-Virus (IBMAV) program is liquidated. Response of the main competitors, Dr.Solomon and NAI (former McAfee), followed immediately. They issued the press-releases offering the IBM product users to promotionally replace the dead anti-virus with their own products.

    Less then one month later Dr.Solomon "committed suicide". The company was bought by NAI (former McAfee) for 640 millions US dollars through an equity swap. The event shocked the anti-virus world - the conflict between two anti-virus giants was completed with a simple bargain that killed one of the most notable and technologically strong anti-virus software manufacturers.

    What Will be Tomorrow?
    What can be expected from computer underground in subsequent years? Most probably the main problems will remain the following:

    1) polymorphic DOS viruses, with additional problems of polymorphism in macro viruses and viruses for Windows and maybe OS/2;
    2) macro viruses with new and improved ways of infecting and covering tracks of their code in the system;
    3) network viruses, using network protocols and commands for spreading.

    The type 3) is now only in the earliest state of developments - viruses make their first faint attempts to spread their code by themselves via Microsoft Mail and using FTP, but the best is yet to come.

    There may appear other problems who which might bring a lot of trouble to users and enough extra work to the developers of anti-virus programs. However I look to the future optimistically: every problem in the history of the development of viruses has been more or less successfully solved.

    Future problems, which are now just ideas in the sick minds of virus makers, will most probably be solved in the same way!

    Source: virus-scan-software.com 
    Technorati Tags:
     

    Read More...
    AddThis Social Bookmark Button

    How to Build Your Own SSD or RAID Array with just Four Compact Flash Memory Cards

    Solid-state drives (or SSDs) are becoming increasingly popular nowadays, due to the fact that they provide relatively high storage capacities, as well as a very high degree of reliability and shock-resistance, especially for mobile or portable applications. However, said storage solutions are generally quite expensive (after all, they're the latest innovations in the field of storage) and this is the reason why the people over at Addonics came up with a PCI adapter that can add as many as four Compact Flash (CF) cards to any system with RAID redundancy support,
    allowing for the development of a low-priced, yet very effective SSD device.

    The Addonics Quad CF PCI adapter (part number AD4CFPRJ) is the company's latest solution for creating a low cost large capacity SSD (solid state drive). The adapter fits into any PCI slot, either standard height or low profile and allows as many as four Compact Flash media of any capacity to be used like an ordinary hard drive.

    Moreover, the adapter includes built-in firmware, which allows the four CF cards to be configured as one large volume, four individual drives, or configured for redundancy with support for RAID 0 (Striped), RAID 1 (Mirrored) and RAID 10 (Mirrored Striped). With the increased capacity and lowering costs of flash media, replacing the hard drive with CF as a boot drive is now a viable alternative because CF offers lower power consumption and no moving parts. Moreover, the device supports not only CF Type I, but also the Type II and MicroDrive formats.

    Furthermore, the adapter supports UDMA, DMA and PIO hard drive modes and is compatible with the most popular operating systems on the market, including here DOS, Windows 98/ME, NT 4.0, 2000, XP, Vista and Linux kernel 2.4+ .

    The Addonics Quad CF PCI adapter - main components Enlarge picture Quite surprisingly, the Addonics Quad CF PCI adapter retails for just around 50 US dollars (obviously, no memory cards included), which makes it quite an affordable solution for most DIY computer enthusiasts out there, who will be able to build their own SSDs or RAID arrays for some pretty affordable prices.

    Source : softpedia.com
    Technorati Tags:


    Read More...
    AddThis Social Bookmark Button

    Windows XP SP3 Twice as Fast as Windows Vista – Leaves Vista SP1 in the Dust

    Forget about Windows Vista. And forget about Windows Vista SP1. Microsoft's latest Windows client has been quite sluggish to begin with. This in both consumer adoption and in terms of the performance it delivers.

    As the operating system was crawling along, while performing the most common of tasks, even "speed bumps" seemed an integer part of the road's landscape. Right, that was uncalled for... But still, even on its best day, Vista is slow, and the first service pack for the operating system will change nothing in this aspect. Windows XP SP3 simply flies in comparison to Vista, SP1 or no SP1.

    Benchmark testing delivered by the researchers at Devil Mountain Software, a software-developmentcompany based in Florida, revealed that Windows XP SP3 is twice as fast as Windows Vista, with or without SP1 installed. The company threw the two operating systems one against the other on the following configuration: Dell XPS M1710, 2GHz Core 2 Duo CPU, 1GB of RAM and nVidia GeForce Go 7900GS video. While Vista SP1 delivered minor and disappointing growth in performance, XP SP3 faired quite well. "Windows XP Service Pack 3 (v.3244) delivers a measurable performance boost to this aging desktop OS. Testing with OfficeBench showed an ~10% performance boost vs. the same configuration running under Windows XP w/Service Pack 2. XP SP3 is shaping-up to be a "must have" update for the majority of users who are still running Redmond's not-so-latest and greatest desktop OS. Of course, none of this bodes well for Vista, which is now more than 2x slower than the most current builds of its older sibling", revealed a member of Devil Mountain Sofware.

    Windows XP SP3 finished the OfficeBench test in approximately 35 seconds, XP SP2 went over 40 seconds with Vista RTM and Vista SP1 both exceeding 80 seconds. The company then added another GB of RAM. Moreover, they also tested Vista in tandem with Office 2007 instead of Office 2003. But while Vista dropped under the 80 seconds milestone it still doesn't even come close to the performance of XP. Commenting the benchmarking Microsoft explained that both Vista SP1 and XP SP3 are still under development and as such, not delivering a complete experience. Vista SP1 is currently planned for the first quarter of next year, while XP has been announced by mid 2008.

    "By providing Vista (SP1) with an additional 1GB of RAM (that's a total of 2GB for those of you keeping score) we managed to achieve a "whopping" 4% improvement in OfficeBench throughput. Moving from Office 2007 to Office 2003 definitely improved Vista's showing. Instead of being over 2x slower than XP on the same OfficeBench workload, Vista is now "only" 1.8x slower", the Devil Mountain Software added.

    source: news.softpedia.com
    Technorati Tags: ,

    Read More...
    AddThis Social Bookmark Button

    Google to Give Developers Access to Trends API

    Google will eventually give programmers access to an API for its Trends analysis tool.

    Google will eventually provide an open application programming interface for its Trends analysis tool, allowing users to embed the tool in their applications, or download data from the application for personal use, a company official said.

    Marissa Mayer, vice president of search products and user experience at Google, would not provide timelines for when the search vendor might open up the API for Trends, which tallies Google Web searches for the terms users enter relative to the total number of searches done on Google.

    However, she noted the company's fondness for APIs, as well as Trends users' requests to be able to put data culled from Trends in a spreadsheet and have the ability to manipulate it. For example, users might be able to create a spreadsheet comparing Trends data from present and previous years.

    "While I can't [give] particular dates for such a launch, I do believe that we will be making an API available so you can take the Trends product and embed it and use the data," Mayer said during a Web cast tutorial on the application Dec. 4.

    Were Google to open up Trends and allows users to download data, marketers could customize their own Trends analyses to detect new patterns, ideally to better target users with products and services.

    Google launched Trends in May 2006, and Mayer said Google uses it to improve its search quality.

    Trends presents users a search volume graph on a linear scale on top of a news-reference-volume graph displaying the number of times topics appeared in Google News stories.

    Trends also includes a feature called Hot Trends that lets users check the most searched terms for a that day. Clicking on a link in Hot Trends yields a number of nuggets of info, including when the search results for that term peaked and where, as well as news articles and blog posts about the topic.

    Users can also compare query volumes, and do cross-discipline analyses, by typing in multiple terms in the search trends box. Trends will conduct analyses only as far back as January 2004.

    source: eweek.com
    Technorati Tags: ,,


    Read More...
    AddThis Social Bookmark Button

    Check Out the Official Release Notes for Windows XP Service Pack 3

    Mind blowing! Simply mind blowing! Shocking! And last, but definitely not least, a true revelation. Microsoft has published the official release notes for Windows XP Service Pack 3, and, boy, are you in for a treat! I bet you didn't see this coming in the least.

    At this point in time, there are but scarce details available on the third and final service pack for XP. The Redmond company has postponed its release several times, taking it from 2006 as far back as the first half of 2008. The abstract launch dated sometime by mid 2008 is the sole aspect of XP SP3 that has officially been confirmed. But this is all about to change... Or is it?

    Just take a look at the official release notes for XP SP3, while, of course, keeping in mind that "this article discusses a beta release of a Microsoft product. The information in this article is provided as-is and is subject to change without notice," as the company has put it. And, of course, that by this point you have visited the link to the release notes for XP SP3 and have been disappointed by the extended level of transparency that Microsoft has offered on this service pack for XP.

    "No formal product support is available from Microsoft for this beta product. For information about how to obtain support for a beta release, see the documentation that is included with the beta product files, or check the Web location where you downloaded the release," Microsoft added. "No formal product support is available from Microsoft for this beta product. For information about how to obtain support for a beta release, see the documentation that is included with the beta product files, or check the Web location where you downloaded the release."

    And the Redmond company even manages to finish at an apex of user frustration, by revealing that "release notes are not available for the Windows XP SP3 beta release." Windows XP SP3 RC has been made available to all MSDN and TechNet subscribers on December 3.

    source: news.softpedia.com
    Technorati Tags: ,
     

    Read More...
    AddThis Social Bookmark Button

    Does Microsoft Actually Want Windows Vista SP1 to Be Pirated?

    Windows Vista Service Pack 1 is currently in its final stages of development in Redmond Utero, and heading for the first release candidate stage.

    Microsoft has even managed to promise that the general public would be able to get a taste of the service pack ahead of the first quarter of 2008, pointing to mid of December 2007, as the date of availability for a public build of Vista SP1 RC. At the same time, the Redmond company began discussing the modifications that the service pack would introduce in the activation infrastructure of the operating system. In this sense, Microsoft mentioned that it was evolving its anti-piracy strategy, in order to meet the ongoing threat posed by the phenomenon.

    Vista was made available in November 2006 and in January 2007, first to business customers and subsequently to the general public, bringing with it a new level of anti-piracy mitigations, such as Activation 2.0 and the Reduced Functionality Mode. Now, after a year since the operating system has been released to manufacturing, and just two months short of the celebration of the first month on the shelves, Microsoft claims that the piracy rate for Vista is half that of Windows XP. And at the same time, the Redmond company is making the illogical move of disabling Reduced Functionality Mode starting with the first service pack for the platform.

    "We want to ensure that through this program, we maintain a great customer experience, and to do so, we will go after pirates and counterfeit software in a way that minimizes any disruption to our genuine customers. We are committed to transparently communicate how the program operates so that our customers and all interested parties clearly understand what’s happening and why. We understand the importance of protecting user privacy and conduct the program in accordance with a clear privacy policy. We are committed to delivering WGA with accuracy by making it a priority in identifying counterfeit software and striving to meet the high standards customers and partners expect of Microsoft," revealed Mike Sievert, Corporate Vice President, Windows Product Marketing.

    Pirated copies of Windows Vista Service Pack 1, detected as non-genuine after failing the Windows Genuine Advantage validation, will deliver the same behavior as pirated copies of Windows XP. Namely, the users will be served "clear and recurring notices", informing them of the fact that Vista SP1 is non-genuine, but without any loss of access to features or of the functionality of the operating system. Net Applications credits Vista with over 9% of the operating system market, while Microsoft is boasting about having shipped in excess of 88 million copies of the platform to its channel partner. But, how desperate can Microsoft be to grow Vista's market share, if it will let its antipiracy guard down? And while we are on the same note... How can the Redmond company call the moving back to the "relaxed" antipiracy model of Windows XP, from that more strict in Vista, an evolution?

    "Finally, we are committed to providing great customer service and support. For those systems identified as non-genuine, we will provide resources to help individuals acquire genuine Windows Vista. These principles will continue to serve as the bar we measure ourselves against in evaluating our anti-piracy efforts and how these efforts evolve over time to meet the continued threat of piracy," Sievert added.
    Technorati Tags: ,
     

    Read More...
    AddThis Social Bookmark Button

    Linux's History

    Linux has a rich history. It is essential to understand Linux's history in order to understand the philosophy behind Linux's programming. This guide hopes to cover what Linux is really about, show you its history, why it was formed, and a brief description of its capabilities and how it operates.

    What is Linux?

    Linux is a freely distributed operating system that behaves like the Unix operating system. Linux was designed specifically for the PC platform and takes advantage of its design to give users comparable performance to high-end UNIX workstations. Many big-name companies have joined the Linux bandwagon such as IBM and Compaq, offering systems pre-installed with Linux. Also, many companies have started Linux packages, such as Red Hat, Corel, and Samba. However, they can only charge for services and documentation packaged with the Linux software. More and more businesses are using Linux as an efficient and more economical way to run their networks.

    Linux is a complete multitasking, multi-user operating system that behaves like UNIX in terms of kernel behavior and peripheral support. Linux has all the features of UNIX and boasts of its open source code and mainly free utilities.

    The Linux kernel was originally developed for the Intel 80386, which was developed with multitasking as one of its features. The kernel is the lowest-level core factor of the operating system. The kernel is the code that controls the interface between user programs and hardware devices, the scheduling of processes to achieve multitasking, and many other aspects of the system. The Linux kernel is a monolithic kernel; all the device drivers are part of the kernel proper. Despite the fact that most of Intel's CPUs are used with single-tasking MS-DOS, Linux makes good use of the advanced multitasking features built into the CPU's instruction set. Linux supports demand paging, which means that only the sections of a program that are necessary are read into RAM. Linux also offers support for copy-on-write, a process that if more than one copy of a particular application is loaded, all tasks can share the same memory. When large memory requirements are needed and only small amounts of physical RAM are available, Linux has another feature called swap space. Swap space allows pages of memory to be written to a reserved area of a disk and treated as an extension of physical memory. By moving pages between the swap space and RAM, Linux can, in effect, act as if it had much more physical RAM than it does, with the cost of some speed due to the hard drive's slower access. Linux also supports diverse file systems, as well as those compatible with DOS and OS/2. Linux's file system, ext2fs, is intended for best possible use of the disk.

    The History of Linux

    Linux is a freely distributable version of UNIX. UNIX is one of the most popular operating systems for networking worldwide because of its large support base and distribution. Linus Torvalds, who was then a student at the University of Helsinki in Finland, developed Linux in 1991. It was released for free on the Internet and generated the largest software-development phenomena of all time. Because of GNU software (GNU being an acronym for Gnu's Not UNIX) created by the Free Software Foundation, Linux has many utilities to offer. The Free Software Foundation offers royalty-free software to programmers and developers. From the very beginning, Linux has been entwined with GNU software. From 1991, Linux quickly developed on hackers' web pages as the alternative to Windows and the more expensive UNIX systems. When Red Hat released its commercial version of Linux packaged with tech support and documentation, the floodgates broke and the majority of the public became aware of Linux and its capabilities. Now more and more new users are willing to try Linux on their personal PCs and business users are willing to use Linux to run their networks. Linux has become the latest phenomenon to hit the PC software market.

    Linux is a unique operating system in that it is an active participant in the Open Source Software movement. Linux is legally covered by the GNU General Public License, also known as GPL. Open Source software is free but is not in the public domain. It is not shareware either. GPL allows people to take free software and distribute their own versions of the software. However, the vendors who sell free software cannot restrict the rights of users who purchase the software. In other words, users who buy GPL software can make copies of it and distribute it free of charge or for a fee. Also, distributors of GPL software must make it clear that the software is covered by the GPL and must provide the complete source code for the software at no cost. Linux embodies the Open Source model. Open source applies to software for which the source code is freely available for anyone to download, alter, and redistribute. Linux is the perfect operating system for hackers because they can freely download newer versions of the Linux kernel or other Linux utilities of the Internet and instantly change its source code to fix any software bugs found. That way, bugs can be fixed in a matter of hours as opposed to days and weeks. Beta testers and code debuggers are unorganized and spread throughout the world, but surprisingly, they have managed to quickly debug Linux software efficiently and cooperate online through the use of the Internet.


    Source: library.thinkquest.org
     
    Technorati Tags: ,


    Read More...
    AddThis Social Bookmark Button