Tag Archives: viruses

The History of Computer Viruses

Computer viruses have a much longer history that most people would imagine. They predate the modern internet although the first viruses were purely technical excises in computer programing. It is not until the advent of large scale internet use that malicious computer viruses started to appear.

The basic theory that underpins most types of PC virus was outlined in John von Nueman’s scienfic paper published back in 1966. The work titled “The Theory of Self-Reproducing Automata”. Known as the last of great mathematicians von Nueman had also worked on the US nuclear program and instrumental in developing game theory.

This theory was not used until 1971 when the first ever virus was released across the ARPANET network. The virus called Creeper spread across the network and infected DEC PDP-10 computers. When a computer was infected it displayed a message reading “I’m the creeper catch me if you can.” The program was an experiment and the Reaper virus was released to clean up and remove the Creeper.

The first anonymous virus was the Wabbit released in 1974 a self-replicating program that lead to a computer crash. This was followed by ANIMAL in 1975. This virus was attached to a program called PERVADE and it reproduced itself in the background and spread across computers as the program was shared. Although ANIMAL was a non-malicious virus it exploited holes in the OS of the computer and left the name of the Animal selected by PERVADE in all the directories and files that the user had access too.

The Elk Cloner written by 15 year school student Rich Skrenta exploited issue with the Apple II boot system. The virus is widely viewed as the first large scale computer virus in the wild. In the wild referrers the fact that it was not contained with one lab or network.

The virus spread via the boot disk of the computer and every after every 50 infections of the boot disk it displayed a message in the form of a short poem. Skrenta who went onto a successful career in computer programming described Elk Cloner as dumb practical joke.

After the Elk Cloner infected Apple machine virus that infected IBM computers followed. The ARF-ARF virus arrived in 1983 and the Trojan horse wiped out the computers directory by offering to sort it into alphabetical order. Although the Pakistani Flu virus appeared in 1986 it was the following year that saw a rapid increase in the number of computer infections.

In 1987 the Vienna, Lehigh, Jerusalem, SCA and Christmas Tree Exec viruses all first appeared and attacked different aspects of computer operating systems. Other virus occurred in different locations around the globe. These included the Stoned virus in New Zealand, Ping Pong in Italy and the Cascade virus in the IBM offices in Belgium. This explosion in computer attacks resulted in IBM developing it’s own anti-virus software for the public. Before 1987 IBM’s anti-virus software had been for internal use only.

These early computer infections were only the start of the problems created by PC virus. The rate and seriousness of the infections after the end of the 1980’s has resulted in the creation of the computer security industry.

Tony Heywood ©2012

The History of Computer Viruses

Computer viruses have a much longer history that most people would imagine. They predate the modern internet although the first viruses were purely technical excises in computer programing. It is not until the advent of large scale internet use that malicious computer viruses started to appear.

The basic theory that underpins most types of PC virus was outlined in John von Nueman’s scienfic paper published back in 1966. The work titled “The Theory of Self-Reproducing Automata”. Known as the last of great mathematicians von Nueman had also worked on the US nuclear program and instrumental in developing game theory.

This theory was not used until 1971 when the first ever virus was released across the ARPANET network. The virus called Creeper spread across the network and infected DEC PDP-10 computers. When a computer was infected it displayed a message reading “I’m the creeper catch me if you can.” The program was an experiment and the Reaper virus was released to clean up and remove the Creeper.

The first anonymous virus was the Wabbit released in 1974 a self-replicating program that lead to a computer crash. This was followed by ANIMAL in 1975. This virus was attached to a program called PERVADE and it reproduced itself in the background and spread across computers as the program was shared. Although ANIMAL was a non-malicious virus it exploited holes in the OS of the computer and left the name of the Animal selected by PERVADE in all the directories and files that the user had access too.

The Elk Cloner written by 15 year school student Rich Skrenta exploited issue with the Apple II boot system. The virus is widely viewed as the first large scale computer virus in the wild. In the wild referrers the fact that it was not contained with one lab or network.

The virus spread via the boot disk of the computer and every after every 50 infections of the boot disk it displayed a message in the form of a short poem. Skrenta who went onto a successful career in computer programming described Elk Cloner as dumb practical joke.

After the Elk Cloner infected Apple machine virus that infected IBM computers followed. The ARF-ARF virus arrived in 1983 and the Trojan horse wiped out the computers directory by offering to sort it into alphabetical order. Although the Pakistani Flu virus appeared in 1986 it was the following year that saw a rapid increase in the number of computer infections.

In 1987 the Vienna, Lehigh, Jerusalem, SCA and Christmas Tree Exec viruses all first appeared and attacked different aspects of computer operating systems. Other virus occurred in different locations around the globe. These included the Stoned virus in New Zealand, Ping Pong in Italy and the Cascade virus in the IBM offices in Belgium. This explosion in computer attacks resulted in IBM developing it’s own anti-virus software for the public. Before 1987 IBM’s anti-virus software had been for internal use only.

These early computer infections were only the start of the problems created by PC virus. The rate and seriousness of the infections after the end of the 1980’s has resulted in the creation of the computer security industry.

Tony Heywood ©2012

What is Social2Search, and how it differs from other adware

What is Social2Search, and how it differs from other adware

Adware development is a very promising sector for hackers and other Internet scams. In recent years, the number of PC users is growing rapidly and so many people are working directly on the Internet, looking through hundreds of pages every day and visiting hundreds of websites. And if earlier from viruses and adware suffered mostly inexperienced users, but now they were joined by people that are working on the Internet. You have to agree, it’s pretty easy to miss the download of a file or accidentally click on a confirmation, if you are flipping websites uninteresting to you or answer the recurring questions all day. Every day the world becomes more and more PC users, and adware is becoming more efficient and more profitable. It infects computers, and starts to show ads in browsers until you delete it. But not every user is able to do it, and sometimes it takes several days or even weeks before the program is finally removed from the computer. During this time, the owner of the infected computer manages go to malicious links few dozens of times, which helps fraudsters to create traffic to third-grade websites, and bring them to the top of issuance. At the same time, adware manages to greatly clog the computer, and let a lot of other viruses to enter the system.

Those who are often faced with clogged computers, or those who have already been victims of viruses or adware, probably know such names as DNS Unlocker, Wajam, Albireo or Provider. These adware samples were the most intrusive, active and difficult to remove until recent time. Few months ago, the new program called Social2Search had appeared in the Web. It quickly settled on this, “market”, and is now ahead of all other competitors by all odds.

This program is so dangerous not because of its features, but because of its well-written description and user-friendly interface. These two factors work to lull the user’s vigilance, and convince him that Social2Search it a good program. According to the description, Social2Search is a special tool that interacts with such well-known social networking sites like Facebook and Twitter. The purpose of this interaction is to obtain information about the visits of your friends to various websites, and their “likes”, and show you this information. Those who install the program are not concerned that such actions aren’t suitable for everyone. In addition, the developers claim that Social2Search may adversely affect your computer, resisting the actions of other programs (obviously, anti-viruses), and that it is very difficult to remove.

Despite this, users are in a hurry to set Social2Search and to use its non-existent functions. For reference, any social network in the first place shows likes of your friends, and only then – all the rest. So, Social2Search deceit entices the user to install, does not perform the claimed function, prevents the user to use the Internet, and displays tons of ads on each page, and each new tab. The only way to stop this outrage is to remove Social2Search from your computer.

How to remove Social2Search

As I said earlier, Social2Search isn’t very tricky as a program. You can use the standard removal techniques to get rid of it. But, if the program had functioned on your PC for more than a day – you may face some difficulties. Anyway, there’s two ways to uninstall Social2Search: you can do it manually, or with help of AV software. Both ways are completely safe, and were tested many times with thousands of users, but there is one major difference: manual removal is one-off, and the protection of antivirus will last for a long time. So, it’s up to your decision. If you want to protect your PC from all kinds of adware and viruses for years – you should purchase the reputable anti-viral tool. We advise you to use Spyhunter, because it’s one of the most effective and low-price tools. It also has other impressive features, like 24/7 tech-support, wide and daily updated database, plain and friendly interface, low CPU usage. But, if you just want to remove Social2Search quickly and forget about all viruses and removal programs – just visit our main website and follow the instructions.