Malware (794226), страница 3
Текст из файла (страница 3)
The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.[citation needed]
With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.[citation needed]
Today, worms are most commonly written for the Windows OS, although a few like Mare-D[36] and the Lion worm[37] are also written for Linux and Unix systems. Worms today work in the same basic way as 1988's Internet Worm: they scan the network and use vulnerable computers to replicate. Because they need no human intervention, worms can spread with incredible speed. The SQL Slammer infected thousands of computers in a few minutes.[38]
Academic research
Main article: Malware research
The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.[39] John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability, self-obfuscation using rudimentary encryption, and others. His Doctoral dissertation was on the subject of computer viruses.[40]
See also
| Information technology portal |
| Computer security portal |
-
Browser hijacking
-
Category:Web security exploits
-
Comparison of antivirus software
-
Computer insecurity
-
Cyber spying
-
Identity theft
-
Industrial espionage
-
Malvertising
-
Riskware
-
Security in Web applications
-
Social engineering (security)
-
Targeted threat
-
Web server overload causes