Nimda

Nimda is one of the more complex virus/worm constructs released. It infects files, spreads itself via E-mail, spreads via Web sites, and spreads via … [Read more...]

Pretty Park

This is a combination beast: a worm, a password-stealing Trojan, and a backdoor. June 1999 it was active across Europe and another outbreak was noted … [Read more...]

Stages

An E-mail worm believed to be the first to use the scrap file format to spread. Before going further, let's first look at what a scrap file … [Read more...]

What Malware Does

I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is … [Read more...]

Denial-of-Service

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to … [Read more...]

Rewrite and Redirect

Most rewrite and redirect attacks are directed against the HOSTS file(s) on infected machines. The HOSTS file is used by an operating system (not just … [Read more...]

Buffer Overflow

A buffer is an area of computer memory set aside for data. Many buffers are fixed length. The proper procedure for inserting data into a buffer is to … [Read more...]

Botnet

Using Trojan Horse programs or worms/viruses, a person (often called a "botmaster" or "herder") can inject malware into a user's computer which opens … [Read more...]

Dr Solomon History

Narrative histories are available from several sources. The information in this section was provided by and used with permission of Dr. Solomon … [Read more...]

1986-1987 The Prologue

It all started in 1986. Basit and Amjad realised that the boot sector of a floppy diskette contained executable code, and this code is run whenever … [Read more...]