<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://pm.haifa.ac.il/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=Probably_The_Most_Famous_Computer_Infections69555</id>
		<title>Probably The Most Famous Computer Infections69555 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=Probably_The_Most_Famous_Computer_Infections69555"/>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Famous_Computer_Infections69555&amp;action=history"/>
		<updated>2026-05-19T20:56:12Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Famous_Computer_Infections69555&amp;diff=158992&amp;oldid=prev</id>
		<title>JackebjpyjwblfGiannotti:&amp;#32;Created page with 'Considering throwing out your notebook as a result of crash of some sort? Has a laptop portion suddenly stopped performance effectively? Is just a software which used to run fant…'</title>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Famous_Computer_Infections69555&amp;diff=158992&amp;oldid=prev"/>
				<updated>2012-08-27T01:04:28Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#39;Considering throwing out your notebook as a result of crash of some sort? Has a laptop portion suddenly stopped performance effectively? Is just a software which used to run fant…&amp;#39;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Considering throwing out your notebook as a result of crash of some sort? Has a laptop portion suddenly stopped performance effectively? Is just a software which used to run fantastic suddenly going haywire?&lt;br /&gt;
&lt;br /&gt;
Before you chalk it as much as components problem like damaged laptop elements, you have to first make sure that it's not only a disease assault of some sort. While in the same way harrowing as a laptop element crash, worms could be simply taken care of with a qualified antivirus plan.&lt;br /&gt;
&lt;br /&gt;
Obviously, not totally all viruses are produced equal; and as the viruses portrayed below have long since had countermeasures developed for them, at the time of the contaminations, these were known little buggers.&lt;br /&gt;
&lt;br /&gt;
Here are the five toughest of the ton.&lt;br /&gt;
&lt;br /&gt;
1. Melissa&lt;br /&gt;
&lt;br /&gt;
In 1999, some type of computer virus began scattering like wildfire via mail communications. Termed &amp;quot;Melissa,&amp;quot; founder David R. Smith said he named it following a Florida incredible dancer. And in the same way that a ballerina can draw you with a, the Melissa virus enticed people to open these messages with the meaning &amp;quot;Here is that file that you asked for, don't show it to anyone else.&amp;quot; Once opened, the virus then replicates itself by pursuing the best fifty people in the recipient's address book. &lt;br /&gt;
&lt;br /&gt;
If you want to educate your more on this subject [http://keepyourcomputerhealthy.weebly.com/ go here]!&lt;br /&gt;
&lt;br /&gt;
2. I Enjoy You&lt;br /&gt;
&lt;br /&gt;
Per year later, another heavy-hitter emerged, this time around from the Philippines. Among other things, it might content itself several instances and disguise the replicants in various individual folders; add new files to registry keys; substitute several crucial program files with clones of itself; and down load a file called WIN-BUGSFIX.EXE (a password-stealing plan) and operate it.&lt;br /&gt;
&lt;br /&gt;
3. Klez&lt;br /&gt;
&lt;br /&gt;
In 2001, annually after I Enjoy You struck, an even more menacing one came out of the woodwork. Klez, when stimulated, multiplied it self via a victim's opt-in list similar to Melissa, and rendered pc and notebook elements themselves to be inoperable. Before it was entirely exterminated, its makers even fine-tuned it to ensure that it'd be intelligent enough to copy the email tackle it was coming from.&lt;br /&gt;
&lt;br /&gt;
4. Code Crimson and Rule Red TWO&lt;br /&gt;
&lt;br /&gt;
Additionally in the exact same year as Klez, the Code Red and Code Red II trojans appeared. These trojans milked a weakness in the programming of the Windows 2000 and Windows NT os's. The weakness involved was the OSes' stream flood dilemma. This issue happens when a computer obtains more info compared to the system's buffers may approach and begins to overwrite next ram.&lt;br /&gt;
&lt;br /&gt;
The initial Code Red infamously bombarded website hosts at the White House by utilizing a Distributed Denial of Service (DDoS) strike. This episode triggered every contaminated computer to make contact with the White House's hosts, thereby overloading them.&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Code Red II-infected computers were no more operable by their owners since the disease produced a backdoor method in their computers' methods, permitting a rural person to achieve get a grip on of the machines.&lt;br /&gt;
&lt;br /&gt;
5. Nimda&lt;br /&gt;
&lt;br /&gt;
However in 2001, a malware branded Nimda (that's &amp;quot;admin&amp;quot; wrote backwards) spread through the entire web. Nimda was known for being the fastest-spreading malware then, acquiring just 22 minutes to have from initial discharge to the most effective set of noted episodes.&lt;br /&gt;
&lt;br /&gt;
Despite to be able to taint household PCs as well, its main goal was web machines, with the objective of delaying these down somewhat. It gone through the net employing various methods, perhaps not the least which was email reproduction. That adeptness was what authorized it to grow itself across tens of thousands of computers in history time. &lt;br /&gt;
&lt;br /&gt;
If you want to educate your more on this subject [http://www.windowserrorsinfo.ewebsite.com/articles/blog.html visit this link].&lt;/div&gt;</summary>
		<author><name>JackebjpyjwblfGiannotti</name></author>	</entry>

	</feed>