<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://pm.haifa.ac.il/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=Probably_The_Most_Known_Pc_Trojans5142468</id>
		<title>Probably The Most Known Pc Trojans5142468 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=Probably_The_Most_Known_Pc_Trojans5142468"/>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Known_Pc_Trojans5142468&amp;action=history"/>
		<updated>2026-04-26T06:04:51Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Known_Pc_Trojans5142468&amp;diff=159039&amp;oldid=prev</id>
		<title>RodneymqeamqotzjElbe:&amp;#32;Created page with 'Considering throwing out your laptop because of a failure of some type? Features a laptop part instantly stopped performing correctly? Is just a system that used to run fantastic…'</title>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=Probably_The_Most_Known_Pc_Trojans5142468&amp;diff=159039&amp;oldid=prev"/>
				<updated>2012-08-27T01:24:42Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#39;Considering throwing out your laptop because of a failure of some type? Features a laptop part instantly stopped performing correctly? Is just a system that used to run fantastic…&amp;#39;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Considering throwing out your laptop because of a failure of some type? Features a laptop part instantly stopped performing correctly? Is just a system that used to run fantastic instantly planning haywire?&lt;br /&gt;
&lt;br /&gt;
Before you chalk it around electronics problem like broken laptop pieces, you have to first be sure that it is not only a disease strike of some type. While just as harrowing as a notebook part crash, worms could be simply taken care of with a qualified antivirus system.&lt;br /&gt;
&lt;br /&gt;
Of course, not all viruses are manufactured equal; and as the viruses shown under have long since had countermeasures developed for them, at the time of their contaminations, they were famous tiny buggers.&lt;br /&gt;
&lt;br /&gt;
Listed below are the five worst of the ton.&lt;br /&gt;
&lt;br /&gt;
1. Melissa&lt;br /&gt;
&lt;br /&gt;
In 1999, a pc disease began spreading like wildfire via e-mail emails. Named &amp;quot;Melissa,&amp;quot; founder David L. Jones mentioned he called it after a Florida exotic ballerina. And in the same way that a ballerina may allure you with a, the Melissa virus enticed people to available these emails with the communication &amp;quot;Here is that doc that you called for, don't demonstrate it to anyone else.&amp;quot; Once popped, the virus subsequently replicates itself by going after the best fifty people in the recipient's address book. &lt;br /&gt;
&lt;br /&gt;
If you want to read more about this topic [http://keepyourcomputerhealthy.weebly.com/ check this out].&lt;br /&gt;
&lt;br /&gt;
2. I Really Like You&lt;br /&gt;
&lt;br /&gt;
Annually later, another heavy-hitter appeared, this time around from the Philippines. Among other things, it may duplicate itself several situations and hide the replicants in a variety of independent folders; put new files to registry keys; exchange several significant program files with duplicates of itself; and obtain a report called WIN-BUGSFIX.EXE (a password-stealing program) and run it.&lt;br /&gt;
&lt;br /&gt;
Three. Klez&lt;br /&gt;
&lt;br /&gt;
In 2001, per year after I Really Like You hit, an even more sinister one came out of the woodwork. Klez, when initialized, multiplied itself via a victim's opt-in list just like Melissa, and performed computer and laptop components themselves to be inoperable. Before it was entirely removed, its inventors perhaps fine-tuned it in order that it'd be intelligent enough to duplicate the e-mail tackle it was coming from.&lt;br /&gt;
&lt;br /&gt;
4. Signal Red and Rule Crimson II&lt;br /&gt;
&lt;br /&gt;
Additionally in the exact same year as Klez, the Code Red and Code Red II worms seemed. These infections exploited a weakness in the encoding of the Windows 2000 and Windows NT systems. The weakness in question was the OSes' stream flood challenge. This problem occurs whenever a pc receives more details compared to system's buffers may procedure and begins to overwrite adjacent ram.&lt;br /&gt;
&lt;br /&gt;
The first Code Red infamously assaulted internet hosts at the White House by implementing a Distributed Denial of Service (DDoS) strike. This assault triggered every contaminated computer to get hold of the White House's hosts, therefore overloading them.&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Code Red II-infected computers were no more operable by their owners because the disease developed a backdoor plan in their computers' devices, permitting a remote consumer to get get a handle on of the models.&lt;br /&gt;
&lt;br /&gt;
5. Nimda&lt;br /&gt;
&lt;br /&gt;
Still in 2001, a malware branded Nimda (that's &amp;quot;admin&amp;quot; spelled backwards) spread through the entire internet. Nimda was famous for being the fastest-spreading malware subsequently, acquiring simply 22 moments to obtain from preliminary launch to the very best set of claimed episodes.&lt;br /&gt;
&lt;br /&gt;
Despite to be able to invade house PCs as well, its major goal was net computers, with the intent of reducing these down dramatically. It journeyed through the net utilizing numerous approaches, perhaps not the least that was mail reproduction. That adeptness was what granted it to increase it self across tens of thousands of hosts in history time. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more about this subject [http://www.upsaid.com/fixingwindowserror/index.html?action=viewcom&amp;amp;id=3 check this out].&lt;/div&gt;</summary>
		<author><name>RodneymqeamqotzjElbe</name></author>	</entry>

	</feed>