<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://pm.haifa.ac.il/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=The_Most_Infamous_Computer_Trojans2076892</id>
		<title>The Most Infamous Computer Trojans2076892 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://pm.haifa.ac.il/index.php?action=history&amp;feed=atom&amp;title=The_Most_Infamous_Computer_Trojans2076892"/>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=The_Most_Infamous_Computer_Trojans2076892&amp;action=history"/>
		<updated>2026-04-12T18:57:18Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>https://pm.haifa.ac.il/index.php?title=The_Most_Infamous_Computer_Trojans2076892&amp;diff=159030&amp;oldid=prev</id>
		<title>MarcbcqkycyuhvHoppman:&amp;#32;Created page with 'Thinking about throwing out your laptop due to a crash of some type? Features a laptop aspect abruptly quit working appropriately? Is a system that used to run wonderful instantl…'</title>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=The_Most_Infamous_Computer_Trojans2076892&amp;diff=159030&amp;oldid=prev"/>
				<updated>2012-08-27T01:21:58Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#39;Thinking about throwing out your laptop due to a crash of some type? Features a laptop aspect abruptly quit working appropriately? Is a system that used to run wonderful instantl…&amp;#39;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Thinking about throwing out your laptop due to a crash of some type? Features a laptop aspect abruptly quit working appropriately? Is a system that used to run wonderful instantly going haywire?&lt;br /&gt;
&lt;br /&gt;
Before you chalk it up to hardware mistake like broken notebook factors, you've to first ensure that it is not really a disease attack of some type. While in the same way harrowing as a notebook portion breakdown, infections may be simply taken care of with a competent antivirus method.&lt;br /&gt;
&lt;br /&gt;
Needless to say, not totally all viruses are made equal; and while the viruses represented under have long since had countermeasures developed for them, at that time of the infestations, they were known tiny buggers.&lt;br /&gt;
&lt;br /&gt;
Listed here are the five worst of the ton.&lt;br /&gt;
&lt;br /&gt;
1. Melissa&lt;br /&gt;
&lt;br /&gt;
In 1999, a computer disease started dispersing like wildfire via email emails. Named &amp;quot;Melissa,&amp;quot; inventor David M. Cruz claimed he named it following a Florida spectacular ballerina. And in the same way that a dancer can draw you with a, the Melissa virus lured people to open these e-mails with the communication &amp;quot;Here is that file that you asked for, don't display it to everyone else.&amp;quot; Once exposed, the virus then replicates itself by seeking the top fifty people in the recipient's address book. &lt;br /&gt;
&lt;br /&gt;
For more information [http://improvecomputerperformance.jimdo.com/blog/ visit this page].&lt;br /&gt;
&lt;br /&gt;
2. I Enjoy You&lt;br /&gt;
&lt;br /&gt;
A year later, another heavy-hitter emerged, now from the Philippines. Among other things, it can backup itself several times and cover the replicants in various split up folders; incorporate fresh files to registry keys; exchange several critical program files with clones of itself; and down load a record called WIN-BUGSFIX.EXE (a password-stealing method) and work it.&lt;br /&gt;
&lt;br /&gt;
Three. Klez&lt;br /&gt;
&lt;br /&gt;
In 2001, per year after I Love You hit, a menacing one came out of the woodwork. Klez, when initialized, multiplied it self via a victim's opt-in list similar to Melissa, and made computer and laptop parts themselves to be inoperable. Before it was absolutely eradicated, its designers actually fine-tuned it to ensure that it'd be wise enough to copy the email tackle it was via.&lt;br /&gt;
&lt;br /&gt;
4. Rule Crimson and Code Crimson II&lt;br /&gt;
&lt;br /&gt;
Also in the same year as Klez, the Code Red and Code Red II worms appeared. These worms used a weakness in the development of the Windows 2000 and Windows NT systems. The weakness under consideration was the OSes' load flood challenge. This challenge occurs when a computer obtains more details compared to system's buffers could procedure and begins to overwrite surrounding storage.&lt;br /&gt;
&lt;br /&gt;
The first Code Red infamously mauled website hosts at the White House by implementing a Distributed Denial of Service (DDoS) assault. That strike induced every afflicted computer to get hold of the White House's hosts, therefore overloading them.&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Code Red II-infected computers were no longer operable by their owners since the malware designed a backdoor software in their computers' devices, letting a distant user to achieve get a grip on of these devices.&lt;br /&gt;
&lt;br /&gt;
5. Nimda&lt;br /&gt;
&lt;br /&gt;
However in 2001, a disease named Nimda (that's &amp;quot;admin&amp;quot; wrote backwards) spread through the entire internet. Nimda was famous for being the fastest-spreading malware subsequently, using just 22 minutes to get from initial release to the top list of reported episodes.&lt;br /&gt;
&lt;br /&gt;
Despite being able to infect house PCs as well, its principal goal was web machines, with the intention of decreasing these down somewhat. It journeyed through the web employing different approaches, perhaps not minimal of which was e-mail reproduction. This adeptness was what helped it to increase it self across 1000s of machines in history time. &lt;br /&gt;
&lt;br /&gt;
For more amazing info [http://registryerrorsnomore.blog.fc2.com/blog-entry-1.html go to this page].&lt;/div&gt;</summary>
		<author><name>MarcbcqkycyuhvHoppman</name></author>	</entry>

	</feed>