Entry
Reader's guide
Entries A-Z
Subject index
Virus
The virus, a computer program designed to replicate and spread itself without the user's knowledge, has become a stock character in popular culture. In books and movies, computer viruses are the villains of the Internet Age, wreaking unimaginable havoc on computer systems and threatening the future of civilization. However, that popular portrayal is not very accurate. The majority of viruses are relatively harmless, and very few have the destructiveness of their fictional counterparts. But when a malicious virus does strike, it can cause significant damage.
When the first viruses appeared in 1986, their ability to inflict damage was relatively limited. Early viruses were designed to spread either by attaching themselves to an executable program file, such as a game or word processor, or by infecting the boot sector of a disk. At startup, and when disks are first inserted, computers read the disk's boot sector, and a virus can thus be transmitted before a computer's operating system has a chance to load and prevent the virus' transmission. Regardless of how these early viruses are spread, they were designed to affect files on a single computer. Most viruses were harmless, perhaps popping up a message on a particular day; but others would slowly or rapidly alter or delete files, and particularly vicious ones could wipe out an entire file system.
Early viruses could cause great damage to one computer on their own, but the virus had to have human help in order to spread. For the most part, this meant transmission via floppy disks. For example, a user might be typing up a document on a computer that had a virus. When that file was saved to a floppy disk, the boot sector of that floppy might get infected. Then, when that disk was inserted into the drive of another computer, and the boot sector was read, the new computer would pick up the virus. Or someone might create a game with a built-in virus; a user might put that game on a disk to share with a friend, and unknowingly share the virus as well.
The medium of email has become the biggest carrier of computer-virus infections. Boot-sector viruses are still transmitted by floppy disks, but most other viruses are spread via email attachments. The growth of email as a medium for communication has also led to a phenomenal growth in viruses. From December 1998 to October 1999, for example, the number of known viruses more than doubled, jumping from 20,500 to 42,000. In early 2001, there were over 52,000 known viruses.
Email has also helped foster several new types of malicious programs. A Trojan horse program is an executable file that does something that the user doesn't expect, such as deleting files, but it doesn't replicate itself. For a while, only executable files (programs) could spread viruses, so users could protect themselves by simply not running programs attached to email messages that they received. But with the invention of macro viruses, text documents could also be used to spread viruses. Macros are a series of commands that can be recorded in a word processor or spreadsheet and included in the document file. Since they are in essence small programs, they can be set up to delete files or otherwise damage a system. Most macro viruses target Microsoft's suite of office programs (Word, Excel, Outlook, and so on), since they are so widely used and the programming language of their macros is relatively basic.
...
- Art, Music, and Performance
- Business and Commerce
- http://Amazon.com
- http://MP3.com
- Business-to-Business
- Cookies
- Customer Relationship Management
- Digital Cash
- Disintermediation
- E-Commerce
- Harold Innis
- Internet Service Providers
- Jakob Nielsen
- Jeff Bezos
- Knowledge Management
- Local Area Network
- Margaret Whitman
- Metrics
- Napster
- Narrowcasting
- Personalization
- Peter Drucker
- Security
- Stephen M. Case
- Steven P. Jobs
- Telecommuting
- Trademark
- Video Conferencing
- William H. Gates, III
- Cyberculture
- “A Manifesto for Cyborgs”
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Allucquère Rosanne Stone
- Avatar
- Blog
- Bruce Sterling
- CommuniTree
- Convergence
- Cyberculture
- Cyberethics
- Cyberfeminism
- Cyberpunk
- Cyberspace
- Cyberwarfare
- Donna J. Haraway
- Electronic Civil Disobedience
- Electronic Democracy
- Electronic Frontier Foundation
- Emoticons
- Esther Dyson
- Gender and New Media
- Habitat
- Hacking, Cracking, and Phreaking
- Hacktivism
- Howard Rheingold
- Instant Messaging
- Interactvity
- John Perry Barlow
- Killer Application
- LambdaMOO
- Marshall McLuhan
- Meme
- Metrics
- Mitchell Kapor
- Nicholas Negroponte
- Online Journalism
- Peer-to-Peer
- Race and Ethnicity and New Media
- Sherry Turkle
- Virtual Community
- William Gibson
- Hacking
- 2600: The Hacker Quarterly
- The New Hacker's Dictionary
- CommuniTree
- Computer Emergency Response Team
- Copyleft
- Cyberculture
- Cyberethics
- Cyberwarfare
- DeCSS
- Electronic Civil Disobedience
- Electronic Frontier Foundation
- Encryption and Cryptography
- Eric Raymond
- Hacking, Cracking, and Phreaking
- Hacktivism
- John Perry Barlow
- Mitchell Kapor
- Richard Stallman
- Security
- Virus
- Legal Topics
- 2600: Hacker Quarterly
- Bernstein vs. the U.S. Department of State
- United States vs. Thomas
- Anonymity
- Carnivore
- Child Online Protection Act and Child Online Privacy Protection Act
- Communications Decency Act
- Copyleft
- Copyright
- DeCSS
- Digital Millennium Copyright Act
- Electronic Civil Disobedience
- Electronic Communications Privacy Act
- Electronic Frontier Foundation
- Hacking, Cracking, and Phreaking
- Linking
- Napster
- Obscenity
- Pamela Samuelson
- Privacy
- Security
- Networks and Networking
- ARPANET
- BITNET
- Broadband
- Browser
- Bulletin Board Systems
- Cellular Telephony
- CommuniTree
- Community Networking
- Distributed Computing
- Firewall
- Freenet (Community Network)
- Freenet (File-Sharing Network)
- Internet
- Internet Appliances
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Relay Chat
- Internet Service Providers
- LISTSERV
- Local Area Network
- Marc Andreessen
- Markup Languages
- Minitel
- MUDs and MOOs
- Napster
- Newsgroups
- Peer-to-Peer
- PLATO
- Satellite Networks
- Short Messaging System
- Telephony
- Tim Berners-Lee
- Usability
- vBNS
- Videotex
- Whole Earth ‘Lectronic Link’
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Open-Source Software
- Organizations and Labs
- Association for Computing Machinery
- Computer Emergency Response Team
- Electronic Frontier Foundation
- Institute of Electrical and Electronic Engineers
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Media Lab, Massachusetts Institute of Technology
- SIGGRAPH
- SRI International
- World Wide Web Consortium
- Xerox Palo Alto Research Center
- People
- Alan Kay
- Alan Turing
- Allucquère Rosanne Stone
- Anita Borg
- Bill Joy
- Brenda Laurel
- Brian Eno
- Bruce Sterling
- Claude Shannon
- Daniel Sandin
- Donna Hoffman
- Donna J. Haraway
- Douglas Englebart
- Edward Tufte
- Eric Raymond
- Esther Dyson
- George Lucas
- Hal Varian
- Hans Moravec
- Harold Innis
- Howard Rheingold
- Ivan Sutherland
- J. C. R. Licklider
- Jakob Nielsen
- Jaron Lanier
- Jeff Bezos
- John Carmack
- John Perry Barlow
- John von Neumann
- Kai Krause
- Laurie Anderson
- Lawrence Lessig
- Manuel Castells
- Marc Andreessen
- Margaret Whitman
- Marshall McLuhan
- Marvin Minsky
- Michael Joyce
- Mitchell Kapor
- Nam June Paik
- Nicholas Negroponte
- Pamela Samuelson
- Pattie Maes
- Peter Drucker
- Raymond Kurzweil
- Richard Stallman
- Robert Moog
- Rodney Brooks
- Seymour Papert
- Sherry Turkle
- Stephen M. Case
- Steven P. Jobs
- Stewart Brand
- Theodor Holm (Ted) Nelson
- Thomas DeFanti
- Tim Berners-Lee
- Vannevar Bush
- Vinton Cerf
- W. Daniel Hillis
- William Gibson
- William H. Gates, III
- Social Issues
- Access
- Anonymity
- Carnivore
- Cyberethics
- Cyberfeminism
- Cyberwarfare
- Digital Divide
- Disposal of Computers
- Education and Computers
- Electronic Civil Disobedience
- Electronic Democracy
- Encryption and Cryptography
- Gender and New Media
- Hacking, Cracking, and Phreaking
- Hacktivism
- Obscenity
- Patent
- Privacy
- Race and Ethnicity and New Media
- Security
- Spam
- Technological Determinism
- Universal Design
- Virtual Community
- Technology
- ARPANET
- Authoring Tools
- Bluetooth
- Broadband
- Browser
- Bulletin Board Systems
- Carnivore
- CAVE
- CD-R, CD-ROM, and DVD
- Cellular Telphony
- Chat
- Codec
- Compression
- Computer-Supported Collaborative Work
- Content Filtering
- Cookies
- DeCSS
- Desktop Video
- Digital Asset Management
- Digital Subscriber Line
- Digital Television
- Distributed Computing
- Emulation
- Encryption and Cryptography
- Expert Systems
- Firewall
- Flash
- Graphical User Interface
- Habitat
- Hypermedia
- Hypertext
- Instant Messaging
- Interactive Television
- Internet
- Internet Appliances
- Internet Relay Chart
- Java
- Linux
- Local Area Network
- Markup Languages
- MIDI
- Minitel
- MP3
- MPEG
- Object-Oriented Programming
- Optical Character Recognition
- Optical Computing and Networking
- Peer-to-Peer
- Personal Digital Assistants
- Photoshop
- Qube
- Robotics
- Satellite Networks
- Shockwave
- Short Messaging System
- Sketchpad
- Software Agents
- Streaming Media
- Telecommuting
- Telephony
- vBNS
- Videoconferencing
- Videotex
- Virus
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Writing
- “A Manifesto for Cyborgs”
- “As We May Think”
- “Man-Computer Symbiosis”
- “The Cathedral and the Bazaar”
- 2600: The Hacker Quarterly
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Bruce Sterling
- Cyberpunk
- Electronic Publishing
- Emoticons
- Hypertext
- Michael Joyce
- William Gibson
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches