Moths of Bugs, Bugs, viruses, What Next? Anti Virus Protection and computer viruses


A historical timeline of computer viruses

1945 A butterfly stuck between relay in a Naval computer was discovered to be the cause of computer problems. The Commander of the Navy was then coined the terms "bug" to describe the problems with the electrical devices and "debugging" to describe efforts to solve the problems of the computer.

1949 Hungarian scientist has developed the theory of self-replicating programs.

Computer and various 1950-1970 A electrical related complications lead to the development of current viruses, including the illegal phone tapping "blue horse" to intercept calls and phone numbers.

Also, during this time, "worm" was designed by Xerox Palo Alto Research Center to search for systems that do not work. Designed to create a more efficient processing and use, the "worm" became the ancestor of the current generation destructive computer viruses.

1983 One of the most famous instances of computer piracy, young computer hackers broke into computer systems of the Government of the United States with an Apple computer and the modem.

The same year, a Ph.d. from the University of Southern California's candidate named a computer program that affects the other programs changing itself or the host program as a "computer virus".

1986 Modern world wide early infection by computer viruses.

Here are some examples: programmers in Pakistan, releasing the first virus for personal computer, entitled "The Brain".

1988 A worm designed by a 23 year old programmer invaded computers ARPANET (a division of the Ministry of defence), deactivation of 6000 of their computers.

1991: The release of PGP (Pretty Good Privacy) a free data encryption tool.

1991-2001 Several known viruses have been released as: "melissa", quickly and automatically sent replicas of the addresses contained in Microsoft Outlook; e-mail "I love you" who sent copies of passwords and user names stored on personal computers, to the Filipino designer of this program Anna Kournikova "viruses"; that was particularly disturbing for users of computers and programmers alike, as that was the beginning of the use of the software "toolkit" almost all those that can assist in the creation of a computer virus.

2001 The Code Red worm (affecting systems using Microsoft Windows NT and Windows 2000 Server software); the "nimda" virus and worm "klez" which has been designed to also disable many of the common anti protection software antivirus on the market at this time were released.

Servers "Root" of 2002, which are used to provide an Internet communication, were infected by a virus causing the need for better protection of Internet infrastructure.

2003 The "slammer" worm caused damage to businesses world-wide.

2004 "Mydoom" worm introduced a virus that attempts to deceive people to open attachments that contain viruses by making statements in the message or re: form.

Development of antivirus software

Many businesses and Governments claim to have developed and published the first software product anti virus.

1987 European Bernt Fix claims to have created an anti anti-virus software

1988 Antivirus Dr Solomon Anti-Virus Toolkit software was released by Alan Solomon, great British.

1990s by this time there are approximately 19 anti software virus, including Norton Anti Virus of well-known Symantec software, McAfee VirusScan; and IBM Anti Virus.

1994. A redemption of Symantec occurred to acquire many small anti business protection software virus which makes it one of the major anti virus software services available.

In the 1990s companies were formed to develop and create anti anti-virus software. During this time, the distinguished company of kaspersky Labs was formed and the development of the anti-virus Antiviral Toolkit Pro (AVP) scanner system. International distribution and product support has become essential in the fight against computer viruses with the transmission of information across the world and the use of the internet. A prominent another anti virus venture during this period was the AVP and F Secure Anti Virus technology license agreement.

Thus, several very well known anti protection of antivirus software vendors have been developed and still exist today including: ALWIL Software avast!, AntiVir PersonalEdition Classic, professional AVG, eTrust EZ Armor Suite, F-Secure Anti-Virus, Kaspersky Anti-Virus, McAfee VirusScan, Norton AntiVirusPanda antivirusand Trend PC-cillin.

With the development, growth, and that it many software programs leading to choose each antivirus attempted to develop special functions and features such as scanning competition customization controls, blocking, parental control and advanced technology to make them stand out from the crowd.

To learn more about viruses and develop the best possible antivirue protection software developers are studying computer viruses to seek models of programming to better power them to detect patterns of familiar programs that are used in many computer viruses and threatsincluding spyware. These anti-virus software that are the most effective are active in their efforts to gathering information and by catching threats before you touch your computer, and updates for viruses on a regular basis. It is important that the software program antivirus you choose also includes protection against threats embedded in images and messages of e-mail with any communication we do on the internet and on the computer.

Consumers should carefully research the products available and choose the combination of services and functions that will be more beneficial for them and their families. Computer programmers are among some of the most creative and innovative minds in the world. So we can never find a "cure" of computer viruses, but perhaps we can find just the right "medicine" in the form of an efficient, cost-effective and easy to use antivirus software system to ensure the security of our personal computers and information.








Lisa Carey is an author who contributes to the Secrets of identity theft: prevention and protection. You can get advice on protection against identity theft, software, and the monitoring of your credit and learn more about the secrets used by the blog of Secrets of identity theftidentity thieves