Home » Computers

Moths To Bugs, Bugs To Viruses What Next? Computer Viruses And Anti Virus Protection

Mar 4, 2008
A Historic Timeline of Computer Viruses

1945 A moth trapped between relays in a Naval computer was discovered to be the cause of the computer's problems. The naval commander then coined the terms "bug", to refer to problems with electrical devices and "debugging" to describe efforts to fix computer problems.

1949 A Hungarian scientist developed the theory of self-replicating programs.

1950-1970 A variety of electrical and computer related complications lead to the development of current viruses, including the unlawful tapping of telephone "blue boxes" to intercept calls and telephone numbers..

Also during this time a computer "worm" was designed by Xerox Palo Alto Research Center to search for systems that are not functioning. Designed to create more efficient computer processing and use, the "worm" became the ancestor to the current generation of destructive computer viruses.

1983 One of the most famous instances of computer hacking, young computer hackers broke into United States government computer systems with an Apple computer and modem.

That same year, a University of Southern California Ph.D candidate named a computer program that affects other programs by changing itself or the host program in some way as a "computer virus."

1986 The beginning of modern day world wide infections by computer viruses.

Examples include: Programmers in Pakistan releasing the first personal computer virus, titled "The Brain,"

1988 A worm designed by a 23 year old programmer invaded ARPANET (a division of the US Department of Defense) computers disabling 6000 of their computers.

1991 The release of PGP (Pretty Good Privacy) a free data encryption tool.

1991-2001 Many well known viruses were released such as:

"Melissa", which automatically and quickly sent replicas of it to email addresses contained in Microsoft Outlook;

"I Love You" which sent copies of passwords and usernames stored on personal computers back to the Philippine designer of this program;

The Anna Kournikova" virus; which was especially alarming to computer users and programmers alike as it was the beginning of the use of "toolkit" software that can assist just about anyone in creating a computer virus.

2001 The Code Red worm (affecting systems using Microsoft Windows NT and Windows 2000 server software); the "Nimda" virus, and The "Klez" worm which was designed to also disable many of the common anti virus software protection on the market at that time were released.

2002 "Root" servers, which are used to provide Internet communication, were affected by a virus causing the need for more protection of the Internet infrastructure.

2003 The "Slammer" worm caused damages to businesses world wide.

2004 The "MyDoom" worm was introduced a virus that attempts to trick people to open email attachments that contain the virus by making statements in the message or re: form.

Antivirus Software Development

Many companies and countries claim to have developed and released the very first anti virus software product.
1987 European Bernt Fix claims to have created an anti virus software

1988 The antivirus software Dr. Solomon's Anti-Virus Toolkit was released by Alan Solomon, of Great Britan.

1990's By this time there were approximately 19 anti virus software programs including the well-known Symantec's Norton Anti Virus software, ViruScan by McAfee; and IBM's Anti Virus.

1994 A Symantec takeover occurred allowing it to acquire many of the smaller anti virus software protection companies making it one of the largest anti virus software services available.

With the 1990's major corporations were being formed to develop and create anti virus software. During this time the prominent company of Kaspersky Labs was formed as well as the development of the Antiviral Toolkit Pro (AVP) anti-virus scanner system. International distribution and product support became paramount in combating computer viruses with the transmittal of information across the globe as well as the use of the internet. One other prominent anti virus venture during this time was the licensing agreement of AVP technologies and F Secure Anti Virus.

As a result several very well known providers of anti virus software protection were developed and still exist today including: ALWIL Software avast!, AntiVir PersonalEdition Classic, AVG Professional, eTrust EZ Armor Suite, F-Secure Anti-Virus, Kaspersky Anti-Virus, McAfee VirusScan, Norton AntiVirus, Panda Antivirus, and Trend PC-cillin.

With the development, growth and competition that this many prominent antivirus software programs to choose from each of them have tried to develop special functions and features such as customization of scan controls, blocking, parental controls, and advanced technology to make them stand out from the crowd.

In order to learn as much about viruses and to develop the best possible antivirus protection software developers study computer viruses to look for patterns in programming to better able them to detect familiar programming patterns that are used in many computer viruses and threats including spyware. Those antivirus software programs that are the most effective are active in their information gathering efforts and in catching threats before they hit your computer, as well as providing updates for detecting viruses on a regular basis. It is important that the antivirus software program that you choose also includes protection from threats embedded in images and email messages with all the communication we do via the internet and out computer.

Consumers should carefully research the products available and choose the combination of services and features that will be most beneficial to them and their family. Computer programmers are among some of the most creative and innovative minds in the world. As such we may never find a "cure" for computer viruses, but maybe we can find just the right "medicine" in the form of an efficient, cost effective and easy to operate antivirus software system to keep our personal computers and information safe.
About the Author
Lisa Carey is a contributing author for Identity Theft Secrets: prevention and protection. You can get tips on Identity theft protection, software, and monitoring your credit as well as learn more about the secrets used by identity thieves at the Identity Theft Secrets blog
Rating:
Please Rate:
(Average: Not rated)
Views: 320
Print Email Report Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources