What are the top 10 computer viruses of all time?
Answers
Answered by
2
hey there!
top viruses of all time are following.....
#LOVEYOU.
The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it's not hard to see why. ...
Code Red.
Code Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. ...
Melissa. ...
Sasser. ...
Zeus. ...
Conficker. ...
Stuxnet. ...
Mydoom.
top viruses of all time are following.....
#LOVEYOU.
The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it's not hard to see why. ...
Code Red.
Code Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. ...
Melissa. ...
Sasser. ...
Zeus. ...
Conficker. ...
Stuxnet. ...
Mydoom.
Answered by
0
!!•••••••☆☆ ☆☆•••••••!!
☣️10 of the most prolific viruses of all time☣️
• Strom Worm ( also called Peacomm and Nuwar) - On January 19th, 2007, over 200 million e-mails included links to download the Storm Worm which help play a part in the overall attack. Most believe the worm gets its name from the fact that one of the e-mail messages carrying the virus had "230 dead as storm batters Europe" as its subject.
• Netsky and Sasser - Netsky spread via e-mail and Windows networks, creating large amounts of Internet traffic and causing Denial of Service (DoS) attacks. At the time, Netsky and all its variants were believed to have accounted for as many as 25 percent of all computer viruses on the Internet. Sasser replicated by finding other systems with vulnerabilities and forcing them to download the virus. Once it was on a new machine, it altered the operating system to make it difficult for users to shut down their computer.
• MyDoom - This worm was unique in that it had a timer of sorts. The virus started Denial of Service attacks, then stopped distributing itself 11 days later. These attacks were aimed at various Internet servers, including attacks against search engines, causing several of them to crash and others to return search results much slower than normal.
• Blaster Worm - This worm was unique in that once it got onto a network, it spread quicker because firewalls typically did not prevent internal machines from using a port the worm utilized. It was stopped by filtering by ISPs and public awareness.
• SQL Slammer - A prolific web server virus, the Slammer (also known as Sapphire) infected nearly half of the servers that help run the Internet 15 minutes after its initial attack.
• Nimda - Spreading through e-mail and Web pages, this worm targeted Internet servers, slowing Internet performance nearly to a halt. It also opened a backdoor to the computer's operating system, allowing a hacker access to the computer. However, access was limited by user account permissions.
• Code Red / Code Red II - These viruses exploited a vulnerability in Microsoft Windows 2000 and NT, causing a buffer overflow. Code Red initiated Denial of Service attacks against White House web servers, while Code Red II opened a backdoor for hackers to access Windows 2000 systems.
• Klez - This virus was unique in that hackers reproduced in many forms. It was also capable of spoofing; which helped spread the virus as recipients would think it was coming from a friend.
• ILOVEYOU - Traveled through e-mail as a message from a secret admirer. When users downloaded the attachment called WIN-BUGSFIX.EXE, the virus would copy and embed itself in key files; including Registry keys.
• Melissa - Once activated, the virus would replicate and then sends itself out to the first 50 people in the address book of the recipient
☆☆☆☆• Hope Help u •☆☆☆☆
☣️10 of the most prolific viruses of all time☣️
• Strom Worm ( also called Peacomm and Nuwar) - On January 19th, 2007, over 200 million e-mails included links to download the Storm Worm which help play a part in the overall attack. Most believe the worm gets its name from the fact that one of the e-mail messages carrying the virus had "230 dead as storm batters Europe" as its subject.
• Netsky and Sasser - Netsky spread via e-mail and Windows networks, creating large amounts of Internet traffic and causing Denial of Service (DoS) attacks. At the time, Netsky and all its variants were believed to have accounted for as many as 25 percent of all computer viruses on the Internet. Sasser replicated by finding other systems with vulnerabilities and forcing them to download the virus. Once it was on a new machine, it altered the operating system to make it difficult for users to shut down their computer.
• MyDoom - This worm was unique in that it had a timer of sorts. The virus started Denial of Service attacks, then stopped distributing itself 11 days later. These attacks were aimed at various Internet servers, including attacks against search engines, causing several of them to crash and others to return search results much slower than normal.
• Blaster Worm - This worm was unique in that once it got onto a network, it spread quicker because firewalls typically did not prevent internal machines from using a port the worm utilized. It was stopped by filtering by ISPs and public awareness.
• SQL Slammer - A prolific web server virus, the Slammer (also known as Sapphire) infected nearly half of the servers that help run the Internet 15 minutes after its initial attack.
• Nimda - Spreading through e-mail and Web pages, this worm targeted Internet servers, slowing Internet performance nearly to a halt. It also opened a backdoor to the computer's operating system, allowing a hacker access to the computer. However, access was limited by user account permissions.
• Code Red / Code Red II - These viruses exploited a vulnerability in Microsoft Windows 2000 and NT, causing a buffer overflow. Code Red initiated Denial of Service attacks against White House web servers, while Code Red II opened a backdoor for hackers to access Windows 2000 systems.
• Klez - This virus was unique in that hackers reproduced in many forms. It was also capable of spoofing; which helped spread the virus as recipients would think it was coming from a friend.
• ILOVEYOU - Traveled through e-mail as a message from a secret admirer. When users downloaded the attachment called WIN-BUGSFIX.EXE, the virus would copy and embed itself in key files; including Registry keys.
• Melissa - Once activated, the virus would replicate and then sends itself out to the first 50 people in the address book of the recipient
☆☆☆☆• Hope Help u •☆☆☆☆
Similar questions