Media Archaeology of Computer Viruses: Second Edition Digital Formations 44
Computer viruses have become an omnipresent threat in the digital age, infecting millions of computers worldwide and causing billions of dollars in damage. But what are computer viruses, and where do they come from? Media Archaeology of Computer Viruses: Second Edition Digital Formations 44 explores the cultural and historical impact of computer viruses, tracing their origins to the early days of computing and examining their evolution into sophisticated cyber weapons.
4.4 out of 5
Language | : | English |
File size | : | 6527 KB |
Text-to-Speech | : | Enabled |
Screen Reader | : | Supported |
Enhanced typesetting | : | Enabled |
Word Wise | : | Enabled |
Print length | : | 326 pages |
The book is divided into three parts. The first part, "Origins," explores the early history of computer viruses, from their humble beginnings as simple pranks to their development into more malicious and destructive forms. The second part, "Evolution," examines the evolution of computer viruses over time, from the early worms and Trojans to the more sophisticated viruses and malware of today. The third part, "Impact," examines the impact of computer viruses on society, from their role in cybercrime to their use as political weapons.
Media Archaeology of Computer Viruses is a fascinating and informative read for anyone interested in the history of technology, the rise of cybercrime, or the impact of digital technologies on society. The book is well-researched and engagingly written, and it provides a unique perspective on one of the most pressing threats facing the digital world today.
Origins
The earliest known computer virus was created in 1971 by Bob Thomas, a programmer at BBN Technologies. Thomas's virus was a simple program that infected other programs by attaching itself to them. Once infected, the virus would replicate itself and spread to other computers on the network.
In the early days, computer viruses were relatively harmless. They were mostly pranks, designed to annoy users and cause minor disruptions. However, as computers became more powerful and interconnected, viruses became more sophisticated and destructive.
In the 1980s, a new type of virus emerged, known as a worm. Worms were able to spread themselves across networks without the need for a host program. This made them much more difficult to contain and control.
In the 1990s, viruses began to be used for more malicious purposes. Hackers used viruses to steal data, damage systems, and extort money from victims.
Evolution
Over the years, computer viruses have evolved in a number of ways. They have become more sophisticated, more destructive, and more difficult to detect and remove.
One of the most significant developments in the evolution of computer viruses was the emergence of polymorphic viruses. Polymorphic viruses are able to change their own code, making them more difficult to detect and remove.
Another significant development was the emergence of stealth viruses. Stealth viruses are able to hide themselves from antivirus software, making them even more difficult to detect and remove.
In recent years, viruses have become increasingly weaponized. Hackers have used viruses to attack critical infrastructure, steal sensitive data, and disrupt economic activity.
Impact
Computer viruses have had a significant impact on society. They have caused billions of dollars in damage, disrupted businesses, and even threatened national security.
Viruses have been used to steal sensitive data, including financial information, medical records, and trade secrets.
Viruses have also been used to disrupt businesses. In 2000, the ILOVEYOU virus infected millions of computers worldwide, causing an estimated $10 billion in damage.
Viruses have even been used to threaten national security. In 2010, the Stuxnet virus was used to attack Iran's nuclear program.
Computer viruses are a serious threat to the digital world. They have the potential to cause significant damage, disrupt businesses, and even threaten national security.
It is important to be aware of the threat of computer viruses and to take steps to protect yourself from infection. You can protect yourself by keeping your software up to date, using antivirus software, and being careful about what you download from the internet.
By taking these steps, you can help to protect yourself from the threat of computer viruses.
References
- Cohen, F. (1984). Computer viruses: theory and experiments. Computers & Security, 3(1),22-35.
- Levy, S. (1994). Hackers: Heroes of the computer revolution. Penguin Books.
- Markoff, J. (2005). What virus writers want. New York Times, April 10, 2005.
- Meserve, P. (2011). The complete idiot's guide to computer viruses. Que Publishing.
- Norton, P. (2002). Fighting computer viruses. Symantec Press.
4.4 out of 5
Language | : | English |
File size | : | 6527 KB |
Text-to-Speech | : | Enabled |
Screen Reader | : | Supported |
Enhanced typesetting | : | Enabled |
Word Wise | : | Enabled |
Print length | : | 326 pages |
Do you want to contribute by writing guest posts on this blog?
Please contact us and send us a resume of previous articles that you have written.
- Best Book Source
- Ebook Universe
- Read Ebook Now
- Digital Book Hub
- Ebooks Online Stores
- Fiction
- Non Fiction
- Romance
- Mystery
- Thriller
- SciFi
- Fantasy
- Horror
- Biography
- Selfhelp
- Business
- History
- Classics
- Poetry
- Childrens
- Young Adult
- Educational
- Cooking
- Travel
- Lifestyle
- Spirituality
- Health
- Fitness
- Technology
- Science
- Arts
- Crafts
- DIY
- Gardening
- Petcare
- Simon Winchester
- Peter Penfold
- Katie Rose Guest Pryal
- Anjana Gupta
- Laura Shapiro
- Anil Kumar
- April A Bosworth
- Mario Cesare
- Andrew Havens
- Daniel Guyton
- Joan E Howard
- Douglass K Daniel
- Philip Greene
- William J Jorden
- Hc Hsu
- Peter Limb
- Kirk Douglas
- Graeme Currie
- Roch Carrier
- Pete Cohen
Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!
- Hank MitchellFollow ·16.7k
- Nikolai GogolFollow ·9.4k
- Jaylen MitchellFollow ·7.4k
- Guillermo BlairFollow ·11k
- Bill GrantFollow ·17.3k
- Jason ReedFollow ·14.4k
- Forrest BlairFollow ·14.8k
- Brennan BlairFollow ·15.7k
Chris Hogan: The Everyday Millionaire Who Shares His...
Chris Hogan is an Everyday Millionaire who...
The Comprehensive Guide to Compensation, Benefits &...
In today's...
Approving 55 Housing Facts That Matter
Housing, an essential aspect...
Unveiling the Enchanting Heritage of Royal Tours: A...
Canada, a land steeped in history...
4.4 out of 5
Language | : | English |
File size | : | 6527 KB |
Text-to-Speech | : | Enabled |
Screen Reader | : | Supported |
Enhanced typesetting | : | Enabled |
Word Wise | : | Enabled |
Print length | : | 326 pages |