NewIntroducing our newest literary treasure! Explore a world of stories with our groundbreaking book innovation. Get ready to be amazed! Check it out

Write Sign In
Nick SucreNick Sucre
Write
Sign In
Member-only story

Media Archaeology of Computer Viruses: Second Edition Digital Formations 44

Jese Leos
·4k Followers· Follow
Published in Digital Contagions: A Media Archaeology Of Computer Viruses Second Edition (Digital Formations 44)
5 min read ·
510 View Claps
43 Respond
Save
Listen
Share

Computer viruses have become an omnipresent threat in the digital age, infecting millions of computers worldwide and causing billions of dollars in damage. But what are computer viruses, and where do they come from? Media Archaeology of Computer Viruses: Second Edition Digital Formations 44 explores the cultural and historical impact of computer viruses, tracing their origins to the early days of computing and examining their evolution into sophisticated cyber weapons.

Digital Contagions: A Media Archaeology of Computer Viruses Second Edition (Digital Formations 44)
Digital Contagions: A Media Archaeology of Computer Viruses, Second Edition (Digital Formations Book 44)
by Jussi Parikka

4.4 out of 5

Language : English
File size : 6527 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Word Wise : Enabled
Print length : 326 pages

The book is divided into three parts. The first part, "Origins," explores the early history of computer viruses, from their humble beginnings as simple pranks to their development into more malicious and destructive forms. The second part, "Evolution," examines the evolution of computer viruses over time, from the early worms and Trojans to the more sophisticated viruses and malware of today. The third part, "Impact," examines the impact of computer viruses on society, from their role in cybercrime to their use as political weapons.

Media Archaeology of Computer Viruses is a fascinating and informative read for anyone interested in the history of technology, the rise of cybercrime, or the impact of digital technologies on society. The book is well-researched and engagingly written, and it provides a unique perspective on one of the most pressing threats facing the digital world today.

Origins

The earliest known computer virus was created in 1971 by Bob Thomas, a programmer at BBN Technologies. Thomas's virus was a simple program that infected other programs by attaching itself to them. Once infected, the virus would replicate itself and spread to other computers on the network.

In the early days, computer viruses were relatively harmless. They were mostly pranks, designed to annoy users and cause minor disruptions. However, as computers became more powerful and interconnected, viruses became more sophisticated and destructive.

In the 1980s, a new type of virus emerged, known as a worm. Worms were able to spread themselves across networks without the need for a host program. This made them much more difficult to contain and control.

In the 1990s, viruses began to be used for more malicious purposes. Hackers used viruses to steal data, damage systems, and extort money from victims.

Evolution

Over the years, computer viruses have evolved in a number of ways. They have become more sophisticated, more destructive, and more difficult to detect and remove.

One of the most significant developments in the evolution of computer viruses was the emergence of polymorphic viruses. Polymorphic viruses are able to change their own code, making them more difficult to detect and remove.

Another significant development was the emergence of stealth viruses. Stealth viruses are able to hide themselves from antivirus software, making them even more difficult to detect and remove.

In recent years, viruses have become increasingly weaponized. Hackers have used viruses to attack critical infrastructure, steal sensitive data, and disrupt economic activity.

Impact

Computer viruses have had a significant impact on society. They have caused billions of dollars in damage, disrupted businesses, and even threatened national security.

Viruses have been used to steal sensitive data, including financial information, medical records, and trade secrets.

Viruses have also been used to disrupt businesses. In 2000, the ILOVEYOU virus infected millions of computers worldwide, causing an estimated $10 billion in damage.

Viruses have even been used to threaten national security. In 2010, the Stuxnet virus was used to attack Iran's nuclear program.

Computer viruses are a serious threat to the digital world. They have the potential to cause significant damage, disrupt businesses, and even threaten national security.

It is important to be aware of the threat of computer viruses and to take steps to protect yourself from infection. You can protect yourself by keeping your software up to date, using antivirus software, and being careful about what you download from the internet.

By taking these steps, you can help to protect yourself from the threat of computer viruses.

References

  • Cohen, F. (1984). Computer viruses: theory and experiments. Computers & Security, 3(1),22-35.
  • Levy, S. (1994). Hackers: Heroes of the computer revolution. Penguin Books.
  • Markoff, J. (2005). What virus writers want. New York Times, April 10, 2005.
  • Meserve, P. (2011). The complete idiot's guide to computer viruses. Que Publishing.
  • Norton, P. (2002). Fighting computer viruses. Symantec Press.

Digital Contagions: A Media Archaeology of Computer Viruses Second Edition (Digital Formations 44)
Digital Contagions: A Media Archaeology of Computer Viruses, Second Edition (Digital Formations Book 44)
by Jussi Parikka

4.4 out of 5

Language : English
File size : 6527 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Word Wise : Enabled
Print length : 326 pages
Create an account to read the full story.
The author made this story available to Nick Sucre members only.
If you’re new to Nick Sucre, create a new account to read this story on us.
Already have an account? Sign in
510 View Claps
43 Respond
Save
Listen
Share

Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!

Good Author
  • Hank Mitchell profile picture
    Hank Mitchell
    Follow ·16.7k
  • Nikolai Gogol profile picture
    Nikolai Gogol
    Follow ·9.4k
  • Jaylen Mitchell profile picture
    Jaylen Mitchell
    Follow ·7.4k
  • Guillermo Blair profile picture
    Guillermo Blair
    Follow ·11k
  • Bill Grant profile picture
    Bill Grant
    Follow ·17.3k
  • Jason Reed profile picture
    Jason Reed
    Follow ·14.4k
  • Forrest Blair profile picture
    Forrest Blair
    Follow ·14.8k
  • Brennan Blair profile picture
    Brennan Blair
    Follow ·15.7k
Recommended from Nick Sucre
Everyday Millionaires Chris Hogan
Asher Bell profile pictureAsher Bell

Chris Hogan: The Everyday Millionaire Who Shares His...

Chris Hogan is an Everyday Millionaire who...

·5 min read
480 View Claps
57 Respond
Bitcoin Billionaires: A True Story Of Genius Betrayal And Redemption
Jay Simmons profile pictureJay Simmons
·5 min read
385 View Claps
58 Respond
The WorldatWork Handbook Of Total Rewards: A Comprehensive Guide To Compensation Benefits HR Employee Engagement
Robert Browning profile pictureRobert Browning
·6 min read
26 View Claps
6 Respond
Doing College Right: A Guide To Student Success
Arthur Conan Doyle profile pictureArthur Conan Doyle
·6 min read
837 View Claps
81 Respond
Approving 55+ Housing: Facts That Matter
Allen Parker profile pictureAllen Parker

Approving 55 Housing Facts That Matter

Housing, an essential aspect...

·5 min read
37 View Claps
8 Respond
Royal Tours 1786 2024: Home To Canada
J.D. Salinger profile pictureJ.D. Salinger

Unveiling the Enchanting Heritage of Royal Tours: A...

Canada, a land steeped in history...

·5 min read
727 View Claps
56 Respond
The book was found!
Digital Contagions: A Media Archaeology of Computer Viruses Second Edition (Digital Formations 44)
Digital Contagions: A Media Archaeology of Computer Viruses, Second Edition (Digital Formations Book 44)
by Jussi Parikka

4.4 out of 5

Language : English
File size : 6527 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Word Wise : Enabled
Print length : 326 pages
Sign up for our newsletter and stay up to date!

By subscribing to our newsletter, you'll receive valuable content straight to your inbox, including informative articles, helpful tips, product launches, and exciting promotions.

By subscribing, you agree with our Privacy Policy.


© 2024 Nick Sucre™ is a registered trademark. All Rights Reserved.