Wednesday 28 November 2012

Best Notepad tricks and hacks…


1. Bush Hid the Facts/This App Can Break

This is one of the most popular notepad tricks because of its mysterious nature. In order to get an idea as to what this trick does, just follow the steps given below:
  • Open Notepad.
  • Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
  • Save that file with any name and close it.
  • Open It Again to see the magic.
Reason For This Behavior: It is known as the 4335 Rule. It means that if we enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters each, and the last word has five letters. Then Notepad Automatically hides the text into unknown code.

2. World Trade Center Attack Trick

As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence  or something else but whatever it is, it does startle us.
  • Open Notepad.
  • Type “Q33N” (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.
You will be amazed by the findings.

3. Make A Personal Log-Book or A Diary

Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself !
  • Open Notepad.
  • Type .LOG (in capital letters) and hit enter.
  • Save it with any name and close it.
  • Open it again.
When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

4. Test Your Anti-Virus

You can also test your anti virus program for its effectiveness using a simple notepad trick. Follow the steps below to know more:
  • Open Notepad.
  • Copy the code give below in the notepad file:
    X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  • Save it with an .exe extension like testvirus.exe
As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.

5. Continually pop the CD Drive

  • Open Notepad.
  • Copy the code given below onto the notepad file:
Set oWMP = CreateObject(“WMPlayer.OCX.7?)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
  • Save it as “Anything.VBS”.
Now open the file and see the magic! The file will continuously force the CD rom to pop out! And If you have more than one then it pops out all of them!

6. Matrix Effect

Not much to explain, just follow the steps and see the amazing matrix effect happen in your DOS window:
  • Open Notepad.
  • Copy the below mentioned text in your notepad file:
@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
  • Save the file with .bat extension like Matrix.bat
Thats it. Just open the file to see the matrix effect right before your eyes!

7. Change The Header/Footer Of Your Notepad File

More often than not whenever you get a printout of your notepad file, it starts with “Untitled” or the filename at top, and “Page ” on bottom. Now if you want to get rid of it or want to change it, just follow the simple steps given below.
  • Open Notepad.
  • Click on File -> Page Setup.
  • Replace the text written in the “Header” and “Footer” box (as shown above) by any of the following codes:
&l Left-align the characters that follow
&c Center the characters that follow
&r Right-align the characters that follow
&d Print the current date
&t Print the current time
&f Print the name of the document
&p Print the page number

8. Constantly Repeat Messages

Using this notepad trick you can annoy anyone and can actually force them to log off or leave the computer (LOL….). This notepad trick will create an infinite cycle of a message in the computer. Follow the steps to know more:
  • Open Notepad.
  • Paste the following code in the notepad file:
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
  • Save the file with any file name but with .bat as extension and close it. For eg. Freakymessage.bat
After saving the file just open it (by double clicking) and see what happens.
Pssstttt……. You can piss of your friends by sending it as an email attachment asking them to try it out !

9. Shut-down The Computer After Conveying Any Message

This one is kind of an annoying trick and if used unknowingly can certainly cause problems (am serious). What this trick does is, after conveying a (any) message it shuts down the computer without any confirmation. In order to create the Shutdown file, follow the below mentioned steps:
  • Open Notepad.
  • Paste the following code in it:
@echo off
msg * Its time to get some rest.
shutdown -c “Error! You have to take rest! Byeeeeee” -s
  • Save the file with any name but with .bat extension and close it. For eg. TakeRest.bat
NOTE : Use this carefully. If you are playing prank then keep in mind that this may lead to loss as it shuts down the computer forcefully.

10. Toggle Keyboard Button Simultaneously

Using Notepad (and VB) you can set different keys on your keyboard to toggle continuously. Following are the 3 tricks using which different keys can be set to toggle simultaneously. Follow the steps given under each head to try out the tricks.
1. Caps Lock Key
    • Open Notepad.
    • Paste the following code in the notepad file:
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
    • Save the file with anyname and .vbs extension. and close it.
    • Now open the newly created file and see how the caps lock key behaves on your keyboard!
2. Hit Enter Key Continuously
    • Open Notepad.
    • Paste the following code in the notepad file:
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
    • Save the file with any name and .vbs extension and close it.
    • Now open the newly created file and see how the enter key behaves!
3. Hit Backspace Key Continuously
    • Open Notepad.
    • Paste the following code in the notepad file:
MsgBox “Lets Rumble”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
    • Save the file with any name and with .vbs extension and close it.
    • Now open the newly created file and see how the key behaves!
In order to end the vbs script (stop continuous key presses), open task manager and end thewscript.exe process as shown in image below.

11. Slowly Type Messages

This one is my favorite. Completely harmless trick and perfect for playing pranks on one’s friends. This trick can really freak out anyone! Follow the below mentioned steps to perform this trick:
  • Open Notepad.
  • Paste the following code in the notepad file:
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “
  • Save the file with any name and with .vbs extension and close it.
Now open the file and see how freakishly slow the messages appear!
NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

12. Type “You are a fool” Continuously

Not much to explain, the title says it all! Follow the steps to make this trick work:
  • Open Notepad.
  • Paste the following code in the notepad file:
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
  • Save the file with any name but with .vbs extension and close it.
Ope the file and see how it makes you type!
NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

13. Open Notepad continuously

  • Open Notepad.
  • Paste the following code in your notepad file:
@ECHO off
:top
START %SystemRoot%system32notepad.exe
GOTO top
  • Save the file with any name nut with .bat extension and close it.
Now open the file and see how it annoys you by opening notepad again and again.

14. Pick Your Option Batch File

When used this creates a file which asks you to choose a number between 1-5 and then does a certain action (as shown below – Action accompanied by number):
1 – Shut’s down the computer
2 – Restart’s the computer
3 – Wipes out the hard drive
4 – Net send
5 – Shows a message & then shut’s down the computer
Before you try out this trick, keep in mind that this can cause loss of important data on your (or any one else’s on which you are running this file) computer system. So BEWARE! In order to create the file, follow the steps given below:
  • Open Notepad.
  • Paste the following code in the notepad file:
@echo off
title Get A Life
cd C:
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not cry if you loose your data or anything.
pause
echo Pick your option:
echo 1. Die Slowly
echo 2. Instant Death
echo 3. Stay Away From This One
echo 4. Die this way (For Wimps!)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
  • Save the file with any name and with a .bat extension and close the file.

15.Lock File(s) on Windows Without Using        Any Software

How many times have you wished of a software using which you can hide or lock files,  restricting its access to other unwanted users. Although there are various software available in market using which you can easily lock/hide files but, i personally dont trust them because most of them are bloatware or spyware.
In this post i am going to share a simple yet powerful way of locking and hiding important files using a the following method. Follow the instructions to make you own Locker ( Without any software !! ) :
  • Open notepad.
  • Copy the following code in notepad file :

    cls
    @ECHO OFF
    title Folder Locker
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
    if NOT EXIST Locker goto MDLOCKER
    :CONFIRM
    echo Are you sure u want to Lock the folder(Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock folder
    set/p "pass=>"
    if NOT %pass%==YOUR PASSWORD HERE goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDLOCKER
    md Locker
    echo Locker created successfully
    goto End
    :End
  • Change the “YOUR PASSWORD HERE” with your password.
  • Save it as batch file ( with extension .bat ) For eg. Locker.bat
  • Now you will see a batch file. Double click it to create a folder locker ( A new folder named Locker would be formed at the same location )
  • Thats it you have now created your own locker and that too without using any software !
  • Brings all the files you want to hide in the locker folder.
  • Double click the batch ( As created above ) file to lock the folder namely Locker.
Folder lock
If you want to unlock your files, simple double click the batch file again and you would be prompted for password ( In DOS window ). Enter the password and enjoy access to the folder.
But don’t delete .bat file and loose your stuff…….

16.Convert Text Into Audio Using Notepad

  1. Open Notepad file on your Windows PC.
  2. Copy and paste the below mentioned code :

      Dim msg, sapi
      msg=InputBox("Enter your text for conversion–www.dibyendu141.blogspot.in.com","Dibyendu Text-To-Audio Converter")
      Set sapi=CreateObject("sapi.spvoice")
      sapi.Speak msg
  3. Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs
Thats it ! Your Text to Audio converter is ready to be used. Now open the saved file and key in the text you want to convert and click OK. If you find any difficulties in using this code, let me know via comments section.

17.Format Your Hard Disk Using Just Notepad !!

Ever wondered of a way to format your hard disk using just notepad ?
I bet you haven’t even thought about it or if you have had then you would still have preferred using reliable software’s available to do the job.
In this post i am going to share a simple way to format your C drive (Yep, only C drive) using just notepad. This is just a nice little nifty trick, which i am sharing with you. Make sure you don’t actually use it on your business computer. Try to make this trick work in a VMWare Machine in your free time.
Moving on, in order to completely format your C: Drive (Primary disk) follow the steps given below :-
  1. Open notepad.
  2. Type the following the code in it (Or just copy paste it).
  3. 01100110011011110111001001101101011000010111010000 100000011000110011101001011100
    0010000000101111010100010010111101011000
  4. Save it as an .exe file giving any name you desire.
Thats It ! Now just double click on the file (to open it) and your C: drive will be formatted !
This is just a little binary fun. Be Careful while using it.
UPDATE : No, you can’t run it from C: drive itself (not from the drive in which OS is installed & running).

Monday 26 November 2012

CREATE YOUR OWN FONTS IN WINDOWS


If you want to make your own fonts in window then
just follow these steps.
first go to start>Run & type here eudcedit and hit enter.

Now use your creativity & make your own fonts.

MATRIX LIKE EFFECT

Excellent Trick For Matrix Effect

just follow the steps

1. Open Notepad.
2.Copy the below mentioned text in your notepad file:

@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

3. Save the file with .bat extension like Mat.bat

it will look like image shown below




AND THEN JUST DOUBLE CLICK ON THIS Mat.bat file and see the magic

HIDE DATA IN MOBILE WITHOUT ANY SOFTWARE


Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone and youdont even need any software for that.
This trick can be used for any JAVA phone from Nokia,Samsung,Motorola,LG or any other company.
JUST FOLLOW SIMPLE STEPS
  1. Create any new folder or you can use any existing folder that is to be hidden.
  2. Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as IMG.jad
  3. Now create a new folder with the same name in the same directory but with the extension of.jar So, I would create the folder with the name IMG.jar
  4. And thats it!! My orignal images folder which has been renamed with .jad gets hidden and only folder with.jar extension is visible which is empty.So,my data is protected/hidden from unwanted eyes.

To unhide the orignal folder you have to remove the .jar extension from the new folder and your orignal folder with all the files and with .jad will become visible.

Evolution Of Computer Viruses History Of Viruses

part 1:


Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.



part 2:


This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.



part 3:


This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.



part 4:


In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this


part 5:


Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

- Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

- The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.



part 6:


Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.

part 7:

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.