When.com Web Search

  1. Ads

    related to: what exe files are viruses going extinct today

Search results

  1. Results From The WOW.Com Content Network
  2. Abraxas (computer virus) - Wikipedia

    en.wikipedia.org/wiki/Abraxas_(computer_virus)

    Due to a bug in the virus, only the first EXE file in any directory is infected. Abraxas-infected files will become 1,171 bytes in length and contain Abraxas' viral code. The file's date and time in the DOS disk directory listing will be set to the system date and time when infection occurred.

  3. ABC (computer virus) - Wikipedia

    en.wikipedia.org/wiki/ABC_(computer_virus)

    ABC, discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month. Upon infection, ABC becomes memory-resident at the top of system memory but below the 640 K DOS boundary and hooks interrupts 16 and 1C.

  4. Scott's Valley - Wikipedia

    en.wikipedia.org/wiki/Scott's_Valley

    The WildList , an organisation tracking computer viruses, never reported Scott's Valley as being in the field. Although it was isolated in the field spreading in California, there is no evidence to suggest it ever became common. Like most older, rare DOS viruses, it is probable that Scott's Valley has become extinct, and obsolete at the minimum.

  5. Sality - Wikipedia

    en.wikipedia.org/wiki/Sality

    Sality is a family of polymorphic file infectors, which target Windows executable files with the extensions .EXE or .SCR. [1] Sality utilizes polymorphic and entry-point obscuring (EPO) techniques to infect files using the following methods: not changing the entry point address of the host, and replacing the original host code at the entry point of the executable with a variable stub to ...

  6. Alabama (computer virus) - Wikipedia

    en.wikipedia.org/wiki/Alabama_(computer_virus)

    Instead of searching for a file to infect, Alabama searches for a file to cross-reference. The virus modifies the FAT entry so that when the user executes one file, another will appear. For instance, on a machine where Alabama is resident, executing PROGRAM1.EXE on a Friday may cause the virus to search for another program and find PROGRAM2.EXE.

  7. AIDS (computer virus) - Wikipedia

    en.wikipedia.org/wiki/AIDS_(computer_virus)

    AIDS II works by first finding an uninfected EXE file in the working directory and then creating a companion COM file with the viral code. The COM files will always be 8,064 bytes in length, with a timestamp corresponding to the time of infection. After creating the new COM file, the virus then plays a loud note, and displays the following ...