• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Today is 25th anniversary of the PC virus

By Abhishek Ghosh January 19, 2011 10:52 am Updated on January 19, 2011

Today is 25th anniversary of the PC virus

Advertisement

TWENTY-FIVE years ago today, two brothers in Pakistan came up with a new and novel way to catch out software pirates.

As it turned out, they also gave birth to one of the greatest annoyances in the modern world.

“Brain”, considered to be the first major personal computer virus, was created on January 19, 1986, by Basit and Amjad Farooq Alvi at their computer shop in Lahore, Pakistan.

From there the program spread across the world ” one infected floppy disk at a time.

At its peak Brain had even reached the offices of a government department in Canada, on the other side of the globe.

To this day there is speculation as to why Basit and Amjad created the virus. It appears to have been a way to stop software pirates.

“(Amjat) wanted a way to detect piracy, to catch someone who copies,” Basit told TIME in 1988. His brother had written several custom software programs which were being copied without permission.

However it seemed a strange excuse. The brothers were themselves involved in making and selling pirated software, which was not illegal in Pakistan at the time.

“They would be selling copies of DOS, Word, commercial software, basically for slightly over the cost of the media,” said Robert Slade, a senior instructor at the International Information System Security Certification Consortium.

“Of course they weren™t paying any licence fees themselves.”

Mr Slade said that even if controlling piracy was in fact the goal, the brothers were on the wrong track.

“A virus is not a good way to control anything, because the virus itself spreads far and wide without any reference to the original media and programs they were selling,” he said.

“Because this was a boot sector infector, it just spread on to any floppy disk that had been put into an infected machine.”

Brain was the first of what became known as “stealth viruses”. Because most 1980s computers only had tiny internal hard drives ” or none at all ” everything had to be run from floppy disks.

Brain would bury itself in the part of the disk necessary for running programs and infect any computer it was inserted into.

It would then sit in the computer’s memory and infect new disks inserted into that machine as well.

Mr Slade said the virus had some sophisticated features, such as being able to “redirect” itself to avoid detection when you went looking for it.

However why the brothers would have bothered with the deception is also a mystery, because the virus was made other changes that were highly visible.

When the virus infected a floppy disk it would rename the boot sector “Brain”. As soon as users ran a directory listing, it would be obvious their disk was infected.

Roger Thompson, one of the first people in the world to discover Brain and an early Australian pioneer of anti-virus software, said he stumbled across the program almost by accident.

“I’d heard about these new things called viruses, and thought I had one,” said Mr Thompson.

“I actually didn’t, but it started me thinking about them, and how I would find them, and the first one I found was indeed Brain.”

While Brain was relatively harmless, it was the mother of all viruses ” the hub from which a host of malicious others were spawned.

Mr Thompson™s anti-virus program “Virus Buster” was used as the antidote for the “Ohio”, “Den Zuk”, “Stoned” and “Jerusalem” viruses which hit computers shortly after Brain.

“As I recall, we decided to not bother trying to cure Brain,” he said.

“It was only a floppy infector, and it was easy to copy anything off the floppy that you cared about, and just reformat the floppy or throw it away.”

Mr Thompson said it was the generation of viruses after Brain which turned malicious.

“Jerusalem was destructive. On any Black Friday (Friday the 13th), it would delete any programs that were run, instead of infecting them, so it simply couldn’t be ignored,” he said.

“You couldn’t throw away your hard drive, and reformatting it didn’t remove the virus.

“To do it by hand, you had to be able to run a dos utility called FDisk, which was beyond Joe Average.”

Virus Buster earned Mr Thompson a 60 per cent share in the market, allowing him to move his family to the US where he became a leader in anti-virus solutions.

Mr Thompson currently works as the chief research officer for AVG, one of the world’s biggest anti-virus software companies, founded in the Czech Republic.

Click to view original source of this news.

This Article Has Been Shared 838 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Today is 25th anniversary of the PC virus

  • Cloud Computing for SMBs

    Cloud Computing for SMBs can empower the full IT department avoiding the one time investment and recurring costs at the same quality like that of enterprise.

  • Blue Brain Project and Whole Brain Simulation

    Blue Brain Project has the intermediate goal to reach Whole Brain Simulation, if we can easily represent the gross function of Brain, many ways are open for us.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • iWork for iCloud : Apple Revving the Power of UNIX based Private Cloud

    iWork for iCloud is currently in Beta without much change in UI. One thing is quite clear – Apple is pushing the Private Cloud based Applications like Adobe.

  • Mac Pro : Technical Details of Apple’s Workstation

    Mac Pro is Apple’s most powerful and highly configurable Intel Xeon–based workstation computer came as successor of Apple Power Mac G5 series.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarMitea says

    January 20, 2011 at 1:18 pm

    Any way I’ll be subscribing to your feed and I hope you post again soon.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What Online Casinos Have No Deposit Bonus in Australia March 30, 2023
  • Four Foolproof Tips To Never Run Out Of Blog Ideas For Your Website March 28, 2023
  • The Interactive Entertainment Serving as a Tech Proving Ground March 28, 2023
  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023
  • Advantages of Cloud Server Over Dedicated Server for Hosting WordPress March 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Today is 25th anniversary of the PC virus," in The Customize Windows, January 19, 2011, March 31, 2023, https://thecustomizewindows.com/2011/01/today-is-25th-anniversary-of-the-pc-virus/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT