Content deleted Content added
FockeWulf FW 190 (talk | contribs) Created see also and added category to 1260 |
Rezonansowy (talk | contribs) →See also: these list entries are already provided in the navbox below Tag: Visual edit |
||
Line 14: | Line 14: | ||
}} |
}} |
||
'''1260''', or V2PX,<ref>[http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html "Threat Assessment of Malicious Code and Human Threats,"] History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.</ref><ref>{{cite web |url=http://www.research.ibm.com/antivirus/timeline.htm |title=IBM's PC "Virus Timeline," |publisher=research.ibm.com |archiveurl=https://web.archive.org/web/20121027045532/http://www.research.ibm.com/antivirus/timeline.htm |archivedate=27 October 2012}}IBM research report. </ref> was a demonstration [[computer virus]] written in 1989 by [[Mark Washburn]]<ref>[http://www.facebook.com/MarkAWashburn Facebook], Mark Washburn.</ref> that used a form of [[Polymorphic code|polymorphic encryption]]. Derived from Ralph Burger's publication of the [[Reverse engineering|disassembled]] Vienna virus [[source code]], the 1260 added a [[cipher]] and varied its [[Antivirus_software#Signature-based_detection|signature]] by [[Randomization|randomizing]] its [[decryption]] [[algorithm]]. Both the 1260 and Vienna infect [[.COM]] files in the current or [[PATH (variable)|PATH]] directories upon execution. Changing an authenticated executable file is detected by most modern computer [[operating system]]s.<ref>[http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=98074 McAfee Labs Threat Center], Details and results of V2PX virus analysis.</ref><ref>[http://wiw.org/~meta/vsum/view.php?vir=1476 "Patricia Hoffman's VSUM Virus Information Summary List,"] V2P6 virus.</ref><ref>[http://www.articleworld.org/index.php?title=1260_(computer_virus)&printable=yes "1260 (computer virus),"] article.</ref> |
'''1260''', or V2PX,<ref>[http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html "Threat Assessment of Malicious Code and Human Threats,"] History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.</ref><ref>{{cite web |url=http://www.research.ibm.com/antivirus/timeline.htm |title=IBM's PC "Virus Timeline," |publisher=research.ibm.com |archiveurl=https://web.archive.org/web/20121027045532/http://www.research.ibm.com/antivirus/timeline.htm |archivedate=27 October 2012}}IBM research report. </ref> was a demonstration [[computer virus]] written in 1989 by [[Mark Washburn]]<ref>[http://www.facebook.com/MarkAWashburn Facebook], Mark Washburn.</ref> that used a form of [[Polymorphic code|polymorphic encryption]]. Derived from Ralph Burger's publication of the [[Reverse engineering|disassembled]] Vienna virus [[source code]], the 1260 added a [[cipher]] and varied its [[Antivirus_software#Signature-based_detection|signature]] by [[Randomization|randomizing]] its [[decryption]] [[algorithm]]. Both the 1260 and Vienna infect [[.COM]] files in the current or [[PATH (variable)|PATH]] directories upon execution. Changing an authenticated executable file is detected by most modern computer [[operating system]]s.<ref>[http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=98074 McAfee Labs Threat Center], Details and results of V2PX virus analysis.</ref><ref>[http://wiw.org/~meta/vsum/view.php?vir=1476 "Patricia Hoffman's VSUM Virus Information Summary List,"] V2P6 virus.</ref><ref>[http://www.articleworld.org/index.php?title=1260_(computer_virus)&printable=yes "1260 (computer virus),"] article.</ref> |
||
==See also== |
|||
*[[Brain (computer virus)]] |
|||
*[[Byte Bandit]] |
|||
*[[Cascade (computer virus)]] |
|||
*[[Christmas Tree EXEC]] |
|||
*[[Elk Cloner]] |
|||
*[[Ghostball (computer virus)]] |
|||
*[[Jerusalem (computer virus)]] |
|||
*[[Lamer Exterminator]] |
|||
*[[Morris worm]] |
|||
*[[Ping-Pong virus]] |
|||
*[[SCA (computer virus)]] |
|||
*[[Scores (computer virus)]] |
|||
*[[Stoned (computer virus)]] |
|||
==References== |
==References== |
||
{{reflist}} |
{{reflist}} |
Revision as of 16:08, 25 March 2016
1260 | |
---|---|
Technical name | 1260 |
Alias | V2PX |
Type | DOS |
Subtype | Resident .COM |
Classification | Virus |
Family | N/A |
Origin | Unknown |
Authors | Mark Washburn |
1260, or V2PX,[1][2] was a demonstration computer virus written in 1989 by Mark Washburn[3] that used a form of polymorphic encryption. Derived from Ralph Burger's publication of the disassembled Vienna virus source code, the 1260 added a cipher and varied its signature by randomizing its decryption algorithm. Both the 1260 and Vienna infect .COM files in the current or PATH directories upon execution. Changing an authenticated executable file is detected by most modern computer operating systems.[4][5][6]
References
- ^ "Threat Assessment of Malicious Code and Human Threats," History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.
- ^ "IBM's PC "Virus Timeline,"". research.ibm.com. Archived from the original on 27 October 2012.IBM research report.
- ^ Facebook, Mark Washburn.
- ^ McAfee Labs Threat Center, Details and results of V2PX virus analysis.
- ^ "Patricia Hoffman's VSUM Virus Information Summary List," V2P6 virus.
- ^ "1260 (computer virus)," article.