List of computer viruses (all)

List of computer viruses (all)

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • List of computer viruses — To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti virus software compile and publish lists of viruses. The compilation of a unified list of viruses is made …   Wikipedia

  • List of computer viruses (E-K) — {|style= border: 1px #aaaaaa solid; background color:#f7f8ff align=center bgcolor= #CCCCCC |Name align=center bgcolor= #CCCCCC |Alias(es) align=center bgcolor= #CCCCCC |Type align=center bgcolor= #CCCCCC |Subtype align=center bgcolor= #CCCCCC… …   Wikipedia

  • List of computer term etymologies — This is a list of the origins of computer related terms or terms used in the computing world (i.e., a list of computer term etymologies). It relates to both computer hardware and computer software. Names of many computer terms, especially… …   Wikipedia

  • List of computer criminals — Hacker Adrian Lamo (left) with contemporaries Kevin Mitnick (center) and Kevin Poulsen …   Wikipedia

  • Timeline of computer viruses and worms — Contents 1 1960–1969 1.1 1966 2 1970–1979 2.1 1 …   Wikipedia

  • Timeline of notable computer viruses and worms — This is a timeline of noteworthy computer viruses and worms.1970 1979Early 1970s* Creeper virus was detected on ARPANET infecting the Tenex operating system. Creeper gained access independently through a modem and copied itself to the remote… …   Wikipedia

  • Computer virus — Not to be confused with Malware. A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term virus is also commonly but erroneously used to refer to other types of malware, including but… …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer surveillance — This article is about surreptitious monitoring of computer activity. For information on methods of preventing unauthorized access to computer data, see computer security. Computer surveillance is the act of performing surveillance of computer… …   Wikipedia

  • Computer worm — Morris Worm source code disk at the Computer History Museum …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”