First time computer viruses are created simultaneously with a computer. In 1949, one of the creators of computer, John von Newman, who created the Electronic Discrete Variable Automatic Computer (EDVAC), presented a paper entitled “Theory and Organization of Complicated Automata.” In his paper discussed the possibility of a program that can spread by it. Development of a computer virus subsequently occurred at AT & T Bell Laboratory, one computer laboratory in the world which has resulted in many things, such as language C and C + + . In this lab, circa 1960s, each time off the researchers to make a game with a program that can destroy the ability to fix itself and behind the opponent’s attacking position. In addition, the game program can reproduce itself automatically.
War of the program is called Core War, namely the winner is the owner of the program remains highest in a particular time interval. Well aware of the dangers of the program, especially if it is leaking out of the laboratory, each finished the game, the program has always been destroyed. Around the 1970s, Xerox introduced a program used to assist the smooth working. Program structure resembling a virus, but this program is to utilize as much time as possible and at the same time two tasks can be performed. In the 1980s, the war began with the virus in the world open up the exposure Fred Cohen, a researcher and assistant professor at the University of Cincinnati, Ohio. In his presentation, Fred also demonstrates a program of his creation, which is a virus that can spread quickly in a number of computers. While developing the virus, Indonesia has also started to hit the virus outbreak. This is the first computer virus to spread in Indonesia is also on 1988. Viruses are so appalling all computer users in Indonesia, then, are © Brain virus known as viral Pakistan.
Understanding Computer Viruses
The term computer virus is not foreign to the current computer user. In fact, about 12 years ago, this term has been recognized by the computer user community. New in 1988, articles appeared in mass media with the incessant preaching about a new threat for computer users who later became known as ‘computer virus’. Virus found on a computer is just a regular program, as appropriate on other programs. But there are very fundamental differences on computer viruses and other programs. Virus was made by someone with a variety of purposes, but generally only virus-makers want to pursue fame and also just for pleasure. But if someone makes a virus with the aim of damaging the course infected will confuse the computer.
Ability Basic Computer Virus
General definitions of computer virus is a computer program that is usually small size can cause disruption or damage to computer systems and have some basic skills, such as:
The ability to reproduce themselves
Namely the ability to make copies itself to files or disks that have not infected, so that over time have expanded their distribution area.
The ability to hide
Namely the ability to hide itself from the user’s attention, among other things the following ways:
- Facing the output to the screen for the virus worked, so the virus does not seem work by the user.
- Placed outside track2 virus program that created the DOS (e.g. track 41)
- The size of the virus was made as small as possible so as not to attract suspicion.
The ability to conduct manipulations
Actually not too important routine manipulation. But this is often distracting. Normally this routine is made for:
- Create a display or a disturbing message on the screen
- Replacing the diskette volume label
- Damaging the structure of the disk, delete files
- Disrupt the working tools of I/O, such as keyboards and printers
The ability to obtain information
Namely the ability to obtain information about the structure of storage media such as the location of the original boot record, partition table layout, layout FAT3, the position of a file, and so forth.
The ability to check his existence
Prior to infiltrate a file, the virus checks for himself in that file with the search for an ID (identification) himself in that file. Files that have not been infected with a virus must not contain the ID of the virus concerned. This ability to prevent the infiltration of many times on a same file.