issue101:boucle_locale_linux
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue101:boucle_locale_linux [2015/10/03 08:59] – d52fr | issue101:boucle_locale_linux [2015/10/03 15:21] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
**The 1980’s saw an onslaught of malicious viruses as a response to increased home computers. As a teen, Richard Skrenta wrote the Elk Cloner that targeted Apple computers in 1981. It was the first wide-scale virus transmitted by disk that worked from the boot sector. Infected Apple computers would then transmit this virus on to a clean disk. Elk Cloner wipes the screen and would display a simple poem.** | **The 1980’s saw an onslaught of malicious viruses as a response to increased home computers. As a teen, Richard Skrenta wrote the Elk Cloner that targeted Apple computers in 1981. It was the first wide-scale virus transmitted by disk that worked from the boot sector. Infected Apple computers would then transmit this virus on to a clean disk. Elk Cloner wipes the screen and would display a simple poem.** | ||
- | Les année | + | Les années |
**In 1983 Frederick Cohen (left) began using the term virus to describe programs like Rabbit and Creeper. These programs worked very much like a real life virus. In 1986, the first IBM PC virus was Brain Boot that originated out of Pakistan. In 1987 six more viruses populated: Cascade, Jerusalem, SCA, Vienna, Lehigh, and Christmas Tree. These viruses were boot sector viruses aimed at crippling the executable files on the hard drive.** | **In 1983 Frederick Cohen (left) began using the term virus to describe programs like Rabbit and Creeper. These programs worked very much like a real life virus. In 1986, the first IBM PC virus was Brain Boot that originated out of Pakistan. In 1987 six more viruses populated: Cascade, Jerusalem, SCA, Vienna, Lehigh, and Christmas Tree. These viruses were boot sector viruses aimed at crippling the executable files on the hard drive.** | ||
Ligne 17: | Ligne 17: | ||
**The first Linux virus arose in 1996, and was Stoag. It exploited holes in the kernel and infected executable binary files. Bliss rose a year later, it was written to prove that Linux is not virus-proof, | **The first Linux virus arose in 1996, and was Stoag. It exploited holes in the kernel and infected executable binary files. Bliss rose a year later, it was written to prove that Linux is not virus-proof, | ||
- | Le premier virus pour Linux apparut en 1996 et s' | + | Le premier virus pour Linux apparut en 1996 et s' |
**At the start of the new century, a number of harmless non-memory resident parasitic viruses developed: Winter.341, Zip Worm, Satyr, Rike, and Ramen. By the mid 2000’s, three aggressive Linux viruses were produced: Badbunny, Kaiten, and Koobface. Badbunny would infect via an openoffice document file format, and display a lewd picture. Kaiten allowed for backdoor access to a Linux platform. Koobface is spread by social networks aimed at gathering login information.** | **At the start of the new century, a number of harmless non-memory resident parasitic viruses developed: Winter.341, Zip Worm, Satyr, Rike, and Ramen. By the mid 2000’s, three aggressive Linux viruses were produced: Badbunny, Kaiten, and Koobface. Badbunny would infect via an openoffice document file format, and display a lewd picture. Kaiten allowed for backdoor access to a Linux platform. Koobface is spread by social networks aimed at gathering login information.** | ||
- | À l'aube du siècle nouveau, bon nombre de virus inoffensifs, | + | À l'aube du siècle nouveau, bon nombre de virus inoffensifs, |
**Many experts agree that Linux is not impervious to viruses. However the requirement for root access on many distros diminishes the ability of viral infection on the hard drive. The biggest threat to Linux users is social engineering.** | **Many experts agree that Linux is not impervious to viruses. However the requirement for root access on many distros diminishes the ability of viral infection on the hard drive. The biggest threat to Linux users is social engineering.** |
issue101/boucle_locale_linux.txt · Dernière modification : 2015/10/03 15:21 de andre_domenech