💾 Archived View for spam.works › mirrors › textfiles › virus captured on 2023-11-04 at 11:28:50. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
Virii programs came into play in the
1980's in full force and to this day turn every online binary transfer into
a potential hazard. Well, maybe that's not entirely true, but you wouldn't
know it from the hype and hysteria bred in the world. Meanwhile, fascinating
artistic studies of the programming of Virii exist out there and will be
brought here. As a rule, I don't include Virus Source Code, since that's just
programming, and boring as all hell. if there's a discussion or writing about
how to make virii, I include that. This is the arbitrariness of the host.
If you're looking for the excellent 40HEX Virus Magazine, it's located
in the <A HREF="http://www.textfiles.com/magazines">Magazines</A> section.
Documentation for Different Viruses and Programs
Information on the "Anti-Bait" Method of Virus Transmission
Anti-Debugger Techniques by The Master Hides Behind the Mask
McAfee Associates Agent Listing (February 23, 1993)
PC Virus Listing, by Jim Goodwin, 1989
Slightly Updated Version of Jim Goodwin's List.
A History of the Amiga Viruses, by Paul M. of POISON Cracking Association
A History of the Amiga Viruses by Ed Earing
The Amiga IRQ Virus: It's Out! (December 28, 1988)
ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring
APPLICATION: Youths Against McAfee
ARCV: The Association of Really Cruel Viruses Newsletter
The 911 Virus, Disassembly and Commentary by Black Wolf
Amateur Virus Creation Research Group Magazine: Introduction
Amateur Virus Creation Research Group Magazine: The New DS-512 Virus
Amateur Virus Creation Research Group Magazine: Nuking, by Thimble
Amateur Virus Creation Research Group Magazine: The Whore Virus
Amateur Virus Creation Research Group Magazine: the AMI Virus
Amateur Virus Creation Research Group Magazine: An Introduction to ASM
Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat
Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat
Amateur Virus Creation Research Group Magazine: Analysis of Connie
Amateur Virus Creation Research Group Magazine: OhhLala Virus
Amateur Virus Creation Research Group Magazine: Twister Virus
Amateur Virus Creation Research Group Magazine: Vlamix 1.0
Overview of Some Amiga Viruses
Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD
Advanced Bait Detection by CoKe of VLAD
Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert
Interview with A Virus Writer named Blode by The Unforgiven
NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)
The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)
A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)
Information on the Brain Virus And Variants
The Bulgarian and Soviet Virus Factories
How to write a virus program, by the Cheshire Cat
Interview with Crom-Cruach of Trident
INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)
ViriiSearch: The Virus Research Newsletter Volume 1 Number 1
ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)
ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)
Computer Virus Research and Information Service Index
Computer Virus Research and Information Service #1
Computer Virus Research and Information Service #2
Computer Virus Research and Information Service #3
Computer Virus Research and Information Service #4
Computer Virus Research and Information Service #5
Computer Virus Research and Information Service #6
Computer Virus Research and Information Service #7
Computer Virus Research and Information Service #8
The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)
Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)
Corrupted Programming International Newsletter Issue #2
CPI Newsletter Volume #1, 1989
Comparison: Products to Detect Changes to Programs
CompuServe Magazine's Virus History Timeline: 1987
CompuServe Magazine's Virus History Timeline: 1988
CompuServe Magazine's Virus History Timeline: 1989
C VIRUS 101: An Introduction to Viruses in C
Computer Virus Myths by Rob Rosenberger with Ross Greenberg
Scan Strings, How They Work, and How to Avoid Them, by Dark Angel
An introduction to Nonoverwriting Virii by Dark Angel
An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel
An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel
Code Optimization: A Beginner's Guide by Dark Angel
Advanced Polymorphism Primer by Dark Angel
SFT's and Their Usage, by Dark Angel
EXE Self-Disinfection by Dark Angel
NFO: The Smeg Virus Construction Kit
Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]
Relationship Chart of the Civil War and Related Viruses by TridenT (1993)
Interview with Dark Helmet of Trident
Diogenes 2.0 Documentation and User Manual
Directory Stealth Techniques of Viruses (FCB)
Virus Writers Reply to the SCAN.EXE Program
List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre
Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow
The Firefly Virus, by Nikedamus
Finding INT 21's Real Address Using the PSP by Satan's Little Helper
FOG: A Polymorphic Encription Algorithm by Eclipse
A Full Stealth or Disinfection on Open by Blonde of Immortal Riot
How the Boot Sequence Operates, Relevant to Virus Infection
How the Boot Sequence Operates Relevant to Viral Infection, Part II.
Computer Operations and Viral Operations
Viral operations: How Viruses Function
How Viruses Use Operating Systems
How Viruses Hide in System Layers
How to Detect Changes made by a Virus
Checking Files for Viruses, Part II
Checking the System Files for Viruses
Viruses that Affect and Infect Files
Viruses and how they Insert Themselves
How to Add a Virus to a Program
Variations of Computer Virus Infection
The General Accounting Office Report on Computer Viruses, 1988
Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization
Computer Viruses: A Rational View, By Dr. Raymond Glath
Analysis of the Gold Bug Virus
An Analysis of Computer Virus Structures (April 7, 1989)
NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)
The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)
The Guardian List, Issue #1, Sept. 25, 1989
Hacked/Miscellaneous Dangerous Files, #9
Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 1988)
Net Hormones: Infection Control using Cooperation among Computers
Virus Hysteria! By Richard B. Levin
Coping with Computer Viruses and Related Problems
Developing Virus Identification Products, by Tim Sankary, 1989
NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)
Implementing Anti-Viral Programs, by John McAfee 1989
Index to SLAM Magazine Issue #1 (January 1997)
Introduction to the Computer Virual Programs Column
Immortal Virus Magazine Issue #95.1
DISASSEMBLY: The Jerusalem B Virus
Analysis of the Jerusalem DC Virus
INTERVIEW: John Tardy of Trident in The Netherlands
Virus Source Code that Destroys the Disk Head
Potential Virus Attack by L. P. Levine
The Faces Behind the Masks by Sara Gordon (November 1994)
The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)
INTERVIEW: Lord Zero, Virus Writer
Information on the Malmsey Virus (October, 1992)
The Mayberry Family of Virus by HypoDermic
INTERVIEW: Metabolis of VLAD (Virus Writing Group)
Virus Characteristics, by McAfee Virus Scanning
The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies
The Melissa Macro Virus, a Report Prepared by Robert M. Slade
Some Information on Memory Residence Methods for Viruses
DISASSEMBLY: Michelangelo Virus
The Michaelangelo Virus Source Code
A Virus Relationship Chart of Masud Khafir's Viruses
INTERVIEW: Masud Khafir of Trident
A List of Viruses Written by Masud Khafir of Trident
Source code for the Necro, A.k.a. "Skull" Virus
Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers
Installation Instructions for Nowhere Man's Virus Creation Library v1.00
Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989
Columbus Day Virus: A Fact Sheet
DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)
Attack of the Computer Virus, By Lee Dembart
Features of Blackjack Virus (PC) (January 24, 1989)
Computer Virus Hits Again (The Peace Virus)
Dark Angel's Phunky Virus Writing Guide #1
INTERVIEW: Persona No Grata of Trident in The Netherlands
A Humble PolyMorphic Engine Primer by Absolute Overlord
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
Polymorphic Viruses Escape Detection but Get Our Attention
Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)
Popoolar Science virus - a very simple overwriting infector
Infection of Portable Executables by Qark and Quantum of VLAD
Dark Angel's Phunky Virus Writing Guide (Part 1)
Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator
Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II
Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I
Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II
INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven
APPLICATION to Join RABID by ProTurbo of RABID (1991)
RatBoy's Overwriting Virus Tutorial
RatBoy's Overwriting Virus Tutorial Part II
An abbreviated bibliography for computer viruses
Resist! Further Virus Strategies by Mouth of Sauron
An Interactive Interview with Virus-Writer Rajaat of Genesis
Viruses and System Security (a story)
Disinfecting an Infected File by Rock Steady of NuKE
TSR COM Infections by Rock Steady of NuKE
Constructing Kit on Infecting .COM by Rock Steady of NuKE
Infection on Closing by Rock Steady of NuKE
EXE Infections Part I: Infection Process, by Rock Steady of NuKE
EXE Infectors Part II by Rock Steady of NuKE
Directory Stealth by Rock Steady of NuKE
Directory Stealth Method 2 by Rock Steady of NuKE
Memory Stealth by Rock Steady NuKE
The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)
Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey
Revelation, a Virus E-Zine, Vol. 1 Issue 1
Virus Spotlight: The Scitzo Virus
Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991
The Smallest Virus I Could Manage (263 Bytes)
You can't release the Worm source code, says SPAN
Elusive New Viruses Can Avoid Detection by Dennis Flanders
Discussion of a Trojan Horse program called "Steroid"
To Remove the Marijuana (Stoned) Virus from HD
An Explanation of how the Stoned Virus operates by Mike Lawrie
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)
ANSI BBS AD: The Adventures of Guild
Some Background on PuKE: An Introduction from TLN
The True Story about Talon by Talon of NUKE (April, 1994)
An Incredibly Complicated Tale of Mystery and Intrigue
Information About Mulipartite Infection of Viruses
Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)
Documentation for a Story Program That's Actually a Virus, (1993)
Lots of warnings about EGABTR.EXE
Other warnings for other random virus programs
How someone's BBS got whacked with Viruses in 1984
A Documentation on Creating TSR Viruses
Intervue with TU About Virus Creation
A universal Detection Model by Chris Ruhl and James Molini
Supposed use of a computer virus during Desert Storm
Virus 101 - Chapter 1 by George Woodside (March 1, 1989)
Virus 101 - Chapter 2 by George Woodside (March 6, 1989)
Virus 101 - Chapter 3, by George Woodside (March 13, 1989)
Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)
The Varicella Virus Source Codes, by Rock Steady
A Universal Virus Detection Model by Chris Ruhl and James Molini
Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991
Computer Viruses: A Rational View by Raymond M. Glath
Fidonet Message Base Disucssing Viruses (Summer 1990)
Fidonet Message Base Disucssing Viruses (Summer 1990)
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)
Dark Angel's Phunky Virus Writing Guide
Dark Angel's Phunky Virus Writing Guide Installment II
NCSA Testimony on Virus Bills, 1990
Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)
What You Should Know About Computer Viruses by BlenderHead
Some of the Less Known Viruses (Humor)
Virus Programming Basics Issue #1
Virus Programming Basics Issue #2: Not So Basic
Discussions about the Jerusalem B Virus
Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989
Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989
What You Should Know about Computer Viruses by Blinderhead
Viruses 101: A Information Set
The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop
The Virus Informer by Mark E. Bishop: The Macintosh Virus
The Virus Informer Chapter 4: The Engine That Kills
The Virus Informer Chapter 5: The Virus List
The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service
The Virus Informer by Mark E. Bishop Chapter 7: Next Week
Computer Virus Myths, by Rob Rosenberger (1988-1992)
A New Stategy for Computer Viruses by William H. Murray
An example of a Virus in BASIC
Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988
Computer Viruses and Trojan Horses; A Guide to Protecting Yourself
Virus Detection Alternatives, by Patrick Min
The Computer Virus Epidemic, 1987-1991. Article Compilation
How to write a Virus Program, by The Cheshire Cat
Viruses in the USSR by Eldar A. Musaev
FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)
A Suggested Readings List for Computer Viruses by Jon Mack
Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman
The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman
Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses
Windows Executable Infection by Qark and Quantum of VLAD
Calling the Windows API in Assembly Language by Qark of VLAD
FAQ: The MS Word 6.x Macro Viruses FAQ v2.0
Information on the XYZ (Examine Your Zipper) Virus (January, 1994)
NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)