122:
293:
162:
220:
283:
458:
74:
337:
523:
199:
30:
504:
175:
142:
57:
34:
98:
443:
378:
448:
419:
320:
288:
400:
315:
249:
17:
349:
298:
232:
22:
517:
470:
431:
406:
310:
78:
453:
395:
383:
366:
166:
146:
102:
61:
179:
126:
480:
332:
203:
492:
271:
266:
475:
361:
237:
254:
45:
This category has the following 8 subcategories, out of 8 total.
219:
The following 34 pages are in this category, out of 34 total.
8:
221:This list may not reflect recent changes
7:
216:Pages in category "Computer viruses"
225:
196:
119:
95:
71:
47:
39:
14:
294:Cookie Monster (computer program)
284:Comparison of computer viruses
1:
459:Strange Brew (computer virus)
540:
338:Esperanto (computer virus)
123:Fictional computer viruses
28:
16:The main article for this
15:
29:See also the categories
505:Zero-day vulnerability
163:Classic Mac OS viruses
444:Software forensics
379:London Action Plan
75:Antivirus software
449:Source code virus
420:Oligomorphic code
321:Drive-by download
289:Compression virus
531:
409:
401:Metamorphic code
316:Dexter (malware)
205:
198:
181:
168:
148:
128:
121:
104:
97:
80:
73:
63:
539:
538:
534:
533:
532:
530:
529:
528:
524:Malware by type
514:
513:
512:
511:
510:
509:
497:
485:
463:
436:
424:
412:
405:
388:
371:
354:
342:
325:
303:
276:
259:
250:Igor Artimovich
242:
213:
212:
211:
210:
207:
206:
200:Windows viruses
195:
186:
183:
182:
170:
169:
153:
150:
149:
133:
130:
129:
118:
109:
106:
105:
94:
85:
82:
81:
70:
65:
64:
38:
37:
27:
12:
11:
5:
537:
535:
527:
526:
516:
515:
508:
507:
501:
498:
496:
495:
489:
486:
484:
483:
478:
473:
467:
464:
462:
461:
456:
451:
446:
440:
437:
435:
434:
428:
425:
423:
422:
416:
413:
411:
410:
403:
398:
392:
389:
387:
386:
381:
375:
372:
370:
369:
364:
358:
355:
353:
352:
350:Festering Hate
346:
343:
341:
340:
335:
329:
326:
324:
323:
318:
313:
307:
304:
302:
301:
299:Cryptovirology
296:
291:
286:
280:
277:
275:
274:
269:
263:
260:
258:
257:
252:
246:
243:
241:
240:
235:
233:Computer virus
229:
227:
226:
217:
214:
209:
208:
194:
193:
190:
187:
185:
184:
174:
173:
171:
161:
160:
157:
154:
152:
151:
141:
140:
137:
134:
132:
131:
117:
116:
113:
110:
108:
107:
93:
92:
89:
86:
84:
83:
69:
68:
66:
56:
55:
52:
49:
48:
43:
40:
31:Computer worms
23:Computer virus
13:
10:
9:
6:
4:
3:
2:
536:
525:
522:
521:
519:
506:
503:
502:
499:
494:
491:
490:
487:
482:
479:
477:
474:
472:
471:Attack vector
469:
468:
465:
460:
457:
455:
452:
450:
447:
445:
442:
441:
438:
433:
432:Phalcon/Skism
430:
429:
426:
421:
418:
417:
414:
408:
404:
402:
399:
397:
394:
393:
390:
385:
382:
380:
377:
376:
373:
368:
365:
363:
360:
359:
356:
351:
348:
347:
344:
339:
336:
334:
331:
330:
327:
322:
319:
317:
314:
312:
309:
308:
305:
300:
297:
295:
292:
290:
287:
285:
282:
281:
278:
273:
270:
268:
265:
264:
261:
256:
253:
251:
248:
247:
244:
239:
236:
234:
231:
230:
228:
224:
222:
215:
201:
197:
192:
191:
188:
177:
176:Macro viruses
172:
164:
159:
158:
155:
144:
143:Linux viruses
139:
138:
135:
124:
120:
115:
114:
111:
100:
96:
91:
90:
87:
76:
72:
67:
59:
58:Amiga viruses
54:
53:
50:
46:
42:Subcategories
41:
36:
35:Trojan horses
32:
25:
24:
19:
407:Mobile virus
311:Dark Avenger
218:
44:
21:
454:Stars virus
396:Macro virus
384:Mark Ludwig
367:Hidden Tear
127:(1 C, 12 P)
99:DOS viruses
79:(5 C, 85 P)
481:Virus hoax
333:Elk Cloner
204:(1 C, 2 P)
518:Category
18:category
493:X-Agent
272:BadBIOS
267:Backoff
476:Virdem
362:Hacker
238:FluBot
255:AVIEN
180:(1 P)
167:(8 P)
147:(2 P)
103:(3 C)
62:(3 P)
33:and
20:is
520::
223:.
202:
178:
165:
145:
125:
101:
77:
60:
500:Z
488:X
466:V
439:S
427:P
415:O
391:M
374:L
357:H
345:F
328:E
306:D
279:C
262:B
245:A
189:W
156:M
136:L
112:F
88:D
51:A
26:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.