Knowledge (XXG)

Elk Cloner

Source 📝

180: 127:. When an uninfected disk was inserted into the computer, the entire DOS (including Elk Cloner) would be copied to the disk, allowing it to spread from disk to disk. To prevent the DOS from being continually rewritten each time the disk was accessed, Elk Cloner also wrote a signature byte to the disk's directory, indicating that it had already been infected. 149:
Elk Cloner was created by Skrenta as a prank in 1982. Skrenta already had a reputation for pranks among his friends. In sharing computer games and software, he would often alter the floppy disks to shut down or display taunting on-screen messages. Due to this reputation, many of his friends simply
283:
or cleaners available. The virus could be removed using Apple's MASTER CREATE utility or other utilities to rewrite a fresh copy of DOS to the infected disk. Furthermore, once Elk Cloner was removed, the previously infected disk would not be reinfected since it already contained the Elk Cloner
284:"signature" in its directory. It was also possible to "inoculate" uninfected disks against Elk Cloner by writing the "signature" to the disk; the virus would then think the disk was already infected and refrain from writing itself. 133:
ELK CLONER: THE PROGRAM WITH A PERSONALITY   IT WILL GET ON ALL YOUR DISKS IT WILL INFILTRATE YOUR CHIPS YES IT'S CLONER!   IT WILL STICK TO YOU LIKE GLUE IT WILL MODIFY RAM TOO SEND IN THE CLONER!
111:. It was attached to a game which was then set to play. The 50th time the game was started, the virus was released, but instead of playing the game, it would change to a blank screen that displayed a 166:
virus, and began circulating it in early 1982 among high school friends and a local computer club. Twenty-five years later, in 2007, Skrenta called it "some dumb little practical joke."
308: 508: 150:
stopped accepting floppy disks from him. Skrenta thought of methods to alter floppy disks without physically touching or harming them. During a winter break from
276:
According to contemporary reports, the virus was rather contagious, successfully infecting the floppies of most people Skrenta knew, and upsetting many of them.
531: 501: 412: 263: 610: 696: 84:
that spread "in the wild", i.e., outside the computer system or laboratory in which it was written. It attached itself to the
201: 691: 686: 536: 494: 244: 216: 342: 197: 151: 620: 615: 362: 300: 223: 190: 681: 155: 595: 322: 650: 645: 230: 585: 304: 580: 212: 660: 640: 124: 600: 460:"Computer Recreations:A Core War bestiary of viruses, worms and other threats to computer memories" 625: 280: 382: 279:
Part of the "success" was that people were not at all wary of the potential problem, nor were
108: 88: 635: 237: 557: 81: 51: 95:
as a 15-year-old high school student, originally as a joke, and put onto a game disk.
675: 91:
and spread by floppy disk. It was written around 1982 by programmer and entrepreneur
92: 69: 399: 442:"Home - Broadcom Community - Discussion Forums, Technical Docs, and Expert Blogs" 630: 590: 562: 179: 163: 120: 40: 459: 138: 104: 159: 85: 30: 420: 572: 486: 204: in this section. Unsourced material may be challenged and removed. 116: 441: 141:
disks without a standard image had their reserved tracks overwritten.
655: 549: 158:, Skrenta discovered how to launch the messages automatically on his 112: 481: 490: 173: 130:
The poem that Elk Cloner would display was as follows:
571: 548: 123:, a copy of the virus was placed in the computer's 65: 57: 47: 36: 26: 21: 107:operating system using a technique now known as a 301:"Prank starts 25 years of computer security woes" 343:"Top 10 Computer Viruses: No. 10 - Elk Cloner" 162:computer. He developed what is now known as a 137:Elk Cloner did not cause deliberate harm, but 502: 363:"List of Computer Viruses Developed in 1980s" 8: 509: 495: 487: 383:"First virus hatched as a practical joke" 264:Learn how and when to remove this message 292: 18: 7: 202:adding citations to reliable sources 402:Salon.com Retrieved April 12, 2013. 103:Elk Cloner spread by infecting the 14: 311:from the original on 2008-01-07. 178: 189:needs additional citations for 115:about the virus. If a computer 61:Mt. Lebanon, Pennsylvania, U.S. 1: 400:The computer virus turns 25 713: 80:is one of the first known 522: 387:The Sydney Morning Herald 156:Mt. Lebanon, Pennsylvania 482:Elk Cloner (circa 1982) 152:Mt. Lebanon High School 697:Public-domain software 446:community.broadcom.com 99:Infection and symptoms 82:microcomputer viruses 692:Hacking in the 1980s 687:1982 in Pennsylvania 517:Hacking in the 1980s 307:. Associated Press. 198:improve this article 601:Christmas Tree EXEC 16:Microcomputer virus 626:Lamer Exterminator 669: 668: 543: 542: 274: 273: 266: 248: 119:from an infected 109:boot sector virus 75: 74: 704: 682:Computer viruses 611:Father Christmas 525: 524: 511: 504: 497: 488: 470: 469: 467: 466: 456: 450: 449: 438: 432: 431: 429: 428: 419:. Archived from 413:"Security: News" 409: 403: 397: 391: 390: 379: 373: 372: 370: 369: 359: 353: 352: 350: 349: 339: 333: 332: 330: 329: 319: 313: 312: 297: 269: 262: 258: 255: 249: 247: 206: 182: 174: 89:operating system 19: 712: 711: 707: 706: 705: 703: 702: 701: 672: 671: 670: 665: 567: 544: 518: 515: 478: 473: 464: 462: 458: 457: 453: 440: 439: 435: 426: 424: 411: 410: 406: 398: 394: 381: 380: 376: 367: 365: 361: 360: 356: 347: 345: 341: 340: 336: 327: 325: 321: 320: 316: 299: 298: 294: 290: 270: 259: 253: 250: 207: 205: 195: 183: 172: 147: 135: 101: 17: 12: 11: 5: 710: 708: 700: 699: 694: 689: 684: 674: 673: 667: 666: 664: 663: 658: 653: 648: 643: 638: 633: 628: 623: 618: 613: 608: 603: 598: 593: 588: 583: 577: 575: 569: 568: 566: 565: 560: 554: 552: 546: 545: 541: 540: 534: 529: 528:← — 523: 520: 519: 516: 514: 513: 506: 499: 491: 485: 484: 477: 476:External links 474: 472: 471: 451: 433: 404: 392: 374: 354: 334: 314: 291: 289: 286: 281:virus scanners 272: 271: 186: 184: 177: 171: 168: 146: 143: 132: 100: 97: 73: 72: 67: 63: 62: 59: 55: 54: 52:Computer virus 49: 48:Classification 45: 44: 38: 34: 33: 28: 24: 23: 15: 13: 10: 9: 6: 4: 3: 2: 709: 698: 695: 693: 690: 688: 685: 683: 680: 679: 677: 662: 659: 657: 654: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 624: 622: 619: 617: 614: 612: 609: 607: 604: 602: 599: 597: 594: 592: 589: 587: 584: 582: 579: 578: 576: 574: 570: 564: 561: 559: 556: 555: 553: 551: 547: 539: → 538: 535: 533: 530: 527: 526: 521: 512: 507: 505: 500: 498: 493: 492: 489: 483: 480: 479: 475: 461: 455: 452: 447: 443: 437: 434: 423:on 2012-07-15 422: 418: 414: 408: 405: 401: 396: 393: 389:. 2007-09-03. 388: 384: 378: 375: 364: 358: 355: 344: 338: 335: 324: 318: 315: 310: 306: 302: 296: 293: 287: 285: 282: 277: 268: 265: 257: 246: 243: 239: 236: 232: 229: 225: 222: 218: 215: –  214: 210: 209:Find sources: 203: 199: 193: 192: 187:This section 185: 181: 176: 175: 169: 167: 165: 161: 157: 153: 144: 142: 140: 131: 128: 126: 122: 118: 114: 110: 106: 105:Apple DOS 3.3 98: 96: 94: 90: 87: 83: 79: 71: 68: 64: 60: 56: 53: 50: 46: 42: 39: 35: 32: 29: 25: 20: 605: 558:The Analyzer 463:. Retrieved 454: 445: 436: 425:. Retrieved 421:the original 416: 407: 395: 386: 377: 366:. Retrieved 357: 346:. Retrieved 337: 326:. Retrieved 323:"Elk Cloner" 317: 295: 278: 275: 260: 254:January 2017 251: 241: 234: 227: 220: 213:"Elk Cloner" 208: 196:Please help 191:verification 188: 170:Distribution 148: 136: 129: 102: 93:Rich Skrenta 77: 76: 70:Rich Skrenta 631:Morris worm 591:Byte Bandit 563:Markus Hess 550:Individuals 164:boot sector 145:Development 121:floppy disk 41:Boot sector 676:Categories 606:Elk Cloner 465:2015-03-22 427:2021-03-02 368:2010-12-10 348:2010-12-10 328:2010-12-10 288:References 224:newspapers 78:Elk Cloner 22:Elk Cloner 661:WANK Worm 636:Ping-Pong 621:Jerusalem 616:Ghostball 139:Apple DOS 532:Timeline 309:Archived 160:Apple II 86:Apple II 31:Apple II 596:Cascade 573:Malware 238:scholar 66:Authors 37:Subtype 656:Virdem 651:Stoned 646:Scores 240:  233:  226:  219:  211:  125:memory 117:booted 58:Origin 586:Brain 537:1990s 245:JSTOR 231:books 43:virus 581:1260 417:CNET 217:news 113:poem 27:Type 641:SCA 305:CTV 200:by 154:in 678:: 444:. 415:. 385:. 303:. 510:e 503:t 496:v 468:. 448:. 430:. 371:. 351:. 331:. 267:) 261:( 256:) 252:( 242:· 235:· 228:· 221:· 194:.

Index

Apple II
Boot sector
Computer virus
Rich Skrenta
microcomputer viruses
Apple II
operating system
Rich Skrenta
Apple DOS 3.3
boot sector virus
poem
booted
floppy disk
memory
Apple DOS
Mt. Lebanon High School
Mt. Lebanon, Pennsylvania
Apple II
boot sector

verification
improve this article
adding citations to reliable sources
"Elk Cloner"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.