180:
127:. When an uninfected disk was inserted into the computer, the entire DOS (including Elk Cloner) would be copied to the disk, allowing it to spread from disk to disk. To prevent the DOS from being continually rewritten each time the disk was accessed, Elk Cloner also wrote a signature byte to the disk's directory, indicating that it had already been infected.
149:
Elk Cloner was created by
Skrenta as a prank in 1982. Skrenta already had a reputation for pranks among his friends. In sharing computer games and software, he would often alter the floppy disks to shut down or display taunting on-screen messages. Due to this reputation, many of his friends simply
283:
or cleaners available. The virus could be removed using Apple's MASTER CREATE utility or other utilities to rewrite a fresh copy of DOS to the infected disk. Furthermore, once Elk Cloner was removed, the previously infected disk would not be reinfected since it already contained the Elk Cloner
284:"signature" in its directory. It was also possible to "inoculate" uninfected disks against Elk Cloner by writing the "signature" to the disk; the virus would then think the disk was already infected and refrain from writing itself.
133:
ELK CLONER: THE PROGRAM WITH A PERSONALITY IT WILL GET ON ALL YOUR DISKS IT WILL INFILTRATE YOUR CHIPS YES IT'S CLONER! IT WILL STICK TO YOU LIKE GLUE IT WILL MODIFY RAM TOO SEND IN THE CLONER!
111:. It was attached to a game which was then set to play. The 50th time the game was started, the virus was released, but instead of playing the game, it would change to a blank screen that displayed a
166:
virus, and began circulating it in early 1982 among high school friends and a local computer club. Twenty-five years later, in 2007, Skrenta called it "some dumb little practical joke."
308:
508:
150:
stopped accepting floppy disks from him. Skrenta thought of methods to alter floppy disks without physically touching or harming them. During a winter break from
276:
According to contemporary reports, the virus was rather contagious, successfully infecting the floppies of most people
Skrenta knew, and upsetting many of them.
531:
501:
412:
263:
610:
696:
84:
that spread "in the wild", i.e., outside the computer system or laboratory in which it was written. It attached itself to the
201:
691:
686:
536:
494:
244:
216:
342:
197:
151:
620:
615:
362:
300:
223:
190:
681:
155:
595:
322:
650:
645:
230:
585:
304:
580:
212:
660:
640:
124:
600:
460:"Computer Recreations:A Core War bestiary of viruses, worms and other threats to computer memories"
625:
280:
382:
279:
Part of the "success" was that people were not at all wary of the potential problem, nor were
108:
88:
635:
237:
557:
81:
51:
95:
as a 15-year-old high school student, originally as a joke, and put onto a game disk.
675:
91:
and spread by floppy disk. It was written around 1982 by programmer and entrepreneur
92:
69:
399:
442:"Home - Broadcom Community - Discussion Forums, Technical Docs, and Expert Blogs"
630:
590:
562:
179:
163:
120:
40:
459:
138:
104:
159:
85:
30:
420:
572:
486:
204: in this section. Unsourced material may be challenged and removed.
116:
441:
141:
disks without a standard image had their reserved tracks overwritten.
655:
549:
158:, Skrenta discovered how to launch the messages automatically on his
112:
481:
490:
173:
130:
The poem that Elk Cloner would display was as follows:
571:
548:
123:, a copy of the virus was placed in the computer's
65:
57:
47:
36:
26:
21:
107:operating system using a technique now known as a
301:"Prank starts 25 years of computer security woes"
343:"Top 10 Computer Viruses: No. 10 - Elk Cloner"
162:computer. He developed what is now known as a
137:Elk Cloner did not cause deliberate harm, but
502:
363:"List of Computer Viruses Developed in 1980s"
8:
509:
495:
487:
383:"First virus hatched as a practical joke"
264:Learn how and when to remove this message
292:
18:
7:
202:adding citations to reliable sources
402:Salon.com Retrieved April 12, 2013.
103:Elk Cloner spread by infecting the
14:
311:from the original on 2008-01-07.
178:
189:needs additional citations for
115:about the virus. If a computer
61:Mt. Lebanon, Pennsylvania, U.S.
1:
400:The computer virus turns 25
713:
80:is one of the first known
522:
387:The Sydney Morning Herald
156:Mt. Lebanon, Pennsylvania
482:Elk Cloner (circa 1982)
152:Mt. Lebanon High School
697:Public-domain software
446:community.broadcom.com
99:Infection and symptoms
82:microcomputer viruses
692:Hacking in the 1980s
687:1982 in Pennsylvania
517:Hacking in the 1980s
307:. Associated Press.
198:improve this article
601:Christmas Tree EXEC
16:Microcomputer virus
626:Lamer Exterminator
669:
668:
543:
542:
274:
273:
266:
248:
119:from an infected
109:boot sector virus
75:
74:
704:
682:Computer viruses
611:Father Christmas
525:
524:
511:
504:
497:
488:
470:
469:
467:
466:
456:
450:
449:
438:
432:
431:
429:
428:
419:. Archived from
413:"Security: News"
409:
403:
397:
391:
390:
379:
373:
372:
370:
369:
359:
353:
352:
350:
349:
339:
333:
332:
330:
329:
319:
313:
312:
297:
269:
262:
258:
255:
249:
247:
206:
182:
174:
89:operating system
19:
712:
711:
707:
706:
705:
703:
702:
701:
672:
671:
670:
665:
567:
544:
518:
515:
478:
473:
464:
462:
458:
457:
453:
440:
439:
435:
426:
424:
411:
410:
406:
398:
394:
381:
380:
376:
367:
365:
361:
360:
356:
347:
345:
341:
340:
336:
327:
325:
321:
320:
316:
299:
298:
294:
290:
270:
259:
253:
250:
207:
205:
195:
183:
172:
147:
135:
101:
17:
12:
11:
5:
710:
708:
700:
699:
694:
689:
684:
674:
673:
667:
666:
664:
663:
658:
653:
648:
643:
638:
633:
628:
623:
618:
613:
608:
603:
598:
593:
588:
583:
577:
575:
569:
568:
566:
565:
560:
554:
552:
546:
545:
541:
540:
534:
529:
528:← —
523:
520:
519:
516:
514:
513:
506:
499:
491:
485:
484:
477:
476:External links
474:
472:
471:
451:
433:
404:
392:
374:
354:
334:
314:
291:
289:
286:
281:virus scanners
272:
271:
186:
184:
177:
171:
168:
146:
143:
132:
100:
97:
73:
72:
67:
63:
62:
59:
55:
54:
52:Computer virus
49:
48:Classification
45:
44:
38:
34:
33:
28:
24:
23:
15:
13:
10:
9:
6:
4:
3:
2:
709:
698:
695:
693:
690:
688:
685:
683:
680:
679:
677:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
592:
589:
587:
584:
582:
579:
578:
576:
574:
570:
564:
561:
559:
556:
555:
553:
551:
547:
539: →
538:
535:
533:
530:
527:
526:
521:
512:
507:
505:
500:
498:
493:
492:
489:
483:
480:
479:
475:
461:
455:
452:
447:
443:
437:
434:
423:on 2012-07-15
422:
418:
414:
408:
405:
401:
396:
393:
389:. 2007-09-03.
388:
384:
378:
375:
364:
358:
355:
344:
338:
335:
324:
318:
315:
310:
306:
302:
296:
293:
287:
285:
282:
277:
268:
265:
257:
246:
243:
239:
236:
232:
229:
225:
222:
218:
215: –
214:
210:
209:Find sources:
203:
199:
193:
192:
187:This section
185:
181:
176:
175:
169:
167:
165:
161:
157:
153:
144:
142:
140:
131:
128:
126:
122:
118:
114:
110:
106:
105:Apple DOS 3.3
98:
96:
94:
90:
87:
83:
79:
71:
68:
64:
60:
56:
53:
50:
46:
42:
39:
35:
32:
29:
25:
20:
605:
558:The Analyzer
463:. Retrieved
454:
445:
436:
425:. Retrieved
421:the original
416:
407:
395:
386:
377:
366:. Retrieved
357:
346:. Retrieved
337:
326:. Retrieved
323:"Elk Cloner"
317:
295:
278:
275:
260:
254:January 2017
251:
241:
234:
227:
220:
213:"Elk Cloner"
208:
196:Please help
191:verification
188:
170:Distribution
148:
136:
129:
102:
93:Rich Skrenta
77:
76:
70:Rich Skrenta
631:Morris worm
591:Byte Bandit
563:Markus Hess
550:Individuals
164:boot sector
145:Development
121:floppy disk
41:Boot sector
676:Categories
606:Elk Cloner
465:2015-03-22
427:2021-03-02
368:2010-12-10
348:2010-12-10
328:2010-12-10
288:References
224:newspapers
78:Elk Cloner
22:Elk Cloner
661:WANK Worm
636:Ping-Pong
621:Jerusalem
616:Ghostball
139:Apple DOS
532:Timeline
309:Archived
160:Apple II
86:Apple II
31:Apple II
596:Cascade
573:Malware
238:scholar
66:Authors
37:Subtype
656:Virdem
651:Stoned
646:Scores
240:
233:
226:
219:
211:
125:memory
117:booted
58:Origin
586:Brain
537:1990s
245:JSTOR
231:books
43:virus
581:1260
417:CNET
217:news
113:poem
27:Type
641:SCA
305:CTV
200:by
154:in
678::
444:.
415:.
385:.
303:.
510:e
503:t
496:v
468:.
448:.
430:.
371:.
351:.
331:.
267:)
261:(
256:)
252:(
242:·
235:·
228:·
221:·
194:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.