Knowledge (XXG)

1260 (computer virus)

Source 📝

285: 250: 308: 174: 212: 278: 387: 191: 468: 463: 313: 271: 231: 247: 397: 392: 458: 181:
History of Viruses, National Institute of Standards and Technology, Computer Security Division, internal report.
372: 171: 427: 422: 362: 209: 151:
directories upon execution. Changing an authenticated executable file is detected by most modern computer
437: 417: 377: 115: 402: 129: 152: 108: 412: 254: 235: 216: 178: 148: 334: 111: 452: 195: 133: 118: 407: 367: 339: 121: 114:
written in 1989 by Mark Washburn. Derived from Ralf Burger's publication of the
382: 228: 137: 140: 349: 263: 432: 326: 125: 68: 144: 57: 267: 46: 229:"Patricia Hoffman's VSUM Virus Information Summary List," 172:"Threat Assessment of Malicious Code and Human Threats," 348: 325: 90: 82: 74: 64: 52: 42: 34: 26: 21: 279: 219:, Details and results of V2PX virus analysis. 8: 286: 272: 264: 164: 18: 7: 194:. research.ibm.com. Archived from 143:. Both the 1260 and Vienna infect 14: 16:IBM PC DOS computer file virus 1: 192:"IBM's PC "Virus Timeline,"" 485: 299: 210:McAfee Labs Threat Center 248:"1260 (computer virus)," 147:files in the current or 200:IBM research report. 469:Hacking in the 1980s 464:Hacking in the 1990s 294:Hacking in the 1980s 378:Christmas Tree EXEC 198:on 27 October 2012. 124:, the 1260 added a 403:Lamer Exterminator 253:2021-08-17 at the 234:2011-09-27 at the 215:2011-07-28 at the 177:2011-04-23 at the 446: 445: 320: 319: 153:operating systems 98: 97: 476: 459:DOS file viruses 388:Father Christmas 302: 301: 288: 281: 274: 265: 258: 245: 239: 226: 220: 207: 201: 199: 188: 182: 169: 19: 484: 483: 479: 478: 477: 475: 474: 473: 449: 448: 447: 442: 344: 321: 295: 292: 262: 261: 255:Wayback Machine 246: 242: 236:Wayback Machine 227: 223: 217:Wayback Machine 208: 204: 190: 189: 185: 179:Wayback Machine 170: 166: 161: 128:and varied its 38:V2P1, Chameleon 17: 12: 11: 5: 482: 480: 472: 471: 466: 461: 451: 450: 444: 443: 441: 440: 435: 430: 425: 420: 415: 410: 405: 400: 395: 390: 385: 380: 375: 370: 365: 360: 354: 352: 346: 345: 343: 342: 337: 331: 329: 323: 322: 318: 317: 311: 306: 305:← — 300: 297: 296: 293: 291: 290: 283: 276: 268: 260: 259: 240: 221: 202: 183: 163: 162: 160: 157: 112:computer virus 96: 95: 92: 88: 87: 84: 80: 79: 76: 72: 71: 66: 65:Classification 62: 61: 54: 50: 49: 44: 40: 39: 36: 32: 31: 28: 27:Technical name 24: 23: 15: 13: 10: 9: 6: 4: 3: 2: 481: 470: 467: 465: 462: 460: 457: 456: 454: 439: 436: 434: 431: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 389: 386: 384: 381: 379: 376: 374: 371: 369: 366: 364: 361: 359: 356: 355: 353: 351: 347: 341: 338: 336: 333: 332: 330: 328: 324: 316: → 315: 312: 310: 307: 304: 303: 298: 289: 284: 282: 277: 275: 270: 269: 266: 256: 252: 249: 244: 241: 237: 233: 230: 225: 222: 218: 214: 211: 206: 203: 197: 193: 187: 184: 180: 176: 173: 168: 165: 158: 156: 154: 150: 146: 142: 139: 135: 131: 127: 123: 120: 117: 113: 110: 106: 102: 94:Mark Washburn 93: 89: 85: 81: 77: 73: 70: 67: 63: 59: 55: 51: 48: 45: 41: 37: 33: 29: 25: 20: 357: 335:The Analyzer 243: 224: 205: 196:the original 186: 167: 119:Vienna Virus 116:disassembled 104: 100: 99: 56:Nonresident 408:Morris worm 368:Byte Bandit 340:Markus Hess 327:Individuals 238:V2P6 virus. 134:randomizing 122:source code 109:polymorphic 453:Categories 383:Elk Cloner 159:References 138:decryption 438:WANK Worm 413:Ping-Pong 398:Jerusalem 393:Ghostball 141:algorithm 130:signature 60:-Infector 309:Timeline 257:article. 251:Archived 232:Archived 213:Archived 175:Archived 107:, was a 373:Cascade 350:Malware 91:Authors 53:Subtype 433:Virdem 428:Stoned 423:Scores 126:cipher 83:Origin 75:Family 363:Brain 314:1990s 103:, or 69:Virus 35:Alias 358:1260 149:PATH 145:.COM 136:its 105:V2PX 101:1260 58:.COM 43:Type 30:1260 22:1260 418:SCA 132:by 86:USA 78:N/A 47:DOS 455:: 155:. 287:e 280:t 273:v

Index

DOS
.COM
Virus
polymorphic
computer virus
disassembled
Vienna Virus
source code
cipher
signature
randomizing
decryption
algorithm
.COM
PATH
operating systems
"Threat Assessment of Malicious Code and Human Threats,"
Archived
Wayback Machine
"IBM's PC "Virus Timeline,""
the original
McAfee Labs Threat Center
Archived
Wayback Machine
"Patricia Hoffman's VSUM Virus Information Summary List,"
Archived
Wayback Machine
"1260 (computer virus),"
Archived
Wayback Machine

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.