1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-06 02:37:48 +02:00
Files
mirror-textfiles.com/virus.html

327 lines
48 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Virus Textfiles</H1>
<P>
Virii programs came into play in the
1980's in full force and to this day turn every online binary transfer into
a potential hazard. Well, maybe that's not entirely true, but you wouldn't
know it from the hype and hysteria bred in the world. Meanwhile, fascinating
artistic studies of the programming of Virii exist out there and will be
brought here. As a rule, I don't include Virus Source Code, since that's just
programming, and boring as all hell. if there's a discussion or writing about
how to make virii, I include that. This is the arbitrariness of the host.
<P>
If you're looking for the excellent 40HEX Virus Magazine, it's located
in the <A HREF="http://www.textfiles.com/magazines">Magazines</A> section.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="virus/DOCUMENTATION.html">DOCUMENTATION</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Documentation for Different Viruses and Programs</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="virus/NCSA.html">NCSA</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>NCSA Virus Reports</B></TD></TR>
<TR><TD>&nbsp;</TD></TR>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/800-5.txt">800-5.txt</A> <tab to=T><TD> 82314<BR><TD> A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/abaittut.txt">abaittut.txt</A> <tab to=T><TD> 14720<BR><TD> Information on the "Anti-Bait" Method of Virus Transmission
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/adebgtut.txt">adebgtut.txt</A> <tab to=T><TD> 15848<BR><TD> Anti-Debugger Techniques by The Master Hides Behind the Mask
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/agents.txt">agents.txt</A> <tab to=T><TD> 36769<BR><TD> McAfee Associates Agent Listing (February 23, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/allvirus.vir">allvirus.vir</A> <tab to=T><TD> 22209<BR><TD> PC Virus Listing, by Jim Goodwin, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/allvirusdf.vir">allvirusdf.vir</A> <tab to=T><TD> 30897<BR><TD> Slightly Updated Version of Jim Goodwin's List.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/amigvir1.txt">amigvir1.txt</A> <tab to=T><TD> 3314<BR><TD> A History of the Amiga Viruses, by Paul M. of POISON Cracking Association
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/amigvir2.txt">amigvir2.txt</A> <tab to=T><TD> 6144<BR><TD> A History of the Amiga Viruses by Ed Earing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/amigvir3.txt">amigvir3.txt</A> <tab to=T><TD> 1920<BR><TD> The Amiga IRQ Virus: It's Out! (December 28, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/anaco001.txt">anaco001.txt</A> <tab to=T><TD> 16048<BR><TD> ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/apply.yam">apply.yam</A> <tab to=T><TD> 4117<BR><TD> APPLICATION: Youths Against McAfee
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/arcvnews01.txt">arcvnews01.txt</A> <tab to=T><TD> 56065<BR><TD> ARCV: The Association of Really Cruel Viruses Newsletter
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/armag911.txt">armag911.txt</A> <tab to=T><TD> 2594<BR><TD> The 911 Virus, Disassembly and Commentary by Black Wolf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/atari101.txt">atari101.txt</A> <tab to=T><TD> 54379<BR><TD> Viruses 101: Chapter 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.001">avcr-01.001</A> <tab to=T><TD> 3088<BR><TD> Amateur Virus Creation Research Group Magazine: Introduction
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.002">avcr-01.002</A> <tab to=T><TD> 39187<BR><TD> Amateur Virus Creation Research Group Magazine: The New DS-512 Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.003">avcr-01.003</A> <tab to=T><TD> 3223<BR><TD> Amateur Virus Creation Research Group Magazine: Nuking, by Thimble
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.004">avcr-01.004</A> <tab to=T><TD> 3605<BR><TD> Amateur Virus Creation Research Group Magazine: The Whore Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.005">avcr-01.005</A> <tab to=T><TD> 24313<BR><TD> Amateur Virus Creation Research Group Magazine: the AMI Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.006">avcr-01.006</A> <tab to=T><TD> 7359<BR><TD> Amateur Virus Creation Research Group Magazine: An Introduction to ASM
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.007">avcr-01.007</A> <tab to=T><TD> 21995<BR><TD> Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.008">avcr-01.008</A> <tab to=T><TD> 22344<BR><TD> Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.009">avcr-01.009</A> <tab to=T><TD> 2881<BR><TD> Amateur Virus Creation Research Group Magazine: Analysis of Connie
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.010">avcr-01.010</A> <tab to=T><TD> 3392<BR><TD> Amateur Virus Creation Research Group Magazine: OhhLala Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.011">avcr-01.011</A> <tab to=T><TD> 4612<BR><TD> Amateur Virus Creation Research Group Magazine: Twister Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avcr-01.012">avcr-01.012</A> <tab to=T><TD> 2892<BR><TD> Amateur Virus Creation Research Group Magazine: Vlamix 1.0
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/avirus.txt">avirus.txt</A> <tab to=T><TD> 4458<BR><TD> Overview of Some Amiga Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/backdoor.txt">backdoor.txt</A> <tab to=T><TD> 6512<BR><TD> Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/baitdet.txt">baitdet.txt</A> <tab to=T><TD> 6722<BR><TD> Advanced Bait Detection by CoKe of VLAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/batvirus.txt">batvirus.txt</A> <tab to=T><TD> 668<BR><TD> Creating a Batch File Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bbinterv.iew">bbinterv.iew</A> <tab to=T><TD> 21652<BR><TD> Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bdinterv.iew">bdinterv.iew</A> <tab to=T><TD> 18873<BR><TD> Interview with A Virus Writer named Blode by The Unforgiven
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bedtime.nfo">bedtime.nfo</A> <tab to=T><TD> 4338<BR><TD> NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/blckbook.txt">blckbook.txt</A> <tab to=T><TD> 24240<BR><TD> The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bluenine.nfo">bluenine.nfo</A> <tab to=T><TD> 9706<BR><TD> A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/braininf.vir">braininf.vir</A> <tab to=T><TD> 4577<BR><TD> Information on the Brain Virus And Variants
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bulgfact.txt">bulgfact.txt</A> <tab to=T><TD> 57241<BR><TD> The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/bulgfactdoc.vir">bulgfactdoc.vir</A> <tab to=T><TD> 57241<BR><TD> The Bulgarian and Soviet Virus Factories
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/catvir.txt">catvir.txt</A> <tab to=T><TD> 10223<BR><TD> How to write a virus program, by the Cheshire Cat
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ccinterv.iew">ccinterv.iew</A> <tab to=T><TD> 8675<BR><TD> Interview with Crom-Cruach of Trident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/chaos.nfo">chaos.nfo</A> <tab to=T><TD> 3677<BR><TD> INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cmvs-1.v1">cmvs-1.v1</A> <tab to=T><TD> 37357<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Number 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cmvs-2.v1">cmvs-2.v1</A> <tab to=T><TD> 60096<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cmvs-3.v1">cmvs-3.v1</A> <tab to=T><TD> 59651<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2000.vir">cnws2000.vir</A> <tab to=T><TD> 14585<BR><TD> Computer Virus Research and Information Service Index
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2001.vir">cnws2001.vir</A> <tab to=T><TD> 17995<BR><TD> Computer Virus Research and Information Service #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2002.vir">cnws2002.vir</A> <tab to=T><TD> 3036<BR><TD> Computer Virus Research and Information Service #2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2003.vir">cnws2003.vir</A> <tab to=T><TD> 5457<BR><TD> Computer Virus Research and Information Service #3
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2004.vir">cnws2004.vir</A> <tab to=T><TD> 44383<BR><TD> Computer Virus Research and Information Service #4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2005.vir">cnws2005.vir</A> <tab to=T><TD> 49238<BR><TD> Computer Virus Research and Information Service #5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2006.vir">cnws2006.vir</A> <tab to=T><TD> 8975<BR><TD> Computer Virus Research and Information Service #6
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2007.vir">cnws2007.vir</A> <tab to=T><TD> 8956<BR><TD> Computer Virus Research and Information Service #7
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cnws2008.vir">cnws2008.vir</A> <tab to=T><TD> 91748<BR><TD> Computer Virus Research and Information Service #8
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/comp.vir">comp.vir</A> <tab to=T><TD> 8320<BR><TD> The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpi-1.txt">cpi-1.txt</A> <tab to=T><TD> 20245<BR><TD> Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpi-2.txt">cpi-2.txt</A> <tab to=T><TD> 99461<BR><TD> Corrupted Programming International Newsletter Issue #2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpi1.vir">cpi1.vir</A> <tab to=T><TD> 24305<BR><TD> CPI Newsletter Volume #1, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpi2.vir">cpi2.vir</A> <tab to=T><TD> 98758<BR><TD> CPI Newsletter Volume #2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpivirus.txt">cpivirus.txt</A> <tab to=T><TD> 23568<BR><TD> Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cpivirus2.txt">cpivirus2.txt</A> <tab to=T><TD> 90571<BR><TD> Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/crcrevue.vir">crcrevue.vir</A> <tab to=T><TD> 55986<BR><TD> Comparison: Products to Detect Changes to Programs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/csvir87.vir">csvir87.vir</A> <tab to=T><TD> 4771<BR><TD> CompuServe Magazine's Virus History Timeline: 1987
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/csvir88.vir">csvir88.vir</A> <tab to=T><TD> 103572<BR><TD> CompuServe Magazine's Virus History Timeline: 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/csvir89.vir">csvir89.vir</A> <tab to=T><TD> 69893<BR><TD> CompuServe Magazine's Virus History Timeline: 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cvirs.html01">cvirs.html01</A> <tab to=T><TD> 10112<BR><TD> C VIRUS 101: An Introduction to Viruses in C
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/cvm.txt">cvm.txt</A> <tab to=T><TD> 23552<BR><TD> Computer Virus Myths by Rob Rosenberger with Ross Greenberg
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut001.txt">datut001.txt</A> <tab to=T><TD> 8220<BR><TD> Scan Strings, How They Work, and How to Avoid Them, by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut002.txt">datut002.txt</A> <tab to=T><TD> 9941<BR><TD> An introduction to Nonoverwriting Virii by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut003.txt">datut003.txt</A> <tab to=T><TD> 14844<BR><TD> An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut004.txt">datut004.txt</A> <tab to=T><TD> 18463<BR><TD> An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut005.txt">datut005.txt</A> <tab to=T><TD> 6571<BR><TD> Code Optimization: A Beginner's Guide by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut006.txt">datut006.txt</A> <tab to=T><TD> 10873<BR><TD> Advanced Polymorphism Primer by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut007.txt">datut007.txt</A> <tab to=T><TD> 8171<BR><TD> SFT's and Their Usage, by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut008.txt">datut008.txt</A> <tab to=T><TD> 17676<BR><TD> EXE Self-Disinfection by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut009.txt">datut009.txt</A> <tab to=T><TD> 11690<BR><TD> Boot Infectors by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/datut010.txt">datut010.txt</A> <tab to=T><TD> 5910<BR><TD> UMB Residency by Dark Angel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/desc.sdi">desc.sdi</A> <tab to=T><TD> 444<BR><TD> NFO: The Smeg Virus Construction Kit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/deth001.rot">deth001.rot</A> <tab to=T><TD> 4661<BR><TD> Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/dhcivwar.txt">dhcivwar.txt</A> <tab to=T><TD> 2206<BR><TD> Relationship Chart of the Civil War and Related Viruses by TridenT (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/dhinterv.iew">dhinterv.iew</A> <tab to=T><TD> 8668<BR><TD> Interview with Dark Helmet of Trident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/diogenesdoc.vir">diogenesdoc.vir</A> <tab to=T><TD> 3217<BR><TD> Diogenes 2.0 Documentation and User Manual
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/dirstlth.txt">dirstlth.txt</A> <tab to=T><TD> 6061<BR><TD> Directory Stealth Techniques of Viruses (FCB)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/drkfib01.txt">drkfib01.txt</A> <tab to=T><TD> 3524<BR><TD> Virus Writers Reply to the SCAN.EXE Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/enigma.asm">enigma.asm</A> <tab to=T><TD> 18797<BR><TD> DISASSEMBLY: The Enigma Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/european.txt">european.txt</A> <tab to=T><TD> 19456<BR><TD> List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/eval.vir">eval.vir</A> <tab to=T><TD> 26111<BR><TD> Anti-Viral Product Evaluation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fester.vir">fester.vir</A> <tab to=T><TD> 10122<BR><TD> Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/firefly.txt">firefly.txt</A> <tab to=T><TD> 19617<BR><TD> The Firefly Virus, by Nikedamus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fish.vir">fish.vir</A> <tab to=T><TD> 9382<BR><TD> Thoughts on the Fish Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fndint21.txt">fndint21.txt</A> <tab to=T><TD> 12608<BR><TD> Finding INT 21's Real Address Using the PSP by Satan's Little Helper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fog.txt">fog.txt</A> <tab to=T><TD> 17483<BR><TD> FOG: A Polymorphic Encription Algorithm by Eclipse
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fullstlt.txt">fullstlt.txt</A> <tab to=T><TD> 10033<BR><TD> A Full Stealth or Disinfection on Open by Blonde of Immortal Riot
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funbot2.cvp">funbot2.cvp</A> <tab to=T><TD> 3190<BR><TD> How the Boot Sequence Operates, Relevant to Virus Infection
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funbot3.cvp">funbot3.cvp</A> <tab to=T><TD> 3465<BR><TD> How the Boot Sequence Operates Relevant to Viral Infection, Part II.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen1.cvp">fungen1.cvp</A> <tab to=T><TD> 2792<BR><TD> Computer Operations and Viral Operations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen2.cvp">fungen2.cvp</A> <tab to=T><TD> 2721<BR><TD> Viral operations: How Viruses Function
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen3.cvp">fungen3.cvp</A> <tab to=T><TD> 2672<BR><TD> How Viruses Use Operating Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen4.cvp">fungen4.cvp</A> <tab to=T><TD> 2629<BR><TD> How Viruses Hide in System Layers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen5.cvp">fungen5.cvp</A> <tab to=T><TD> 2939<BR><TD> How Viruses are Activated
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen6.cvp">fungen6.cvp</A> <tab to=T><TD> 2679<BR><TD> How to Detect Changes made by a Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen7.cvp">fungen7.cvp</A> <tab to=T><TD> 2716<BR><TD> Checking Files for Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen8.cvp">fungen8.cvp</A> <tab to=T><TD> 3033<BR><TD> Checking Files for Viruses, Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungen9.cvp">fungen9.cvp</A> <tab to=T><TD> 2664<BR><TD> Checking the System Files for Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/fungena.cvp">fungena.cvp</A> <tab to=T><TD> 2766<BR><TD> How Viruses Avoid Detection
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funpiv1.cvp">funpiv1.cvp</A> <tab to=T><TD> 2542<BR><TD> Viruses that Affect and Infect Files
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funpiv2.cvp">funpiv2.cvp</A> <tab to=T><TD> 2375<BR><TD> Viruses and how they Insert Themselves
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funpiv3.cvp">funpiv3.cvp</A> <tab to=T><TD> 2529<BR><TD> How to Add a Virus to a Program
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funpiv4.cvp">funpiv4.cvp</A> <tab to=T><TD> 2895<BR><TD> Viral Code "Association"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/funpiv5.cvp">funpiv5.cvp</A> <tab to=T><TD> 2872<BR><TD> Variations of Computer Virus Infection
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/g2.txt">g2.txt</A> <tab to=T><TD> 25600<BR><TD> Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/gao_rpt">gao_rpt</A> <tab to=T><TD> 106252<BR><TD> The General Accounting Office Report on Computer Viruses, 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/gf.txt">gf.txt</A> <tab to=T><TD> 1966<BR><TD> Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/glath.vir">glath.vir</A> <tab to=T><TD> 21116<BR><TD> Computer Viruses: A Rational View, By Dr. Raymond Glath
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/gold-bug.txt">gold-bug.txt</A> <tab to=T><TD> 9373<BR><TD> Analysis of the Gold Bug Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/goodwin.txt">goodwin.txt</A> <tab to=T><TD> 137805<BR><TD> An Analysis of Computer Virus Structures (April 7, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/greetng1.txt">greetng1.txt</A> <tab to=T><TD> 3202<BR><TD> NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/guardian.bbs">guardian.bbs</A> <tab to=T><TD> 29058<BR><TD> The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/guardian.vir">guardian.vir</A> <tab to=T><TD> 53823<BR><TD> The Guardian List, Issue #1, Sept. 25, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hackmisc.9">hackmisc.9</A> <tab to=T><TD> 9303<BR><TD> Hacked/Miscellaneous Dangerous Files, #9
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hate.txt">hate.txt</A> <tab to=T><TD> 1540<BR><TD> BBS AD: The Immortal Hate BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hatedetect.vir">hatedetect.vir</A> <tab to=T><TD> 5984<BR><TD> Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hitler.a86">hitler.a86</A> <tab to=T><TD> 39241<BR><TD> The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hormones.vir">hormones.vir</A> <tab to=T><TD> 19584<BR><TD> Net Hormones: Infection Control using Cooperation among Computers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hr5061.vir">hr5061.vir</A> <tab to=T><TD> 2309<BR><TD> The text of H.R. 5061
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/hysteria.vir">hysteria.vir</A> <tab to=T><TD> 18748<BR><TD> Virus Hysteria! By Richard B. Levin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ibmpaper.vir">ibmpaper.vir</A> <tab to=T><TD> 87040<BR><TD> Coping with Computer Viruses and Related Problems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/identify.txt">identify.txt</A> <tab to=T><TD> 20602<BR><TD> Developing Virus Identification Products, by Tim Sankary, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/illegal.nfo">illegal.nfo</A> <tab to=T><TD> 2083<BR><TD> NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/implemen.mca">implemen.mca</A> <tab to=T><TD> 42307<BR><TD> Implementing Anti-Viral Programs, by John McAfee 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/index.mag">index.mag</A> <tab to=T><TD> 1201<BR><TD> Index to SLAM Magazine Issue #1 (January 1997)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/intro1.cvp">intro1.cvp</A> <tab to=T><TD> 2475<BR><TD> Introduction to the Computer Virual Programs Column
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ivm-95.html">ivm-95.html</A> <tab to=T><TD> 146968<BR><TD> Immortal Virus Magazine Issue #95.html
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/jeru-b.asm">jeru-b.asm</A> <tab to=T><TD> 42115<BR><TD> DISASSEMBLY: The Jerusalem B Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/jeru-dc.vir">jeru-dc.vir</A> <tab to=T><TD> 3328<BR><TD> Analysis of the Jerusalem DC Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/jtinterv.iew">jtinterv.iew</A> <tab to=T><TD> 17375<BR><TD> INTERVIEW: John Tardy of Trident in The Netherlands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/jvvirus.txt">jvvirus.txt</A> <tab to=T><TD> 42968<BR><TD> Jerusalem B Virus Source Code
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/killhead.vir">killhead.vir</A> <tab to=T><TD> 959<BR><TD> Virus Source Code that Destroys the Disk Head
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/levine.pap">levine.pap</A> <tab to=T><TD> 13323<BR><TD> Potential Virus Attack by L. P. Levine
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/lminterv.iew">lminterv.iew</A> <tab to=T><TD> 54289<BR><TD> The Faces Behind the Masks by Sara Gordon (November 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/locprst.txt">locprst.txt</A> <tab to=T><TD> 32002<BR><TD> Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ltlmess.slt">ltlmess.slt</A> <tab to=T><TD> 4005<BR><TD> The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/lzinterv.iew">lzinterv.iew</A> <tab to=T><TD> 20100<BR><TD> INTERVIEW: Lord Zero, Virus Writer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/macv.txt">macv.txt</A> <tab to=T><TD> 24130<BR><TD> How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/malmsey.txt">malmsey.txt</A> <tab to=T><TD> 4058<BR><TD> Information on the Malmsey Virus (October, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mayhem.txt">mayhem.txt</A> <tab to=T><TD> 1384<BR><TD> Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mbfamily.txt">mbfamily.txt</A> <tab to=T><TD> 6942<BR><TD> The Mayberry Family of Virus by HypoDermic
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mbinterv.iew">mbinterv.iew</A> <tab to=T><TD> 13793<BR><TD> INTERVIEW: Metabolis of VLAD (Virus Writing Group)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mcaffvirus.txt">mcaffvirus.txt</A> <tab to=T><TD> 7075<BR><TD> Virus Characteristics, by McAfee Virus Scanning
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mdef.inf">mdef.inf</A> <tab to=T><TD> 4864<BR><TD> The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/melissa.txt">melissa.txt</A> <tab to=T><TD> 13926<BR><TD> The Melissa Macro Virus, a Report Prepared by Robert M. Slade
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/memres.txt">memres.txt</A> <tab to=T><TD> 7779<BR><TD> Some Information on Memory Residence Methods for Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/michael.asm">michael.asm</A> <tab to=T><TD> 6969<BR><TD> DISASSEMBLY: Michelangelo Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/michangl.txt">michangl.txt</A> <tab to=T><TD> 6840<BR><TD> The Michaelangelo Virus Source Code
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mk-chart.txt">mk-chart.txt</A> <tab to=T><TD> 1835<BR><TD> A Virus Relationship Chart of Masud Khafir's Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mkinterv.iew">mkinterv.iew</A> <tab to=T><TD> 12153<BR><TD> INTERVIEW: Masud Khafir of Trident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/mkvirlst.txt">mkvirlst.txt</A> <tab to=T><TD> 17466<BR><TD> A List of Viruses Written by Masud Khafir of Trident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/necro.a86">necro.a86</A> <tab to=T><TD> 22069<BR><TD> Source code for the Necro, A.k.a. "Skull" Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/net.hor">net.hor</A> <tab to=T><TD> 19511<BR><TD> Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/newinstl.txt">newinstl.txt</A> <tab to=T><TD> 1472<BR><TD> Installation Instructions for Nowhere Man's Virus Creation Library v1.00
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/nist01.txt">nist01.txt</A> <tab to=T><TD> 5761<BR><TD> Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/nist02.txt">nist02.txt</A> <tab to=T><TD> 4238<BR><TD> Columbus Day Virus: A Fact Sheet
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/offspr82.txt">offspr82.txt</A> <tab to=T><TD> 1470<BR><TD> DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/p1.txt">p1.txt</A> <tab to=T><TD> 10934<BR><TD> Attack of the Computer Virus, By Lee Dembart
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/pcblkjck.txt">pcblkjck.txt</A> <tab to=T><TD> 4608<BR><TD> Features of Blackjack Virus (PC) (January 24, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/peacevir.vir">peacevir.vir</A> <tab to=T><TD> 2573<BR><TD> Computer Virus Hits Again (The Peace Virus)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ph-vir1.txt">ph-vir1.txt</A> <tab to=T><TD> 19794<BR><TD> Dark Angel's Phunky Virus Writing Guide #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/pngintrv.iew">pngintrv.iew</A> <tab to=T><TD> 9876<BR><TD> INTERVIEW: Persona No Grata of Trident in The Netherlands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/polyflag.txt">polyflag.txt</A> <tab to=T><TD> 18411<BR><TD> A Humble PolyMorphic Engine Primer by Absolute Overlord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/polymorf.txt">polymorf.txt</A> <tab to=T><TD> 31851<BR><TD> Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/polymorph.txt">polymorph.txt</A> <tab to=T><TD> 17432<BR><TD> Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/polymrph.txt">polymrph.txt</A> <tab to=T><TD> 14524<BR><TD> Polymorphic Viruses Escape Detection but Get Our Attention
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/polyvir.txt">polyvir.txt</A> <tab to=T><TD> 6299<BR><TD> Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/popscia86.vir">popscia86.vir</A> <tab to=T><TD> 4472<BR><TD> Popoolar Science virus - a very simple overwriting infector
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/portexec.txt">portexec.txt</A> <tab to=T><TD> 9293<BR><TD> Infection of Portable Executables by Qark and Quantum of VLAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps-vir1.txt">ps-vir1.txt</A> <tab to=T><TD> 19801<BR><TD> Dark Angel's Phunky Virus Writing Guide (Part 1)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps-vir2.txt">ps-vir2.txt</A> <tab to=T><TD> 29546<BR><TD> Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps-vir3.txt">ps-vir3.txt</A> <tab to=T><TD> 20133<BR><TD> Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps-vir4.txt">ps-vir4.txt</A> <tab to=T><TD> 22970<BR><TD> Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps-vir5.txt">ps-vir5.txt</A> <tab to=T><TD> 20131<BR><TD> Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps_vir1.vir">ps_vir1.vir</A> <tab to=T><TD> 19865<BR><TD> Phalcon Skism, Part I
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps_vir2.vir">ps_vir2.vir</A> <tab to=T><TD> 29617<BR><TD> Phalcon Skism, Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps_vir3.vir">ps_vir3.vir</A> <tab to=T><TD> 20204<BR><TD> Phalcon Skism, Part III
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ps_vir4.vir">ps_vir4.vir</A> <tab to=T><TD> 23041<BR><TD> Phalcon Skism, Part IV
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/qkinterv.iew">qkinterv.iew</A> <tab to=T><TD> 15053<BR><TD> INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rab_mem.apl">rab_mem.apl</A> <tab to=T><TD> 3110<BR><TD> APPLICATION to Join RABID by ProTurbo of RABID (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ratboy-1.txt">ratboy-1.txt</A> <tab to=T><TD> 12067<BR><TD> RatBoy's Overwriting Virus Tutorial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/ratboy-2.txt">ratboy-2.txt</A> <tab to=T><TD> 15758<BR><TD> RatBoy's Overwriting Virus Tutorial Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/readlist.vir">readlist.vir</A> <tab to=T><TD> 12800<BR><TD> An abbreviated bibliography for computer viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/resist.txt">resist.txt</A> <tab to=T><TD> 29417<BR><TD> Resist! Further Virus Strategies by Mouth of Sauron
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rjinterv.iew">rjinterv.iew</A> <tab to=T><TD> 31156<BR><TD> An Interactive Interview with Virus-Writer Rajaat of Genesis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/robin.hod">robin.hod</A> <tab to=T><TD> 6655<BR><TD> Viruses and System Security (a story)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut001.txt">rstut001.txt</A> <tab to=T><TD> 13765<BR><TD> Disinfecting an Infected File by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut002.txt">rstut002.txt</A> <tab to=T><TD> 9350<BR><TD> TSR COM Infections by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut003.txt">rstut003.txt</A> <tab to=T><TD> 7782<BR><TD> Constructing Kit on Infecting .COM by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut004.txt">rstut004.txt</A> <tab to=T><TD> 20142<BR><TD> Infection on Closing by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut005.txt">rstut005.txt</A> <tab to=T><TD> 13378<BR><TD> EXE Infections Part I: Infection Process, by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut006.txt">rstut006.txt</A> <tab to=T><TD> 7572<BR><TD> EXE Infectors Part II by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut007.txt">rstut007.txt</A> <tab to=T><TD> 11905<BR><TD> Directory Stealth by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut008.txt">rstut008.txt</A> <tab to=T><TD> 7273<BR><TD> Directory Stealth Method 2 by Rock Steady of NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut009.txt">rstut009.txt</A> <tab to=T><TD> 5350<BR><TD> Memory Stealth by Rock Steady NuKE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rstut010.txt">rstut010.txt</A> <tab to=T><TD> 28965<BR><TD> The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rumors.txt">rumors.txt</A> <tab to=T><TD> 9250<BR><TD> Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/rvlatn1.vir">rvlatn1.vir</A> <tab to=T><TD> 48324<BR><TD> Revelation, a Virus E-Zine, Vol. 1 Issue 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/samson.vir">samson.vir</A> <tab to=T><TD> 5642<BR><TD> Samson's PC Virus List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/scitzo.nfo">scitzo.nfo</A> <tab to=T><TD> 1954<BR><TD> Virus Spotlight: The Scitzo Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/sdwlnd02.ans">sdwlnd02.ans</A> <tab to=T><TD> 3788<BR><TD> ANSI BBS AD: Shadowland BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/six_byte.pad">six_byte.pad</A> <tab to=T><TD> 17377<BR><TD> Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/smallvir.txt">smallvir.txt</A> <tab to=T><TD> 3568<BR><TD> The Smallest Virus I Could Manage (263 Bytes)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/span02.vir">span02.vir</A> <tab to=T><TD> 1735<BR><TD> You can't release the Worm source code, says SPAN
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stealth.txt">stealth.txt</A> <tab to=T><TD> 3798<BR><TD> Elusive New Viruses Can Avoid Detection by Dennis Flanders
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/steroid.vir">steroid.vir</A> <tab to=T><TD> 2304<BR><TD> Discussion of a Trojan Horse program called "Steroid"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stoned-b.txt">stoned-b.txt</A> <tab to=T><TD> 10898<BR><TD> The Stoned-B Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stoned1.vir">stoned1.vir</A> <tab to=T><TD> 3392<BR><TD> To Remove the Marijuana (Stoned) Virus from HD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stoned_d.law">stoned_d.law</A> <tab to=T><TD> 9105<BR><TD> An Explanation of how the Stoned Virus operates by Mike Lawrie
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stormbrg.rt1">stormbrg.rt1</A> <tab to=T><TD> 2158<BR><TD> A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/stormbrg.rt2">stormbrg.rt2</A> <tab to=T><TD> 1554<BR><TD> A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/tag.ans">tag.ans</A> <tab to=T><TD> 14090<BR><TD> ANSI BBS AD: The Adventures of Guild
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/talons01.txt">talons01.txt</A> <tab to=T><TD> 5850<BR><TD> Some Background on PuKE: An Introduction from TLN
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/talons02.txt">talons02.txt</A> <tab to=T><TD> 28869<BR><TD> The True Story about Talon by Talon of NUKE (April, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/talons03.txt">talons03.txt</A> <tab to=T><TD> 2293<BR><TD> An Incredibly Complicated Tale of Mystery and Intrigue
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/talontut.txt">talontut.txt</A> <tab to=T><TD> 7844<BR><TD> Information About Mulipartite Infection of Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/tdoc1.txt">tdoc1.txt</A> <tab to=T><TD> 14961<BR><TD> Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/tdoc2.txt">tdoc2.txt</A> <tab to=T><TD> 5179<BR><TD> Documentation for a Story Program That's Actually a Virus, (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/troj.hac">troj.hac</A> <tab to=T><TD> 4652<BR><TD> Lots of warnings about EGABTR.EXE
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/troj.txt">troj.txt</A> <tab to=T><TD> 7528<BR><TD> Other warnings for other random virus programs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/trojan.vir">trojan.vir</A> <tab to=T><TD> 9191<BR><TD> How someone's BBS got whacked with Viruses in 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/tsrtut.txt">tsrtut.txt</A> <tab to=T><TD> 4484<BR><TD> A Documentation on Creating TSR Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/tuinterv.iew">tuinterv.iew</A> <tab to=T><TD> 6820<BR><TD> Intervue with TU About Virus Creation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/universa.mol">universa.mol</A> <tab to=T><TD> 13613<BR><TD> A universal Detection Model by Chris Ruhl and James Molini
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/usavirus.vir">usavirus.vir</A> <tab to=T><TD> 2175<BR><TD> Supposed use of a computer virus during Desert Storm
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/v101pt1">v101pt1</A> <tab to=T><TD> 14746<BR><TD> Virus 101 - Chapter 1 by George Woodside (March 1, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/v101pt2">v101pt2</A> <tab to=T><TD> 18596<BR><TD> Virus 101 - Chapter 2 by George Woodside (March 6, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/v101pt3">v101pt3</A> <tab to=T><TD> 19444<BR><TD> Virus 101 - Chapter 3, by George Woodside (March 13, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/v101pt4">v101pt4</A> <tab to=T><TD> 5845<BR><TD> Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/varicell.txt">varicell.txt</A> <tab to=T><TD> 5474<BR><TD> The Varicella Virus Source Codes, by Rock Steady
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vdetect.vir">vdetect.vir</A> <tab to=T><TD> 13696<BR><TD> A Universal Virus Detection Model by Chris Ruhl and James Molini
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/verify_r.txt">verify_r.txt</A> <tab to=T><TD> 24830<BR><TD> Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vguide.txt">vguide.txt</A> <tab to=T><TD> 21135<BR><TD> Computer Viruses: A Rational View by Raymond M. Glath
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vi900906.txt">vi900906.txt</A> <tab to=T><TD> 187667<BR><TD> Fidonet Message Base Disucssing Viruses (Summer 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vi901029.txt">vi901029.txt</A> <tab to=T><TD> 181138<BR><TD> Fidonet Message Base Disucssing Viruses (Summer 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vir-1.v1">vir-1.v1</A> <tab to=T><TD> 37205<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vir-2.v1">vir-2.v1</A> <tab to=T><TD> 60027<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vir-3.v1">vir-3.v1</A> <tab to=T><TD> 59654<BR><TD> ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vir.txt">vir.txt</A> <tab to=T><TD> 19800<BR><TD> Dark Angel's Phunky Virus Writing Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vir2.txt">vir2.txt</A> <tab to=T><TD> 29557<BR><TD> Dark Angel's Phunky Virus Writing Guide Installment II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virbillfax.vir">virbillfax.vir</A> <tab to=T><TD> 4169<BR><TD> NCSA Testimony on Virus Bills, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virethic.txt">virethic.txt</A> <tab to=T><TD> 13124<BR><TD> Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virii.txt">virii.txt</A> <tab to=T><TD> 17712<BR><TD> What You Should Know About Computer Viruses by BlenderHead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/viris03.txt">viris03.txt</A> <tab to=T><TD> 7208<BR><TD> Some of the Less Known Viruses (Humor)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virpgm01.txt">virpgm01.txt</A> <tab to=T><TD> 12883<BR><TD> Virus Programming Basics Issue #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virpgm02.txt">virpgm02.txt</A> <tab to=T><TD> 23762<BR><TD> Virus Programming Basics Issue #2: Not So Basic
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virs.vir">virs.vir</A> <tab to=T><TD> 11931<BR><TD> Discussions about the Jerusalem B Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virukpc.txt">virukpc.txt</A> <tab to=T><TD> 13056<BR><TD> Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus">virus</A> <tab to=T><TD> 5314<BR><TD> Virus Attack! By Rick Arnold
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus-al.ert">virus-al.ert</A> <tab to=T><TD> 2065<BR><TD> Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus.html">virus.html</A> <tab to=T><TD> 1821<BR><TD> Virus Discussion on a BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus.kie">virus.kie</A> <tab to=T><TD> 32573<BR><TD> The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus.txt">virus.txt</A> <tab to=T><TD> 5160<BR><TD> Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus1.dna">virus1.dna</A> <tab to=T><TD> 17710<BR><TD> What You Should Know about Computer Viruses by Blinderhead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus1.vir">virus1.vir</A> <tab to=T><TD> 4223<BR><TD> Report on the DATACRIME Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus101.vir">virus101.vir</A> <tab to=T><TD> 58631<BR><TD> Viruses 101: A Information Set
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus101001.vir">virus101001.vir</A> <tab to=T><TD> 13796<BR><TD> Virus 101 Chapter 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus101002.vir">virus101002.vir</A> <tab to=T><TD> 17548<BR><TD> Virus 101 Chapter 2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus101003.vir">virus101003.vir</A> <tab to=T><TD> 18347<BR><TD> Virus 101 Chapter 3
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus101004.vir">virus101004.vir</A> <tab to=T><TD> 4971<BR><TD> Virus 101 Chapter 4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus2.txt">virus2.txt</A> <tab to=T><TD> 11729<BR><TD> The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus3.txt">virus3.txt</A> <tab to=T><TD> 7585<BR><TD> The Virus Informer by Mark E. Bishop: The Macintosh Virus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus4.txt">virus4.txt</A> <tab to=T><TD> 4268<BR><TD> The Virus Informer Chapter 4: The Engine That Kills
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus5.txt">virus5.txt</A> <tab to=T><TD> 49830<BR><TD> The Virus Informer Chapter 5: The Virus List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus6.txt">virus6.txt</A> <tab to=T><TD> 1729<BR><TD> The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus7.txt">virus7.txt</A> <tab to=T><TD> 1762<BR><TD> The Virus Informer by Mark E. Bishop Chapter 7: Next Week
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus_my.ths">virus_my.ths</A> <tab to=T><TD> 27085<BR><TD> Computer Virus Myths, by Rob Rosenberger (1988-1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virus_st.whm">virus_st.whm</A> <tab to=T><TD> 16646<BR><TD> A New Stategy for Computer Viruses by William H. Murray
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusbas.vir">virusbas.vir</A> <tab to=T><TD> 1338<BR><TD> An example of a Virus in BASIC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusbib.txt">virusbib.txt</A> <tab to=T><TD> 4480<BR><TD> Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusbro.vir">virusbro.vir</A> <tab to=T><TD> 9856<BR><TD> Computer Viruses and Trojan Horses; A Guide to Protecting Yourself
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusdet.txt">virusdet.txt</A> <tab to=T><TD> 50981<BR><TD> Virus Detection Alternatives, by Patrick Min
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusdoc.vir">virusdoc.vir</A> <tab to=T><TD> 205175<BR><TD> The Computer Virus Epidemic, 1987-1991. Article Compilation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/viruses.pro">viruses.pro</A> <tab to=T><TD> 10368<BR><TD> How to write a Virus Program, by The Cheshire Cat
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/viruses.txt">viruses.txt</A> <tab to=T><TD> 3123<BR><TD> Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/viruses.uss">viruses.uss</A> <tab to=T><TD> 20740<BR><TD> Viruses in the USSR by Eldar A. Musaev
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusfaq.txt">virusfaq.txt</A> <tab to=T><TD> 84745<BR><TD> FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusinf.vir">virusinf.vir</A> <tab to=T><TD> 9216<BR><TD> A Suggested Readings List for Computer Viruses by Jon Mack
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusl.vir">virusl.vir</A> <tab to=T><TD> 1887<BR><TD> The Virus Informer, Issue #6
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusone.vir">virusone.vir</A> <tab to=T><TD> 4323<BR><TD> The Virus Informer, Issue #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virussum.doc">virussum.doc</A> <tab to=T><TD> 558766<BR><TD> Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virussum.txt">virussum.txt</A> <tab to=T><TD> 607049<BR><TD> The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/virusx.txt">virusx.txt</A> <tab to=T><TD> 14142<BR><TD> Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/vlab102.vir">vlab102.vir</A> <tab to=T><TD> 19999<BR><TD> Viral Lab 102, May 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/wininf01.txt">wininf01.txt</A> <tab to=T><TD> 25224<BR><TD> Windows Executable Infection by Qark and Quantum of VLAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/wininf02.txt">wininf02.txt</A> <tab to=T><TD> 13444<BR><TD> Calling the Windows API in Assembly Language by Qark of VLAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/wordmacro.txt">wordmacro.txt</A> <tab to=T><TD> 86611<BR><TD> FAQ: The MS Word 6.x Macro Viruses FAQ v2.0
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/xyz.txt">xyz.txt</A> <tab to=T><TD> 3424<BR><TD> Information on the XYZ (Examine Your Zipper) Virus (January, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/yam-ivp.nfo">yam-ivp.nfo</A> <tab to=T><TD> 3769<BR><TD> NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="virus/yetiser_">yetiser_</A> <tab to=T><TD> 15345<BR><TD> Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 295 files for a total of 7,012,356 bytes.</SMALL><TR><TD ALIGN=RIGHT><SMALL>There are 2 directories.</SMALL></TABLE><P>
</BODY>
</HTML>
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
either <A HREF="http://archives.textfiles.com/virus.tar.gz"><B>virus.tar.gz</B></A> (2426657 bytes) or <A HREF="http://archives.textfiles.com/virus.zip"><B>virus.zip</B></A> (2772458 bytes) instead of all the files separately. <P>