The future of viruses and operating systems.
32464c1664cc47a4bf3c0b876cddde062fddee18fae70800755ea07d8d03b00d
An overview and Analysis of the LOVE-LETTER-FOR-YOU virus/worm.
91e72ac403333b1d6fa854a57c316306f67a39f3f33d59b7d9fe29d968376dcd
Trojans: what they are, different kinds of trojans (RATs, keyloggers, password trojans etc') for Unix and Windows, how to look out for trojans and defeat them etc'. Everything you always wanted to know about trojans but were afraid to ask (in fear of appearing to be lame).
35cd278dc8708c046f0ccb7340296c5676e446468e162fa3226e24714507ea84
Computer Viruses as Artificial Life: A consideration of computer viruses as artificial life - self-replicating organisms
b321c4b8fb90b38fa572954743c0600fc539f18b4f49260f5607e40719e03f9c
Frequently Asked Questions on VIRUS-L/compvirus
4b52313f35e3d742045819277d3c303dbb03bb0ed5fbec704526d91f08f0c5b2
The Internet Worm Program: An Analysis: A description of the algorithms used by the Internet Worm program of November 2, 1988
affa84c4a62ed1123918b7a64289ba5cf8cc9d19567ee5cdad990ab88edae0ba
The Internet Worm Incident A description of the events involved in the Internet Worm of November 2, 1988
8eb9f7185ac48e4ccca04ccc9a7510dabb32136d2718846650061924075abaa7
An Overview of Computer Viruses in a Research Environment: An examination of computer viruses as malicious logic in a research and development environment and current techniques in controlling the threats of viruses and other malicious logic programs
0d4fd86ba91ab95156476f18d275bae8d226bb68ef7aff97b000018727d3f480
Computer Viruses and Related Threats: A Management Guide: Guidelines for preventing, deterring, containing, and recovering from attacks of viruses and related threats A report from the US National Institute of Standards and Technology
87c8afcd6d9d623f45edd83119016001c48473a5d562e1c35f62a181abc6f91e
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988: A detailed description of the events of the Internet Worm of November 2, 1988 from one of the teams of people who combatted it
44d4224d79222ad2ef47daf229f207f80e3d78def17c4108c0f665a3714a19ef
A Guide to the Selection of Anti-Virus Tools and Techniques: Criteria for judging the functionality, practicality, and convenience of anti-virus tools A report from the US National Institute of Standards and Technology
46c6a24ca3f2b9bcfcc9156ad003b4ea8a8fdf09d178fab97cf22da1a6404fed
A Tour of the Worm: A tour of the Internet Worm of November 2, 1988
511c3658eaa1afa261ca31a420dda36e6547a72cdd13c93eecc0ec7f0f2b5cee
Computer Security: The GAO's report on the Internet Worm of November, 1988, and on the then-current state of Internet vulnerabilities and prosecution of computer virus cases
1e93c0cf71353c788dc9aa6071ef90c75d86691628b2eb40a144e35953895f1b