Skip to main content

Ferry Bring Peoples From Side To Side On Mekong River Of Cambodia

  Ferry Bring Peoples From Side To Side On Mekong River Of Cambodia Hi Friends, Welcome to my blogger "168 168 Never Quit". This is my new video. if you like this video so please comment, share, subscribe. Thank you very much Rorn Entertainment Channel Mix Plants Along The Street

The World's Worst Computer Virus

May 5, 2000, a very average day for the very average business supervisor. Though in just a couple of hours, it would quickly turn into a day of utter chaos and turmoil. Nearly every install of brand-new computer software damaged beyond repair, over 13,000 pieces of malware detected in just one office building, and soon, over $20 billion in damage seen all across the world. What happened?

These catastrophic events were the work of a new computer worm that was circulating the internet: “ILOVEYOU.” Quite an ironic name, but it was derived from the fact that the worm would disguise itself as a love letter coming from a secret admirer. The worm could subsequently enter the Guinness Book of World Records because the foremost “virulent” What exactly allowed it to purpose this an honest deal damage, and the way did it paintings?

The virus originated in the Philippines and was created by two programmers, Onel De Guzman and his friend, Reonel Ramones. It was allegedly developed by taking other pieces of malicious software found online and putting them all together. The success of the virus relied on Visual Basic Scripting, commonly seen as a .vbs file, and the gullibility of non-tech savvy computer users, who used Windows’ new feature of hiding file extensions by default. The brand-new OS, Windows 2000, was the first version of Windows to implement this change. The option to hide file extensions goes all the way back to Windows 95, but users had to turn this on voluntarily.

The World's Worst Computer Virus
Microsoft made this change to increase convenience for their end users, but as a result, also created the golden opportunity for malware developers. This was something that they could greatly take advantage of, and here’s how: Recipients of the ILOVEYOU worm would receive an email from someone in their Microsoft Outlook contact list, reading as follows: “kindly check the attached LOVELETTER coming from me.” The actual worm was listed as an attachment, and the name of the file shows exactly how the creators carried this out. Although the file ends in .vbs, the extension .txt is delusively added to the file name. When average Windows 2000 users downloaded this file, it would appear as only “.txt” on the desktop, giving the impression that it was a genuine text file.

This alone is why the virus mostly affected computers with Windows 2000, but earlier versions like 95 and 98 could still get infected, as those who didn’t hide file extensions and saw the .vbs at the end just chose to ignore it. The moment the file was actually opened, it would perform the following tasks:
Make multiple copies of itself, some of them hiding in parts of the directory, and others replacing and hiding personal files such as .mp3’s,. jpg’s, and other script types. 

Modify Windows registry keys. Send itself to everyone in your email contact list. Create a file called WIN-BUGSFIX.EXE, which would steal passwords from the user, despite its misleading name. The worm’s ability to cause mass destruction was also attributed to its design. Being a visual basic script, it was super easy for a user to access the source code and do whatever they wanted to with it.

While ILOVEYOU was not the first email worm, it made some big changes from previous ones that would cause it to be the most recognized. A similar virus from the year before known as Melissa, would mass mail itself to the first 50 people in your contact list. ILOVEYOU would send it everyone, allowing it to spread exponentially. Guzman and Ramones were arrested and promptly investigated by Philippines’ National Bureau of Investigation. It was revealed that Guzman had been working on a program designed to steal passwords for his college thesis.

When it was rejected, he dropped out. ILOVEYOU was very similar to this program, and was likely created as a pastime project, as Guzman claimed that he may have released the worm unintentionally. Since there were no official anti-malware laws at the time, all charges were dropped, and Guzman and Ramones were released scot-free. Antivirus laws were created immediately after, allowing the nefarious doings of ILOVEYOU to remain as an infamous part of computer history. So, I am going to be doing a demonstration of how the virus actually works. This was made possible by YouTube user Dan O-O-C-T 1,  I highly suggest you check him out. This will be a very similar demonstration, but I, nonetheless, wanted to try this out for myself.

The World's Worst Computer Virus
It is currently Friday, May 5, 2000. On my computer, I am running Windows 2000, and on my desktop, I have included some files for the virus to overwrite. I have an audio file which is completely functional, and just a standard image.

I am going to open my Microsoft Outlook and check my email. Looks like I have something in my inbox. Well, this looks interesting. “kindly check the attached love letter coming from me.” I guess someone wants to share some undisclosed feelings that they have about me. Let’s go ahead and download that. As you can see, if I turn off the default setting to hide file extensions, the .vbs is here very clearly, but since I have it turned on, I have no idea. This is just an ordinary text file, and I’m curious to see what’s inside.

As you can now see, everyone in my contact list has now been sent a copy of this script. In addition, the files that I showed you earlier, have now been overwritten. They’re gone. Even if I revert it back to the original file extension, nothing.

You can probably see why this was such an issue for businesses, as important files would be permanently erased, and could only be recovered from a backup, if they were so lucky. As mentioned earlier, this virus would only hide some files rather than overwrite them, specifically audio files. As you can see, our mp3 is perfectly fine, just locked away. So, if you were a music producer, you had a much easier way out of this.
Remember when I told you that this virus was known for being easily modifiable?

Well, I will show you just how simple it is to access the source code. All you have to do is right click and select “Edit,” the rest is at your fingertips. Many other programmers who were also emailed the virus could send out their own version, and that’s exactly what they did. Some of them showed absolutely no mercy, and rather than destroying files, destroyed the entire operating system. If we replace is, and jse with “exe” and “com,” these files will be replaced with the worm.
Let’s go ahead and restart, shall we?
Thank you so much for watching, 



Comments

Popular posts from this blog

Apple Keyboard Evolution 1983-2015

I don’t have a Lisa Keyboard, and they’re quite rare and expensive. But here’s what it looked like, it was quite large and clunky. Although not really any wider than a modern Apple keyboard . So, this is the original Macintosh keyboard. It’s kind of tall, and notice that it has no arrow keys, no function keys and no number pad. Apparently, Steve Jobs believed that everybody would use the mouse for everything, except typing. It uses an RJ-11 type connector, similar to a phone cord. The mouse actually had its own separate connector, and did not connect to the keyboard at all. This is about as basic as it gets. I can plug my telephone into it, for some reason. So, one thing I noticed about this is that there are no indicators on where to put your fingers. I’ve never heard a keyboard echo before. It’s not real springy or anything. It does have… …metallic kind of noise to it. But, DAVID: This is the Apple Desktop Bus keyboard. As the name suggests, this was the first keyboard to use the new

The AdLib Gold Experience

Greetings folks, and today on LGR I am proud to present the fabled AdLib Gold 1000 Stereo Sound Adapter. An IBM PC-compatible sound card which, after multiple delays, launched at a suggested price of $299 in the US sometime in late 1992. More or less, its release is a bit complicated but we’ll get to that. For now lemme just go ahead and say how much I’m freak in’ out with excitement recording this footage. Cuz dude, seeing an AdLib Gold in person, still in the box, unused? Among retro PC enthusiasts, that’s like finding a golden unicorn that craps diamonds, it’s just not a thing. Yet here it is, looking’ spiffy! And it’s all thanks to Trixter, aka Jim Leonard of The Old-school PC, Check out his YouTube channel if you’re into this kind of thing too, the man’s a fountain of knowledge and some of the items in his collection are literally one of a kind. Not the least of which being this pristine AdLib Gold 1000, a card that I’ve been wondering about ever since I was eight years old lookin

IBM 8516 Touchscreen CRT Monitor

Greetings and welcome to LGR Oddware where were taking a look at hardware and software that is odd, forgotten, and obsolete! And today it is the IBM 8516 CRT touchscreen from the beginning of the 1990s. And yeah you can touch and draw and do all kinds of things that you would normally do with a mouse or light pen or whatever else -- just with your fingers! And so let’s see what this thing is and what it can do. All right so this is the IBM PS/2 Model 8516 13-inch CRT touchscreen monitor first introduced in June of 1991 for a suggested retail price of $1695 US dollars, holy crap. That would be almost $3,100 at the time of this recording, not a cheap price for a 13-inch VGA monitor back then.  It was built by IBM to be compatible with PCs running DOS, Windows 3 -- and IBM OS/2 of course, because they were still pushing it rather hard when this came out. And as advanced and awesome as it was for its time it was not the first of its kind as far as touchscreen CRTs, not by a long shot.  For

The Advantech I.Q. Unlimited with BASIC and a Z80 CPU.

Hello, and welcome back to the 8-Bit Guy. In this episode, I want to show you this bizarre little computer known as the IQ Unlimited by Advantech. Now, you might be wondering “What is this company Advantech?” Well, if you turn the computer over you’ll see it was actually produced by Video Technology Electronics, otherwise known as V-Tech.” Yes, that’s the same V-Tech that has produced tons of cordless telephones, kids learning computers, baby monitors, and a variety of other things. They are also the ones that built the Laser 128, which was an Apple II clone, along with the matching Laser XT which was a PC clone. They also produced the laser line of portable computers, and even a series of proprietary desktop computers that carried the laser brand name. So, needless to say V-Tech is no stranger to making computers. But, I think this may be the strangest one they ever made. The front of the box claims it to be complete, powerful, simple, and affordable. They are also those that built th

Words of Krom Ngoy

Words of Kram Ngoy This Brahma song is translated to tell Khmer men and women To be mindful should be diligent. Do not be lazy, do not be too stupid, try to learn numbers, learn the alphabet Learn all the virtues, supernatural wisdom combined with ideas. Born to see through, even from afar           Really good at thinking about everything. Fools do not wake up like blind people on both sides           There is no image of a cheap sinner born ignorant. The human race, though high and low, descended from the Pao clan.           Evil, good, black and white, cut off descendants like ancestors. Ignorant people are not venerated as a religion           The monks know the Dharma, the students study hard. The ignorant breed is not very wise, the crooked breed is not very gentle           Straight seed until the true seed does not disappear. Innocent parents do not want their children to be ignorant           Cursing for the children to know. Ignorant father sees his son never angry          

The best gaming laptop for MS-DOS games

The other day, I used to be reading this old Computes Gazette magazine from 1983. and that I saw this card you'll send off for more information. happen if I filled it out and sent it off? Well, stick around till the top and I'll show you the result. Most of the time, stepping into Retro Gaming are often quite challenge. Even the old Atari 2600 her, for instance, it are often very challenging to seek out a contemporary TV or monitor that you simply. On the brilliant side, the games are pretty easy to affect. All you've got to try to to is locate them online, or thrift shop, or whatever and you purchase the sport, and you recognize, But, things get even harder once you start watching old computers. For instance, the Commodore 64 uses a disk format that's essentially foreign today.  It's no means to attach to the web, and albeit you've got a pile of blank disks, getting the games copied over to them from the web could be a nightmare. Now, if you fast forward just a

Strangest Computer Designs of the '80s

OMG Mr. LGR!!! You made my day showing the Seiko computer watch series. I collect these things and Have almost  the entire lineup up including the weird UC-2200. The only one I'm missing is the "wrist mac" which was essentially a Seiko RC4400 but marketed and sold for Apple. It could be considered the first apple watch! That design for the Elwro-800 actually seems pretty good and I wish I had it for the C64 back in the day. That wire holder could have been used for holding a computer magazine with a user made program which they always had in the magazines back in the day. Even now it would be good for data input from a written copy, or even writers who like to get their pre-writing done on paper. They were the machines we were taught Turing language on -- and compiling even a tiny Turing program on them was unbelievably slow.  I really liked the GUI on them though, but we never really used the GUI much; all the programming we did was in a text file run through a compiler

Will Kill Your Computer

Hey guys, this is Austin, and this is the USB Killer. Now, it might not look like much, however this will straight up kill your computer. So, this is a device that’s used to test hardware, so while it looks like an ordinary USB device, instead, there’s a series of capacitors inside. So, if you plug it into a computer, it will charge those capacitors up, and once they’re full it turns around and releases all of that power at 240 volts straight back into the computer, in theory killing it. It doesn’t take much to be able to pop this thing open. Now, before we proceed: Do not try this at home. Seriously. Not only is it very possible for this thing to kill electronics, but it’s also. And by being careful, I mean don’t try this at home. We have an Asus Chrome book.  Now, USB Killer claims that this is going to work on around 95 percent of computers, and the reason for that is that while some computers have properly capped USB ports, most have completely unprotected ports, which means that i

Lost Colony of Roanoke

 The broken anchor is pretty sketch. Sounds like the colony might have been wiped out and Smith not wanting to return to England and say "my bad they all died" was able to save face by saying "We have proof they are safe and moved location.  Near the end of the 16th century, a man by the name of John White embarked on a transatlantic voyage. His destination was the island of Roanoke along the southeastern coast of North America. On this island, White had established an English colony some three years before and he was now returning to resume his position as Governor. After a long and difficult journey, White finally reached the site of the colony only to find the more than one hundred men, women, and children had left behind had disappeared. Before White had a chance to conduct a more extensive search, the ship returned to England and in its wake, it left a mystery.  Raleigh was soon thereafter knighted by Queen Elizabeth I and the new land was to be named Virginia in ho

BootSkin XP - A Boot Screen Customization Tool for Windows XP

 Hello everybody and welcome back . We’re going to be taking a look at a pretty cool little piece of software for Windows XP, and there’s also a version for Windows Vista, called BootSkin. And this is a little bit of an older program. This was released, I want to say, somewhere in the mid-2000s. This is actually a piece of software that I used on a couple of my Windows XP , and even some my Windows Vista machines like over 10 years ago. It’s been a while since I’ve used this piece of software. But what this software allows you to do is, as you can probably tell by the name, it allows you to skin and customize your Windows boot screen, add a little bit more personality to your system and make your boot screen look more unique so, you know it’s gonna be much different than everybody else’s which just says Windows XP when it boots up. And this is made by a company called StarDock and I’ve used a couple of different StarDock programs before there’s another one of my favorite programs from