enow.com Web Search

  1. Ads

    related to: viruses on linux

Search results

  1. Results from the WOW.Com Content Network
  2. Linux malware - Wikipedia

    en.wikipedia.org/wiki/Linux_malware

    Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses .

  3. Linux.Encoder - Wikipedia

    en.wikipedia.org/wiki/Linux.Encoder

    Linux.Encoder (also known as ELF/Filecoder.A and Trojan.Linux.Ransom.A) is considered to be the first ransomware Trojan targeting computers running Linux. [1] There are additional variants of this Trojan that target other Unix and Unix-like systems. Discovered on November 5, 2015, by Dr. Web, this malware affected at least tens of Linux users. [2]

  4. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    "Ply" – DOS 16-bit based complicated polymorphic virus appeared with a built-in permutation engine. Boza, the first virus designed specifically for Windows 95 files arrives. Laroux, the first Excel macro virus appears. Staog, the first Linux virus attacks Linux machines

  5. Staog - Wikipedia

    en.wikipedia.org/wiki/Staog

    Staog was the first computer virus written for the Linux operating system. It was discovered in the autumn of 1996, and the vulnerabilities that it exploited were fixed soon after. It has not been detected in the wild since its initial outbreak.

  6. Comparison of computer viruses - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_computer_viruses

    By the time the virus is identified, many names have been used to denote the same virus. Ambiguity in virus naming arises when a newly identified virus is later found to be a variant of an existing one, often resulting in renaming. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b ...

  7. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    A simple example is the following malicious version of the Linux sudo command. An attacker would place this script in a publicly writable directory (e.g., /tmp). If an administrator happens to be in this directory and executes sudo, then the Trojan may execute, compromising the administrator's password.

  1. Ads

    related to: viruses on linux