Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Comparison of computer viruses
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Related lists === *[[List of computer worms]] *[[Timeline of computer viruses and worms]] ==== Unusual subtypes ==== *[[Palm OS viruses]] *[[HyperCard viruses]] *[[Linux malware]] ==== Notable instances ==== *[[Conficker]] *[[Creeper virus]] - The first malware that ran on ARPANET *[[ILOVEYOU]] *[[Leap (computer worm)|Leap]] - Mac OS X Trojan horse *[[Shamoon]] a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by [[Saudi Aramco]]. *[[Storm Worm]] - A Windows trojan horse that forms the [[Storm botnet]] *[[Stuxnet]] First destructive [[Industrial control system|ICS]]-targeting [[Trojan horse (computing)|Trojan]] which destroyed part of [[Iran]]'s nuclear program. The virus destroyed the centrifuge components making it impossible to enrich [[uranium]] to weapons grade. ==== Similar software ==== *[[Adware]] *[[Malware]] *[[Spamming]] *[[Spyware]] *[[Computer worm]] *[[Trojan horse (computing)|Trojan horse]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)