Loveyou virus




















Within the below contents, you can find the origin, development, influences, as well as many other aspects of the virus. It attacked more than 55 million Windows personal computers on and after May 5th, Therefore, it made the unwitting users think that it was a normal text file. Windows would parse file names from right to left, stop at the first period character, and show only those elements to the left of this.

The virus file, having two periods in its name, could display the inner fake txt file extension. However, to open the attachment will activate the visual basic script. It searches connected drives and replaces files with extensions. Yet, MP3s and other audio-related files would be hidden instead of overwritten. The virus propagates itself by sending a copy of the payload to all addresses in the Windows Address Book used by Microsoft Outlook. Therefore, a few people accessing the attachment will finally lead to millions of copies that can cripple email systems and destroy millions of files on computers in each successive network.

The following daybreak, as employees began their daily work, the virus was spread first to Hong Kong, then Europe, and finally the United States. Over 10 days, more than 55 million infections had been reported. What is a Trojan virus? What does a Trojan virus do? How to remove the Trojan virus from your computer? This post shows you the answers. Later, Onel de Guzman removed the geographic restriction out of curiosity, which enabled the malware to spread worldwide.

Since there were no laws in the Philippines against creating malware then, the Philippine Congress enacted Republic Act No. The script adds Windows Registry data for automatic startup on system boot. A user can easily modify the malware to replace important files in the system and destroy the OS. Most variants had to do with what file extensions were affected by the virus.

Some others only modified the credits to the author that were originally included in the standard version of the virus; they remove the author credits completely or reference false authors.

Though it has been over 20 years since the ILOVEYOU virus infection, it is still necessary to know how to protect yourself from losing data once been attacked by similar viruses in the future.

Like Article. Last Updated : 16 Feb, Previous Email Worms. Next Crypto Virus. Recommended Articles. Article Contributed By :. Easy Normal Medium Hard Expert. Writing code in comment? Please use ide. Load Comments. What's New. How to Secure your Website. Remote Desktop Connection Manager. Check Website Safety. Website Virus Scan. Website Malware Removal. Windows Desktop Management Software. Link Scanner. Check Website Reputation. What is Hashing. Check Website for Malware. Website Scam Checker.

Is This Website Safe. How to Learn Hacking. Managed Detection and Response. Scan Link. Got more than 1 PC? Share this article:. Get Now! Resources Tutorials WordPress. Spread the love. Be part of an IT community with thousands of subscribers. Get the latest news, blogs, and thought leadership articles. Subscribe now. Add new comment Your name author.



0コメント

  • 1000 / 1000