VIRUS SOURCE BANCK
- جمعه, ۱۵ آبان ۱۳۹۴، ۰۲:۱۸ ب.ظ
VIRUS SOURCE
| Filename |
Size |
Description of the Textfile |
| DOCUMENTATION | Documentation for Different Viruses and Programs | |
| NCSA | NCSA Virus Reports | |
| 800-5.txt | 82314 | A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992 |
| abaittut.txt | 14720 | Information on the "Anti-Bait" Method of Virus Transmission |
| adebgtut.txt | 15848 | Anti-Debugger Techniques by The Master Hides Behind the Mask |
| agents.txt | 36769 | McAfee Associates Agent Listing (February 23, 1993) |
| allvirus.vir | 22209 | PC Virus Listing, by Jim Goodwin, 1989 |
| allvirusdf.vir | 30897 | Slightly Updated Version of Jim Goodwin's List. |
| amigvir1.txt | 3314 | A History of the Amiga Viruses, by Paul M. of POISON Cracking Association |
| amigvir2.txt | 6144 | A History of the Amiga Viruses by Ed Earing |
| amigvir3.txt | 1920 | The Amiga IRQ Virus: It's Out! (December 28, 1988) |
| anaco001.txt | 16048 | ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring |
| apply.yam | 4117 | APPLICATION: Youths Against McAfee |
| arcvnews01.txt | 56065 | ARCV: The Association of Really Cruel Viruses Newsletter |
| armag911.txt | 2594 | The 911 Virus, Disassembly and Commentary by Black Wolf |
| atari101.txt | 54379 | Viruses 101: Chapter 1 |
| avcr-01.001 | 3088 | Amateur Virus Creation Research Group Magazine: Introduction |
| avcr-01.002 | 39187 | Amateur Virus Creation Research Group Magazine: The New DS-512 Virus |
| avcr-01.003 | 3223 | Amateur Virus Creation Research Group Magazine: Nuking, by Thimble |
| avcr-01.004 | 3605 | Amateur Virus Creation Research Group Magazine: The Whore Virus |
| avcr-01.005 | 24313 | Amateur Virus Creation Research Group Magazine: the AMI Virus |
| avcr-01.006 | 7359 | Amateur Virus Creation Research Group Magazine: An Introduction to ASM |
| avcr-01.007 | 21995 | Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat |
| avcr-01.008 | 22344 | Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat |
| avcr-01.009 | 2881 | Amateur Virus Creation Research Group Magazine: Analysis of Connie |
| avcr-01.010 | 3392 | Amateur Virus Creation Research Group Magazine: OhhLala Virus |
| avcr-01.011 | 4612 | Amateur Virus Creation Research Group Magazine: Twister Virus |
| avcr-01.012 | 2892 | Amateur Virus Creation Research Group Magazine: Vlamix 1.0 |
| avirus.txt | 4458 | Overview of Some Amiga Viruses |
| backdoor.txt | 6512 | Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD |
| baitdet.txt | 6722 | Advanced Bait Detection by CoKe of VLAD |
| batvirus.txt | 668 | Creating a Batch File Virus |
| bbinterv.iew | 21652 | Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert |
| bdinterv.iew | 18873 | Interview with A Virus Writer named Blode by The Unforgiven |
| bedtime.nfo | 4338 | NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992) |
| blckbook.txt | 24240 | The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991) |
| bluenine.nfo | 9706 | A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994) |
| braininf.vir | 4577 | Information on the Brain Virus And Variants |
| bulgfact.txt | 57241 | The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria |
| bulgfactdoc.vir | 57241 | The Bulgarian and Soviet Virus Factories |
| catvir.txt | 10223 | How to write a virus program, by the Cheshire Cat |
| ccinterv.iew | 8675 | Interview with Crom-Cruach of Trident |
| chaos.nfo | 3677 | INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995) |
| cmvs-1.v1 | 37357 | ViriiSearch: The Virus Research Newsletter Volume 1 Number 1 |
| cmvs-2.v1 | 60096 | ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992) |
| cmvs-3.v1 | 59651 | ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992) |
| cnws2000.vir | 14585 | Computer Virus Research and Information Service Index |
| cnws2001.vir | 17995 | Computer Virus Research and Information Service #1 |
| cnws2002.vir | 3036 | Computer Virus Research and Information Service #2 |
| cnws2003.vir | 5457 | Computer Virus Research and Information Service #3 |
| cnws2004.vir | 44383 | Computer Virus Research and Information Service #4 |
| cnws2005.vir | 49238 | Computer Virus Research and Information Service #5 |
| cnws2006.vir | 8975 | Computer Virus Research and Information Service #6 |
| cnws2007.vir | 8956 | Computer Virus Research and Information Service #7 |
| cnws2008.vir | 91748 | Computer Virus Research and Information Service #8 |
| comp.vir | 8320 | The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990) |
| cpi-1.txt | 20245 | Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989) |
| cpi-2.txt | 99461 | Corrupted Programming International Newsletter Issue #2 |
| cpi1.vir | 24305 | CPI Newsletter Volume #1, 1989 |
| cpi2.vir | 98758 | CPI Newsletter Volume #2 |
| cpivirus.txt | 23568 | Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989) |
| cpivirus2.txt | 90571 | Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989) |
| crcrevue.vir | 55986 | Comparison: Products to Detect Changes to Programs |
| csvir87.vir | 4771 | CompuServe Magazine's Virus History Timeline: 1987 |
| csvir88.vir | 103572 | CompuServe Magazine's Virus History Timeline: 1988 |
| csvir89.vir | 69893 | CompuServe Magazine's Virus History Timeline: 1989 |
| cvirs.101 | 10112 | C VIRUS 101: An Introduction to Viruses in C |
| cvm.txt | 23552 | Computer Virus Myths by Rob Rosenberger with Ross Greenberg |
| datut001.txt | 8220 | Scan Strings, How They Work, and How to Avoid Them, by Dark Angel |
| datut002.txt | 9941 | An introduction to Nonoverwriting Virii by Dark Angel |
| datut003.txt | 14844 | An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel |
| datut004.txt | 18463 | An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel |
| datut005.txt | 6571 | Code Optimization: A Beginner's Guide by Dark Angel |
| datut006.txt | 10873 | Advanced Polymorphism Primer by Dark Angel |
| datut007.txt | 8171 | SFT's and Their Usage, by Dark Angel |
| datut008.txt | 17676 | EXE Self-Disinfection by Dark Angel |
| datut009.txt | 11690 | Boot Infectors by Dark Angel |
| datut010.txt | 5910 | UMB Residency by Dark Angel |
| desc.sdi | 444 | NFO: The Smeg Virus Construction Kit |
| deth001.rot | 4661 | Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH] |
| dhcivwar.txt | 2206 | Relationship Chart of the Civil War and Related Viruses by TridenT (1993) |
| dhinterv.iew | 8668 | Interview with Dark Helmet of Trident |
| diogenesdoc.vir | 3217 | Diogenes 2.0 Documentation and User Manual |
| dirstlth.txt | 6061 | Directory Stealth Techniques of Viruses (FCB) |
| drkfib01.txt | 3524 | Virus Writers Reply to the SCAN.EXE Program |
| enigma.asm | 18797 | DISASSEMBLY: The Enigma Virus |
| european.txt | 19456 | List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre |
| eval.vir | 26111 | Anti-Viral Product Evaluation |
| fester.vir | 10122 | Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow |
| firefly.txt | 19617 | The Firefly Virus, by Nikedamus |
| fish.vir | 9382 | Thoughts on the Fish Virus |
| fndint21.txt | 12608 | Finding INT 21's Real Address Using the PSP by Satan's Little Helper |
| fog.txt | 17483 | FOG: A Polymorphic Encription Algorithm by Eclipse |
| fullstlt.txt | 10033 | A Full Stealth or Disinfection on Open by Blonde of Immortal Riot |
| funbot2.cvp | 3190 | How the Boot Sequence Operates, Relevant to Virus Infection |
| funbot3.cvp | 3465 | How the Boot Sequence Operates Relevant to Viral Infection, Part II. |
| fungen1.cvp | 2792 | Computer Operations and Viral Operations |
| fungen2.cvp | 2721 | Viral operations: How Viruses Function |
| fungen3.cvp | 2672 | How Viruses Use Operating Systems |
| fungen4.cvp | 2629 | How Viruses Hide in System Layers |
| fungen5.cvp | 2939 | How Viruses are Activated |
| fungen6.cvp | 2679 | How to Detect Changes made by a Virus |
| fungen7.cvp | 2716 | Checking Files for Viruses |
| fungen8.cvp | 3033 | Checking Files for Viruses, Part II |
| fungen9.cvp | 2664 | Checking the System Files for Viruses |
| fungena.cvp | 2766 | How Viruses Avoid Detection |
| funpiv1.cvp | 2542 | Viruses that Affect and Infect Files |
| funpiv2.cvp | 2375 | Viruses and how they Insert Themselves |
| funpiv3.cvp | 2529 | How to Add a Virus to a Program |
| funpiv4.cvp | 2895 | Viral Code "Association" |
| funpiv5.cvp | 2872 | Variations of Computer Virus Infection |
| g2.txt | 25600 | Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993) |
| gao_rpt | 106252 | The General Accounting Office Report on Computer Viruses, 1988 |
| gf.txt | 1966 | Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization |
| glath.vir | 21116 | Computer Viruses: A Rational View, By Dr. Raymond Glath |
| gold-bug.txt | 9373 | Analysis of the Gold Bug Virus |
| goodwin.txt | 137805 | An Analysis of Computer Virus Structures (April 7, 1989) |
| greetng1.txt | 3202 | NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993) |
| guardian.bbs | 29058 | The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989) |
| guardian.vir | 53823 | The Guardian List, Issue #1, Sept. 25, 1989 |
| hackmisc.9 | 9303 | Hacked/Miscellaneous Dangerous Files, #9 |
| hate.txt | 1540 | BBS AD: The Immortal Hate BBS |
| hatedetect.vir | 5984 | Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 1988) |
| hitler.a86 | 39241 | The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993 |
| hormones.vir | 19584 | Net Hormones: Infection Control using Cooperation among Computers |
| hr5061.vir | 2309 | The text of H.R. 5061 |
| hysteria.vir | 18748 | Virus Hysteria! By Richard B. Levin |
| ibmpaper.vir | 87040 | Coping with Computer Viruses and Related Problems |
| identify.txt | 20602 | Developing Virus Identification Products, by Tim Sankary, 1989 |
| illegal.nfo | 2083 | NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994) |
| implemen.mca | 42307 | Implementing Anti-Viral Programs, by John McAfee 1989 |
| index.mag | 1201 | Index to SLAM Magazine Issue #1 (January 1997) |
| intro1.cvp | 2475 | Introduction to the Computer Virual Programs Column |
| ivm-95.1 | 146968 | Immortal Virus Magazine Issue #95.1 |
| jeru-b.asm | 42115 | DISASSEMBLY: The Jerusalem B Virus |
| jeru-dc.vir | 3328 | Analysis of the Jerusalem DC Virus |
| jtinterv.iew | 17375 | INTERVIEW: John Tardy of Trident in The Netherlands |
| jvvirus.txt | 42968 | Jerusalem B Virus Source Code |
| killhead.vir | 959 | Virus Source Code that Destroys the Disk Head |
| levine.pap | 13323 | Potential Virus Attack by L. P. Levine |
| lminterv.iew | 54289 | The Faces Behind the Masks by Sara Gordon (November 1994) |
| locprst.txt | 32002 | Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions |
| ltlmess.slt | 4005 | The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992) |
| lzinterv.iew | 20100 | INTERVIEW: Lord Zero, Virus Writer |
| macv.txt | 24130 | How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager |
| malmsey.txt | 4058 | Information on the Malmsey Virus (October, 1992) |
| mayhem.txt | 1384 | Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992) |
| mbfamily.txt | 6942 | The Mayberry Family of Virus by HypoDermic |
| mbinterv.iew | 13793 | INTERVIEW: Metabolis of VLAD (Virus Writing Group) |
| mcaffvirus.txt | 7075 | Virus Characteristics, by McAfee Virus Scanning |
| mdef.inf | 4864 | The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies |
| melissa.txt | 13926 | The Melissa Macro Virus, a Report Prepared by Robert M. Slade |
| memres.txt | 7779 | Some Information on Memory Residence Methods for Viruses |
| michael.asm | 6969 | DISASSEMBLY: Michelangelo Virus |
| michangl.txt | 6840 | The Michaelangelo Virus Source Code |
| mk-chart.txt | 1835 | A Virus Relationship Chart of Masud Khafir's Viruses |
| mkinterv.iew | 12153 | INTERVIEW: Masud Khafir of Trident |
| mkvirlst.txt | 17466 | A List of Viruses Written by Masud Khafir of Trident |
| necro.a86 | 22069 | Source code for the Necro, A.k.a. "Skull" Virus |
| net.hor | 19511 | Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers |
| newinstl.txt | 1472 | Installation Instructions for Nowhere Man's Virus Creation Library v1.00 |
| nist01.txt | 5761 | Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989 |
| nist02.txt | 4238 | Columbus Day Virus: A Fact Sheet |
| offspr82.txt | 1470 | DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993) |
| p1.txt | 10934 | Attack of the Computer Virus, By Lee Dembart |
| pcblkjck.txt | 4608 | Features of Blackjack Virus (PC) (January 24, 1989) |
| peacevir.vir | 2573 | Computer Virus Hits Again (The Peace Virus) |
| ph-vir1.txt | 19794 | Dark Angel's Phunky Virus Writing Guide #1 |
| pngintrv.iew | 9876 | INTERVIEW: Persona No Grata of Trident in The Netherlands |
| polyflag.txt | 18411 | A Humble PolyMorphic Engine Primer by Absolute Overlord |
| polymorf.txt | 31851 | Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura |
| polymorph.txt | 17432 | Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura |
| polymrph.txt | 14524 | Polymorphic Viruses Escape Detection but Get Our Attention |
| polyvir.txt | 6299 | Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992) |
| popscia86.vir | 4472 | Popoolar Science virus - a very simple overwriting infector |
| portexec.txt | 9293 | Infection of Portable Executables by Qark and Quantum of VLAD |
| ps-vir1.txt | 19801 | Dark Angel's Phunky Virus Writing Guide (Part 1) |
| ps-vir2.txt | 29546 | Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator |
| ps-vir3.txt | 20133 | Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II |
| ps-vir4.txt | 22970 | Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I |
| ps-vir5.txt | 20131 | Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II |
| ps_vir1.vir | 19865 | Phalcon Skism, Part I |
| ps_vir2.vir | 29617 | Phalcon Skism, Part II |
| ps_vir3.vir | 20204 | Phalcon Skism, Part III |
| ps_vir4.vir | 23041 | Phalcon Skism, Part IV |
| qkinterv.iew | 15053 | INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven |
| rab_mem.apl | 3110 | APPLICATION to Join RABID by ProTurbo of RABID (1991) |
| ratboy-1.txt | 12067 | RatBoy's Overwriting Virus Tutorial |
| ratboy-2.txt | 15758 | RatBoy's Overwriting Virus Tutorial Part II |
| readlist.vir | 12800 | An abbreviated bibliography for computer viruses |
| resist.txt | 29417 | Resist! Further Virus Strategies by Mouth of Sauron |
| rjinterv.iew | 31156 | An Interactive Interview with Virus-Writer Rajaat of Genesis |
| robin.hod | 6655 | Viruses and System Security (a story) |
| rstut001.txt | 13765 | Disinfecting an Infected File by Rock Steady of NuKE |
| rstut002.txt | 9350 | TSR COM Infections by Rock Steady of NuKE |
| rstut003.txt | 7782 | Constructing Kit on Infecting .COM by Rock Steady of NuKE |
| rstut004.txt | 20142 | Infection on Closing by Rock Steady of NuKE |
| rstut005.txt | 13378 | EXE Infections Part I: Infection Process, by Rock Steady of NuKE |
| rstut006.txt | 7572 | EXE Infectors Part II by Rock Steady of NuKE |
| rstut007.txt | 11905 | Directory Stealth by Rock Steady of NuKE |
| rstut008.txt | 7273 | Directory Stealth Method 2 by Rock Steady of NuKE |
| rstut009.txt | 5350 | Memory Stealth by Rock Steady NuKE |
| rstut010.txt | 28965 | The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993) |
| rumors.txt | 9250 | Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey |
| rvlatn1.vir | 48324 | Revelation, a Virus E-Zine, Vol. 1 Issue 1 |
| samson.vir | 5642 | Samson's PC Virus List |
| scitzo.nfo | 1954 | Virus Spotlight: The Scitzo Virus |
| sdwlnd02.ans | 3788 | ANSI BBS AD: Shadowland BBS |
| six_byte.pad | 17377 | Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991 |
| smallvir.txt | 3568 | The Smallest Virus I Could Manage (263 Bytes) |
| span02.vir | 1735 | You can't release the Worm source code, says SPAN |
| stealth.txt | 3798 | Elusive New Viruses Can Avoid Detection by Dennis Flanders |
| steroid.vir | 2304 | Discussion of a Trojan Horse program called "Steroid" |
| stoned-b.txt | 10898 | The Stoned-B Virus |
| stoned1.vir | 3392 | To Remove the Marijuana (Stoned) Virus from HD |
| stoned_d.law | 9105 | An Explanation of how the Stoned Virus operates by Mike Lawrie |
| stormbrg.rt1 | 2158 | A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses |
| stormbrg.rt2 | 1554 | A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995) |
| tag.ans | 14090 | ANSI BBS AD: The Adventures of Guild |
| talons01.txt | 5850 | Some Background on PuKE: An Introduction from TLN |
| talons02.txt | 28869 | The True Story about Talon by Talon of NUKE (April, 1994) |
| talons03.txt | 2293 | An Incredibly Complicated Tale of Mystery and Intrigue |
| talontut.txt | 7844 | Information About Mulipartite Infection of Viruses |
| tdoc1.txt | 14961 | Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993) |
| tdoc2.txt | 5179 | Documentation for a Story Program That's Actually a Virus, (1993) |
| troj.hac | 4652 | Lots of warnings about EGABTR.EXE |
| troj.txt | 7528 | Other warnings for other random virus programs |
| trojan.vir | 9191 | How someone's BBS got whacked with Viruses in 1984 |
| tsrtut.txt | 4484 | A Documentation on Creating TSR Viruses |
| tuinterv.iew | 6820 | Intervue with TU About Virus Creation |
| universa.mol | 13613 | A universal Detection Model by Chris Ruhl and James Molini |
| usavirus.vir | 2175 | Supposed use of a computer virus during Desert Storm |
| v101pt1 | 14746 | Virus 101 - Chapter 1 by George Woodside (March 1, 1989) |
| v101pt2 | 18596 | Virus 101 - Chapter 2 by George Woodside (March 6, 1989) |
| v101pt3 | 19444 | Virus 101 - Chapter 3, by George Woodside (March 13, 1989) |
| v101pt4 | 5845 | Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989) |
| varicell.txt | 5474 | The Varicella Virus Source Codes, by Rock Steady |
| vdetect.vir | 13696 | A Universal Virus Detection Model by Chris Ruhl and James Molini |
| verify_r.txt | 24830 | Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991 |
| vguide.txt | 21135 | Computer Viruses: A Rational View by Raymond M. Glath |
| vi900906.txt | 187667 | Fidonet Message Base Disucssing Viruses (Summer 1990) |
| vi901029.txt | 181138 | Fidonet Message Base Disucssing Viruses (Summer 1990) |
| vir-1.v1 | 37205 | ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1 |
| vir-2.v1 | 60027 | ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992) |
| vir-3.v1 | 59654 | ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992) |
| vir.txt | 19800 | Dark Angel's Phunky Virus Writing Guide |
| vir2.txt | 29557 | Dark Angel's Phunky Virus Writing Guide Installment II |
| virbillfax.vir | 4169 | NCSA Testimony on Virus Bills, 1990 |
| virethic.txt | 13124 | Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992) |
| virii.txt | 17712 | What You Should Know About Computer Viruses by BlenderHead |
| viris03.txt | 7208 | Some of the Less Known Viruses (Humor) |
| virpgm01.txt | 12883 | Virus Programming Basics Issue #1 |
| virpgm02.txt | 23762 | Virus Programming Basics Issue #2: Not So Basic |
| virs.vir | 11931 | Discussions about the Jerusalem B Virus |
| virukpc.txt | 13056 | Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989 |
| virus | 5314 | Virus Attack! By Rick Arnold |
| virus-al.ert | 2065 | Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989 |
| virus.1 | 1821 | Virus Discussion on a BBS |
| virus.kie | 32573 | The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology |
| virus.txt | 5160 | Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man |
| virus1.dna | 17710 | What You Should Know about Computer Viruses by Blinderhead |
| virus1.vir | 4223 | Report on the DATACRIME Virus |
| virus101.vir | 58631 | Viruses 101: A Information Set |
| virus101001.vir | 13796 | Virus 101 Chapter 1 |
| virus101002.vir | 17548 | Virus 101 Chapter 2 |
| virus101003.vir | 18347 | Virus 101 Chapter 3 |
| virus101004.vir | 4971 | Virus 101 Chapter 4 |
| virus2.txt | 11729 | The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop |
| virus3.txt | 7585 | The Virus Informer by Mark E. Bishop: The Macintosh Virus |
| virus4.txt | 4268 | The Virus Informer Chapter 4: The Engine That Kills |
| virus5.txt | 49830 | The Virus Informer Chapter 5: The Virus List |
| virus6.txt | 1729 | The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service |
| virus7.txt | 1762 | The Virus Informer by Mark E. Bishop Chapter 7: Next Week |
| virus_my.ths | 27085 | Computer Virus Myths, by Rob Rosenberger (1988-1992) |
| virus_st.whm | 16646 | A New Stategy for Computer Viruses by William H. Murray |
| virusbas.vir | 1338 | An example of a Virus in BASIC |
| virusbib.txt | 4480 | Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988 |
| virusbro.vir | 9856 | Computer Viruses and Trojan Horses; A Guide to Protecting Yourself |
| virusdet.txt | 50981 | Virus Detection Alternatives, by Patrick Min |
| virusdoc.vir | 205175 | The Computer Virus Epidemic, 1987-1991. Article Compilation |
| viruses.pro | 10368 | How to write a Virus Program, by The Cheshire Cat |
| viruses.txt | 3123 | Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988 |
| viruses.uss | 20740 | Viruses in the USSR by Eldar A. Musaev |
| virusfaq.txt | 84745 | FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992) |
| virusinf.vir | 9216 | A Suggested Readings List for Computer Viruses by Jon Mack |
| virusl.vir | 1887 | The Virus Informer, Issue #6 |
| virusone.vir | 4323 | The Virus Informer, Issue #1 |
| virussum.doc | 558766 | Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman |
| virussum.txt | 607049 | The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman |
| virusx.txt | 14142 | Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses |
| vlab102.vir | 19999 | Viral Lab 102, May 1994 |
| wininf01.txt | 25224 | Windows Executable Infection by Qark and Quantum of VLAD |
| wininf02.txt | 13444 | Calling the Windows API in Assembly Language by Qark of VLAD |
| wordmacro.txt | 86611 | FAQ: The MS Word 6.x Macro Viruses FAQ v2.0 |
| xyz.txt | 3424 | Information on the XYZ (Examine Your Zipper) Virus (January, 1994) |
| yam-ivp.nfo | 3769 | NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992) |
| yetiser_ | 15345 | Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993 |
- ۹۴/۰۸/۱۵