logo
Defence blues
History of malware
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
      • Golem Trust Computing Ltd.
      • Department of Silent Stability
      • The Home for Bewildered Beasts of Legend
      • Stormforge
      • Blue team @SOC
      • Reverse engineering
        • Binary formats
        • Cracking nuts
        • Malware analysis
          • History of malware
          • Typical behaviours
          • Purpose of a malware attack
          • Malware signatures
          • Static and dynamic analysis
          • Packers
          • Memory analysis
          • Virtual function reverse engineering tool
          • Analysing Anti-Reverse engineering tricks
          • PE/ELF header parser
          • Dynamic analysis for API monitoring
        • THM Rooms
      • Steganography
      • Cryptanalysis
      • Blue team for dev
      • Blue team @Home
      • Bulletproofing servers
      • Honeytech for humans

    History of malwareΒΆ

    Some small stories on how malicious software (malware) has evolved into the complicated viruses we may be exposed to today.

    • Interview with Ray Tomlinson on Creeper/Reaper

    • Malware spotlight: Wabbit

    • The Animal Episode

    • Elk-Cloner: The 30-year-old prank that became the first computer virus

    • With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988

    • YouTube: Virus.DOS.Cascade

    • onx/CASCADE

    2026-03-23 18:18
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7