{"id":21,"date":"2007-09-14T10:06:08","date_gmt":"2007-09-14T08:06:08","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/09\/21\/happy-birthday-computer-viruses\/"},"modified":"2007-09-14T10:06:08","modified_gmt":"2007-09-14T08:06:08","slug":"happy-birthday-computer-viruses","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/","title":{"rendered":"Happy Birthday Computer Viruses!"},"content":{"rendered":"<p>This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday occurrences, it\u2019s easy to ignore that the first computer virus that got into the wild is as old, in computer years, as Methusalah.<\/p>\n<p>It was called Elk Cloner, and it was the work of a 15-year old high school student named Rick Skrenta. He developed a boot sector virus &#8211; the kind that hides in parts of a disk that contain no actual files &#8211; that he circulated via floppy disks in his school and a local computer club. While we are more familiar with the vast number of viruses that target Windows computers, it is interesting to note that this first virus affected only Apple II computers.<\/p>\n<p>Fortunately, this virus did no harm, but rather displayed a \u201cpoem\u201d:<\/p>\n<blockquote><p>\nElk Cloner: The program with a personality<br \/>\nIt will get on all your disks<br \/>\u2028It will infiltrate your chips<br \/>\u2028Yes it&#8217;s Cloner!<br \/>\nIt will stick to you like glue<br \/>\u2028It will modify RAM too<br \/>\nSend in the Cloner!<\/p>\n<\/blockquote>\n<p>When Skrenta was asked about this virus in 2007, he said it was &#8220;some dumb little practical joke.&#8221;<\/p>\n<p>For more on the history of computer viruses, you can check out <a href=\"http:\/\/www.news.com\/A-20-year-plague\/2009-7349_3-5111410.html\">this CNet article<\/a>  that looks at the evolution in self-replicating computer code, from the first worm (1975) to the more recent plague of computer viruses, and <a href=\"http:\/\/en.wikipedia.org\/wiki\/Timeline_of_notable_computer_viruses_and_worms\">this Wikipedia timeline of computer viruses<\/a>. And while you\u2019re at it, make sure to keep your copy of <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">Intego VirusBarrier X4<\/a> up to date to make sure your Mac won\u2019t get infected. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday occurrences, it\u2019s easy to ignore that the first computer virus that got into the wild is as old, in computer years, as Methusalah. It was called Elk Cloner, and it was [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Happy Birthday Computer Viruses! - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-09-14T08:06:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/\",\"name\":\"Happy Birthday Computer Viruses! - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-09-14T08:06:08+00:00\",\"dateModified\":\"2007-09-14T08:06:08+00:00\",\"description\":\"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Happy Birthday Computer Viruses!\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Happy Birthday Computer Viruses!\",\"datePublished\":\"2007-09-14T08:06:08+00:00\",\"dateModified\":\"2007-09-14T08:06:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage\"},\"wordCount\":273,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/","og_locale":"en_US","og_type":"article","og_title":"Happy Birthday Computer Viruses! - The Mac Security Blog","og_description":"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday","og_url":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-09-14T08:06:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/","name":"Happy Birthday Computer Viruses! - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-09-14T08:06:08+00:00","dateModified":"2007-09-14T08:06:08+00:00","description":"This year, some computer users may want to celebrate a peculiar anniversary: the computer virus is 25 years old. While viruses have become everyday","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Happy Birthday Computer Viruses!"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Happy Birthday Computer Viruses!","datePublished":"2007-09-14T08:06:08+00:00","dateModified":"2007-09-14T08:06:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-birthday-computer-viruses\/#webpage"},"wordCount":273,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-l","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/21"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/21\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=21"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=21"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}