Malware Museum

Nikoletta Szabo

Today’s malwares are designed to be silent, unnoticeable and effective without drawing the attention of users to their maleficent activities. They steal our credit card and personal details without us realizing it. Although, it was not always the popular way to infect servers/computers. A couple of decades ago viruses usually featured colorful pictures, scrambled codes or even a statement on the corruption of your computer.

 

malware-museum (1)

 

 

Mikko Hermanni Hyppönen, a Finnish chief resource officer has recently collected the viruses from the 1980’s and 1990’s and put them together in an online archive, which is now known as the Malware Museum.

 

Képkivágás

 

 

The contents of the collection include presentations, descriptions and videos on long-forgotten computer viruses. Now, you can safely experience and examine the virus infections of the past decades. Visitors can even download the viruses disposed from the destructive code, leaving only the visual effects behind. You can find viruses ranging from CRASH.COM through LSD.COM to FELLOW.COM

 

malware-museum

 

 

It was a revolutionary idea to create this archive, and its success has been proved by the number of visitors, which almost reached 100,000 since its release. It is a brilliant way to get to know the history of malwares and helps you to become an expert on how they work, which is an essential skill in todays’ technologically advanced world.

Share your ideas with us about this article

Previous posts

How strong is a „strong” password? 1/2
The idea   Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based authentication and we know that this method is far from being ideal – at least in the way many people use it. Let’s imagine a website on which people can create accounts. The web application stores a non-decryptable hash (or more precisely the output of a hash function) of the password given by the user. A hash funct...
The Ninjas Mount Some Docks
Building and deploying Docker – the hottest topic of every devops forum and IT blogs. We kinda had the impression before, that we won’t miss our chances with it either. Why Docker? If you are in the web hosting business, containers and Docker technology cannot be such big news for you. Docker triumphed over virtualization. No wonder, as it has some great tricks up on its sleeves: It resolves the conflict between development and operations. As the dev team has the full control over the execution environment, infrastructures can be changed easily. Even the maintenance of...