ILOVEYOU (computer Virus)
   HOME





ILOVEYOU (computer Virus)
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on 4 May 2000 and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". Windows computers often hide the latter file extension (" VBS", a type of interpreted file) by default because it is an extension for a file type that Windows knows, leading unwitting users to think it was a normal text file. Opening the attachment activates the Visual Basic script. First, the worm inflicts damage on the local machine, overwriting random files (including Office files and image files; however, it hides MP3 files instead of deleting them), then, it copies itself to all addresses in the Windows Address Book used by Microsoft Outlook, allowing it to spread much faster than any other previous email worm. Onel de Guzman, a then-24-year-old computer science student at AMA C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Manila
Manila, officially the City of Manila, is the Capital of the Philippines, capital and second-most populous city of the Philippines after Quezon City, with a population of 1,846,513 people in 2020. Located on the eastern shore of Manila Bay on the island of Luzon, it is classified as a Cities of the Philippines#Independent cities, highly urbanized city. With , Manila is one of the world's List of cities proper by population density, most densely populated cities proper. Manila was the first chartered city in the country, designated bPhilippine Commission Act No. 183on July 31, 1901. It became autonomous with the passage of Republic Act No. 409, "The Revised Charter of the City of Manila", on June 18, 1949. Manila is considered to be part of the world's original set of global cities because its commercial networks were the first to extend across the Pacific Ocean and connect Asia with the Hispanic America, Spanish Americas through the Manila galleon, galleon trade. This marked t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AMA Computer University
AMA University, also known as AMA Computer University (AMACU) or simply AMA, is a private, nonsectarian, for-profit university in Quezon City, Philippines. History AMA Institute of Computer Studies AMA University and its sister school AMA Computer College (AMACC) were founded by Amable R. Aguiluz V, who named them after the initials of his father's name, Amable Mendoza Aguiluz Sr. Aguiluz founded the AMA Institute of Computer Studies with the first computer school located along Shaw Boulevard on October 20, 1980. Back then, AMA Institute of Computer Studies offered only short-term courses in Electronic Data Processing Fundamentals, Basic Programming, and Technology Career. Three students enrolled at the AMA Institute of Computer Studies during the first semester. AMA Computer College, branches and sister schools AMA Computer College was created in June 1981. It extended its services through a four-year Bachelor of Science degree program in Computer Science. With only a hand ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were used in the Microsoft Windows, Windows line of operating systems. While IE has been discontinued on most Windows editions, it remains supported on certain editions of Windows, such as Windows 10 editions#Organizational editions, Windows 10 LTSB/LTSC. Starting in 1995, it was first released as part of the add-on package Microsoft Plus!, Plus! for Windows 95 that year. Later versions were available as free downloads or in-service packs and included in the original equipment manufacturer (OEM) service releases of Windows 95 and later versions of Windows. Microsoft spent over per year on Internet Explorer in the late 1990s, with over 1,000 people involved in the project by 1999. In 2016, Microsoft Edge (series of web browsers), Microsoft Edge w ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Trojan Horse (computing)
In computing, a trojan horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising itself as a normal program. Trojans are generally spread by some form of social engineering (security), social engineering. For example, a user may be duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or into clicking on a fake advertisement on the Internet. Although their payload can be anything, many modern forms act as a backdoor (computing), backdoor, contacting a controller who can then have unauthorized access to the affected device. Ransomware attacks are often carried out using a trojan. Unlike computer viruses and Computer worm, worms, trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves. Origins of the term The term is derived from the Ancient Greece, ancient Greek story of the deceptive Trojan Horse ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microsoft Windows Library Files
The Microsoft Windows operating system and Microsoft Windows SDK support a collection of shared libraries that software can use to access the Windows API. This article provides an overview of the core libraries that are included with every modern Windows installation, on top of which most Windows applications are built. Library Sources The Windows operating system contains compiled versions of these libraries known as dynamically-linked libraries ( .dll), which are executable libraries that can be used by multiple programs while only one copy of the library is loaded into memory. These are canonically referred to as system libraries and all programs installed on the system can utilize them. The Windows SDK additionally distributes compiled versions of these libraries known as statically-linked libraries ( .lib), which are non-executable libraries that, in whole or in part, can be embedded into a program when it is compiled. The most common Windows compilers being Micr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Reboot
In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be either a cold reboot (alternatively known as a hard reboot) in which the power to the system is physically turned off and back on again (causing an initial boot of the machine); or a warm reboot (or soft reboot) in which the system restarts while still powered up. The term restart (as a system command) is used to refer to a reboot when the operating system closes all programs and finalizes all pending input and output operations before initiating a soft reboot. Terminology Etymology Early electronic computers (like the IBM 1401) had no operating system and little internal memory. The input was often a stack of punch cards or via a switch register. On systems with cards, the computer was initiated by pressing a start button that performed a single command - "read a card". This first card then instructed the machine to read more card ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Directory (computing)
In computing, a directory is a file system cataloging structure that contains references to other computer files, and possibly other directories. On many computers, directories are known as folders or drawers, analogy, analogous to a workbench or the traditional office filing cabinet. The name derives from books like a telephone directory that lists the phone numbers of all the people living in a certain area. Files are organized by storing related files in the same directory. In a hierarchical file system (that is, one in which files and directories are organized in a manner that resembles a tree structure, tree), a directory contained inside another directory is called a subdirectory. The terms parent and child are often used to describe the relationship between a subdirectory and the directory in which it is cataloged, the latter being the parent. The top-most directory in such a filesystem, which does not have a parent of its own, is called the root directory. The freedesktop ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Guardian
''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardian'' is part of the Guardian Media Group, owned by the Scott Trust Limited. The trust was created in 1936 to "secure the financial and editorial independence of ''The Guardian'' in perpetuity and to safeguard the journalistic freedom and liberal values of ''The Guardian'' free from commercial or political interference". The trust was converted into a limited company in 2008, with a constitution written so as to maintain for ''The Guardian'' the same protections as were built into the structure of the Scott Trust by its creators. Profits are reinvested in its journalism rather than distributed to owners or shareholders. It is considered a newspaper of record in the UK. The editor-in-chief Katharine Viner succeeded Alan Rusbridger in 2015. S ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Email Attachment
An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. History, and technical detail Originally, ARPANET, UUCP, and Internet SMTP email allowed 7-bit ASCII text only. Text files were emailed by including them in the message body. In the mid 1980s text files could be grouped with UNIX tools such as bundle and shar (shell archive) and included in email message bodies, allowing them to be unpacked on remote UNIX systems with a single shell command. The COMSYS/MSGDMS system at MIT offered "Enclosures" beginning by 1976. Users inside COMSYS could receive the enclosure file directly. Messages sent to users out of the COMSYS world sent the enclosure as part of the message body, which was useful only for text files. Attaching non-text files was first accomplished in 1980 by manually encoding 8-bit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Windows Script Host
The Microsoft Windows Script Host (WSH) (formerly named Windows Scripting Host) is an automation technology for Microsoft Windows operating systems that provides scripting abilities comparable to batch files, but with a wider range of supported features. This tool was first provided on Windows 95 after Build 950a on the installation discs as an optional installation configurable and installable by means of the Control Panel, and then a standard component of Windows 98 (Build 1111) and subsequent and Windows NT 4.0 Build 1381 and by means of Service Pack 4. WSH is also a means of automation for Internet Explorer via the installed WSH engines from IE Version 3.0 onwards; at this, time VBScript became a means of automation for Microsoft Outlook 97. WSH is also an optional install provided with a VBScript and JScript engine for Windows CE 3.0 and following; some third-party engines, including Rexx and other forms of BASIC, are also available. It is language-independent in that it can ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of the longest-running newspapers in the United States, the ''Times'' serves as one of the country's Newspaper of record, newspapers of record. , ''The New York Times'' had 9.13 million total and 8.83 million online subscribers, both by significant margins the List of newspapers in the United States, highest numbers for any newspaper in the United States; the total also included 296,330 print subscribers, making the ''Times'' the second-largest newspaper by print circulation in the United States, following ''The Wall Street Journal'', also based in New York City. ''The New York Times'' is published by the New York Times Company; since 1896, the company has been chaired by the Ochs-Sulzberger family, whose current chairman and the paper's publ ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Trojan Horse (computing)
In computing, a trojan horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising itself as a normal program. Trojans are generally spread by some form of social engineering (security), social engineering. For example, a user may be duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or into clicking on a fake advertisement on the Internet. Although their payload can be anything, many modern forms act as a backdoor (computing), backdoor, contacting a controller who can then have unauthorized access to the affected device. Ransomware attacks are often carried out using a trojan. Unlike computer viruses and Computer worm, worms, trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves. Origins of the term The term is derived from the Ancient Greece, ancient Greek story of the deceptive Trojan Horse ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]