Upload
domenico-barra
View
755
Download
1
Embed Size (px)
Citation preview
V!r0l0gy #malwarez vs#gl!tchart
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.*
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".*
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.*
A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.*
“If A Glitch Is An Unexpected Moment In A System That Calls Attention To That system, Glitch Art Is Anytime An Artist Intentionally leverages That moment, By Either recontextualizing Or Provoking glitches.” (Nick Briz)*
MALWAREZ
GL!Tch_ART
Glitches & computer malwares turn our tech experiences into nightmares but they are part of this whole cyber adventure. The following works are remixes of malwares graphics/payloads created with databending. Let yourself get infected! V!R0L0Gy is online @ -> http://v1r0l0gy.tumblr.com T00lz:
- Audacity V2.1.0 (LADSPA, Nyquist and VST).
- GoldWave V5.70 - Wordpad - Notepad++ V6.7.5 - Photoshop Cs3&&Cs6 - PhotoScape V3.7 - Internet - Gimp2 - XVIV32 V2.55
Databending file format: .raw/.jpg/.jpeg2000/.tif/.png/.bmp/ .gif/.jpf/.pcx/.iff/.pdf/.tga/.eps/ .ico/
Malwares, like glitches, are here to remind us that the machines we are sold and told to be perfect are instead very weak and are very easy to be exploited for one’s own pleasure.
“Every viable computer virus must have at least two basic parts, or subroutines, if it is even to be called a virus. Firstly, it must contain a search routine, which locates new files or new disks which are worthwhile targets for infection. This routine will determine how well the virus reproduces. Secondly, every computer virus must contain a routine to copy itself into the program which the search routine locates. The copy routine will only be sophisticated enough to do its job without getting caught. The smaller it is, the better. computer virus generally contain logic bombs which trigger at a certain date and then display a message or do something annoying or nasty.”* Virology is a glitch art project based on the databending remix of some of the most famous computer virus logic bombs visuals.
http://www.vxheaven.org/lib/vml01.html#c1
*The Giant Black Book of Computer Viruses Mark Ludwig
databending is the artistic alteration of digital information d.0.m-barra
http://v1r0l0gy.tumblr.com/
Frodo Virus (1989)
Virus.DOS.MTZ
Zohra (1999)
Virus.DOS.SkyNet.1448
Hymn Virus (1990)
Fellow.com Virus
Nameless.com Virus
SPARTAK2.2000 Virus
Virus.Multi.Arianna.2864
Virus.DOS.Marine.5000 (1997)
Virus.DOS.TPE.Kela.4568 (1994)
Malware_crew.com
Markiz.2642 (2003)
Virus.DOS.LSD.1600 (1994)
Flame Virus (1998<)
RedCode Virus (1998)
Virus.DOS.Italian.578
V-Sign Virus (1992)
Swen Worm (2003)
Sircam Worm (2001)
Sasser Internet Worm (2004)
OnTheFly (Kournikova) Worm (2001)
Marburg Virus (1998)
Joshi Virus (1990)
Happy99 email/newsgroup worm (1999)
Denzuko Virus (1988)
Concept Macro Virus (1995)
Codered Worm (2001)
Bizatch Virus (1995)
Beagle Email Worm (2004)
h#p://malware.wikia.com/
Coffeeshop-1568 Virus (1992)
The Rescue virus (1997)
VIrus.DOS.Casino.2330 (1991)
Devil’s Dance DOS Virus (1993)
Virus.DOS.NightKing.1568
Virus.DOS.Deliver.Digi.3547 (1995)
Tequila Virus (1921)
Cascade Virus (1987)
Elk Cloner Virus (1982)
Japanese Xmas.Cookie Virus (1992)
Virus.DOS.Murderer.3670 (1997)
Virus.DOS.Walker.3846 (1992)
Michelangelo Virus (1991)
VBS/VBSWG-Z Worm (2001)
Virus.DOS.Leprosy.81- Hellraiser variant (1991)
Virus.DOS.Burma.563 (1997)
Virus.DOS.VCL.Olympic.1440 (1994)
Virus.DOS.Suicide.2048 (1992)
Crash Virus (1998)
Virus.DOS.AIDS.552 (circa 1990)
Virus.DOS.Phantom1 (1994)
HLC Globe-8001B Virus
Win16.Tentacle.10596 Virus (1996)
VBS/Monopoly Worm (1999)
Toadie Virus (1999)
Email-Worm.Win32.Conut (2003)
Virus.DOS.Leprosy.Skism.1992 (1992)
W32/Hybris-F Worm (2000)
Fear-1823 Virus
Email-Worm.Win32.LoveLetter (2000)
Ambulance Virus (1989/1990)
Virus.DOS.Barrotes (1993)
Blaster Worm/Lovesan (2003)
Brain Virus (1986)
W32/Dorf-AE Worm (2007)
Virus.DOS.CMOSDead (1998)
Creeper Internet Worm (1969/71)
CyberAIDS Virus (1988)
Spanska.1509/Elvira Virus (1997)
Virus.Multi.Ithaqua.8030
Datacrime Virus (1989)
Maldal Email Worm (2001)
Virus.DOS.Spanska.1500/Mars Land (1997)
Media Markt Virus (1995)
Worm.Win32.Mydoom/Shimgapi (2004)
Virus.Boot-DOS.Playgame.2000 (1998)
HLLC.Plane Virus (1996)
Virus.DOS.Techno.1123 (1993)
Implant DOS Virus (1996/2007)
Virus.DOS.Leo.3948
SCA Virus (1987)
W32.Music.C.Worm (2000)
W32.Navidad Worm (2000)
WM97/Melissa-AG/Prilissa Virus (1999)
Zafi-D Virus (2004)
Koobface Worm (2008)
Christmas Tree Mass Mailer Worm (1987)
Morris Worm (1988)
ZAPP Virus (1993)
Virus.DOS.First.343 (1997)
Virus.DOS.Virdem (1986)
WTF DOS Virus
Special thanks to: - http://malware.wikia.com - http://t3xtm0.de/ - http://virus.wikidot.com/ - https://archive.org/
details/malwaremuseum
<<<V!R0L0GY>>> is a project
by D0/\/\_b4RR@
iNF3CT3d