A deep dive into the world of DOS viruses

Video thumbnail (Frame 0) Video thumbnail (Frame 2408) Video thumbnail (Frame 3172) Video thumbnail (Frame 4035) Video thumbnail (Frame 5062) Video thumbnail (Frame 5826) Video thumbnail (Frame 6962) Video thumbnail (Frame 8075) Video thumbnail (Frame 9113) Video thumbnail (Frame 10464) Video thumbnail (Frame 11225) Video thumbnail (Frame 12751) Video thumbnail (Frame 13736) Video thumbnail (Frame 14699) Video thumbnail (Frame 17578) Video thumbnail (Frame 19120) Video thumbnail (Frame 19954) Video thumbnail (Frame 20807) Video thumbnail (Frame 21553) Video thumbnail (Frame 22873) Video thumbnail (Frame 24088) Video thumbnail (Frame 25635) Video thumbnail (Frame 26670) Video thumbnail (Frame 27633) Video thumbnail (Frame 29116) Video thumbnail (Frame 29896) Video thumbnail (Frame 31136) Video thumbnail (Frame 32258) Video thumbnail (Frame 33707) Video thumbnail (Frame 39218) Video thumbnail (Frame 40811) Video thumbnail (Frame 42138) Video thumbnail (Frame 43502) Video thumbnail (Frame 44895) Video thumbnail (Frame 46364) Video thumbnail (Frame 47265) Video thumbnail (Frame 49021) Video thumbnail (Frame 49994) Video thumbnail (Frame 50768) Video thumbnail (Frame 51761) Video thumbnail (Frame 53197) Video thumbnail (Frame 54292) Video thumbnail (Frame 55079) Video thumbnail (Frame 55808) Video thumbnail (Frame 56647)
Video in TIB AV-Portal: A deep dive into the world of DOS viruses

Formal Metadata

A deep dive into the world of DOS viruses
Explaining in detail just how those little COM files infected and played with us back in the day
Title of Series
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
It is now 27 years since MS-DOS 5.0 was released. During its day there was the threat of viruses breaking your system or making it act in unpredictable ways. Due to its age and near total lack of consumer use it is safe to assume that all of the viruses for MS-DOS have been written. Using community archives and modern analysis methods we can uncover how they worked and reflect on how things have changed.
Keywords Security

Related Material

Video is cited by the following resource
Malware Route of administration
Rule of inference Execution unit Asynchronous Transfer Mode NP-hard Clique-width Heat transfer Maxima and minima Directory service Menu (computing) Cursor (computers) Device driver Density of states Route of administration Number Read-only memory Convex hull Software testing Hardware-in-the-loop simulation Bus (computing) Right angle MiniDisc
Execution unit NP-hard Online help Electronic program guide Computer file Survival analysis Heat transfer Menu (computing) Field (computer science) Ext functor Letterpress printing Device driver Open set Canadian Light Source Number Computer configuration Software testing Bus (computing) MiniDisc Right angle Extension (kinesiology)
Computer file
Execution unit Server (computing) Computer program Code Computer Computer network Computer Annulus (mathematics) Error message Malware Set (mathematics) System programming Authorization Force Extension (kinesiology)
Computer file
Hooking System call Computer file Computer worm Condition number Electronic visual display
Computer file Code Computer worm Condition number Hydraulic jump
Resource allocation String (computer science) Computer file Computer program Computer worm Condition number Letterpress printing Electronic visual display output Open set
Resource allocation String (computer science) Computer file Code Electronic visual display output Open set
Keyboard shortcut Resource allocation String (computer science) Computer file Code Electronic visual display output Open set
Writing Reading (process) Pointer (computer programming) Parsing Revision control Computer program Inference Code Electronic visual display Open set Route of administration
String (computer science) Inference
Befehlsprozessor Bit
Befehlsprozessor Bit Tunis
Touchscreen Checklist
Read-only memory Code Density of states
Sample (statistics)
Touchscreen Checklist
Sample (statistics) Touch typing Computer file Gastropod shell Route of administration
Pointer (computer programming) Emulator Blog Opcode Hydraulic jump
Execution unit Installation art Computer virus Link (knot theory) Computer program Device driver Virtual memory Sample (statistics) Error message Buffer solution Set (mathematics) Hill differential equation Conditional-access module Chi-squared distribution
Parsing Computer file Computer program Maxima and minima Code Letterpress printing Open set Route of administration Resource allocation String (computer science) Revision control Electronic visual display output Hydraulic jump
Sample (statistics) Code
Sample (statistics) Emulator Blog Computer file Code Gastropod shell Hydraulic jump Route of administration
Emulator Blog Hydraulic jump
Cone penetration test Emulator Blog Read-only memory Code Cartesian closed category Semiconductor memory Hydraulic jump