Vous êtes sur la page 1sur 29

Contents

Articles
Glossary of Internet-related terminology List of computer system manufacturers Timeline of computer viruses and worms Timeline of popular Internet services Timeline of Microsoft Windows 1 3 8 16 22

References
Article Sources and Contributors Image Sources, Licenses and Contributors 26 27

Article Licenses
License 28

Glossary of Internet-related terminology

Glossary of Internet-related terminology


As the Internet has expanded and new technologies have arisen in relation to the Internet, so has new terminology, abbreviations, and neologisms. Here is a list of Internet-related terminology.

World Wide Web


<dfn>spamming</dfn> the act of sending unsolicited email, or posting many useless messages in a forum or such website. (Possibly derived from a Monty Python sketch, in which Vikings repetitively sing about SPAM, annoying the other customers.) <dfn>blogging</dfn> using online "web logs", or blogs <dfn>googling</dfn> searching through the Google search engine <dfn>egosurfer</dfn> someone who searches the Internet for references of himself <dfn>ID-10-T</dfn> clueless user; everybody giving a hard time to (computer) administrators <dfn>mouse potato</dfn> someone who spends a lot of time at the computer, in analogy to the term 'couch potato' for TV-addicts. Also known as a "Comp Head" in relation to a crack cocaine addict, or "coke head". <dfn>troll</dfn> someone who attempts to gain infamy in chat or on forums by use of but not limited to: links to disturbing items, bashing (fighting, put down) with others, copying or mimicking other's real posts into perverted messages. <dfn>HTML</dfn> HyperText Markup Language, the coding language used to create hypertext documents for the World Wide Web. In HTML, a block of text can be surrounded with tags that indicate how it should appear (for example, in bold face or italics). Also, in HTML a word, a block of text, or an image can be linked to another file on the Web. HTML files are viewed with a World Wide Web browser. <dfn> CSS</dfn> Cascading Style Sheets; while HTML dictates the content of page, CSS regulates the format, including headers, footers, navigation bars, etc. While all of these elements can be created in HTML, such a method would have to be repeated on every web page. CSS on the other hand, is applied to all pages of a website. <dfn>PHP</dfn> PHP Hypertext Preprocessor, the coding language to create interactive web pages and so forth. <dfn>trashers</dfn> someone who searches for information via whatever means needed which would compromise the security of a site. This activity often includes searching trash or refuse disposed in recycle bins of from the facility. <dfn>youtuber</dfn> a person who produces video content for the video sharing site Youtube.

Glossary of Internet-related terminology <dfn> Tweet</dfn> A term given to the small message sent by a user of the website Twitter. <dfn> flamer</dfn> A flamer is someone who makes degrading or insulting remarks on a forum or other Internet message board, the verb of which is 'flame'. <dfn> griefer</dfn> A player of an online game who harasses other players. This term was made popular by Minecraft, a game in which players can build objects and structures out of blocks. In multiplayer servers, a 'griefer' is someone who destroys other people's creations. <dfn> noob</dfn> A new or unexperienced person, someone who does not know the rules of a website, or has only recently joined <dfn> The Game</dfn> A popular mind game, often referred to on public message boards as a way to irritate other users <dfn> leet</dfn> Leet, or '1337', is a term used to describe someone who is unnaturally adept at a certain trait or ability. Main usage is often centered around video games. <dfn> win</dfn> Similar to 'leet', 'win' expresses an ability to perform an otherwise impossible act through pure luck or practice, or an object or statement that constitutes an amusing or amazing element <dfn> fail</dfn> The opposite of 'win', 'fail' expresses an ability to incorrectly perform acts ranging from idiotically simple to impossibly difficult, often consisting of an amusing element. <dfn> friending</dfn> Describes the act of making and adding friends online through social networking sites such as Facebook and MySpace. <dfn> unfriend</dfn> The act of removing someone from a list of friends on social networking profiles of Facebook, MySpace or Bebo. It is also the Oxford dictionary's 2009 Word of the Year. <dfn> Cyberbully</dfn> A bully who harasses his or her victims online through various means such as spamming, defaming or negative impersonation of the victim. <dfn> Phishing</dfn> The act of attempting to obtain private or sensitive information such as user names, passwords and credit card information through the use of fake emails from trustworthy sites. <dfn> Redditor</dfn> A person who scours the internet for media and posts the findings on the website. Once posted the other members can upvote or downvote the material, for quality.

Glossary of Internet-related terminology

TCP/IP or ISP
<dfn>ADSL</dfn> Asymmetric Digital Subscriber Line is a technology for transmitting digital information at a high bandwidth on existing phone lines to homes and businesses. ADSL is asymmetric in the sense that it uses most of the channel to transmit downstream to the user and only a small part to receive information from the user. This means, high download rates and slower upload rates. Generally if you see 2Mb ADSL broadband, it refers to 2 Mbit/s Max d/load rate. The upload rate will probably be around 256 kbit/s Max. (ADSL has a maximum download rate of 8 Mbit/s, ADSL2 is capable of up to 16 Mbit/s and ADSL2+ is rated at 24 Mbit/s maximum.) <dfn>Cable modem</dfn> Primary competitor to ADSL, uses digital information transmitted over a cable television infrastructure. <dfn>Dial-up</dfn> A method of connection to the internet using existing copper phone lines using a modem on the client's end to send information at a slow speed, normally reaching maximum speed at about 56 kbit/s. This technology uses the voice spectrum of the telephone lines to transmit data using a system of sounds that only the receiving modem or ISP understand.

List of computer system manufacturers


This list is incomplete. The following is a list of notable computer system manufacturers.

Current
ABS Computer Technologies (Parent: Newegg) Acer eMachines Gateway Packard Bell Aigo AMAX Amstrad Apple Ascendant Computers Asus AVADirect Averatec AXIOO International Axiomtek Belinea BenQ Bluechip Computer Cerise Computers

Chip PC Clevo Cline

List of computer system manufacturers Commodore Gaming Cray CyberPower PC Cybernet Manufacturing Data General Dell Alienware Averatec Dera Dino PC Doxx Computer Egenera Falcon Northwest Fujitsu Gateway, Inc. Gericom Gigabyte Groupe Bull HLBS Tech (P) Limited Hardcore Computer Hasee Hewlett-Packard Compaq VoodooPC HCL Infosystems Ltd Hitachi IBM Integrated Intellect Corporation IGEL Jetta International Kohjinsha Kontron AG Lanix Lanner Inc LanSlide Gaming PCs Lenovo LG Lotus Computer [1] Maingear MDG Computers Mecer Medion Mesh Computers Micro-Star International (MSI)

Micro Center Mitac International Corp.

List of computer system manufacturers Motion Computing Inc. NEC Corp Nedfield NV (formerly: Tulip Computers) NEO Neos Computers Novatech Olidata Olivetti Oracle Corporation Sun Microsystems Origin PC Panasonic Polywell Prolink Puget Systems Q2 Radioactive PC Redfox Sager Notebook Computers Samsung Electronics Sharp Shuttle Inc. SGI Socket Mobile Inc. Sony Stone Computers Systemax Circuit City CompUSA TigerDirect System76 SuperMicro TabletKiosk Tadpole Computer TIME The PC Heaven Toshiba TriGem Computer, Inc Tyan Unisys V3 Gaming PC Velocity Micro ViewSonic Viglen

Viking Computers Vigor Gaming WidowPC

List of computer system manufacturers Winbook Wipro Infotech Wortmann Wyse Technology Inc. Xitrix Computer Corporation Zenith Computers Zinox Computers Zoostorm Zotac

Defunct
Alliant Computer Systems - Ceased operations in 1992. Altos Computer Systems - acquired by Acer in 1990. Amdahl Corporation - A wholly owned subsidiary of Fujitsu since 1997. Apollo Computer - Acquired by Hewlett-Packard in 1989. Apricot Computers - ceased operations in 1999. Ardent Computer - Merged with Stellar Computer to form Stardent in 1989. AST Computers, LLC - Exited the computer market in 2001. Atari Corporation AT&T Austin Computer Systems Burroughs - Merged with Sperry to form Unisys in 1986. Celerity Computing - Acquired by Floating Point Systems in 1988. Commodore International - declared bankruptcy in 1994. Compaq - Acquired by Hewlett-Packard in 2002. CompuAdd - filed for bankruptcy in 1993. Control Data Corporation (CDC) - Shrank as units were spun off from 1988 to 1992; remainder is now Ceridian. Convex Computer - purchased by Hewlett-Packard in 1995 Corona Data Systems - among the original "IBM PC Compatible" clone makers Cromemco Digital Equipment Corporation - Acquired by Compaq in 1998. Eagle Computer - ceased operations in 1986. EckertMauchly Computer - Acquired by Remington Rand in 1950. Elonex Encore Computer - Acquired by Gores Technology Group in 1998 and renamed to Encore Real Time Computing, which Gores then sold to Compro Computer Services in 2002. English Electric - merged into International Computers Limited. Everex - US subsidiary closed its doors in 2009. Evesham - merged into TIME Computers. Fountain Technologies - parent company of Quantex Microsystems filed for bankruptcy in 2000. Franklin Computer Corporation - exited computer hardware business and reorganized into Franklin Electronic Publishers. General Electric - Sold its computer division to Honeywell in 1970.

Gould Electronics - Sold its computer division to Nippon Mining in 1988, who in turn sold it to Encore Computer later that year. Honeywell - Sold its computer division to Groupe Bull in 1991. International Computers and Tabulators - merged into International Computers Limited.

List of computer system manufacturers International Computers Limited - now part of Fujitsu. Kaypro - filed for bankruptcy in 1992. Leading Edge - Mid '80s leader in PC Clone for the masses - Manufacturing done first by Mitsubishi then Daewoo Magnuson Computer Systems - filed for bankruptcy in early 1980s. Mitsubishi Electronics - Closed computer systems division in 1990 Manufactured systems for Leading Edge and Sperry-Unisys MPC (formerly MicronPC)[2] - Filed Chapter 11 bankruptcy on November 7, 2008. Efforts at reorganization failed. Multiflow Computer - Ceased operations in 1990. NeXT - acquired by Apple Computer in 1996. Northgate Computer Systems - Acquired by Lan Plus in 1997, after filing for Chapter 11 bankruptcy in 1994; Lan Plus later renamed itself Northgate Innovations. Osbourne Computer - Ceased operations in 1985; rights to the Osbourne brand were sold to Mikrolog. PC Brand - acquired by Tandon Corporation in 1991.[3] Printaform Processor Technology - Ceased operations in 1979. Psystar - Under 2009 permanent injunction to stop selling computers with Apple's Mac OS X operating system. Psystar's web site has disappeared. Pyramid Technology - Acquired by Siemens in 1995. Radio Shack RCA - Exited the computer business in 1971; Sperry Rand took over RCA's installed base in 1972. Remington Rand - Acquired by Sperry to form Sperry Rand in 1955. Scientific Data Systems - Acquired by Xerox in 1969. Sequent Computer Systems - Acquired by IBM in 1999. Simply Computers - merged into Misco/Systemax. Sinclair Research - acquired by Amstrad in 1986. Solbourne Computer - Acquired by Deloitte Consulting in 2008. Sperry - Merged with Burroughs to form Unisys in 1986. Sperry Rand - Dropped "Rand" from its name in 1978 and continued as Sperry. Stardent - Ceased operations in 1992. Stellar Computer - Merged with Ardent Computer to form Stardent in 1989. Sun Microsystems - A wholly owned subsidiary of Oracle since 2009. Systems Engineering Laboratories - Acquired by Gould Electronics in 1981 and became Gould's computer division. Tandy Corporation - Previous parent company of RadioShack, produced the TRS-80 and Tandy 1000 and 2000 IBM PC compatible computers. Sold their computer division to AST Computers in the early 1990s. Tiny Computers - merged into TIME Computers. Wang Laboratories - acquired by Getronics in 1999. XByte Computers Xerox - Exited the computer business. Zeos - merged into MPC Corporation in 1996, which in turn filed for Chapter 11 bankruptcy in 2008. Zepto Computers A/S - On 17 November 2009 Zepto Computer was declared bankrupt, after several tries to save the company.[4]

List of computer system manufacturers

References
[1] http:/ / www. lotuspc. net [2] www.mpccorp.com (http:/ / www. mpccorp. com/ ) [3] Anthony R. Gold, et al. v. Ziff Communications Company (http:/ / www. morelaw. com/ verdicts/ case. asp?n=1-99-3142& s=IL& d=18384/ ) [4] Zepto computers files for bankruptcy (http:/ / www. engadget. com/ 2009/ 11/ 19/ zepto-computers-files-for-bankruptcy/ )

External links
About.com list of desktop computer systems (http://compreviews.about.com/cs/mandesktop) About.com list of laptop computer systems (http://compreviews.about.com/cs/manlaptop) Compcinfo.com list of desktop and laptop companies (http://www.compcinfo.com)

Timeline of computer viruses and worms


This is a timeline of noteworthy computer viruses, worms and Trojan horses.

1960-1969
1966
The work of John von Neumann on the "Theory of self-reproducing automata" is published.[1] The article is based on lectures held by von Neumann at the University of Illinois about the "Theory and Organization of Complicated Automata" back in 1949.

1970-1979
1971
The Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies.[2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.[3]

1974
The Wabbit virus, more a fork bomb than a virus, is written. The Wabbit virus makes multiple copies of itself on a single computer (and was named "Wabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.

1974/1975
ANIMAL is written by John Walker for the UNIVAC 1108.[4] Animal asked a number of questions to the user in an attempt to guess the type of animal that the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damage to existing file or directory structure, and not to copy itself if permissions did not exist or if damage could result. Its spread was therefore halted by an OS upgrade which changed the format of the file status tables that PERVADE used for safe copying. Though non-malicious, "Pervading Animal" represents the first Trojan "in the wild".[4]

Timeline of computer viruses and worms

1980-1989
1980
Jrgen Kraus wrote his Diplom thesis "Selbstreproduktion bei Programmen" (self-reproduction of programs).[4]

1981
A program called Elk Cloner, written for Apple II systems and created by Richard Skrenta. Apple II was seen as particularly vulnerable due to the storage of its operating system on floppy disk. Elk Cloner's design combined with public ignorance about what malware was and how to protect against it led to Elk Cloner being responsible for the first large-scale computer virus outbreak in history.

1983
The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" as suggested by his teacher Leonard Adleman to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself."[5] November 10, 1983, at Lehigh University, Cohen demonstrates a virus-like program on a VAX11/750 system. The program was able to install itself to, or infect, other system objects.

1984
Ken Thompson publishes his seminal paper, Reflections on Trusting Trust, in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system, it inserted a backdoor into the login command, and when used to compile itself, it inserted the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code were present in the source code.[6]

1986
January: The Brain boot sector virus (aka Pakistani flu) is released. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, as it was created in Lahore, Pakistan by 19 year old Pakistani programmer, Basit Farooq Alvi, and his brother, Amjad Farooq Alvi. December 1986: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.

1987
Appearance of the Vienna virus, which was subsequently neutralizedthe first time this had happened on the IBM platform.[7] Appearance of Lehigh virus, boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only. October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. Jerusalem destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.

Timeline of computer viruses and worms November: The SCA virus, a boot sector virus for Amigas appears, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit. December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralysed several international computer networks in December 1987.

10

1988
March 1 : Ping-Pong virus is a boot sector virus. It was discovered at University of Turin in Italy. June: The Festering Hate Apple ProDOS virus spreads from underground pirate BBS systems and starts infecting mainstream networks. November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.

1989
October 1989: Ghostball, the first multipartite virus, is discovered by Fririk Sklason.

1990-1999
1990
Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burger develops the first family of polymorphic virus: the Chameleon family. Chameleon series debuted with the release of 1260.[8] [9] [10]

1992
Michelangelo was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal.

1993
"Leandro & Kelly" and "Freddy Krueger" spread quickly due to popularity of BBS and shareware distribution.

1994
April [11] : OneHalf (computer virus) is a DOS-based polymorphic computer virus.

1995
The first Macro virus, called "Concept," is created. It attacked Microsoft Word documents.[12]

1996
"Ply" - DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.

1998
June 2: The first version of the CIH virus appears.

Timeline of computer viruses and worms

11

1999
Jan 20: The Happy99 worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy New Year. It modifies system files related to Outlook Express and Internet Explorer (IE) on Windows 95 and Windows 98. March 26: The Melissa worm was released, targeting Microsoft Word and Outlook-based systems, and creating considerable network traffic. June 6: The ExploreZip worm, which destroys Microsoft Office documents, was first detected. December 30 [13] : Kak worm is a Javascript computer worm that spread itself by exploiting a bug in Outlook Express.

2000 and later


2000
May: The ILOVEYOU worm appears. As of 2004 this was the most costly virus to businesses, causing upwards of 5.5 to 10 billion dollars in damage. The backdoor trojan to the worm, Barok, was created by Filipino programmer Onel de Guzman of AMA Computer University; it is not known who created the attack vector or who unleashed it; de Guzman himself denies being behind the outbreak although he suggests he may have been duped by someone using his own Barok code as a payload. August 24 [14] : Pikachu virus is the first virus that targets children. The virus is written in Visual Basic 6. September : Hybris (computer worm) was found and the worm believed to be written by a Brazilian named Vecna.

2001
February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the Microsoft Outlook addressbook.[15] Its creator, Dutchman Jan de Wit, was sentenced to 150 hours of community service.[16] May 8: The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS. July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares. July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released. August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China. September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm. October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.

2002
February 11 [17] : Simile (computer virus) is a metamorphic computer virus written in Assembly and the place of origin for this virus is Spain. Beast is a Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). It is capable of infecting almost all Windows OS i.e. 95 through XP. Written in Delphi and Released first by its author Tataye in 2002, its most current version was released October 3, 2004 March 7 : Mylife (computer worm) is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.[18] August 30: Optix Pro is a configurable remote access tool or Trojan, similar to SubSeven or BO2K.[19]

Timeline of computer viruses and worms

12

2003
January 24: The SQL slammer worm, aka Sapphire worm, Helkern and other names, attacks vulnerabilities in Microsoft SQL Server and MSDE and causes widespread problems on the Internet. April 2: Graybird is a Trojan also known as Backdoor.Graybird.[20] June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).[21] August 12: The Blaster worm, aka the Lovesan worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers. August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows. August 19: The Sobig worm (technically the Sobig.F worm) spreads rapidly through Microsoft systems via mail and network shares. September 18 [22] : Swen is a computer worm written in C++. October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weakpoints by the Blaster and Sobig worms cause massive damage. November 10 [23] : Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039. November 20 [24] : Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.

2004
January 18 : Bagle (computer worm) is a mass-mailing worm affecting all versions of Microsoft Windows. There were 2 variants of Bagle worm, they were Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004. Late January: MyDoom emerges, and currently holds the record for the fastest-spreading mass mailer worm. February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as on mapped network drivers if available. Many variants of the Netsky worm appeared. March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts. May 1: The Sasser worm emerges by exploiting a vulnerability in LSASS and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business. June 15 : Caribe (computer worm) or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on [25] and [26] August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor Trojan Horse that infects Windows NT family systems (Windows 2000, XP, 2003).[27] August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a Trojan Horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.[28] October 12, 2004: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.[29] December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.

Timeline of computer viruses and worms

13

2005
August 16[30] : Zotob (computer worm) is a worm that spread itself by exploiting Microsoft Windows Plug and Play Buffer Overflow (MS05-039). October 13: The Samy XSS worm becomes the fastest spreading virus by some definitions as of 2006. Late 2005: The Zlob Trojan, also known as Trojan.Zlob, is a trojan horse which masquerades as a required video codec in the form of ActiveX. It was first detected in late 2005.[31] 2005: Bandook or Bandook Rat (Bandook Remote Administration Tool) is a backdoor trojan horse that infects the Windows family. It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / Kernel Patching to bypass the firewall, and allow the server component to hijack processes and gain rights for accessing the Internet.

2006
January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files. February 16: discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced. Late March : Brontok variant N was found in late March.[32] Brontok was a mass-email worm and the origin for the worm was from Indonesia. Late September: Stration or Warezov worm first discovered.

2007
January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30 it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[33] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film. July : Zeus (trojan horse) is a Trojan horse that steals banking information by keystroke logging.

2008
February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.[34] March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.[35] May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.[36] July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.[37] July 31: The Koobface computer worm targets users of Facebook and MySpace. New variants constantly appear.[38] November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. The French Navy,[39] UK Ministry of Defence (including Royal Navy warships and submarines),[40] Sheffield Hospital network,[41] German Bundeswehr[42] and Norwegian Police were all affected. Microsoft sets a bounty of $250,000 USD for information leading to the

Timeline of computer viruses and worms capture of the worm's author(s).[43] Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644 [44] patching the server service vulnerability responsible for the spread of Conficker.

14

2009
July 4: The July 2009 cyber attacks occur and the emergence of the W32.Dozor attack the United States and South Korea. July 15: Symantec discovered Daprosy Worm. Said trojan worm is intended to steal online-game passwords in internet cafes. It could, in fact, intercept all keystrokes and send them to its author.

2010
February 18: Microsoft announced that a BSoD problem on some windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon trojan[45] June 17: Stuxnet, a Windows trojan, was detected.[46] It is the first worm to attack SCADA systems.[47] There are suggestions that it was designed to target Iranian nuclear facilities.[48] It uses a valid certificate from Realtek.[49] September 9: The virus, called "here you have" or "VBMania", is a simple Trojan Horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here". September 15: The Virus called Kenzero is a virus that spreads online from Peer to peer (P2P) sites taking browsing history.[50]

2011
SpyEye and ZeuS merged code is seen. [51] New variants attack mobile phone banking information. [52] Anti-Spyware 2011, a trojan which attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It actually disables security-related process of anti-virus programs, while also blocking access to the Internet which prevents updates.[53]

References
[1] von Neumann, John (1966). "Theory of self-reproducing automata" (http:/ / cba. mit. edu/ events/ 03. 11. ASE/ docs/ VonNeumann. pdf). . Retrieved June 12, 2010. [2] Chen, Thomas; Robert, Jean-Marc (2004). "The Evolution of Viruses and Worms" (http:/ / vx. netlux. org/ lib/ atc01. html). . Retrieved 2009-02-16. [3] Russell, Deborah; Gangemi, G T (1991). Computer Security Basics (http:/ / books. google. com/ ?id=BtB1aBmLuLEC& printsec=frontcover). O'Reilly. p.86. ISBN0937175714. . [4] ANIMAL Source Code (http:/ / www. fourmilab. ch/ documents/ univac/ animalsrc. html) [5] Fred Cohen 1984 Computer Viruses Theory and Experiments (http:/ / www. eecs. umich. edu/ ~aprakash/ eecs588/ handouts/ cohen-viruses. html) [6] Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. [7] Kaspersky Lab viruslist (http:/ / www. viruslist. com/ en/ viruses/ encyclopedia?chapter=153311150) [8] "Virus.DOS.Chameleon.1260 - Securelist" (http:/ / www. viruslist. com/ en/ viruses/ encyclopedia?virusid=2008). Viruslist.com. . Retrieved 2010-07-10. [9] "V2PX" (http:/ / vil. nai. com/ vil/ content/ v_98074. htm). Vil.nai.com. . Retrieved 2010-07-10. [10] "What we detect - Securelist" (http:/ / www. viruslist. com/ en/ viruses/ encyclopedia?chapter=153311162). Viruslist.com. . Retrieved 2010-07-10. [11] http:/ / virus. wikia. com/ wiki/ Onehalf [12] "Glossary - Securelist" (http:/ / www. viruslist. com/ en/ glossary?glossid=189267795). Viruslist.com. . Retrieved 2010-07-10. [13] http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2000-121908-3951-99 [14] http:/ / www. geek. com/ articles/ news/ pikachus-new-computer-attack-20000824/

Timeline of computer viruses and worms


[15] "Kournikova computer virus hits hard" (http:/ / news. bbc. co. uk/ 2/ hi/ science/ nature/ 1167453. stm). BBC News. February 13, 2001. . Retrieved April 9, 2010. [16] Evers, Joris (May 3, 2002). "Kournikova virus maker appeals sentence" (http:/ / www. computerworld. com/ s/ article/ 70752/ Kournikova_virus_maker_appeals_sentence_). . Retrieved 20 November 2010. [17] http:/ / virus. wikia. com/ wiki/ MetaPHOR [18] http:/ / antivirus. about. com/ library/ weekly/ aa030802a. htm [19] Sevcenco, Serghei (August 30, 2002). "Security Updates: Backdoor.OptixPro.12" (http:/ / securityresponse1. symantec. com/ sarc/ sarc. nsf/ html/ backdoor. optixpro. 12. html/ ). Symantec. . Retrieved 2009-03-01. [20] Sevcenco, Serghei (February 10, 2006). "Symantec Security Response: Backdoor.Graybird" (http:/ / securityresponse1. symantec. com/ sarc/ sarc. nsf/ html/ backdoor. graybird. html) (in EN). Symantec. . Retrieved 2009-03-01. [21] "Backdoor.Prorat" (http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2003-061315-4216-99). Symantec. February 13, 2007. . Retrieved 2009-03-01. [22] http:/ / www. f-secure. com/ v-descs/ swen. shtml [23] http:/ / www. securelist. com/ en/ descriptions/ old61021 [24] http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2003-112019-2425-99 [25] http:/ / www. f-secure. com/ v-descs/ cabir. shtml [26] http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2004-061419-4412-99 [27] "Spyware Detail Nuclear RAT 1.0b1" (http:/ / www. ca. com/ securityadvisor/ pest/ pest. aspx?id=453078396). Computer Associates. August 16, 2004. . Retrieved 2009-03-01. [28] "Vundo" (http:/ / vil. nai. com/ vil/ content/ v_127690. htm). McAfee. . Retrieved 2009-03-01. [29] "Backdoor.Bifrose" (http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2004-101214-5358-99) (in EN). Symantec, Inc.. October 12, 2004. . Retrieved 2009-02-28. [30] http:/ / www. symantec. com/ security_response/ writeup. jsp?docid=2005-081615-4443-99 [31] "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats" (http:/ / www. trendmicro. com/ vinfo/ secadvisories/ default6. asp?VNAME=The+ ZLOB+ Show:+ Trojan+ poses+ as+ fake+ video+ codec,+ loads+ more+ threats) (in EN). Trend Micro. . Retrieved 2009-02-28. [32] http:/ / www. f-secure. com/ v-descs/ brontok_n. shtml [33] Peter Gutmann (31 August 2007). "World's most powerful supercomputer goes online" (http:/ / seclists. org/ fulldisclosure/ 2007/ Aug/ 0520. html). Full Disclosure. . Retrieved 2007-11-04. [34] Gage, Deborah (February 17, 2005). "Chinese PC virus may have hidden agenda" (http:/ / www. seattlepi. com/ business/ 351670_picframevirus18. html). SeatlePI. . Retrieved 2009-03-01. [35] Kimmo (March 3, 2008). "MBR Rootkit, A New Breed of" (http:/ / www. f-secure. com/ weblog/ archives/ 00001393. html) (in EN). F-Secure. . Retrieved 2009-03-01. [36] "Win32.Ntldrbot (aka Rustock)" (http:/ / www. pr. com/ press-release/ 84130) (in EN). Dr. Web Ltd.. . Retrieved 2009-03-01. [37] "Virus Total" (http:/ / www. virustotal. com/ analisis/ a5d8b3ba9226285dd14619fd8faf12a7) (in EN). virustotal.com. July 8, 2008. . Retrieved 2009-03-01. [38] "Koobface malware makes a comeback" (http:/ / news. cnet. com/ 8301-1009_3-20002112-83. html?) (in EN). cnet.com. April 9, 2010. . Retrieved 2009-04-13. [39] Willsher, Kim (2009-02-07). French fighter planes grounded by computer virus (http:/ / telegraph. co. uk/ news/ worldnews/ europe/ france/ 4547649/ French-fighter-planes-grounded-by-computer-virus. html). London: The Daily Telegraph. . Retrieved 2009-04-01. [40] Williams, Chris (2009-01-20). MoD networks still malware-plagued after two weeks (http:/ / theregister. co. uk/ 2009/ 01/ 20/ mod_malware_still_going_strong). The Register. . Retrieved 2009-01-20. [41] Williams, Chris (2009-01-20). Conficker seizes city's hospital network (http:/ / theregister. co. uk/ 2009/ 01/ 20/ sheffield_conficker). The Register. . Retrieved 2009-01-20. [42] (in German) Conficker-Wurm infiziert hunderte Bundeswehr-Rechner (http:/ / www. pc-professionell. de/ news/ 2009/ 02/ 16/ conficker_wurm_infiziert_hunderte_bundeswehr_rechner). PC Professionell. 2009-02-16. . Retrieved 2009-04-01. [43] Neild, Barry (2009-02-13). "$250K Microsoft bounty to catch worm creator" (http:/ / www. cnn. com/ 2009/ TECH/ ptech/ 02/ 13/ virus. downadup/ index. html). CNN. . Retrieved 2009-03-29. [44] "MS08-067: Vulnerability in Server service could allow remote code execution" (http:/ / support. microsoft. com/ kb/ 958644). Microsoft Corporation. . [45] "Alureon trojan caused Windows 7 BSoD" (http:/ / www. microsoft. com/ security/ portal/ Threat/ Encyclopedia/ Entry. aspx?Name=Win32/ Alureon) (in EN). microsoft.com. February 18, 2010. . Retrieved 2010-02-18. [46] VirusBlokAda News (http:/ / anti-virus. by/ en/ tempo. shtml) [47] Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?" (http:/ / www. infoworld. com/ print/ 137598). Infoworld. . Retrieved 16 September 2010. [48] Stuxnet virus: worm 'could be aimed at high-profile Iranian targets (http:/ / www. telegraph. co. uk/ technology/ news/ 8021102/ Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets. html), Telegraph, 23 Sep 2010 [49] "Possible New Rootkit Has Drivers Signed by Realtek" (http:/ / threatpost. com/ en_us/ blogs/ possible-new-rootkit-has-drivers-signed-realtek-071510). Kaspersky Labs. 15 July 2010. .

15

Timeline of computer viruses and worms


[50] Harvison, Josh (September 27, 2010). "Blackmail virus infects computers, holds information ransom" (http:/ / www. kait8. com/ Global/ story. asp?S=13220447). kait8.com. . Retrieved 20 November 2010. [51] "Bastard child of SpyEye/ZeuS merger appears online The Register" (http:/ / www. theregister. co. uk/ 2011/ 01/ 25/ spyeye_zeus_merger/ ). theregister.co.uk. 2011 [last update]. . Retrieved April 11, 2011. "Bastard child of SpyEye/ZeuS merger appears online" [52] "SpyEye mobile banking Trojan uses same tactics as ZeuS The Register" (http:/ / www. theregister. co. uk/ 2011/ 04/ 05/ spyeye_mobile_trojan/ ). theregister.co.uk. 2011 [last update]. . Retrieved April 11, 2011. "SpyEye mobile banking Trojan uses same tactics as ZeuS" [53] (http:/ / www. precisesecurity. com/ rogue/ xp-anti-spyware-2011/ )

16

External links
Snopes (http://www.snopes.com/computer/virus/) Compilation of viruses, worms, and trojan horses. A short history of hacks, worms and cyberterror (http://www.computerworld.com/action/article. do?command=viewArticleBasic&taxonomyName=Government&articleId=9131924&taxonomyId=13& pageNumber=1) by Mari Keefe, Computerworld, April 2009

Timeline of popular Internet services


2010
Diaspora, a free personal web server that implements a distributed social networking service. Flattr, a microdonation system.

2009
Google Docs, a free, Web-based word processor, spreadsheet, presentation, form, and data storage service offered by Google goes out of beta. Wolfram Alpha, the answer engine is born. Kickstarter, an online threshold pledge system for funding creative projects. Web 2.0 Suicide Machine, a service to automatically delete private content and friend relationships from many social networking sites at once.

2008
Encyclopedia of Life, a free, online collaborative encyclopedia intended to document all of the 1.8 million living species known to science. GitHub, a web-based hosting service for software development projects that use the Git revision control system TinEye, a reverse image search engine. Spotify, a DRM-based music streaming service offering unlimited streaming of selected music from a range of major and independent record labels. Jinni, a semantic search and recommendation engine for movies, TV shows and short films.

Timeline of popular Internet services

17

2007
Google Street View, a technology featured in Google Maps and Google Earth that provides panoramic views from various positions along many streets in the world. Kindle, the e-book reader by Amazon.com is launched together with the e-book virtual bookshop. In July 2010 Amazon announced that e-book sales for its Kindle reader outnumbered sales of hardcover books. Tumblr is a microblogging platform that allows users to post text, images, videos, links, quotes and audio to their tumblelog, a short-form blog.

2006
WikiLeaks, an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Twitter is a social networking and micro-blogging service that enables its users to send and read other users' updates, tweets, which are text-based posts of up to 140 characters in length. IMSLP, the International Music Score Library Project. Spokeo, a social network aggregator web site that aggregates data from many online and offline sources launches, raising many privacy concerns. YouPorn, a free pornographic video sharing website. Mint.com is a free web-based personal financial management service for the US and Canada.

2005
YouTube is a video sharing website. Google Earth is a virtual globe computer program. Megaupload, allows users to upload and download files. Musopen, an online music library of copyright-free (public domain) music. OpenID, an open standard that describes how users can be authenticated in a decentralized manner eyeOS, an open source web desktop following the cloud computing concept. Etsy, an e-commerce website focused on handmade or vintage items as well as art and craft supplies.

2004
Podcast: A downloadable audio file for listening to on a portable media player. A bit like a radio program that you can save and listen to at your convenience. "Podcast" is a portmanteau of the words "iPod" and "broadcast". Podcasting began to catch hold in late 2004, though the ability to distribute audio and video files easily has been around since before the dawn of the Internet. Facebook is a social networking website. World of Warcraft (WoW) is a massively multiplayer online role-playing game (MMORPG). Flickr is a photo/ video sharing website.

Timeline of popular Internet services

18

2003
Skype, a software application that allows users to make voice calls over the Internet. iTunes is an online store which sells music and videos in downloadable form. MySpace is a social networking website. Second Life is a virtual world. 4chan is created. CouchSurfing, a hospitality exchange network. The Pirate Bay, a Swedish website that hosts torrent files.

2002
Tor, a system intended to enable online anonymity is released. Last.fm, a music recommender system. LinkedIn, a business-oriented social networking site is founded and launched next year. TinyURL, a URL shortening service. Skyscanner, a flight search engine that allows users to browse for flights via price and location.

2001
Wikipedia, an online encyclopedia. StumbleUpon, a discovery engine that uses collaborative filtering to recommend web content to its users. PartyPoker.com, a set of online poker card rooms.

2000
Blogger is a blog publishing service that allows private or multi-user blogs with time-stamped entries. Geocaching.com starts its activity. This outdoor sport activity with online support can be considered one of the early forms of geosocial networking. deviantArt, an online community showcasing various forms of user-made artwork. TripAdvisor, travel site that assists customers in gathering travel information, posting reviews and opinions of travel related content and engaging in interactive travel forums.

1999
RSS, the first version of the web feed formats used to publish frequently updated works is created at Netscape. Monster.com, an employment website. SourceForge, a web-based source code repository. It acts as a centralized location for software developers to control and manage open source software development. SETI@home, an internet-based public volunteer computing project. Its purpose is to analyze radio signals, searching for signs of extra terrestrial intelligence. Napster (now defunct) was an online music peer-to-peer file sharing service

Timeline of popular Internet services

19

1998
Google Inc. launched a search engine for web sites of the World Wide Web, subsequently extending search facilities to many types of media, including books, magazines, forums, email, news. Yahoo! Groups a community-driven Internet communication tool, a hybrid between an electronic mailing list and an Internet forum starts off as Yahoo! Clubs PayPal, an e-commerce business allowing payments and money transfers to be made through the Internet.

1997
Babel Fish launched by AltaVista. It was the first language translation service for web content, with technology provided by SYSTRAN. Netflix, an American corporation that offers both on-demand video streaming over the internet, and flat rate online video rental.

1996
Ultima Online (UO), a graphical massively multiplayer online role-playing game (MMORPG). Internet Archive is an archive of periodically cached versions of websites. Hotmail, a free web-based email service. Ticketmaster, a ticket sales and distribution company goes online and sells its first ticket through their platform. Shopzilla, a price comparison service.

1995
Ebay is an auction and shopping website. Wiki: A website that anyone can edit. Craigslist, a centralized network of online communities, featuring free online classified advertisements

1994
Amazon.com is an online retailer, best known for selling books, but now sells all kinds of goods. GeoCities a free web hosting service, now defunct, founded as Beverly Hills Internet (BHI) by David Bohnett and John Rezner . The Yahoo! website started off as a web directory and soon became a webportal offering all kinds of Internet services. Match.com, an online dating company. FedEx.com launches, being the first transportation web site to offer online package tracking.

1993
Blog: A blog (a contraction of the term weblog) is a type of website which resembles an online diary. Entries are commonly displayed in reverse-chronological order. Originally hand-coded, there are now blogging tools (a kind of content management system) to facilitate searching and linking to other blogs. CDDB, a database for software applications to look up audio CD (compact disc) information over the Internet. Hutchison Paging email gateway allows emails to be sent to message pagers in the UK. This same system worked with Orange mobile phones when they were launched in 1994, emails would arrive as texts.

Timeline of popular Internet services

20

1992
HTML was developed by a British engineer, Tim Berners-Lee while working in CERN. This was devised so that reports from CERN, including photographs, graphs and tables could be shared (served) across the web. Veronica (search engine) provides an index of files on Gopher servers.

1991
Gopher: A hypertext system which was soon largely replaced by the World Wide Web.

1990
ARPANET was retired and merged into the NSFNET. IMDb, the Internet Movie Database. The Archie search engine lists names of files on FTP sites.

1988
Internet Relay Chat (IRC): A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message.

1986
LISTSERV the first electronic mailing list software application,

1983
Internet: A global computer network which was created by interconnecting various existing networks with the TCP/IP protocol suite.

1982
First standardization of the Simple Mail Transfer Protocol, a network transmission standard for the transport of email.

1979
Usenet: A distributed threaded discussion and file sharing system; a collection of forums known as newsgroups, that was a precursor to today's web-based forums. One notable difference from a BBS or web forum is that there is no central system owner. Usenet is distributed among a large, constantly changing conglomeration of servers which store and forward messages to one another.

Timeline of popular Internet services

21

1978
MUD: First real-time, multi-player MUD adventure game was developed by Roy Trubshaw and Richard Bartle at Essex University, England.

1973
E-mail: First proposal for standardization of electronic mail message format in RFC 561. ARPANET made its first international connection between University college in London and Royal Radar establishment in Norway.

1971
FTP: File Transfer Protocol Project Gutenberg, a volunteer effort to digitize and archive cultural works.

1969
Telnet: A system for logging in, over a network, to a computer situated in another location. ARPANET connected Stanford research Institute in Santa Barbara to the University of Utah, the internet was born, although the first attempt actually crashed on the 'g' of the word 'Login'

1960s
Email: Electronic mail applications are developed on timesharing main frame computers for communication between system users. The beginning of the internet can be traced back to 1962, when the RAND (America's military think tank) tackled the problem of how they could communicate in the aftermath of a nuclear attack, their thinking was prompted by the Cuban Missile Crisis.

Timeline of Microsoft Windows

22

Timeline of Microsoft Windows


This article presents a timeline of events in the history of Microsoft Windows operating systems from 1985 to present.

Desktop/Server

Date 20 November 1985 9 December 1987 27 May 1988 13 March 1989 22 May 1990 6 April 1992 27 October 1992 27 July 1993 8 November 1993 21 September 1994 30 May 1995 24 August 1995 24 August 1996

16-bit Windows 1.0

32-bit

64-bit

Codename

Windows 2.0

Windows 2.10 Windows 2.11 Windows 3.0 Windows 3.1 Windows for Workgroups 3.1 Windows NT 3.1 Windows for Workgroups 3.11 Windows NT 3.5 Janus Kato, Sparta

NT OS/2 Snowball (LB)

Daytona

Windows NT 3.51 Windows 95

Daytona Chicago

Windows NT 4.0

SUR, Cairo

Timeline of Microsoft Windows

23
Windows 98 Windows 98 SE Windows 2000 For SP1 Asteroid Millenium Memphis

25 June 1998 5 May 1999 17 February 2000 14 September 2000 29 August 2001 25 October 2001 31 October 2002 24 April 2003

Windows Me

Windows 2000 Advanced Server Limited Edition Windows 2000 Datacenter Server Limited Edition Windows XP Whistler

Windows XP Media Center Edition Windows Server 2003

Freestyle

Whistler Server Harmony

30 September 2003 12 October 2004 25 April 2005 8 July 2006

Windows XP Media Center Edition 2004 Windows XP Media Center Edition 2005 Windows XP Professional x64 Edition Windows Fundamentals for Legacy PCs Windows Vista for Business use

Symphony

Eiger

30 November 2006 30 January 2007 7 November 2007 27 February 2008 22 October [1] 2009 22 October 2009 6 April 2011

Longhorn

Windows Vista for Home use; released in fifty countries

Longhorn

Windows Home Server

Quattro

Windows Server 2008

Longhorn Server 7(Vienna)

Windows 7

Windows Server 2008 R2

Windows Server 7 Vail

Windows Home Server 2011

Timeline of Microsoft Windows

24

Mobile

Date November 16, 1996 June 25, 1997 September 29, 1997 November 1, 1997 January 8, 1998

Release Windows CE 1.0 Windows CE 1.01 Windows CE 2.0 Windows CE 2.0 Windows CE 2.01 Windows CE 2.01

Codename Pegasus

Notes

Alder Mercury Gryphon Apollo Alder EP Birch Birch SP2 Cedar Rapier Palm-sized PC, Pocket PC (P/PC) and Smartphone Handheld PC (H/PC) Palm-sized PC, Pocket PC (P/PC) and Smartphone Auto PC

March 1, 1998 July 1, 1998 September 28, 1999 April 19, 2000

Windows CE 2.10 Windows CE 2.11 Windows CE 2.12 Windows CE 3.0 Pocket PC 2000

September 25, 2000 Windows CE 3.0 Core Add-on Pack October 4, 2001 January 7, 2002 June 1, 2002 April 23, 2003 June 23, 2003 March 24, 2004 July 9, 2004 May 9, 2005 September 15, 2006 Pocket PC 2002 Windows CE 4.0 Windows CE 4.1 .NET Core Windows CE 4.2 .NET Core Windows Mobile 2003 Windows Mobile 2003 SE Windows CE 5.0 Windows Mobile 5 Windows CE 6.0 Merlin Talisker Jameson McKendric Ozone Ozone update Macallan Magneto Yamazaki Palm-sized PC, Pocket PC (P/PC) and Smartphone

Timeline of Microsoft Windows

25
Windows Mobile 6 Windows Mobile 6.1 Windows Mobile 6.5 Windows Phone 7 Photon Crossbow

February 12, 2007 April 1, 2008 May 11, 2009 November 8, 2010

References
[1] The Date for General Availability (GA) of Windows 7 (http:/ / windowsteamblog. com/ blogs/ windows7/ archive/ 2009/ 06/ 02/ the-date-for-general-availability-ga-of-windows-7-is. aspx)

External links
Official Microsoft Windows Website (http://www.microsoft.com/Windows/) Microsoft Windows History Timeline (http://www.microsoft.com/Windows/WinHistoryIntro.mspx) History of Microsoft Windows CE

Article Sources and Contributors

26

Article Sources and Contributors


Glossary of Internet-related terminology Source: http://en.wikipedia.org/w/index.php?oldid=427154689 Contributors: Alan Liefting, AstroHurricane001, Avocado, Backburner001, Benzi455, Bob5946, Bobblewik, Bobo192, ClockworkLunch, Cnilep, Colin Kimbrell, Coyote330, Craigfh, DGG, Dogman15, Dresdnhope, Dysprosia, Functionjunction, Hemant5515, Hesselsc, Hixie, Hoary, Jagged Persona, Jakerdemian, JoanneB, JonHarder, Joy, Kelly Martin, Kpjas, Kubigula, Legotech, Lightmouse, Mahanga, Maxkelley, Michaels.perry, Mild Bill Hiccup, Needarb, PrimeHunter, Quiddity, Qwyrxian, Robofish, Rollie, Rwwww, SOD.NET, Screamingman14, Serenehj, ShelfSkewed, SimonP, Smateika, Spiffy sperry, Studerby, The Transhumanist, Tothwolf, Venu62, Woohookitty, Wren337, Xpclient, 35 anonymous edits List of computer system manufacturers Source: http://en.wikipedia.org/w/index.php?oldid=430524088 Contributors: A Forgotten Shadow, Ahbond, Alansohn, Alexgan, Alpinwolf, Arm jstp, Asacomputers, Ataricom, Barek, Barticus88, Bdg4436, Benlisquare, Bjelleklang, Burst404, CSWarren, Captain Wikify, CarlDavidson, Cherryguy93, Chowbok, Chris the speller, Cleared as filed, Colonel Warden, Corvairsx2, Courcelles, CrowJC, Curtjr4, DanMS, Dbdevils24, Dizeyah, Dk1965, Drilnoth, Dusketernal, Eb1232, Editerfella, Edwin.balli, Epizoan, Evilruletheworld96, Fbi205agent, Flopsy Mopsy and Cottonmouth, Frap, Freedomlinux, Fudo, Fwn122, Gailwin, GaussianCopula, Gujubadboy408, Gurch, HiPePC, Hroulf, HypersonicPerformance, Ilikelmo25, Integrated intellect corporation, Ioeth, J.smith, JCam, Jcsia, Jedijeff123, JeremyMcCracken, Jkwdoc, Joespoon, John M Baker, Jtarrab, JustinRossi, Justinkjames, Karel felipe, Karin sanders, Kiamori, Kingj123, Kingturtle, Kjkolb, Kulshrax, LOL, LanceBarber, Lastpit, Latinneo, Lilbunnifufu101, Madsalty, Mailer diablo, Mandrake15, Manoridius, MarceloNunesPOA, Maturion, Mdsamuel, Mike Cline, Minna Sora no Shita, Misocurdo, MrProgramer, Myscrnnm, NapoliRoma, NawlinWiki, NewInn, NilsTycho, Nimro, Noliver, Numbereye, Ocatecir, Oneac, Pak21, Pascal.Tesson, Pcap, Pcwiz11, Peripitus, Phinenine, RHaworth, RNSABLE63, Radioactivepc, Ravecomputer, Redbeanpaste, Rjaf29, Rjd0060, Rjwilmsi, Rkononenko, Ronz, Ropratt, Rrburke, Rsrikanth05, Rwwww, Ryno502, SJP, SevenTwenty, Sh4fton, Shihtzuman, Silverrage, Slo-mo, Snoofer, Soap, Socerhed, Socketmobile, Spyke01, SteveSims, Stevietheman, Swaq, Takobell, Technomaniacz, The Kinslayer, The great outdoorsman, Themfromspace, TheoClarke, Theone12here, Timmccloud, Tnxman307, Tosayit, Toussaint, Trentonb, Tsuyoshi000926, Twas Now, Twtmc, Ulric1313, Ultimate Destructo, Uyabba, Vladsinger, Vology, Watchdogusa, Webbrandy, Wiki131wiki, Wikifun95, Wtshymanski, Xvxonline17, 511 anonymous edits Timeline of computer viruses and worms Source: http://en.wikipedia.org/w/index.php?oldid=430497252 Contributors: A-Day, AVazquezR, Action Jackson IV, Adamantios, Aecis, Aeons, Ahoerstemeier, Ahunt, Akadruid, Aladdinsane64, Alansohn, Alekjds, Alpha Quadrant, Alpha Quadrant (alt), Andrewpmk, Anfi, Anish9807, AnonMoos, AppleMacReporter, Arbitrary username, AxelBoldt, Ayudante, Bachrach44, BeaverOtter28, Ben D., Bender235, Bexz2000, Bhuston, Bk0, Bo98, BodyTag, Boemanneke, Brainman, Brunnock, Bryan Derksen, Bsroiaadn, Bubble94, BubbleDude22, Bueller 007, Butros, Calvacadeofcats, Campoftheamericas, Camw, CaptainMorgan, CardinalDan, Ched Davis, Chick Bowen, Chiefhuggybear, Chris Croy, Christan80, Citicat, Coldacid, Colonies Chris, CommonEditor2345, Cpl Syx, Cwolfsheep, Cyvh, DagErlingSmrgrav, Dalef, DanielPharos, Danwh89, DarkFalls, Darkoneko, Dave souza, Dazza4994, Dchristle, Demon Hill, Dialectric, DopefishJustin, Dr.queso, Drdamour, Dstever, Duder130, Dwedit, Eliz81, EmmetCaulfield, Eric outdoors, Erik9, Excirial, Exec8, FayssalF, Fbifriday, Ferengi, Fieldday-sunday, Figure.10, FlyingPenguins, Fonzy, FrYGuY, Fratley, Fratrep, Frevidar, Furrykef, G1smoe, GCarty, GVOLTT, Ghettoblaster, GiM, Gobonobo, GreenSpigot, HamburgerRadio, Helpfulweasal, Histrion, Hoppy2, IngSoc BigBrother, Iridescence, Jacobolus, Jacroe, James.Denholm, James086, Jasonxu98, Javawizard, Jeremy Visser, Jerryobject, Jerrysmp, JoeSmack, Joshweiser, Jtg, Just Another Dan, Kekasih13, Kenilworth Terrace, Ketiltrout, Kizor, Kolyavmk, Kortaggio, Kreachure, Leapfrog314, Leeyc0, Lerdsuwa, LetsPlayMBP, Linberry, LodeRunner, Logan, Lotje, Luna Santin, Mackilicious, MacsBug, Makeshiftman, Mathgod333, Mawcowboybillsbrick7, Mecanismo, Megaman en m, Mgiganteus1, Michael2, MikeCerm, MikeLynch, Milo03, Minna Sora no Shita, Miq, Mmernex, Moe Epsilon, Morte, Mortus Est, Morven, Movementarian, Msikma, Mushroom, Myanw, N. Harmonik, NEMT, Nailbiter, NapoliRoma, Navynaveed, Nhero2006, Nixdorf, No1lakersfan, NumbNull, Odalcet, Omnieiunium, Onebravemonkey, Orbst, Ozzykhan, Pacific Coast Highway, Papercutbiology, Person453, Pheonex, Philip Trueman, Pmsyyz, Pstevens, PushButtonToGo, QTCaptain, Qaxzaaa, Quantumelfmage, Quesodood, QuintusMaximus, Radical-Dreamer, RedWolf, RekishiEJ, Rf.89, Rich Farmbrough, Rjwilmsi, Romal, RoyBoy, Rsnbrgr, Rtyb, RyanDesign, SD6-Agent, SamSim, Schneelocke, Seaphoto, Seegoon, Serotonin deficient, SheavesOfWheat, Shivam101, Sik0fewl, SimonP, Singelet, Skizzik, Slightsmile, Sloane, Snigbrook, Some jerk on the Internet, Somebody500, Spellmaster, SpikeJones, SpyMagician, Ssdfsa, StaticVision, Stone789, Stuart P. Bentley, StuartBrady, Styrofoam1994, Tau666666, TerraFrost, Th1rt3en, The Anome, Time3000, Tony1, Tothwolf, Trafton, TrancedOut, Ub3rst4r, Umdelt, Uncle Dick, UnitedStatesian, Universeis42, Unre4L, User27091, Utopiah, Uucp, Venu62, Versus22, VladimirKorablin, Vrenator, WAS 4.250, Warren, Wereon, WhisperToMe, WikiWookie, Wikieditoroftoday, Will Hawes, Windchaser, Winterheart, Wtmitchell, Wwwwolf, Yabba67, Yamara, Ysangkok, ZX81, 503 anonymous edits Timeline of popular Internet services Source: http://en.wikipedia.org/w/index.php?oldid=425330549 Contributors: 1ForTheMoney, Abdouss Wafi, Bjung, Catgut, Filceolaire, Johnuniq, Kbrose, Kyle1278, Micru, Mild Bill Hiccup, NexCarnifex, Ottawahitech, Quiname, W163, WikiTome, Ylem, Zighweng, 34 anonymous edits Timeline of Microsoft Windows Source: http://en.wikipedia.org/w/index.php?oldid=423041327 Contributors: A boardley, Billyboy1970, Fkfe, Gabrielpokemon, Ghettoblaster, James Michael 1, KrisBogdanov, Letdorf, Lkt1126, Maw136, Nedko 066, Rob Jansen, Soruly, Tomy9510, Umofomia, Warren, 81 anonymous edits

Image Sources, Licenses and Contributors

27

Image Sources, Licenses and Contributors


Image:Windows Family Tree.svg Source: http://en.wikipedia.org/w/index.php?title=File:Windows_Family_Tree.svg License: Creative Commons Attribution-ShareAlike 3.0 Unported Contributors: J.int, Linfocito B, NOKIA 3120 classic, 1 anonymous edits Image:Windows CE Timeline.png Source: http://en.wikipedia.org/w/index.php?title=File:Windows_CE_Timeline.png License: Creative Commons Attribution-ShareAlike 3.0 Unported Contributors: Intgr, McNeight, Petr Dlouh, 3 anonymous edits

License

28

License
Creative Commons Attribution-Share Alike 3.0 Unported http:/ / creativecommons. org/ licenses/ by-sa/ 3. 0/

Vous aimerez peut-être aussi