Jump to content

EGABTR: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Citation bot (talk | contribs)
Alter: url. URLs might have been anonymized. | Use this bot. Report bugs. | Suggested by AManWithNoPlan | #UCB_webform 1719/2200
 
Line 1: Line 1:
{{Short description|Computer malware}}
{{Short description|Computer malware}}
'''EGABTR''' (EGA for enhanced graphics adapter),<ref>{{cite book |url=https://books.google.com/?id=HotVAAAAMAAJ&q=EGABTR&dq=EGABTR |title=Computer Language, Volume 4 |date=1987 |access-date=September 25, 2015}}</ref> sometimes pronounced "'''Eggbeater'''", was a [[Trojan horse (computing)|Trojan horse]] [[Computer software|program]]<ref>{{cite book |last=Kershner |first=Helene G. |date=1992 |title=Computer Literacy |url=https://books.google.com/books?id=TY5YAAAAYAAJ |publisher=D. C. Heath |page=240 |isbn=978-0669279986 |access-date=September 24, 2015}}</ref> that achieved some level of notoriety in the late 1980s and early 1990s.<ref name="BiggerSecrets">{{cite book |last=Poundstone |first=William |date=1989 |title=Bigger Secrets: More Than 125 Things They Prayed You'd Never Find Out |url=https://books.google.com/books?id=Twr1KAGlgDUC|publisher=[[Houghton Mifflin Harcourt]] |page=166 |isbn=978-0395530085 |access-date=September 25, 2015}}</ref><ref>{{cite magazine |last=Emmerson |first=Andrew |date=January 28, 1988 |title=Phantoms of the operating system |url=https://books.google.com/books?id=4tKSYkNGPVcC&pg=PA69 |magazine=[[New Scientist]] |volume=117 |issue=1597 |pages=69 |access-date=23 September 2015}}</ref><ref>{{cite book |date=1986 |title=Omni, Volume 8 |url=https://books.google.com/books?id=Lt1NAQAAIAAJ |publisher=Omni Publications International |page=35 |access-date=September 25, 2015}}</ref><ref name="ICL">{{cite book |date=1990 |title=Introduction to Computer Literacy |url=https://archive.org/details/introductiontoco0000kers |url-access=registration |publisher=D. C. Heath Publishing Company |page=[https://archive.org/details/introductiontoco0000kers/page/399 399] |isbn=978-0669095609 |access-date=September 25, 2015}}</ref><ref>
'''EGABTR''' (EGA for enhanced graphics adapter),<ref>{{cite book |url=https://books.google.com/books?id=HotVAAAAMAAJ&q=EGABTR |title=Computer Language, Volume 4 |date=1987 |access-date=September 25, 2015}}</ref> sometimes pronounced "'''Eggbeater'''", was a [[Trojan horse (computing)|Trojan horse]] [[Computer software|program]]<ref>{{cite book |last=Kershner |first=Helene G. |date=1992 |title=Computer Literacy |url=https://books.google.com/books?id=TY5YAAAAYAAJ |publisher=D. C. Heath |page=240 |isbn=978-0669279986 |access-date=September 24, 2015}}</ref> that achieved some level of notoriety in the late 1980s and early 1990s.<ref name="BiggerSecrets">{{cite book |last=Poundstone |first=William |date=1989 |title=Bigger Secrets: More Than 125 Things They Prayed You'd Never Find Out |url=https://books.google.com/books?id=Twr1KAGlgDUC|publisher=[[Houghton Mifflin Harcourt]] |page=166 |isbn=978-0395530085 |access-date=September 25, 2015}}</ref><ref>{{cite magazine |last=Emmerson |first=Andrew |date=January 28, 1988 |title=Phantoms of the operating system |url=https://books.google.com/books?id=4tKSYkNGPVcC&pg=PA69 |magazine=[[New Scientist]] |volume=117 |issue=1597 |pages=69 |access-date=23 September 2015}}</ref><ref>{{cite book |date=1986 |title=Omni, Volume 8 |url=https://books.google.com/books?id=Lt1NAQAAIAAJ |publisher=Omni Publications International |page=35 |access-date=September 25, 2015}}</ref><ref name="ICL">{{cite book |date=1990 |title=Introduction to Computer Literacy |url=https://archive.org/details/introductiontoco0000kers |url-access=registration |publisher=D. C. Heath Publishing Company |page=[https://archive.org/details/introductiontoco0000kers/page/399 399] |isbn=978-0669095609 |access-date=September 25, 2015}}</ref><ref>
{{cite book |last1=Kane |first1=Pamela |last2=Hopkins |first2=Andy |date=1993 |title=The data recovery bible: preventing and surviving computer crashes |url=https://books.google.com/books?id=QOZQAAAAMAAJ |publisher=Brady Publishing |isbn=978-1566860802 |access-date=September 25, 2015}}</ref> Allegedly a [[Computer graphics|graphics]] utility that would improve the quality of an [[Enhanced Graphics Adapter|EGA]] display, it actually was [[malware]] that deleted the [[file allocation table]]s on the [[hard drive]].<ref>{{cite news |title=Lots of warnings about EGABTR.EXE |url=http://www.matarese.com/matarese-files/12837/lots-warnings-about-egabtr/index.html |work=www.matarese.com |archive-url=https://web.archive.org/web/20070927101226/http://www.matarese.com/matarese-files/12837/lots-warnings-about-egabtr/index.html |archive-date=27 September 2007}}</ref><ref>[http://download.bitdefender.com/resources/files/Main/file/Malware_History.pdf Malware History from BitDefender]</ref><ref name="BiggerSecrets"/> This deletion was accompanied by a text message reading "Arf! Arf! Got you!".<ref>{{Cite web |url=http://www.ciac.org/ciac/virdb/VIRS0387.TXT |title=VIRS0387 |access-date=2006-01-21 |archive-url=https://web.archive.org/web/20060826052902/http://www.ciac.org/ciac/virdb/VIRS0387.TXT |archive-date=2006-08-26 |url-status=dead }}</ref><ref name="ICL"/><ref>{{cite magazine |date=July 23, 1985 |title=Warning! |url=https://books.google.com/books?id=Dwvc24nC0IQC&pg=PA33 |magazine=[[PC Magazine]] |volume=4 |issue=15 |page=34 |access-date=23 September 2015}}</ref> Coverage about this virus has translated in languages such as German, Chinese and Indonesian.<ref>Google Books results</ref> Various sources disagree as to the exact wording.
{{cite book |last1=Kane |first1=Pamela |last2=Hopkins |first2=Andy |date=1993 |title=The data recovery bible: preventing and surviving computer crashes |url=https://books.google.com/books?id=QOZQAAAAMAAJ |publisher=Brady Publishing |isbn=978-1566860802 |access-date=September 25, 2015}}</ref> Allegedly a [[Computer graphics|graphics]] utility that would improve the quality of an [[Enhanced Graphics Adapter|EGA]] display, it actually was [[malware]] that deleted the [[file allocation table]]s on the [[hard drive]].<ref>{{cite news |title=Lots of warnings about EGABTR.EXE |url=http://www.matarese.com/matarese-files/12837/lots-warnings-about-egabtr/index.html |work=www.matarese.com |archive-url=https://web.archive.org/web/20070927101226/http://www.matarese.com/matarese-files/12837/lots-warnings-about-egabtr/index.html |archive-date=27 September 2007}}</ref><ref>[http://download.bitdefender.com/resources/files/Main/file/Malware_History.pdf Malware History from BitDefender]</ref><ref name="BiggerSecrets"/> This deletion was accompanied by a text message reading "Arf! Arf! Got you!".<ref>{{Cite web |url=http://www.ciac.org/ciac/virdb/VIRS0387.TXT |title=VIRS0387 |access-date=2006-01-21 |archive-url=https://web.archive.org/web/20060826052902/http://www.ciac.org/ciac/virdb/VIRS0387.TXT |archive-date=2006-08-26 |url-status=dead }}</ref><ref name="ICL"/><ref>{{cite magazine |date=July 23, 1985 |title=Warning! |url=https://books.google.com/books?id=Dwvc24nC0IQC&pg=PA33 |magazine=[[PC Magazine]] |volume=4 |issue=15 |page=34 |access-date=23 September 2015}}</ref> Coverage about this virus has translated in languages such as German, Chinese and Indonesian.<ref>Google Books results</ref> Various sources disagree as to the exact wording.



Latest revision as of 00:04, 10 December 2021

EGABTR (EGA for enhanced graphics adapter),[1] sometimes pronounced "Eggbeater", was a Trojan horse program[2] that achieved some level of notoriety in the late 1980s and early 1990s.[3][4][5][6][7] Allegedly a graphics utility that would improve the quality of an EGA display, it actually was malware that deleted the file allocation tables on the hard drive.[8][9][3] This deletion was accompanied by a text message reading "Arf! Arf! Got you!".[10][6][11] Coverage about this virus has translated in languages such as German, Chinese and Indonesian.[12] Various sources disagree as to the exact wording.

In the 1980s, Richard Streeter, a CBS executive,[13] once downloaded the Trojan virus, learned about EGABTR after visiting electronic Bulletin boards, hoping to find something to improve his operating system and unknowingly downloaded the virus.[14]

References

[edit]
  1. ^ Computer Language, Volume 4. 1987. Retrieved September 25, 2015.
  2. ^ Kershner, Helene G. (1992). Computer Literacy. D. C. Heath. p. 240. ISBN 978-0669279986. Retrieved September 24, 2015.
  3. ^ a b Poundstone, William (1989). Bigger Secrets: More Than 125 Things They Prayed You'd Never Find Out. Houghton Mifflin Harcourt. p. 166. ISBN 978-0395530085. Retrieved September 25, 2015.
  4. ^ Emmerson, Andrew (January 28, 1988). "Phantoms of the operating system". New Scientist. Vol. 117, no. 1597. p. 69. Retrieved 23 September 2015.
  5. ^ Omni, Volume 8. Omni Publications International. 1986. p. 35. Retrieved September 25, 2015.
  6. ^ a b Introduction to Computer Literacy. D. C. Heath Publishing Company. 1990. p. 399. ISBN 978-0669095609. Retrieved September 25, 2015.
  7. ^ Kane, Pamela; Hopkins, Andy (1993). The data recovery bible: preventing and surviving computer crashes. Brady Publishing. ISBN 978-1566860802. Retrieved September 25, 2015.
  8. ^ "Lots of warnings about EGABTR.EXE". www.matarese.com. Archived from the original on 27 September 2007.
  9. ^ Malware History from BitDefender
  10. ^ "VIRS0387". Archived from the original on 2006-08-26. Retrieved 2006-01-21.
  11. ^ "Warning!". PC Magazine. Vol. 4, no. 15. July 23, 1985. p. 34. Retrieved 23 September 2015.
  12. ^ Google Books results
  13. ^ "Nation and World News". Chicago Tribune. August 16, 1985. Retrieved September 25, 2015.
  14. ^ Berke, Joseph H. (1988). The tyranny of malice: exploring the dark side of character and culture. Summit Books. p. 238. ISBN 978-0671497538. Retrieved September 25, 2015.
[edit]