25:
446:
226:
213:
Byte Bandit made no attempt to disguise itself as modern viruses, trojans, and worms do. While it naturally over-wrote the bootblock, it also hooked into the system, remaining reset-resident and causing system data corruption and system failures. The virus increments a copy counter every time it
214:
writes itself to a disk, which is in the text string "Virus by Byte Bandit in 9.87. Number of copys:" which also gives a date of
September 1987 for the creation, as well as the assumed name of the programmer.
296:
273:
245:
487:
89:
61:
266:
108:
375:
169:
68:
46:
516:
301:
259:
75:
42:
57:
480:
385:
380:
360:
415:
410:
210:
and SADDAM, Byte Bandit was not destructive. It just spread automatically from system to system.
35:
511:
506:
350:
473:
345:
425:
405:
8:
365:
82:
390:
207:
157:
461:
145:
400:
457:
322:
196:
177:
500:
231:
395:
327:
193:
174:
370:
251:
127:
24:
150:
453:
337:
181:
445:
420:
314:
200:
162:
206:
In contrast to the feared Amiga viruses like the infamous
203:
personal computer. It first appeared in
January 1988.
239:
221:
49:. Unsourced material may be challenged and removed.
498:
481:
267:
488:
474:
274:
260:
109:Learn how and when to remove this message
281:
242:– Swiss Cracking Association's homepage
499:
255:
440:
47:adding citations to reliable sources
18:
13:
14:
528:
217:
444:
224:
23:
248:at the Amiga Virus Encyclopedia
34:needs additional citations for
1:
246:Byte Bandit-Virus description
460:. You can help Knowledge by
7:
10:
533:
439:
336:
313:
287:
168:
156:
144:
136:
126:
456:-related article is a
517:Hacking in the 1980s
282:Hacking in the 1980s
43:improve this article
366:Christmas Tree EXEC
123:
16:1988 computer virus
391:Lamer Exterminator
240:http://www.sca.ch/
208:Lamer Exterminator
128:Original author(s)
121:
469:
468:
434:
433:
308:
307:
187:
186:
119:
118:
111:
93:
524:
490:
483:
476:
448:
441:
376:Father Christmas
290:
289:
276:
269:
262:
253:
252:
234:
229:
228:
227:
199:created for the
146:Operating system
124:
120:
114:
107:
103:
100:
94:
92:
51:
27:
19:
532:
531:
527:
526:
525:
523:
522:
521:
497:
496:
495:
494:
437:
435:
430:
332:
309:
283:
280:
230:
225:
223:
220:
137:Initial release
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
530:
520:
519:
514:
509:
493:
492:
485:
478:
470:
467:
466:
449:
432:
431:
429:
428:
423:
418:
413:
408:
403:
398:
393:
388:
383:
378:
373:
368:
363:
358:
353:
348:
342:
340:
334:
333:
331:
330:
325:
319:
317:
311:
310:
306:
305:
299:
294:
293:← —
288:
285:
284:
279:
278:
271:
264:
256:
250:
249:
243:
236:
235:
219:
218:External links
216:
197:computer virus
185:
184:
178:computer virus
172:
166:
165:
160:
154:
153:
148:
142:
141:
138:
134:
133:
130:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
529:
518:
515:
513:
512:Amiga viruses
510:
508:
507:Malware stubs
505:
504:
502:
491:
486:
484:
479:
477:
472:
471:
465:
463:
459:
455:
450:
447:
443:
442:
438:
427:
424:
422:
419:
417:
414:
412:
409:
407:
404:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
359:
357:
354:
352:
349:
347:
344:
343:
341:
339:
335:
329:
326:
324:
321:
320:
318:
316:
312:
304: →
303:
300:
298:
295:
292:
291:
286:
277:
272:
270:
265:
263:
258:
257:
254:
247:
244:
241:
238:
237:
233:
222:
215:
211:
209:
204:
202:
198:
195:
191:
183:
179:
176:
173:
171:
167:
164:
161:
159:
155:
152:
149:
147:
143:
139:
135:
131:
129:
125:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
58:"Byte Bandit"
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
462:expanding it
451:
436:
355:
323:The Analyzer
232:Amiga portal
212:
205:
189:
188:
140:January 1988
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
396:Morris worm
356:Byte Bandit
328:Markus Hess
315:Individuals
194:boot sector
190:Byte Bandit
175:Boot sector
122:Byte Bandit
501:Categories
371:Elk Cloner
69:newspapers
426:WANK Worm
401:Ping-Pong
386:Jerusalem
381:Ghostball
297:Timeline
158:Platform
151:Amiga OS
99:May 2011
454:malware
361:Cascade
338:Malware
182:malware
132:Unknown
83:scholar
421:Virdem
416:Stoned
411:Scores
85:
78:
71:
64:
56:
452:This
351:Brain
302:1990s
201:Amiga
192:is a
163:Amiga
90:JSTOR
76:books
458:stub
346:1260
170:Type
62:news
406:SCA
45:by
503::
180:,
489:e
482:t
475:v
464:.
275:e
268:t
261:v
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.