<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virus Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/virus/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/virus/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 24 Jan 2023 14:20:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>virus Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/virus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>COVID origins &#8216;may have been tied&#8217; to China&#8217;s bioweapons program: GOP report</title>
		<link>https://goodshepherdmedia.net/covid-origins-may-have-been-tied-to-chinas-bioweapons-program-gop-report/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 15 Dec 2022 07:54:23 +0000</pubDate>
				<category><![CDATA[Health]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[accidental]]></category>
		<category><![CDATA[been tied]]></category>
		<category><![CDATA[bioweapons]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China's]]></category>
		<category><![CDATA[COVID]]></category>
		<category><![CDATA[escape out of the lab]]></category>
		<category><![CDATA[escape out of Wuhan]]></category>
		<category><![CDATA[GOP report]]></category>
		<category><![CDATA[human population]]></category>
		<category><![CDATA[Lab]]></category>
		<category><![CDATA[origins]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[spilled over]]></category>
		<category><![CDATA[tied]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Wuhan]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=5790</guid>

					<description><![CDATA[OVID origins &#8216;may have been tied&#8217; to China&#8217;s bioweapons program: GOP report House Republicans state that the virus &#8216;spilled over&#8217; to the human population Watch the latest video at foxnews.com FIRST ON FOX: Republican members of the House Intelligence Committee are alleging in a newly released report that there are &#8220;indications&#8221; that COVID-19 could be tied to China’s [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline" style="text-align: center;">OVID origins &#8216;may have been tied&#8217; to China&#8217;s bioweapons program: GOP report</h1>
<h2 class="sub-headline speakable" style="text-align: center;">House Republicans state that the virus &#8216;spilled over&#8217; to the human population</h2>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6310267199112&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<p class="speakable"><strong>FIRST ON FOX:</strong> Republican members of the <a href="https://www.foxnews.com/category/politics/house-of-representatives" target="_blank" rel="noopener">House Intelligence Committee</a> are alleging in a newly released report that there are &#8220;indications&#8221; that COVID-19 could be tied to China’s biological weapons research program and &#8220;spilled over&#8221; to the general human population during an incident at the Wuhan Institute of Virology.</p>
<figure id="attachment_5794" aria-describedby="caption-attachment-5794" style="width: 546px" class="wp-caption alignleft"><img fetchpriority="high" decoding="async" class=" wp-image-5794" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/WUHAN-VIROLOGY-LAB-COVID-INVESTIGATION-WUHAN.webp" alt="Members of the World Health Organization team tasked with investigating the origins of the coronavirus disease are seen. (Reuters/Thomas Peter)" width="546" height="307" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/WUHAN-VIROLOGY-LAB-COVID-INVESTIGATION-WUHAN.webp 1440w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/WUHAN-VIROLOGY-LAB-COVID-INVESTIGATION-WUHAN-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/WUHAN-VIROLOGY-LAB-COVID-INVESTIGATION-WUHAN-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/WUHAN-VIROLOGY-LAB-COVID-INVESTIGATION-WUHAN-768x432.webp 768w" sizes="(max-width: 546px) 100vw, 546px" /><figcaption id="caption-attachment-5794" class="wp-caption-text"><em><span style="color: #ff6600;">Members of the World Health Organization team tasked with investigating the origins of the coronavirus disease are seen. (Reuters/Thomas Peter)</span></em></figcaption></figure>
<p class="speakable">The information was released in a minority staff report by members of the <a href="https://www.foxnews.com/politics" target="_blank" rel="noopener">House Permanent Select Committee</a> on Intelligence on Wednesday night.</p>
<p>&#8220;Contrary to the implication of the [Intelligence Community’s] declassified report, based on our investigation involving a variety of public and non-public information, we conclude that there are indications that SARS-CoV-2 may have been tied to China’s biological weapons research program and spilled over to the human population during a lab-related incident at the Wuhan Institute of Virology,&#8221; a summary of the report states. &#8220;The IC failed to adequately address this information in its classified Updated Assessment. When we attempted to raise the issues with the IC, it failed to respond.&#8221;</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div class="ad gam" data-iu="lb2"></div>
</div>
<p>In a declassified assessment on the origins of COVID-19 by the Office of the Director of National Intelligence in October 2021, the report states that SARS-CoV-2 was &#8220;probably not a biological weapon,&#8221; adding, &#8220;We remain skeptical of allegations that SARS-CoV-2 was a biological weapon because they are supported by scientifically invalid claims.&#8221;</p>
<div class="image-ct inline">
<div class="caption">
<p>Members of the World Health Organization team tasked with investigating the origins of the coronavirus disease are seen. <span class="copyright">(Reuters/Thomas Peter)</span></p>
<figure id="attachment_5793" aria-describedby="caption-attachment-5793" style="width: 387px" class="wp-caption alignright"><img decoding="async" class=" wp-image-5793" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/wenstrup.webp" alt="Rep. Brad Wenstrup, R-Ohio, speaks during a House Intelligence Committee hearing on Capitol Hill in Washington, Thursday, April 15, 2021. (Al Drago/Pool via AP) (AP)" width="387" height="218" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/wenstrup.webp 1440w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/wenstrup-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/wenstrup-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/wenstrup-768x432.webp 768w" sizes="(max-width: 387px) 100vw, 387px" /><figcaption id="caption-attachment-5793" class="wp-caption-text"><span style="color: #ff6600;"><em>Rep. Brad Wenstrup, R-Ohio, speaks during a House Intelligence Committee hearing on Capitol Hill in Washington, Thursday, April 15, 2021. (Al Drago/Pool via AP) (AP)</em></span></figcaption></figure>
</div>
</div>
<p>Wednesday&#8217;s report released by House Republicans also alleges that its investigation &#8220;revealed serious shortcomings with both the classified and declassified versions of the Intelligence Community’s,&#8221; and states that the omissions &#8220;likely skewed the public’s understanding of key issues and deepened mistrust.&#8221;</p>
<p>&#8220;The Committee believes the IC downplayed important information relating to the possible links between COVID-19 and China’s bioweapons research based in part on input from outside experts,&#8221; the report states, adding that the intelligence community &#8220;refuses to be transparent with the Committee regarding which experts it relied on.&#8221;</p>
<div class="image-ct inline">
<div class="m">
<div class="mceTemp"></div>
</div>
<div class="caption">
<p>Rep. Brad Wenstrup, R-Ohio, speaks during a House Intelligence Committee hearing on Capitol Hill in Washington, Thursday, April 15, 2021. (Al Drago/Pool via AP) <span class="copyright">(AP)</span></p>
</div>
</div>
<p>Rep. Brad Wenstrup, R-Ohio, told Fox News Digital that Americans deserve answers regarding the origins of COVID-19</p>
<figure id="attachment_5791" aria-describedby="caption-attachment-5791" style="width: 439px" class="wp-caption alignleft"><img decoding="async" class=" wp-image-5791" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Wuhan-Institute.webp" alt="A security person moves journalists away from the Wuhan Institute of Virology. (AP Photo/Ng Han Guan, File)" width="439" height="247" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Wuhan-Institute.webp 1440w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/Wuhan-Institute-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/Wuhan-Institute-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/Wuhan-Institute-768x432.webp 768w" sizes="(max-width: 439px) 100vw, 439px" /><figcaption id="caption-attachment-5791" class="wp-caption-text"><span style="color: #ff6600;"><em>A security person moves journalists away from the Wuhan Institute of Virology. (AP Photo/Ng Han Guan, File)</em></span></figcaption></figure>
<p>&#8220;The American people are owed answers about the origins of COVID-19. Our report states that COVID-19 may have been tied to China&#8217;s bioweapons research program and that the Intelligence Community (IC) withheld key information from the American public&#8217;s authorized elected officials, deepening public mistrust,&#8221; Wenstrup said. &#8220;Our findings also show that the Chinese Communist Party (CCP) bears more responsibility for the COVID-19 pandemic than what has been publicly known or transparently communicated to the American people.&#8221;</p>
<figure id="attachment_5792" aria-describedby="caption-attachment-5792" style="width: 423px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-5792" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/AP21034210627378.webp" alt="Security personnel gather near the entrance of the Wuhan Institute of Virology during a visit by the World Health Organization team in Wuhan in China's Hubei province on Feb. 3, 2021. (AP)" width="423" height="238" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/AP21034210627378.webp 1440w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/AP21034210627378-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/AP21034210627378-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/AP21034210627378-768x432.webp 768w" sizes="(max-width: 423px) 100vw, 423px" /><figcaption id="caption-attachment-5792" class="wp-caption-text"><em><span style="color: #ff6600;">Security personnel gather near the entrance of the Wuhan Institute of Virology during a visit by the World Health Organization team in Wuhan in China&#8217;s Hubei province on Feb. 3, 2021. (AP)</span></em></figcaption></figure>
<p>&#8220;As a physician and Army veteran, I believe it is vitally important that we understand the origins of the COVID-19 pandemic and strive to do everything within our power to pursue policies that will help prevent our country from being vulnerable like this in the future.&#8221;</p>
<p>A security person moves journalists away from the Wuhan Institute of Virology. <span class="copyright">(AP Photo/Ng Han Guan, File)</span></p>
<p>While alleging that COVID&#8217;s origins were likely tied to China’s biological weapons research program, the report states, &#8220;We have not seen any credible indication that the virus was intentionally, rather than accidentally, released.&#8221; Security personnel gather near the entrance of the Wuhan Institute of Virology during a visit by the World Health Organization team in Wuhan in China&#8217;s Hubei province on Feb. 3, 2021. <span class="copyright" style="font-size: 16px;">(AP) </span></p>
<p>&#8220;Nor do we claim the information we have found is a smoking gun that definitively resolves the question of the <a href="https://www.foxnews.com/category/health/infectious-disease/coronavirus" target="_blank" rel="noopener">origins of COVID-19</a> beyond all doubt. However, the information is important to furthering the public’s understanding, and we will seek to declassify the classified version of our report in the next Congress to further the conversation,&#8221; the report states.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>cited <a href="https://www.foxnews.com/politics/covid-origins-may-have-been-tied-chinas-bioweapons-program-gop-report" target="_blank" rel="noopener">https://www.foxnews.com/politics/covid-origins-may-have-been-tied-chinas-bioweapons-program-gop-report</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Making of the First Computer Virus</title>
		<link>https://goodshepherdmedia.net/the-making-of-the-first-computer-virus/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:37:36 +0000</pubDate>
				<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Computer Virus]]></category>
		<category><![CDATA[First]]></category>
		<category><![CDATA[First Computer Virus]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[The Brain Computer Shop]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9511</guid>

					<description><![CDATA[The Making of the First Computer Virus — The🧠Brain Computer Shop &#8211; Pakistan &#160; Amjad Alvi is remembered for writing the first free-range PC virus that went viral in an age before the internet. But he’s done so much more. The first call came late one winter night. A journalist working for a university magazine [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="mceTemp"></div>
<h1 style="text-align: center;">The Making of the First Computer Virus —</h1>
<h2 style="text-align: center;">The<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" />Brain Computer Shop &#8211; Pakistan</h2>
<p>&nbsp;</p>
<div class="row tabletRow">
<div id="t2">
<h3 class="article-description ">Amjad Alvi is remembered for writing the first free-range PC virus that went viral in an age before the internet. But he’s done so much more.</h3>
</div>
</div>
<p dir="ltr">The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy.</p>
<p dir="ltr">“Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.</p>
<p dir="ltr">“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system.</p>
<p dir="ltr">“How the hell did she come across it?” he wondered.</p>
<p dir="ltr">That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan.</p>
<p dir="ltr">It was an era before the internet came to be what we know it as today. Connections between computers were largely limited to scientists and a few research organisations in the United States, Europe and Japan.</p>
<p dir="ltr">Most IBM personal computers ran on MS-DOS and data was stored on 5.25-inch floppy disks, which could store 160 kilobyte of files. It was on one such disk that Amjad had copied the ‘Brain Virus’ or, the Pakistani Brain, which became the first viral computer infestation the world had seen.</p>
<p dir="ltr">Somehow a copy of that floppy found its way to the United States.</p>
<p dir="ltr">The self-replicating virus that automatically copied onto the disks spread like wildfire. Students came across it on disks in the universities of Pittsburgh, Pennsylvania, Delaware and George Washington University.</p>
<p dir="ltr">It slowed systems at the Providence Journal-Bulletin newspaper and popped up in trading terminals in Hong Kong. Users found it on their personal computers in places as far as Australia.</p>
<p dir="ltr">Some <a href="http://www.pirp.harvard.edu/pubs_pdf/bransco/bransco-i89-3.pdf" target="_blank" rel="noopener">estimates</a> suggest that between 1986 and 1989, the Brain Virus hit more than 100,000 computers — 10,000 of them at Washington DC’s Georgetown University alone.</p>
<p dir="ltr">Everyone knew the name of the culprit because Amjad had put his address and phone number in between the code along with this message:</p>
<p dir="ltr">“WELCOME TO DUNGEON&#8230;Beware of this Virus&#8230;Contact Us for Vaccination”</p>
<figure class="content-image">
<p><figure id="attachment_9519" aria-describedby="caption-attachment-9519" style="width: 960px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-9519" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1.jpg" alt="The Pakistani Brain was a sophisticated BOOT virus, which would load onto the PC before the operating system. (TRTWorld)" width="960" height="586" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1-300x183.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68598_BrainVirus_1576670292085-1-768x469.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /><figcaption id="caption-attachment-9519" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">The Pakistani Brain was a sophisticated BOOT virus, which would load onto the PC before the operating system. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Brain was a benign virus as it wasn’t written to erase data or damage hardware. However, within a few months it opened the floodgates for newer variants and copycats which applied the same logic as Amjad’s to infiltrate computers and cause widespread damage.</p>
<p dir="ltr">Viral computer infestations jumped tenfold from 3,000 in the first two months of 1988 to around 30,000 in its last two months, a US-based software trade organisation noted at the time.</p>
<p dir="ltr">“We were just showing off our skills to each other and trying to identify vulnerability in the DOS system. I didn’t think it would become so big,” says Amjad.</p>
<p dir="ltr">But big it became. In September 1988, the Alvi brothers were featured in a <em>Time</em> magazine cover story and tech historians still regard their virus as one of the most sophisticated of its time.</p>
<p dir="ltr">No history of computer viruses is complete without mention of the Pakistani Brain. It was the Brain that gave the idea to some programmers to write the first anti-virus software.</p>
<p dir="ltr">Among the people who were awed by the novelty of its code was a software engineer named John McAfee, the eccentric US millionaire and guru of the anti-virus industry. And he called the Alvi brothers geniuses.</p>
<p dir="ltr">“I read a story in San Jose Mercury News and I go ‘how the hell did they do that?’&#8221;</p>
<p dir="ltr">“Nobody had ever thought about using software to act like bacteria and viruses. That’s a genius idea,” he told <em>TRT World</em> in a recent Skype interview.</p>
<p dir="ltr">McAfee, who at the time was running a computer firm Interpath, studied Brain and wrote a programme to counter it.</p>
<p dir="ltr">“I posted it on my electronic bulletin board and two weeks later I had a million users.”</p>
<p dir="ltr">That’s how the famed McAfee, the first commercial antivirus software, was born.</p>
<p dir="ltr">But how did two Pakistanis from Lahore, famous for its food and hospitality, come up with the idea in the first place? How did a young man with no formal education in information technology and no mentor to guide him figure out a complex process to infiltrate computers undetected?</p>
<p dir="ltr"><strong>The boy who bunked school </strong></p>
<p dir="ltr">When it’s time to have fun, most boys in Lahore head to their rooftops to fly kites. Others would go out to play Pakistan’s most popular sport, street-cricket. Amjad Alvi, however, stayed in his room and tinkered with electronic gadgets.</p>
<p dir="ltr">Born in 1962 in a middle-income family, Amjad was the second-youngest of Muhammad Farooq Alvi’s six children. Senior Alvi was a medical doctor who encouraged his kids from an early age to read books and magazines.</p>
<figure class="content-image">
<p><figure id="attachment_9516" aria-describedby="caption-attachment-9516" style="width: 684px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9516" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902.jpg" alt="Amjad Alvi with his brothers at the small workshop that he set up at his father's clinic. (TRTWorld)" width="684" height="482" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902-300x211.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68586_Alvibrothers_1576661354902-768x541.jpg 768w" sizes="(max-width: 684px) 100vw, 684px" /><figcaption id="caption-attachment-9516" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">Amjad Alvi with his brothers at the small workshop that he set up at his father&#8217;s clinic. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>“My father wanted me to become a fighter pilot. When I was 10 years old he bought me two books. One was about airplanes and the other about electronic experiments. I just got into electronics,” Alvi explains.</p>
<p dir="ltr">He vividly recalls the first time he took details and sketches from a how-to book to put together a crystal radio.</p>
<p dir="ltr">“It needed a coil, a gang capacitor, a diode and a headphone. It didn’t need a battery. You just give it earth, attach a long antenna and it catches local transmission,” he told <em>TRT World</em>.</p>
<p dir="ltr">“Same thing prisoners of war made during WWII to know what was happening outside.”</p>
<p dir="ltr">From improvised radios, Amjad moved on to experimenting with walkie-talkies and music synthesisers that involved the use of transistors.</p>
<p dir="ltr">“OC-72. I still remember the transistor number. Finding the components was not always easy.”</p>
<p dir="ltr">Often after school he would scavenge through the narrow lanes of Lahore’s Hall Market where scores of stores sell parts ranging from capacitors to electric switches.</p>
<p dir="ltr">In the 1970s it was a struggle to find electronic parts and even more difficult to get a hold of the right instruction manuals. That’s where the Alvi siblings were lucky.</p>
<p dir="ltr">They had a library membership of the British Council, an initiative of the United Kingdom to impart education in mostly developing countries. That gave Amjad access to journals such as Wireless World and Practical Electronics.</p>
<p dir="ltr">“They didn’t allow you to take anything home from the library. I spent hours copying the descriptions and drawings.”</p>
<p dir="ltr">He often bunked school to come to the library. “That didn’t go down well with my parents once they found out. I was banned from visiting the library for a while.”</p>
<p dir="ltr">In his own words, Amjad was “always a third class student” and failed a calculus exam in college. The method he used to solve an integration problem didn’t go down well with his evaluator. It was not that he didn’t know the answer, he just did it in another way.</p>
<p dir="ltr">Students were supposed to attempt the question based on the standard course book. Amjad relied on a reference from an American book he had come across at the library.</p>
<p dir="ltr">Why else would he fail, he wondered. After all, he never forgot his fifth grade teacher at Saint Andrews school, Miss Benjamin, telling the class on their first day: “Mathematics is the mother of all sciences.”</p>
<p dir="ltr">If you knew that, if you knew the logic that goes into solving a problem, if you had learned about the flip flop in electronic circuitry on your own and you also had a computer, then the possibilities to make things were endless, he says.</p>
<p dir="ltr">“Do you see what I mean by that? With limited resources in Pakistan where it’s difficult to get hold of components, if you had a computer and a bit of imagination, you can do anything.&#8221;</p>
<figure class="content-image">
<p><figure id="attachment_9514" aria-describedby="caption-attachment-9514" style="width: 545px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9514" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211.jpg" alt="John McAfee wrote the antivirus programme after coming across Pakistani Brain in the 1980s. (Getty Images)" width="545" height="375" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211-300x207.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68587_JohnMcAfee_1576661607211-768x529.jpg 768w" sizes="(max-width: 545px) 100vw, 545px" /><figcaption id="caption-attachment-9514" class="wp-caption-text"></span> <span style="color: #ff6600;">John McAfee wrote the antivirus programme after coming across Pakistani Brain in the 1980s. (Getty Images)</span></figcaption></figure></figure>
<p>&nbsp;</p>
<p><strong>Love at first sight</strong></p>
<p dir="ltr">Amjad eventually completed his masters in physics from University of Punjab. But having read everything about computers from all the magazines he could get his hands on, he fell in love with the machines.</p>
<p dir="ltr">In the early 80s he came across an advertisement in a newspaper about a local distributor who was selling Sinclair computers.</p>
<p dir="ltr">The Sinclair ZX80 was launched in 1980 by a British company, Science of Cambridge. Though it wasn’t the first personal computer and left users annoyed over its display issues, it came with a price tag of 99 pounds or around $230, the cheapest personal computer to hit the stores.</p>
<p dir="ltr">“That was my first computer. A good thing about it was that it was sold as a do-it-yourself kit. So you’d get to know the ins and outs of the computer,” says Amjad.</p>
<p dir="ltr">Like elsewhere in the world, personal computers such as the IBMs, Commodore 64, RadioShack and Atari were slowly becoming common in Pakistan. Yet there were just a handful of technicians who knew how to repair them.</p>
<p dir="ltr">That’s where Amjad put his electronic know-how to use and carved out a niche market for himself. He opened a makeshift computer repair shop within the premises of his father’s clinic in mid-80s. The business was named Brain Services.</p>
<p dir="ltr">“We’d say Amjad was a brainy kid. That’s how the name stuck,” says Basit, who was 17 at the time.</p>
<p dir="ltr">Very soon the distributors of Sinclair and other brands were referring broken computers to Amjad. “I still have the logs — the record of the computers I serviced. I made good money with that.”</p>
<figure class="content-image">
<p><figure id="attachment_9520" aria-describedby="caption-attachment-9520" style="width: 534px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9520" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005.jpg" alt="The Sinclair ZX80 was cheap and one of its stripped-down version could be assembled by hand. (Getty Images)" width="534" height="383" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005-300x215.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68588_Sinclair_1576661834005-768x550.jpg 768w" sizes="(max-width: 534px) 100vw, 534px" /><figcaption id="caption-attachment-9520" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">The Sinclair ZX80 was cheap and one of its stripped-down version could be assembled by hand. (Getty Images)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Over the years, while the story of Brain virus has been told many times, the narrative has missed some key points. Amjad was a pioneer in key IT-related developments in Pakistan.</p>
<p dir="ltr">In 1987, he set up a shop in Singapore to buy monitors, power supply units, processors and motherboards from different companies and assembled them as clones, making Brain among the first suppliers of custom-made computers.</p>
<p dir="ltr">The availability of clones helped many people buy their first computers as they cost much less than branded machines, which were out of reach of many Pakistanis.</p>
<p dir="ltr">Along the way, Amjad honed his programming skills, reading ever-more advanced books and articles in professional journals, mostly to work on mathematical functions.</p>
<p dir="ltr">The first programme to make him money was one designed to convert measuring units. Jewellers and goldsmiths in Lahore had electronic scales which displayed weight in grams and milligrams. But in their daily dealings they relied on Indian units of tola, ratti, and masha.</p>
<p dir="ltr">“I didn’t design the system. I took the idea from somewhere and then built the electronic interface including the port and everything myself,” he said.</p>
<p dir="ltr">By the early 1990s, Brain Services had transformed into Brain NET. Amjad, Basit and their elder brother, Shahid, pitched in whatever capital they had to expand the enterprise. The obvious transition to make was to Bulletin Board Services, which were a sort of an online community before the arrival of the World Wide Web.</p>
<p dir="ltr">They also introduced Pakistan’s first email service around that time. However, the potential customers, who were mostly factory owners, were content with fax machines.</p>
<p dir="ltr">“Our customers would often say, ‘We don’t need to send any communication outside the country, so why bother with email?’ So we built servers and nodes in all the major cities and laid a domestic communication infrastructure. It worked,” says Amjad.</p>
<figure class="content-image">
<p><figure id="attachment_9517" aria-describedby="caption-attachment-9517" style="width: 660px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-9517" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957.jpg" alt="Even before he became famous as a co-author of the Pakistani Brain, Amjad was traveling to other countries to buy components for his clone computers. (TRTWorld)" width="660" height="463" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957.jpg 960w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957-300x210.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68589_AmjadAlvi_1576662247957-768x538.jpg 768w" sizes="(max-width: 660px) 100vw, 660px" /><figcaption id="caption-attachment-9517" class="wp-caption-text"></span></em> <em><span style="color: #ff6600;">Even before he became famous as a co-author of the Pakistani Brain, Amjad was traveling to other countries to buy components for his clone computers. (TRTWorld)</span></em></figcaption></figure><figcaption></figcaption></figure>
<p>Brain Net would eventually become one of the first internet service providers in Pakistan.</p>
<p dir="ltr">But what Amjad is remembered for is the computer virus.</p>
<p dir="ltr"><strong>The making of the Brain</strong></p>
<p dir="ltr">The jury is still out on the question of who wrote the first computer virus.</p>
<p dir="ltr">Most researchers say it was Richard Skrenta who in 1982 as a 15-year-old high school student pranked his friends with Elk Cloner, probably the first self-replicating programme.</p>
<p dir="ltr">Elk Cloner spread via gaming disks, which Skrenta, who is now a tech entrepreneur, loaned to his friends. It slowed down their Apple IIs or abruptly shut the systems.</p>
<p dir="ltr">The moniker, virus, was conceived a year later in 1983 by professor Len Adleman for a programme that his student <a href="http://all.net/books/virus/part5.html" target="_blank" rel="noopener">Fred Cohen</a> wrote.</p>
<p dir="ltr">Cohen demonstrated the ability of his code at a security conference in Pennsylvania. That virus, which could spread through bulletin boards, was able to give Cohen control of a mainframe computer within minutes. His experiment is well <a href="https://www.wired.com/2009/11/1110fred-cohen-first-computer-virus/" target="_blank" rel="noopener">documented</a>.</p>
<p dir="ltr">There’s also Creeper and the famous Core War game from the mid-1970s, which was famously <a href="http://www.koth.org/info/akdewdney/First.htm" target="_blank" rel="noopener">featured</a> in <em>Scientific American </em>and gave the world a peek into what the rogue programmes can do.</p>
<p dir="ltr">Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit.</p>
<p dir="ltr">In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “<a href="http://content.time.com/time/specials/packages/article/0,28804,1839579_1839578_1839526,00.html" target="_blank" rel="noopener">Cookie</a>”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away.</p>
<p dir="ltr">Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes.</p>
<p dir="ltr">If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself.</p>
<p dir="ltr">“Initially DOS didn’t give you the option of multitasking. Then they included a new procedure in the code called Terminate and Stay Resident, which basically allowed you to push a programme to the background and pull it back without terminating it,” said Amjad.</p>
<figure class="content-image">
<p><figure id="attachment_9518" aria-describedby="caption-attachment-9518" style="width: 640px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-large wp-image-9518" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-949x1024.jpg" alt="Some experts say it was Richard Skrenta who wrote the first computer virus in early 1980s. (AP)" width="640" height="691" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-949x1024.jpg 949w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-278x300.jpg 278w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012-768x829.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68591_RichardSkrenta_1576662683012.jpg 960w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption id="caption-attachment-9518" class="wp-caption-text"><span style="color: #ff6600;">Some experts say it was Richard Skrenta who wrote the first computer virus in early 1980s. (AP)</span></figcaption></figure><figcaption></figcaption></figure>
<p>Brain was a BOOT Sector Virus and loaded onto the computer from the infected floppy when it was switched on — without the user ever finding out.</p>
<p dir="ltr">What made Brain unique was its ability to load into the computer even before the operating system.</p>
<p dir="ltr">“It was seen as sophisticated for its time by the use of relocation of the boot sector rather than overwriting it, and by marking the moved boot sector as unavailable on the disk,” Gene Spafford, a cyber security expert, told <em>TRT World</em>.</p>
<p dir="ltr">The Brain in its original form was not meant to erase data or even slow down machines. It was simply a way for Amjad and his brother to keep track of who was using their software.</p>
<p dir="ltr">“An NGO wanted us to write a patient management programme. But they were paying us very little. So I copied Brain on to their floppy and explicitly told them not to give it to anyone,” says Amjad.</p>
<p dir="ltr">Despite his warning the infected floppy was apparently shared, copied and the virus started to move and take on a life of its own.</p>
<p dir="ltr">Brain was quickly followed by far more lethal programmes and the Alvi brothers moved on to focus on their internet service and telecommunication applications.</p>
<p dir="ltr">McAfee doesn’t believe that Elk Cloner or Cohen’s virus were the first. He made a fortune from McAfee AntiVirus and was estimated to be worth $100 million before the 2007 financial crash.</p>
<p dir="ltr">He has done a lot over the years — built mansions in the US, tried to make natural antibiotics, ran a cybersecurity firm and ventured into the business of cryptocurrencies.</p>
<p dir="ltr">But his view on the Brain hasn’t altered.</p>
<p dir="ltr">“(The) first virus was the Pakistani Brain. Trust me. There were no viruses before. The word had not even been invented. No one was discussing it or writing about it or considering it. It was not an idea that could come into your brain if you had not seen it.”</p>
<div class="article-source">by <a href="https://www.trtworld.com/author/saadhasan">SAAD HASAN</a> Source: <a href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" target="_blank" rel="noopener">TRT World</a></div>
<div></div>
<div></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div>
<div id="nomobile">
<div class="container">
<div class="thumb tright">
<div class="thumbinner">
<h1 id="firstHeading" class="firstHeading" lang="en"><img loading="lazy" decoding="async" class="size-large wp-image-9521 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-1024x440.png" alt="" width="640" height="275" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-1024x440.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-300x129.png 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805-768x330.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/68580_PakistanBrain01_1576660113805.png 1140w" sizes="(max-width: 640px) 100vw, 640px" />Brain PC Virus</h1>
<p><i><b>updated:</b> May 1st, 2022</i></p>
<div class="thumbcaption">
<div>Brain; written in 1983;<sup id="cite_ref-Dooley_2018_p._217_1-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Dooley_2018_p._217-1">[1]</a></sup> released in 1986. Detected in 1986 or 1987. It inspired the creation of over 1,000 different viruses.<sup id="cite_ref-PC_Mag_p._32_2-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-PC_Mag_p._32-2">[2]</a></sup> It was also the first virus to cause a pandemic.<sup id="cite_ref-Elzembely_Aysha_2022_p._272_3-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Elzembely_Aysha_2022_p._272-3">[3]</a></sup></div>
</div>
</div>
</div>
<ul>
<li><b>Virus</b>—Brain <small>(aka <i>&#8220;Pakistani&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Pakistani Brain&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;BRAIN&#8221;</i>,<sup id="cite_ref-Tipton_Nozaki_2016_p._259_5-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Nozaki_2016_p._259-5">[5]</a></sup><i>&#8220;(c)BRAIN&#8221;</i>,<sup id="cite_ref-Tipton_Nozaki_2016_p._259_5-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Nozaki_2016_p._259-5">[5]</a></sup><i>&#8220;Pakistani Flu&#8221;</i>, <i>&#8220;Basit&#8221;</i>, <i>&#8220;Lahore&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Ashar&#8221;</i><sup id="cite_ref-Tipton_Krause_2003_p._1268_4-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Y.C.1.E.R.P.&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Ohio&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Den Zuk&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Venezualan&#8221;</i>,<sup id="cite_ref-Tipton_Krause_2003_p._1268_4-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Search&#8221;</i><sup id="cite_ref-Tipton_Krause_2003_p._1268_4-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Tipton_Krause_2003_p._1268-4">[4]</a></sup><i>&#8220;Nipper&#8221;</i>,<sup id="cite_ref-Grimes_2001_p._6_6-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup><i>&#8220;Clone&#8221;</i><sup id="cite_ref-Grimes_2001_p._6_6-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup> and <i>&#8220;Dungeon&#8221;</i><sup id="cite_ref-Grimes_2001_p._6_6-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Grimes_2001_p._6-6">[6]</a></sup>)</small> was the world&#8217;s first PC virus (<small>although it is argued it isn&#8217;t the first generic <i>computer</i> virus ever; as it isn&#8217;t entirely clear based on the definition—the other contenders being <i>&#8220;Elk Cloner&#8221;</i> and <i>&#8220;Creeper&#8221;</i><sup id="cite_ref-Willems_2019_p._3_7-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Willems_2019_p._3-7">[7]</a></sup></small>). This is why some have stated <i>&#8220;[t]he Brain virus of 1986 is often identified erroneously as the <b>first virus ever discovered.</b>..although Brain was the first PC virus&#8221;</i>.<sup id="cite_ref-Burkey_Breakfield_2000_p._349_8-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-8">[8]</a></sup> What is clear—besides being the <b>first PC virus</b>—Brain was also the <b>first stealth virus</b>.<sup id="cite_ref-Burkey_Breakfield_2000_p._349_8-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-8">[8]</a></sup><sup id="cite_ref-Burkey_Breakfield_2000_p._349-350_9-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Burkey_Breakfield_2000_p._349-350-9">[9]</a></sup><sup id="cite_ref-10" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-10">[n. 1]</a></sup><sup id="cite_ref-Ferbrache_2012_p._11_11-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ferbrache_2012_p._11-11">[10]</a></sup><sup id="cite_ref-12" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-12">[n. 2]</a></sup>
<ul>
<li>Brain was the first virus to pass from PC to PC.<sup id="cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Contesti_Andre_Henry_Goins_2007_p._380-13">[11]</a></sup> And unlike previous viruses, Brain was the <b>first to cause a virus pandemic</b>.<sup id="cite_ref-Elzembely_Aysha_2022_p._272_3-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Elzembely_Aysha_2022_p._272-3">[3]</a></sup> In 1990, it was reported that 7% of all reported infection incidents were caused by Brain.<sup id="cite_ref-Ferbrache_2012_p._11_11-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ferbrache_2012_p._11-11">[10]</a></sup> More damaging was the fact that between the release of Brain in 1986 and 1992, over 1,000 different viruses were born,<sup id="cite_ref-PC_Mag_p._32_2-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-PC_Mag_p._32-2">[2]</a></sup> many likely inspired by the success of Brain.</li>
<li>However, there exists contradictory information on how damaging Brain was; some have claimed it harmless, others that it&#8217;s damage is minimal,<sup id="cite_ref-Gregg_2008_p._261_14-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> whereas others still have stated it could delete vast swathes of information.<sup id="cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Pieprzyk_Hardjono_Seberry_2003_p._611-15">[13]</a></sup><sup id="cite_ref-Computerworld_p._10_16-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Computerworld_p._10-16">[14]</a></sup> Others still yet say it only damaged the floppy disks it was found on.<sup id="cite_ref-Salomon_2010_p._138_17-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Salomon_2010_p._138-17">[15]</a></sup> These contradictions can&#8217;t really be explained, as it seems to have depended on the individual machine.</li>
</ul>
</li>
<li>The virus spread from Lahore, Pakistan, where it was found on expensive and popular software floppy disks sold cheaply to tourists (<small>another source states it was given to one of the writers of the virus&#8217;s friend, who had been given it on a disk and who had taken it to the US</small><sup id="cite_ref-Edgar_2002_p._225_18-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup>).<sup id="cite_ref-Salomon_2010_p._138_17-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Salomon_2010_p._138-17">[15]</a></sup> The virus was first created in 1983,<sup id="cite_ref-Dooley_2018_p._217_1-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Dooley_2018_p._217-1">[1]</a></sup> although some state 1986<sup id="cite_ref-Stavroulakis_Stamp_2010_p._527_19-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Stavroulakis_Stamp_2010_p._527-19">[17]</a></sup><sup id="cite_ref-Journal_of_Information_Ethics_1995_p._51_20-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Journal_of_Information_Ethics_1995_p._51-20">[18]</a></sup> (this was also the year the writers were also first contacted<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup><sup id="cite_ref-22" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-22">[n. 3]</a></sup>); others say it was first detected on October 22nd, 1987 by the University of Delaware<sup id="cite_ref-Feudo_1992_p._97_23-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Feudo_1992_p._97-23">[20]</a></sup><sup id="cite_ref-24" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-24">[n. 4]</a></sup> where it had rendered 1% of it&#8217;s disks unusable and destroyed one students thesis,<sup id="cite_ref-Edgar_2002_p._225_18-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup> and also had the <i>&#8220;unwanted side effect&#8221;</i> of accidentally overwriting parts of some of the disks it entered.<sup id="cite_ref-Edgar_2002_p._225_18-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup>
<ul>
<li>This subsequently inspired <i>Time Magazine</i> to cover the virus in their article <i>&#8220;Invasion of the Data Snatchers!&#8221;</i>,<sup id="cite_ref-Edgar_2002_p._225_18-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Edgar_2002_p._225-18">[16]</a></sup> which brought Brain (and other viruses) into mainstream infamy.</li>
</ul>
</li>
</ul>
<div class="thumb tleft">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>This image shows where the cylinder, head (also known as <i>&#8220;side&#8221;</i>) and sector are on a disk.<sup id="cite_ref-Paul_Sheer_.282002.29._25-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Paul_Sheer_.282002.29.-25">[21]</a></sup></div>
</div>
</div>
</div>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<ul>
<li>Brain was a virus that was ingenious in many ways; for instance it&#8217;s code was surprisingly larger than the boot sector itself (despite it being a boot sector virus—it would be similar to having a human hosting a virus several times their size),<sup id="cite_ref-Gregg_2008_p._261_14-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> so how it hid there (and for how long) was an incredulous feat. In fact in 1992, the National Computer Security Association (NCSA) stated in their <i>&#8220;Executive Guide to Computer Viruses&#8221;</i> that it was <i>&#8220;one of the best written viruses ever&#8221;</i>.<sup id="cite_ref-Ritstein_1992_p._8_26-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> In order to understand the level of complexity involved in it&#8217;s design, the nature of the boot sector itself must be explored, and it&#8217;s relationship with the rest of the system on the hard disk (the latter is where computer information is stored).
<ul>
<li>A boot sector is a part of the computer that the BIOS checks when a system is being started up (it is the first sector found on a disk, and is located at cylinder 0, head 0, sector 1).<sup id="cite_ref-Gregg_2008_p._261_14-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> A system that boots looks for this file to execute what is known as the boot process.<sup id="cite_ref-Gregg_2008_p._261_14-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> When found, important files core to the operation of a computer load up (such as <i>io.sys</i>, <i>command.com</i>, <i>config.sys</i> and <i>autoexec.bat</i>).<sup id="cite_ref-Gregg_2008_p._261_14-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup></li>
<li>The virus&#8217;s writers got around the size limitation by storing the first 512 bytes (0.5 Kb) of the code in the boot sector,<sup id="cite_ref-Gregg_2008_p._261_14-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> and then stored the rest of the code in six different areas on a 360K floppy disk<sup id="cite_ref-Ritstein_1992_p._8_26-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> (at the time the floppy disks—which were 5.25 inches in size—could store 160 Kb of information<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>).<sup id="cite_ref-Gregg_2008_p._261_14-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Gregg_2008_p._261-14">[12]</a></sup> The boot sector has always been 512 bytes, and only in 2011 did it change to 4096 bytes (~4 Kb).<sup id="cite_ref-Clarke_Tryfonas_2011_p._70_27-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Clarke_Tryfonas_2011_p._70-27">[23]</a></sup></li>
</ul>
</li>
<li>The virus operated by taking over the boot sector in the disk.<sup id="cite_ref-Ritstein_1992_p._8_26-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> It moved the original boot sector to another location, and marked it as <i>&#8220;bad&#8221;</i> in the file allocation table (also known as <i>&#8220;FAT&#8221;</i>) of the disk.<sup id="cite_ref-Ritstein_1992_p._8_26-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> This causes the DOS to ignore it entirely (it neither shows it as a directory or attempts to write to it or erase or overwrite it).<sup id="cite_ref-Ritstein_1992_p._8_26-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> However the virus itself will still redirect all requests the computer makes to the original boot sector (hence masking the viruses location).<sup id="cite_ref-Ritstein_1992_p._8_26-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> In this way the virus is said to <i>&#8220;firmly&#8221;</i> stay in control of the machine.<sup id="cite_ref-Ritstein_1992_p._8_26-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> Additionally, any uninfected disk that accesses the infected machine will become infected.<sup id="cite_ref-Ritstein_1992_p._8_26-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup> The virus also relabels the diskette to read <i>&#8220;(c)Brain&#8221;</i>.<sup id="cite_ref-Ritstein_1992_p._8_26-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Ritstein_1992_p._8-26">[22]</a></sup></li>
</ul>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
<div class="thumb tright">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>The message that has since become legendary in computing history.</div>
</div>
</div>
</div>
<ul>
<li>One of the curious aspects of the virus is that it is the only virus in history where the authors explicitly stated their name and address in the code.<sup id="cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Price_Waterhouse_.28Firm.29_1989_p._5-28">[24]</a></sup><sup id="cite_ref-29" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-29">[n. 5]</a></sup><sup id="cite_ref-Schnoll_2004_p._38_30-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Schnoll_2004_p._38-30">[25]</a></sup> Indeed, as well as carrying out the functions described above, the virus comes with a message which has since become legendary amongst computer historians; it reads <small><i><b>&#8220;Welcome to the Dungeon (c) 1986 Basit &amp; Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,443248,280530. Beware of this VIRUS&#8230;. Contact us for vaccination&#8230;&#8230;&#8230;&#8230; $#@%$@!!&#8221;</b></i></small>.<sup id="cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Mikko_Hypponen_.28Unknown_Date2.29.-31">[26]</a></sup> The first person to contact them was a journalist in the winter of 1986.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-2" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>
<ul>
<li>Between 1986 and 1989 the virus was estimated to have hit 100,000 machines worldwide.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-3" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> It could be found in the universities of the US, trading terminals in Hong Kong and as far away as Australia.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-4" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> In 1991 it had infected over 250,000 computers.<sup id="cite_ref-RussellGangemi1991_32-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-RussellGangemi1991-32">[27]</a></sup> This was all the more amazing considering <i>&#8220;[c]onnections between computers were largely limited to scientists and a few research organisations in the United States, Europe and Japan&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-5" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> This promptly inspired John McAfee (1945—2021) to write the world&#8217;s first antivirus software programme, <i>VirusScan</i>.<sup id="cite_ref-McAfeeHistory_33-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-McAfeeHistory-33">[28]</a></sup> He later sold it to Intel many years later for US$7.6 billion dollars.<sup id="cite_ref-bbcnewsjohnmcafeedead_34-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-bbcnewsjohnmcafeedead-34">[29]</a></sup>
<ul>
<li>Interestingly, when questioned on whether Elk Cloner or Brain (or indeed others) was the first actual virus, McAfee emphasised <i>&#8220;(The) first virus was the Pakistani Brain. Trust me. There were no viruses before. The word had not even been invented. No one was discussing it or writing about it or considering it. It was not an idea that could come into your brain if you had not seen it&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-6" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> Indeed his view <i>&#8220;hasn’t altered&#8230;[he] doesn’t believe that Elk Cloner or Cohen’s virus were the first&#8221;</i> as some claim.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-7" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup></li>
</ul>
</li>
</ul>
</li>
</ul>
<div class="thumb tleft">
<div class="thumbinner">
<div class="thumbcaption">
<div class="magnify"></div>
<div>Floppy disks were a popular means of storage in the 1980s/1990s. Japan&#8217;s Tokyo government still used them until 2021.<sup id="cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Hanako_Montgomery_.28November_29th.2C_2021.29.-35">[30]</a></sup> Brain stopped spreading after the introduction of 5.25&#8243; floppy disks vs 3.5&#8243; type.</div>
</div>
</div>
</div>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<dl>
<dd>
<ul>
<li>The virus was created by Amjad Alvi (b. 1962<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-8" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>) and Basit Alvi (b. 1969), though it was largely Amjad&#8217;s idea.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-9" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> The idea grew out of an interest in tinkering around with bits of code,<sup id="cite_ref-36" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-36">[n. 6]</a></sup> but the push was when the brothers were commissioned to design a programme (a heart monitor according to Norton,<sup id="cite_ref-norton_37-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-norton-37">[31]</a></sup> but according to the brothers it was a patient management programme<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-10" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>) that they truly became motivated enough to put it out into the wild. They were worried their work would be pirated by their client (who also wasn&#8217;t paying them enough) despite being explicitly told not to do so.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-11" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup> Accordingly, <i>&#8220;[d]espite his warning the infected floppy was apparently shared, copied and the virus started to move and take on a life of its own&#8221;</i>.<sup id="cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-12" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">[19]</a></sup>
<ul>
<li>Ironically, despite their creation arising out of their frustrations with piracy, the brothers themselves pirated software. According to <i>Time</i>, <small><i>&#8220;[t]he irony is that the Alvi brothers were selling pirated software themselves—programs that “cost several hundred dollars in the U.S., for as little as $1.50 each.” And they even laced some of the pirated copies of the software they were selling with viruses as well—but only&#8230;to foreigners&#8221;</i></small>.<sup id="cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">[32]</a></sup> They eventually stopped selling contaminated software in 1987.<sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">[33]</a></sup> The virus&#8217;s spread itself was also stopped when the 3.5 inch floppies it was usually found on were replaced with the newer 5.25 inch types.<sup id="cite_ref-Moore_2014_p._39_40-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Moore_2014_p._39-40">[34]</a></sup></li>
<li>The brothers justified it by quite openly stating; <i>&#8220;[w]hen Pakistanis came in for, say, Lotus 1-2-3, they were sold clean, uncontaminated copies. But foreigners, particularly Americans, were given virus-ridden versions. Why the special treatment for outsiders? The brothers’ somewhat confused rationalization hinges on a loophole in Pakistani law. According to Basit, copyright protection in Pakistan does not extend to computer software. Therefore, he says, it is not illegal for local citizens to trade in bootleg disks; technically, they are not engaged in software piracy. Then why infect American buyers? ‘Because you are pirating,’ says Basit. ‘You must be punished&#8217;”&#8221;</i>.<sup id="cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">[32]</a></sup><sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291-41">[35]</a></sup><sup id="cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-1" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">[33]</a></sup> Their business is still in operation today.<sup id="cite_ref-contactusbrain_42-0" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-contactusbrain-42">[36]</a></sup><sup id="cite_ref-43" class="reference"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_note-43">[n. 7]</a></sup></li>
</ul>
</li>
</ul>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
</dd>
</dl>
<div class="floatright"></div>
</div>
</div>
<h2><span id="Sources" class="mw-headline">Sources</span></h2>
<h3><span id="Footnotes" class="mw-headline">Footnotes</span></h3>
<div class="reflist4">
<div>
<p>&nbsp;</p>
<div class="reflist columns references-column-count references-column-count-3">
<ol class="references">
<li id="cite_note-10"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-10">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus introduced the concept of stealth to the computing public. A stealth virus hides the changes that it makes to an infected system. For example, if a full-stealth virus infects the boot sector of a diskette, a reading of that boot sector on an infected system will return the original contents of the boot sector, not the virus code. Similarly, changes to the amount of free memory or to the length of infected files can be disguised. After the stealth virus, the next technical innovations in viruses were encryption and polymorphism&#8221;</i>.</span>
<ol>
<li>Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</li>
</ol>
</li>
<li id="cite_note-12"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-12">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The virus was also the first case of limited camouflage being employed. When the virus was active in memory no alteration of the boot sector (from its standard value) could be detected&#8221;</i>.</span>
<ol>
<li>Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</li>
</ol>
</li>
<li id="cite_note-22"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-22">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy. “Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system. “How the hell did she come across it?” he wondered. That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-24"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-24">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus was the first virus to infect computer systems in the United States . It was first detected at the University of Delaware in Newark in October 1987&#8221;</i>.</span>
<ol>
<li>Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</li>
</ol>
</li>
<li id="cite_note-29"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-29">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;It is the only virus yet discovered that includes the valid names addresses and phone numbers of the original perpetrators&#8221;</i>.</span>
<ol>
<li>Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</li>
</ol>
</li>
<li id="cite_note-36"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-36">^</a> <span class="reference-text"><b>Quote:</b><i>&#8220;Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit. In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “Cookie”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away. Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes. If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-43"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-43">^</a> <span class="reference-text">Their website is still active as of April 28th, 2022.</span>
<ol>
<li><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</li>
</ol>
</li>
<li id="cite_note-44"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-44">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus introduced the concept of stealth to the computing public. A stealth virus hides the changes that it makes to an infected system. For example, if a full-stealth virus infects the boot sector of a diskette, a reading of that boot sector on an infected system will return the original contents of the boot sector, not the virus code. Similarly, changes to the amount of free memory or to the length of infected files can be disguised. After the stealth virus, the next technical innovations in viruses were encryption and polymorphism&#8221;</i>.</span>
<ol>
<li>Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</li>
</ol>
</li>
<li id="cite_note-45"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-45">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The virus was also the first case of limited camouflage being employed. When the virus was active in memory no alteration of the boot sector (from its standard value) could be detected&#8221;</i>.</span>
<ol>
<li>Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</li>
</ol>
</li>
<li id="cite_note-46"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-46">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The first call came late one winter night. A journalist working for a university magazine in Miami, Florida, wanted to know about a mischievous computer programme that was driving students crazy. “Hello, can I talk to Amjad or Basit Alvi?” she asked. Her American accent and the fact that Amjad, who took the call, was half asleep, made the conversation difficult.“My [spoken] English is not really good,” says Amjad. It took him some time to realise she was talking about a code that he and his younger brother, Basit, had written a few months before on the Microsoft operating system. “How the hell did she come across it?” he wondered. That telephone conversation took place in 1986 when Amjad was 24 years old and still lived with his parents in Lahore, Pakistan&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-47"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-47">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;The Brain virus was the first virus to infect computer systems in the United States . It was first detected at the University of Delaware in Newark in October 1987&#8221;</i>.</span>
<ol>
<li>Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</li>
</ol>
</li>
<li id="cite_note-48"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-48">^</a> <span class="reference-text"><b>Quote</b>: <i>&#8220;It is the only virus yet discovered that includes the valid names addresses and phone numbers of the original perpetrators&#8221;</i>.</span>
<ol>
<li>Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</li>
</ol>
</li>
<li id="cite_note-49"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-49">^</a> <span class="reference-text"><b>Quote:</b><i>&#8220;Like the crystal radio and the unit programme, Amjad says he took the concept to stealthily insert a code into a computer from other programmers and tweaked it a bit. In the late 1960s, students at the Massachusetts Institute of Technology wrote a computer programme they called the “Cookie”. Computer users would be interrupted by the word cookie that kept flashing on their screen until you type the word ‘cookie’ for it to go away. Amjad says before writing Brain, he and some of his friends had modified Cookie into a programme which told stories if the computer was left idle for a few minutes. If a programme can run in the background like this, then why not use it as a harmless virus, he asked himself&#8221;</i>.</span>
<ol>
<li>Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</li>
</ol>
</li>
<li id="cite_note-50"><a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-50">^</a> <span class="reference-text">Their website is still active as of April 28th, 2022.</span>
<ol>
<li><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</li>
</ol>
</li>
</ol>
</div>
<p>&nbsp;</p>
</div>
</div>
<h3><span id="References" class="mw-headline">References</span></h3>
<div class="reflist4">
<div>
<p>&nbsp;</p>
<div class="reflist columns references-column-count references-column-count-3">
<ol class="references">
<li id="cite_note-Dooley_2018_p._217-1">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Dooley_2018_p._217_1-3"><sup>d</sup></a> <span class="reference-text">Dooley, J.F. (2018). <i><a class="external text" href="https://books.google.co.uk/books?id=q61qDwAAQBAJ&amp;pg=PA217&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjLtPLGxtX2AhWQY8AKHQl8B4w4KBDoAXoECAsQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms</a></i>. History of Computing. Springer International Publishing. p. 217. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783319904436">ISBN 978-3-319-90443-6</a>.</span></li>
<li id="cite_note-PC_Mag_p._32-2">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-PC_Mag_p._32_2-3"><sup>d</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=a2YTCyIAwwIC&amp;pg=PP32&amp;dq=Brain+PC+virus&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAQQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">PC Mag</a></i>. March 31st, 1992. Ziff Davis, Inc. p. 32. ISSN 0888-8507.</span></li>
<li id="cite_note-Elzembely_Aysha_2022_p._272-3">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Elzembely_Aysha_2022_p._272_3-3"><sup>d</sup></a> <span class="reference-text">Elzembely, H.A.I.; Aysha, E.E.D. (2022). <i><a class="external text" href="https://books.google.co.uk/books?id=IwZlEAAAQBAJ&amp;pg=PA272&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAMQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Arab and Muslim Science Fiction: Critical Essays</a></i>. Critical Explorations in Science Fiction and Fantasy. McFarland, Incorporated, Publishers. p. 272. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781476685236">ISBN 978-1-4766-8523-6</a>.</span></li>
<li id="cite_note-Tipton_Krause_2003_p._1268-4">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Krause_2003_p._1268_4-17"><sup>r</sup></a> <span class="reference-text">Tipton, H.F.; Krause, M. (2003). <i><a class="external text" href="https://books.google.co.uk/books?id=96BbTjHBpOQC&amp;pg=PA1268&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgFEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Information Security Management Handbook, Fifth Edition</a></i>. Taylor &amp; Francis. p. 1268. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203325438">ISBN 978-0-203-32543-8</a>.</span></li>
<li id="cite_note-Tipton_Nozaki_2016_p._259-5">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Tipton_Nozaki_2016_p._259_5-3"><sup>d</sup></a> <span class="reference-text">Tipton, H.F.; Nozaki, M.K. (2016). <i><a class="external text" href="https://books.google.co.uk/books?id=0S_3DwAAQBAJ&amp;pg=PA259&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Information Security Management Handbook, Volume 6</a></i>. CRC Press. p. 259. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781439893159">ISBN 978-1-4398-9315-9</a>.</span></li>
<li id="cite_note-Grimes_2001_p._6-6">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Grimes_2001_p._6_6-5"><sup>f</sup></a> <span class="reference-text">Grimes, R.A. (2001). <i><a class="external text" href="https://books.google.co.uk/books?id=1HYlDwAAQBAJ&amp;pg=PA6&amp;dq=first+and+only+virus+name+and+address+brain&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwj6hIaNk9z2AhWxQEEAHVCnA1YQ6AF6BAgJEAI#v=onepage&amp;q=first%20and%20only%20virus%20name%20and%20address%20brain&amp;f=false" rel="nofollow">Malicious Mobile Code: Virus Protection for Windows</a></i>. O&#8217;Reilly Media. p. 6. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781491994719">ISBN 978-1-4919-9471-9</a>.</span></li>
<li id="cite_note-Willems_2019_p._3-7">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Willems_2019_p._3_7-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Willems_2019_p._3_7-1"><sup>b</sup></a> <span class="reference-text">Willems, E. (2019). <i><a class="external text" href="https://books.google.co.uk/books?id=dcOWDwAAQBAJ&amp;pg=PA3&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Cyberdanger: Understanding and Guarding Against Cybercrime</a></i>. Springer International Publishing. p. 3. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783030045319">ISBN 978-3-030-04531-9</a>.</span></li>
<li id="cite_note-Burkey_Breakfield_2000_p._349-8">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349_8-3"><sup>d</sup></a> <span class="reference-text">Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</span></li>
<li id="cite_note-Burkey_Breakfield_2000_p._349-350-9">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349-350_9-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Burkey_Breakfield_2000_p._349-350_9-1"><sup>b</sup></a> <span class="reference-text">Burkey, R.; Breakfield, C.V. (2000). <i><a class="external text" href="https://books.google.co.uk/books?id=e0MuhQFvlSkC&amp;pg=PA349&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgDEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Designing a Total Data Solution: Technology, Implementation, and Deployment</a></i>. Best Practices. CRC Press. p. 349-350. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203997512">ISBN 978-0-203-99751-2</a>.</span></li>
<li id="cite_note-Ferbrache_2012_p._11-11">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ferbrache_2012_p._11_11-3"><sup>d</sup></a> <span class="reference-text">Ferbrache, D. (2012). <i><a class="external text" href="https://books.google.co.uk/books?id=_VLmBwAAQBAJ&amp;pg=PA11&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwiKg9D8gNX2AhXinFwKHQBeBD8Q6AF6BAgHEAI#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">A Pathology of Computer Viruses</a></i>. Springer London. p. 11. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781447117742">ISBN 978-1-4471-1774-2</a>.</span></li>
<li id="cite_note-Contesti_Andre_Henry_Goins_2007_p._380-13">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Contesti_Andre_Henry_Goins_2007_p._380_13-1"><sup>b</sup></a> <span class="reference-text">Contesti, D.L.; Andre, D.; Henry, P.A.; Goins, B.A.; Waxvik, E.; Tipton, H.F. (2007). <i><a class="external text" href="https://books.google.co.uk/books?id=Jt1meI49yTwC&amp;pg=PA380&amp;dq=brain+pc+virus+1984&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjhr5bcj9X2AhURXsAKHQiaDSQQ6AF6BAgIEAI#v=onepage&amp;q=brain%20pc%20virus%201984&amp;f=false" rel="nofollow">Official (ISC)2 Guide to the SSCP CBK</a></i>. (ISC)2 Press. CRC Press. p. 380. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780203331576">ISBN 978-0-203-33157-6</a>.</span></li>
<li id="cite_note-Gregg_2008_p._261-14">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Gregg_2008_p._261_14-13"><sup>n</sup></a> <span class="reference-text">Gregg, M. (2008). <i><a class="external text" href="https://books.google.co.uk/books?id=V5CiOVGr-JoC&amp;pg=PA261&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAgQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Build Your Own Security Lab: A Field Guide for Network Testing</a></i>. Wiley. p. 261. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780470379486">ISBN 978-0-470-37948-6</a>.</span></li>
<li id="cite_note-Pieprzyk_Hardjono_Seberry_2003_p._611-15">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Pieprzyk_Hardjono_Seberry_2003_p._611_15-1"><sup>b</sup></a> <span class="reference-text">Pieprzyk, J.; Hardjono, T.; Seberry, J. (2003). <i><a class="external text" href="https://books.google.co.uk/books?id=NH-m8L0R3rYC&amp;pg=PA611&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjL0M--hNX2AhWMQUEAHSWLBzc4FBDoAXoECAsQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Fundamentals of Computer Security</a></i>. Monographs in theoretical computer science. Springer Berlin Heidelberg. p. 611. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783540431015">ISBN 978-3-540-43101-5</a>.</span></li>
<li id="cite_note-Computerworld_p._10-16">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Computerworld_p._10_16-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Computerworld_p._10_16-1"><sup>b</sup></a> <span class="reference-text">Alexander, Michael (November 13th, 1989). <i><a class="external text" href="https://books.google.co.uk/books?id=_8Id5on7xmkC&amp;pg=PA10&amp;dq=Brain+PC+virus&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwjRmpSSg9X2AhWBi1wKHUoLDDY4ChDoAXoECAIQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Computerworld</a></i>. IDG Enterprise. p. 10. ISSN 0010-4841.</span></li>
<li id="cite_note-Salomon_2010_p._138-17">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Salomon_2010_p._138_17-3"><sup>d</sup></a> <span class="reference-text">Salomon, D. (2010). <i><a class="external text" href="https://books.google.co.uk/books?id=vyyoPz9OKfcC&amp;pg=PA138&amp;dq=Brain+PC+virus&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwi5vPTYw9X2AhXLYcAKHYghAE84HhDoAXoECAYQAg#v=onepage&amp;q=Brain%20PC%20virus&amp;f=false" rel="nofollow">Elements of Computer Security</a></i>. Undergraduate Topics in Computer Science. Springer London. p. 138. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780857290069">ISBN 978-0-85729-006-9</a>.</span></li>
<li id="cite_note-Edgar_2002_p._225-18">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Edgar_2002_p._225_18-7"><sup>h</sup></a> <span class="reference-text">Edgar, S.L. (2002). <i><a class="external text" href="https://books.google.co.uk/books?id=CWLyryduwMYC&amp;pg=PA225&amp;dq=brain+virus+detected+1987&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwj54vqYyNX2AhXbPsAKHX1NDkMQ6AF6BAgDEAI#v=onepage&amp;q=brain%20virus%20detected%201987&amp;f=false" rel="nofollow">Morality and Machines: Perspectives on Computer Ethics</a></i>. Computer Ethics Series. Jones and Bartlett Publishers. p. 225. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780763717674">ISBN 978-0-7637-1767-4</a>.</span></li>
<li id="cite_note-Stavroulakis_Stamp_2010_p._527-19">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Stavroulakis_Stamp_2010_p._527_19-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Stavroulakis_Stamp_2010_p._527_19-1"><sup>b</sup></a> <span class="reference-text">Stavroulakis, P.; Stamp, M. (2010). <i><a class="external text" href="https://books.google.co.uk/books?id=I-9P1EkTkigC&amp;pg=PA527&amp;dq=brain+virus+%22created+in+1986%22&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwi75YG767X3AhXLbMAKHUHrBjY4ChDoAXoECAgQAg#v=onepage&amp;q=brain%20virus%20%22created%20in%201986%22&amp;f=false" rel="nofollow">Handbook of Information and Communication Security</a></i>. Handbook of Information and Communication Security. Springer Berlin Heidelberg. p. 527. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9783642041174">ISBN 978-3-642-04117-4</a>.</span></li>
<li id="cite_note-Journal_of_Information_Ethics_1995_p._51-20">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Journal_of_Information_Ethics_1995_p._51_20-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Journal_of_Information_Ethics_1995_p._51_20-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=NTIPAQAAMAAJ&amp;q=brain+virus+%22created%22+1986&amp;dq=brain+virus+%22created%22+1986&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwirtfmB67X3AhVPQ0EAHR2sDbw4HhDoAXoECAgQAg" rel="nofollow">Journal of Information Ethics</a></i>. Vol. 4-5; Vol. 4. McFarland &amp; Company. 1995. p. 51. Retrieved 2022-04-28.</span></li>
<li id="cite_note-Saad_Hasan_.28December_18th.2C_2019.29.-21">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-17"><sup>r</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-18"><sup>s</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-19"><sup>t</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-20"><sup>u</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-21"><sup>v</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-22"><sup>w</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-23"><sup>x</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-24"><sup>y</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Saad_Hasan_.28December_18th.2C_2019.29._21-25"><sup>z</sup></a> <span class="reference-text">Saad Hasan (December 18th, 2019). <i><a class="external text" href="https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">The making of the first computer virus — the Pakistani Brain</a></i>. TRT World. <i><a class="external text" href="https://web.archive.org/web/20220322001755/https://www.trtworld.com/magazine/the-making-of-the-first-computer-virus-the-pakistani-brain-32296" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/duOIX" rel="nofollow">Archive.is Link</a></i>. Retrieved March 22nd, 2022.</span></li>
<li id="cite_note-Feudo_1992_p._97-23">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Feudo_1992_p._97_23-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Feudo_1992_p._97_23-1"><sup>b</sup></a> <span class="reference-text">Feudo, C.V. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=uxSzAAAAIAAJ&amp;q=brain+first+detected+delaware&amp;dq=brain+first+detected+delaware&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwibrLir5rX3AhUfQkEAHQtqDN0Q6AF6BAgCEAI" rel="nofollow">The Computer Virus Desk Reference</a></i>. Business One Irwin. p. 97. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781556237553">ISBN 978-1-55623-755-3</a>.</span></li>
<li id="cite_note-Paul_Sheer_.282002.29.-25">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Paul_Sheer_.282002.29._25-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Paul_Sheer_.282002.29._25-1"><sup>b</sup></a> <span class="reference-text">Paul Sheer (2002). <i><a class="external text" href="https://www.physics.udel.edu/~bnikolic/teaching/phys660/RUTE/rute/node22.html#SECTION002211000000000000000" rel="nofollow">19. Partitions, File Systems, Formatting, Mounting</a></i>. University of Delaware. <i><a class="external text" href="https://web.archive.org/web/20210425184043/https://www.physics.udel.edu/~bnikolic/teaching/phys660/RUTE/rute/node22.html" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/hmZlM" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Ritstein_1992_p._8-26">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-3"><sup>d</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-4"><sup>e</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-5"><sup>f</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-6"><sup>g</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-7"><sup>h</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-8"><sup>i</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-9"><sup>j</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-10"><sup>k</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-11"><sup>l</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-12"><sup>m</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-13"><sup>n</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-14"><sup>o</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-15"><sup>p</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-16"><sup>q</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Ritstein_1992_p._8_26-17"><sup>r</sup></a> <span class="reference-text">Ritstein, C. (1992). <i><a class="external text" href="https://books.google.co.uk/books?id=iXBXgPqwkJIC&amp;pg=PA8&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwjAvc_Z4_zTAhXnIJoKHSuXA5sQ6AEIMTAC#v=onepage&amp;q=%22one%20of%20the%20best%20written%20viruses%20ever%22&amp;f=false" rel="nofollow">Executive Guide to Computer Viruses</a></i>. Diane Publishing Company. p. 8. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781568062518">ISBN 978-1-56806-251-8</a>.</span></li>
<li id="cite_note-Clarke_Tryfonas_2011_p._70-27">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Clarke_Tryfonas_2011_p._70_27-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Clarke_Tryfonas_2011_p._70_27-1"><sup>b</sup></a> <span class="reference-text">Clarke, N.; Tryfonas, T. (2011). <i><a class="external text" href="https://books.google.co.uk/books?id=k6pGAwAAQBAJ&amp;pg=PA70&amp;dq=boot+sector+size+512&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjB9fiyr9j2AhVMQUEAHc_aCxIQ6AF6BAgDEAI#v=onepage&amp;q=boot%20sector%20size%20512&amp;f=false" rel="nofollow">Proceedings of the Sixth International Workshop on Digital Forensics and Incident Analysis (WDFIA 2011)</a></i>. University of Plymouth. p. 70. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781841022857">ISBN 978-1-84102-285-7</a>.</span></li>
<li id="cite_note-Price_Waterhouse_.28Firm.29_1989_p._5-28">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Price_Waterhouse_.28Firm.29_1989_p._5_28-1"><sup>b</sup></a> <span class="reference-text">Price Waterhouse (Firm) (1989). <i><a class="external text" href="https://books.google.co.uk/books?id=TPUmAAAAMAAJ&amp;q=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;dq=is+the+only+virus+yet+discovered+that+includes+the+valid+names+addresses+and+phone+numbers+of+the+original&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwij4o3n8rX3AhWsQkEAHXRhA8sQ6AF6BAgHEAI" rel="nofollow">The Complete Computer Virus Handbook</a></i>. Issue 2. p. 5. Pitman. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780273032557">ISBN 978-0-273-03255-7</a>.</span></li>
<li id="cite_note-Schnoll_2004_p._38-30">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Schnoll_2004_p._38_30-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Schnoll_2004_p._38_30-1"><sup>b</sup></a> <span class="reference-text">Schnoll, S. (2004). <i><a class="external text" href="https://books.google.co.uk/books?id=jhrCcsDnTKwC&amp;pg=PA38&amp;dq=Brain+%22only+virus%22+name+and+address&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjP57O-8rX3AhXGilwKHeS4BywQ6AF6BAgIEAI#v=onepage&amp;q=Brain%20%22only%20virus%22%20name%20and%20address&amp;f=false" rel="nofollow">Microsoft Exchange Server 2003 Distilled</a></i>. The Addison-Wesley Microsoft Technology Series (in Danish). Addison-Wesley. p. 38. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780321245922">ISBN 978-0-321-24592-2</a>.</span></li>
<li id="cite_note-Mikko_Hypponen_.28Unknown_Date2.29.-31">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Mikko_Hypponen_.28Unknown_Date2.29._31-1"><sup>b</sup></a> <span class="reference-text">Mikko Hypponen (Unknown Date). <i><a class="external text" href="https://campaigns.f-secure.com/brain/virus.html" rel="nofollow">BRAIN Searching for the first PC virus in Pakistan</a></i>. F-Secure. <i><a class="external text" href="https://web.archive.org/web/20171023214516/https://campaigns.f-secure.com/brain/virus.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved October 23rd, 2017.</span></li>
<li id="cite_note-RussellGangemi1991-32">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-RussellGangemi1991_32-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-RussellGangemi1991_32-1"><sup>b</sup></a> <span class="reference-text">Deborah Russell; G. T. Gangemi (1991). <i><a class="external text" href="https://books.google.co.uk/books?id=BtB1aBmLuLEC&amp;pg=PA7&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwjip4P67PzTAhXlYZoKHSB9DfU4ChDoAQhWMAk#v=onepage&amp;q=computer%20Brain%20virus&amp;f=false" rel="nofollow">Computer Security Basics</a></i>. &#8220;O&#8217;Reilly Media, Inc.&#8221;. p. 7. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780937175712">ISBN 978-0-937175-71-2</a>.</span></li>
<li id="cite_note-McAfeeHistory-33">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-McAfeeHistory_33-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-McAfeeHistory_33-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://books.google.co.uk/books?id=YcPvV893aXgC&amp;pg=PA1032&amp;dq=computer+Brain+virus&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwiX1uj97PzTAhWJB5oKHcAJCnE4FBDoAQhMMAc#v=onepage&amp;q=computer%20Brain%20virus&amp;f=false" rel="nofollow">Inventors and Inventions</a></i>. Marshall Cavendish. 2008. p. 1032. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9780761477679">ISBN 978-0-7614-7767-9</a>.</span></li>
<li id="cite_note-bbcnewsjohnmcafeedead-34">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-bbcnewsjohnmcafeedead_34-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-bbcnewsjohnmcafeedead_34-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://www.bbc.co.uk/news/world-europe-57589822" rel="nofollow">John McAfee: Anti-virus creator found dead in prison cell</a></i>. June 23rd, 2021. BBC News. <i><a class="external text" href="https://web.archive.org/web/20220323104236/https://www.bbc.com/news/world-europe-57589822" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/C1VJF" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Hanako_Montgomery_.28November_29th.2C_2021.29.-35">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Hanako_Montgomery_.28November_29th.2C_2021.29._35-1"><sup>b</sup></a> <span class="reference-text">Hanako Montgomery (November 29th, 2021). <i><a class="external text" href="https://www.vice.com/en/article/bvnnm3/japan-floppy-disks-tokyo-meguro" rel="nofollow">It’s 2021, and Tokyo Authorities Are Finally Phasing Out Floppy Disks</a></i>. VICE. <i><a class="external text" href="https://web.archive.org/web/20220323160800/https://www.vice.com/en/article/bvnnm3/japan-floppy-disks-tokyo-meguro" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/rRg51" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-norton-37">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-norton_37-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-norton_37-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://us.norton.com/internetsecurity-malware-when-were-computer-viruses-first-written-and-what-were-their-original-purposes.html#" rel="nofollow">When Were Computer Viruses First Written, and What Were Their Original Purposes?</a></i>. Norton. <i><a class="external text" href="https://web.archive.org/web/20220323154401/https://us.norton.com/internetsecurity-malware-when-were-computer-viruses-first-written-and-what-were-their-original-purposes.html" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/0NBKb" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Doug_Aamoth_.28January_19th.2C_2011.29.-38">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Doug_Aamoth_.28January_19th.2C_2011.29._38-3"><sup>d</sup></a> <span class="reference-text">Doug Aamoth (January 19th, 2011). <i><a class="external text" href="https://techland.time.com/2011/01/19/happy-birthday-jerk-first-pc-virus-born-25-years-ago/" rel="nofollow">Happy Birthday, Jerk: First PC Virus Born 25 Years Ago</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20210418095344/https://techland.time.com/2011/01/19/happy-birthday-jerk-first-pc-virus-born-25-years-ago/" rel="nofollow">WayBackMachine Link</a></i>. <i><a class="external text" href="https://archive.ph/E419J" rel="nofollow">Archive.is Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292-39">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-1"><sup>b</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-2"><sup>c</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.292_39-3"><sup>d</sup></a> <span class="reference-text">Philip Elmer-Dewitt; Ross H. Munro (September 26th, 1988). <i><a class="external text" href="http://www.time.com/time/magazine/article/0,9171,968490-2,00.html" rel="nofollow">Technology: You Must Be Punished (Page 2)</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20110306002734/http://www.time.com/time/magazine/article/0,9171,968490-2,00.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-Moore_2014_p._39-40">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Moore_2014_p._39_40-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Moore_2014_p._39_40-1"><sup>b</sup></a> <span class="reference-text">Moore, R. (2014). <i><a class="external text" href="https://books.google.co.uk/books?id=fyqgBAAAQBAJ&amp;pg=PA39&amp;dq=brain+3.5+inch+5.25+inch+floppy&amp;hl=en&amp;newbks=1&amp;newbks_redir=0&amp;sa=X&amp;ved=2ahUKEwjOhcqAy972AhWHQkEAHbEhBmcQ6AF6BAgHEAI#v=onepage&amp;q=brain%203.5%20inch%205.25%20inch%20floppy&amp;f=false" rel="nofollow">Cybercrime: Investigating High-Technology Computer Crime</a></i>. Taylor &amp; Francis. p. 39. <a class="internal mw-magiclink-isbn" href="http://materiaislamica.com/index.php/Special:BookSources/9781317522973">ISBN 978-1-317-52297-3</a>.</span></li>
<li id="cite_note-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291-41">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-Philip_Elmer-Dewitt.3B_Ross_H._Munro_.28September_26th.2C_1988.291_41-1"><sup>b</sup></a> <span class="reference-text">Philip Elmer-Dewitt; Ross H. Munro (September 26th, 1988). <i><a class="external text" href="https://time.com/time/magazine/article/0,9171,968490-1,00.html" rel="nofollow">Technology: You Must Be Punished (Page 1)</a></i>. Time. <i><a class="external text" href="https://web.archive.org/web/20110224005538/https://time.com/time/magazine/article/0,9171,968490-1,00.html" rel="nofollow">WayBackMachine Link</a></i>. Retrieved March 23rd, 2022.</span></li>
<li id="cite_note-contactusbrain-42">^ <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-contactusbrain_42-0"><sup>a</sup></a> <a href="http://materiaislamica.com/index.php/Brain_PC_Virus#cite_ref-contactusbrain_42-1"><sup>b</sup></a> <span class="reference-text"><i><a class="external text" href="https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">Contact Us</a></i>. Brain Telecommunication Ltd. <i><a class="external text" href="https://web.archive.org/web/20220428044009/https://brain.net.pk/index.php/brain/contact-us" rel="nofollow">WayBackmachine Link</a></i>. <i><a class="external text" href="https://archive.ph/huSj3" rel="nofollow">Archive.is Link</a></i>. Retrieved April 28th, 2022.</span></li>
</ol>
</div>
</div>
</div>
</div>
<p><a href="http://materiaislamica.com/index.php/Brain_PC_Virus" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
