Throwback Thursday: The Unbearable Lightness of Testing

Posted by   Virus Bulletin on   Apr 16, 2015

VB gets in on the Throwback Thursday act, delving into the archives.

Over the last couple of years, the 'Throwback Thursday' trend has taken the Internet by storm, with social media users indulging in a weekly wallow in nostalgia, fondly resurrecting photographs of themselves wearing terrible fashion in their childhood or sporting awful haircuts in their teens. The VB team decided it was high time we got in on the act, but to spare you the photographs (for now at least), we plan to use the opportunity to take a regular delve into our archives.

This week, we turn back the clock to December 1996 at a time when the memory limits of the DOS environment posed issues for anti-malware developers that we wouldn't give a second thought to today. While scanners were already "groaning" under the load of the ever-increasing number of viruses (the growth in the number of known viruses was then around 150-200 per month), the need to add complex new scan capabilities - for dealing with macro viruses - threatened to be the last straw for some. The solution for several products of the time was to supply a second executable offering macro-scanning functionality. The then Editor of VB, Ian Whalley, quite rightly argued that it was unreasonable to expect people to have to run multiple programs to detect different types of virus and wondered where we would be if we had to have a product consisting of 9,500 separate executables, "one for every virus...".

Read Ian's editorial piece here in HTML-format, or download it here as a PDF (no registration or subscription required).

Posted on 16 April 2015 by Helen Martin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.