https://en.wikipedia.org/wiki/Computer_virus
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Computer_worm
http://www.webopedia.com/DidYouKnow/Internet/virus.asp
https://en.wikipedia.org/wiki/Zombie_computers
https://en.wikipedia.org/wiki/Software_cracking
https://en.wikipedia.org/wiki/Adware
http://www.security-faqs.com/what-are-the-main-differences-between-hackers-and-crackers.html
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://en.wikipedia.org/wiki/Botnet
https://en.wikipedia.org/wiki/Denial-of-service_attack
https://en.wikipedia.org/wiki/Click_fraud
https://en.wikipedia.org/wiki/Phishing
https://en.wikipedia.org/wiki/Social_engineering_(computer_security)
https://en.wikipedia.org/wiki/Heuristic_(computer_science)#Virus_scanning
https://en.wikipedia.org/wiki/Sandbox_(computer_security)
http://virus.wikidot.com/winvir
https://www.techopedia.com/definition/26655/boot-sector-virus
https://en.wikipedia.org/wiki/Polymorphic_code
https://en.wikipedia.org/wiki/Comparison_of_computer_viruses
https://en.wikipedia.org/wiki/1260_(computer_virus)
https://en.wikipedia.org/wiki/4K_(computer_virus)
https://en.wikipedia.org/wiki/.COM
https://en.wikiquote.org/wiki/Grover_Cleveland
https://en.wikipedia.org/wiki/5lo
https://en.wikipedia.org/wiki/A_and_A_(computer_virus)
https://en.wikipedia.org/wiki/Abraxas_(computer_virus)
https://en.wikipedia.org/wiki/Acid_(computer_virus)
https://en.wikipedia.org/wiki/Acme_(computer_virus)
https://en.wikipedia.org/wiki/Actifed_(computer_virus)
https://en.wikipedia.org/wiki/Runtime_library
https://en.wikipedia.org/wiki/Run_time_(program_lifecycle_phase)
https://en.wikipedia.org/wiki/Ada_(computer_virus)
https://en.wikipedia.org/wiki/Agena_(computer_virus)
https://en.wikipedia.org/wiki/AGI-Plan_(computer_virus)
https://en.wikipedia.org/wiki/AIDS_(computer_virus)
https://en.wikipedia.org/wiki/Alabama_(computer_virus)
https://en.wikipedia.org/wiki/Alcon_(computer_virus)
https://en.wikipedia.org/wiki/Ambulance_(computer_virus)
https://en.wikipedia.org/wiki/Anna_Kournikova_(computer_virus)
https://en.wikipedia.org/wiki/AntiCMOS_(computer_virus)
https://en.wikipedia.org/wiki/ARCV-n_(computer_virus)
https://en.wikipedia.org/wiki/Bomber_(ccomputer_virus)
https://en.wikipedia.org/wiki/Bliss_(virus)
https://en.wikipedia.org/wiki/Brain_(computer_virus)
https://en.wikipedia.org/wiki/Christmas_Tree_(computer_virus)
https://en.wikipedia.org/wiki/CIH_(computer_virus)
https://en.wikipedia.org/wiki/Commwarrior_(computer_virus)
https://en.wikipedia.org/wiki/Eliza_(computer_virus)
https://en.wikipedia.org/wiki/Form_(computer_virus)
https://en.wikipedia.org/wiki/Graybird
https://en.wikipedia.org/wiki/Hare_(computer_virus)
https://en.wikipedia.org/wiki/ILOVEYOU_(computer_virus)
https://en.wikipedia.org/wiki/INIT_1984_(computer_virus)
https://en.wikipedia.org/wiki/Jerusalem_(computer_virus)
https://en.wikipedia.org/wiki/Kama_Sutra_(computer_worm)
https://en.wikipedia.org/wiki/Lamer_Exterminator_(computer_virus)
https://en.wikipedia.org/wiki/MacMag
https://en.wikipedia.org/wiki/MDEF_(computer_virus)
https://en.wikipedia.org/wiki/Melissa_(computer_worm)
https://en.wikipedia.org/wiki/Michelangelo_(computer_virus)
https://en.wikipedia.org/wiki/Navidad_virus
https://en.wikipedia.org/wiki/Natas_(computer_virus)
https://en.wikipedia.org/wiki/NVIR_(computer_virus)
https://en.wikipedia.org/wiki/OneHalf_(computer_virus)
https://en.wikipedia.org/wiki/Ontario.1024_(computer_virus)
https://en.wikipedia.org/wiki/Pikachu_virus
https://en.wikipedia.org/wiki/Ping-pong_virus
https://en.wikipedia.org/wiki/RavMonE.exe
https://en.wikipedia.org/wiki/Backdoor_(computing)
https://en.wikipedia.org/wiki/Scores_(computer_virus)
https://en.wikipedia.org/wiki/Scott's_Valley_(computer_virus)
https://en.wikipedia.org/wiki/SevenDust_(computer_virus)
https://en.wikipedia.org/wiki/Shankar's_Virus
https://en.wikipedia.org/wiki/Simile_(computer_virus)
http://security.stackexchange.com/questions/4619/oligomorphism-vs-polymorphism-vs-metamorphism-in-malware
http://searchsecurity.techtarget.com/definition/metamorphic-and-polymorphic-malware
https://en.wikipedia.org/wiki/Smeg_Virus_Construction_Kit
https://en.wikipedia.org/wiki/Stoned_(computer_virus)
https://en.wikipedia.org/wiki/Sunday_(computer_virus)
https://en.wikipedia.org/wiki/TDL-4
https://en.wikipedia.org/wiki/Techno_(computer_virus)
https://en.wikipedia.org/wiki/Whale_(computer_virus)
https://en.wikipedia.org/wiki/ZMist_(computer_virus)
https://en.wikipedia.org/wiki/Bootkit
https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms
https://en.wikipedia.org/wiki/Fork_bomb
https://en.wikipedia.org/wiki/Badtrans_(computer_worm)
https://en.wikipedia.org/wiki/Bagle_(computer_worm)
https://en.wikipedia.org/wiki/Blaster_(computer_worm)
https://en.wikipedia.org/wiki/Buffer_overflow
https://en.wikipedia.org/wiki/SYN_flood
https://en.wikipedia.org/wiki/Brontok
https://en.wikipedia.org/wiki/BuluBebek
https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
https://en.wikipedia.org/wiki/Daprosy_Worm
https://en.wikipedia.org/wiki/Code_Red_II
https://en.wikipedia.org/wiki/Mydoom
https://en.wikipedia.org/wiki/Doomjuice
https://en.wikipedia.org/wiki/ExploreZip
https://en.wikipedia.org/wiki/Father_Christmas_(computer_worm)
https://en.wikipedia.org/wiki/Hybris_(computer_worm)
https://en.wikipedia.org/wiki/Kak_worm
https://en.wikipedia.org/wiki/Klez_(computer_worm)
https://en.wikipedia.org/wiki/Koobface
https://en.wikipedia.org/wiki/Morris_(computer_worm)
https://en.wikipedia.org/wiki/Mylife_(computer_worm)
https://en.wikipedia.org/wiki/Netsky_(computer_worm)
https://en.wikipedia.org/wiki/Nimda_(computer_worm)
https://en.wikipedia.org/wiki/Sadmind_(computer_worm)
https://en.wikipedia.org/wiki/Sasser_(computer_worm)
https://en.wikipedia.org/wiki/Sircam_(computer_worm)
https://en.wikipedia.org/wiki/Sober_(computer_worm)
https://en.wikipedia.org/wiki/Sobig_(computer_worm)
https://en.wikipedia.org/wiki/SQL_Slammer
https://en.wikipedia.org/wiki/Swen
https://en.wikipedia.org/wiki/W32/Bolgimo.worm_(computer_worm)
https://en.wikipedia.org/wiki/Backdoor.Win32.IRCBot
https://en.wikipedia.org/wiki/Helpful_worm
https://en.wikipedia.org/wiki/Welchia_(computer_worm)
https://en.wikipedia.org/wiki/Witty_(computer_worm)
https://en.wikipedia.org/wiki/Zotob_(computer_worm)
https://en.wikipedia.org/wiki/Beast_Trojan_(trojan_horse)
https://en.wikipedia.org/wiki/Reverse_connection
https://en.wikipedia.org/wiki/Vundo
https://en.wikipedia.org/wiki/Ransomware_(malware)
https://en.wikipedia.org/wiki/Storm_Worm
https://en.wikipedia.org/wiki/Zeus_(trojan_horse)
https://en.wikipedia.org/wiki/Mocmex
https://en.wikipedia.org/wiki/Torpig
https://en.wikipedia.org/wiki/Bohmini.A
https://en.wikipedia.org/wiki/Malvertising
https://en.wikipedia.org/wiki/Conficker
https://en.wikipedia.org/wiki/Waledac_botnet
https://en.wikipedia.org/wiki/Kenzero
https://en.wikipedia.org/wiki/ZeroAccess
https://en.wikipedia.org/wiki/Flame_(malware)
https://en.wikipedia.org/wiki/Shamoon
https://en.wikipedia.org/wiki/CryptoLocker
https://en.wikipedia.org/wiki/Gameover_ZeuS
https://en.wikipedia.org/wiki/Regin_(malware)
https://en.wikipedia.org/wiki/Gumblar
https://en.wikipedia.org/wiki/Rogue_security_software
https://en.wikipedia.org/wiki/Scareware