{"id":1583,"date":"2011-06-11T13:08:00","date_gmt":"2011-06-11T21:08:00","guid":{"rendered":"https:\/\/alliancedigitalstudios.com\/cgi-bin\/blog\/1969\/12\/31\/anatomy-of-a-computer-virus-explained\/"},"modified":"2019-05-12T13:10:37","modified_gmt":"2019-05-12T21:10:37","slug":"anatomy-of-a-computer-virus-explained","status":"publish","type":"post","link":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/2011\/06\/11\/anatomy-of-a-computer-virus-explained\/","title":{"rendered":"Anatomy of a computer virus explained"},"content":{"rendered":"<p><img src=https:\/\/flowingdata.com\/wp-content\/uploads\/2011\/06\/Anatomy-of-a-computer-virus-625x350.png \/><\/p>\n<p>Motion designer Patrick Clair tells the story of Stuxnet, &#8220;a Microsoft Windows computer worm discovered in July 2010 that targets industrial software and equipment.&#8221; Unlike many viruses and worms, Stuxnet was designed with a specific target &#8211; Siemens Supervisory Control And Data Acquisition (SCADA) systems &#8211; and left any other systems unharmed. Stuxnet could then increase pressure in nuclear reactors and turn off oil pipelines, all the while showing monitors everything was fine&#8230;<\/p>\n<p><a href=https:\/\/flowingdata.com\/2011\/06\/28\/anatomy-of-a-computer-virus-explained\/ target=_blank rel=\"noopener noreferrer\">https:\/\/flowingdata.com\/2011\/06\/28\/anatomy-of-a-computer-virus-explained\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Motion designer Patrick Clair tells the story of Stuxnet, &#8220;a Microsoft Windows computer worm discovered in July 2010 that targets industrial software and equipment.&#8221; Unlike many viruses and worms, Stuxnet was designed with a specific target &#8211; Siemens Supervisory Control And Data Acquisition (SCADA) systems &#8211; and left any other systems unharmed. Stuxnet could then &hellip; <a href=\"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/2011\/06\/11\/anatomy-of-a-computer-virus-explained\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Anatomy of a computer virus explained&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1583","post","type-post","status-publish","format-standard","hentry","category-coolstuff"],"_links":{"self":[{"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/posts\/1583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/comments?post=1583"}],"version-history":[{"count":1,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/posts\/1583\/revisions"}],"predecessor-version":[{"id":2049,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/posts\/1583\/revisions\/2049"}],"wp:attachment":[{"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/media?parent=1583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/categories?post=1583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alliancedigitalentertainment.com\/cgi-bin\/blog\/wp-json\/wp\/v2\/tags?post=1583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}