Fifteen isolations of LBV have been reported, including 8 from fruit bats and a cat in KwaZulu-Natal Province of South Africa, but the
virus has never been associated with human disease (2,3).
In 1959, scientists first spotted the
virus in ducks.
The
virus is named for Marburg, Germany, where it was first identified in 1967 after infected monkeys shipped there from Uganda spread the
virus to people.
Now Yoshihiro Kawaoka and his colleagues at the University of Wisconsin-Madison School of Veterinary Medicine and the University of Tokyo have perfected an advanced method of producing the inactivated "seed"
virus used to produce influenza vaccine, a technique known as reverse genetics.
Like other viruses, the
virus that causes influenza is a miniscule shell of proteins and fats that surrounds pieces of the genetic material DNA.
The purpose of both applications is to protect data and system configurations; users routinely avoided using both applications until they felt the pain by losing data or being attacked by a
virus; at the outset, both were relatively difficult applications to use.
Some industry experts deem 2003 to be the worst year in
virus history--a history that dates back to the early 1980s when the first viruses hit Apple operating systems.
A computer
virus is a program that replicates by inserting or attaching itself to other computer programs or media and can disrupt a computer system's functional abilities.
Herpes simplex
virus 1 (HSV-1) most commonly causes herpes labialis (cold sores) with an increasing number of genital HSV-1 cases being reported; these are suspected to be caused through oral sex.
During acute or chronic infection, many HIV-infected individuals who are not on drug treatment have high levels of circulating
virus that is ostensibly wild type; the
virus has no detectable mutations that would make it resistant to drugs like tenofovir (Viread) or lopinavir/ritonavir (Kaletra).
Symantec has a number of safeguards built into our
virus lab security architecture to keep malicious code isolated, including air-gaping of this lab from the rest of the engineering networks.
Most people forget how dependent individuals and businesses are on technology and how vulnerable they are because of that dependence--that is, until they are attacked by a computer
virus and have to watch helplessly as the
virus takes over their computers, networks, and perhaps their entire computing infrastructure.