About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

The infection of PC compatible computers


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

--------------------------------------------------------------------------

THE INFECTION OF PC COMPATIBLE COMPUTERS

Stephen E. Kiel
Raymond K. Lee
Georgia Institute of Technology
Summer Quarter 1988

INTRODUCTION

The recent publicity over computer viruses has produced
mixed reactions and much confusion inside, as well as outside, of
the computing industry. The conflicting opinions are caused either
by a misunderstanding of what viruses are or a lack of
understanding of their potential problems. This paper answers
those questions and in addition, gives a description of currently
suggested methods for IBM PC's and compatibles for detecting,
preventing, and eliminating viruses. A highly technical discussion
is not the objective, but rather a broad overview is given along
with sources of additional information and assistance.

THE BEGINNING

On November 3, 1983, an idea was conceived of by Fred
Cohen as an experiment to be presented at a weekly seminar on
computer security [1]. The idea was simple enough: design a
computer program that could modify other programs to include a
possibly evolved copy of itself. This evolved copy would then
modify other programs and thus continue the propagation and
evolution. The program could easily be spread by unknowing users
throughout a computer system or network.

It only took eight hours of expert work on a heavily
loaded VAX 11/750 to complete the first of such programs and
prepare it for demonstration. The program was inserted into the
beginning of a new program on the system called 'vd,' which
displayed Unix structures graphically. A new program was chosen so
that details of its operation and its performance characteristics
would be unknown. Users were introduced to vd via the system
bulletin board.

The program inside of vd used the authorizations of every
user using it to infect their programs. In all of the experiments,
the program that was initially inserted into vd was granted all
system rights in under an hour. The shortest time was under five
minutes, with the average time under 30 minutes. Even people who
knew that the experiments were taking place were unable to defend
themselves. Once the surprising results of the experiments were
announced, the administrators of the VAX 11/750 decided that no
further computer experiments would be performed on their system.
Precautions were taken to keep the experiment under control. No
damage was done and only reports were sent back on the program's
progress. Also, traces were generated to insure that the program
could not spread without detection. All files were purged of the
program after the experiment was completed. It is unfortunate that
an apparent fear reaction on the part of the system administrators
prohibited any further testing.

DEFINING A VIRUS

A name for programs exhibiting the behavior described
above was thought of by Len Adleman: 'viruses.' A computer virus
can generally be defined as a program which hides in computer
systems, usually in larger programs, whose mission is to replicate
and spread until the occurrence of some designated event. When
this event takes place, the program can then perform some action
specified by its creator. The term 'virus' is very appropriate
since computer viruses (here after referred to as simply 'viruses')
behave much like their biological counterparts.

Once in a computer system, a virus can remain quiet for an
incubation and contagion period, during which it infects other
files. After some prespecified event, such as a period of time or
a number of infections, the virus can come to life and begin an
attack. All the while, the offspring of the virus are infecting
other files and systems, also waiting to be triggered to attack.

The software that controls the computer and the devices
connected to it is known as the DOS, an acronym for disk operating
system. DOS commands are the core of the operating system and
instruct the computer to start, stop, or continue an operation.
The most popular DOS for IBM PC compatible computers is Microsoft
Corporation's MS-DOS.

Personal computer viruses typically infect three special
MS-DOS files: IBMBIO.COM, IBMSYS.COM, and COMMAND.COM. These
files are found on every system disk and become part of memory each
time the operating system is loaded into the computer. The system
files IBMBIO.COM and IBMSYS.COM are hidden and read-only and are
not easily infected. The COMMAND.COM file, which is the default
command processor of MS-DOS, is both visible and modifiable. A
number of viruses have been discovered which infect this file.
These three files are copied to other disks and run on other
machines often enough that a virus in any of these files can spread
very quickly.

The action performed by viruses will vary. It could be
simply the flashing of a harmless message on the screen. A virus
in Aldus Publishing's FreeHand, a graphics program for the
Macintosh, printed the message, "We would like to take this
opportunity to convey our universal message of peace to all
Macintosh users around the world" [2]. The company had to recall
about 5,000 infected packages. Unfortunately, all viral behavior
is not benign like this message printing or the simple infection
tracing found in the experiment discussed in the opening paragraphs
of this paper. There have even been reports of viruses which can
slightly modify spreadsheets and other data [3].

Viruses have been found which reformat hard disks and
destroy data. The destructive behavior is only limited to the
warped imagination of its creator. Because of the hidden dangers
involved, apparently safe software packages carrying such viruses
have become known as "Trojan Horses." A viral outbreak of this
sort took place last fall in the microcomputer labs at Lehigh
University in Bethlehem, Pa. [4]. This particular outbreak,
described below, generated a lot of publicity and caused both
corporations and colleges alike to become concerned about the
potential damage that viruses can inflict.

THE LEHIGH VIRUS

The Lehigh virus was typical of many other viruses. It
sat in the COMMAND.COM file and was thus loaded into the computer
whenever it was booted. The virus hid inside this file in a
temporary storage space called the stack space. After infecting
the same file on a number of other disks, the virus would wipe out
all data and program files on the disk it was on. Backup copies
were similarly infected, some users were attacked more than once.

Once the outbreak had come to light, work began
immediately to identify what was happening and to find a cure.
Fortunately, the virus' creator made a mistake: the date on the
COMMAND.COM file was altered by the infection. (It is relatively
simple to keep the date from changing, so the absence of a changed
file date does not guarantee that a file is virus-free.)

Upon examination of the file, the contaminated stack space
was discovered. Since this space is normally all zeros, student
lab consultants wrote a simple program that looked at the stack
space and wrote zeros over any code that was present. The virus
was then erased from approximately 600 disks.

If it was not for the creator's date mistake, it would
have taken much longer for the Lehigh Computing Center to kill its
virus. It is doubtful that any new viruses that crop up will make
a similar mistake. As everything else related to computers
increases in complexity, so will viruses.

SIZING UP THE PROBLEM

It is unknown exactly how many disks and computer systems
are infected in the world. Some experts and officials are trying
to keep track of the world's viruses by documenting their
characteristics and occurances.

For example, four versions of the Israeli virus and seven
versions of the Brain virus [5] have been found. The Israeli virus
was supposed to do some kind of damage on May 13, 1988, the fortieth
anniversary of the founding of Israel. The Brain virus was originally
written to warn would-be software pirates of a software package for
physicians written by Basit Farooq Alvi, a 19-year-old from Pakistan.
The Brain has since evolved to data destruction.

VIRUS HYPE

Fueling the scare is indeed a problem and has led to what
has become known as the "Virus Hype." The press and media has been
notorious for spreading rumors and partial truths about viruses.
Besides causing undue panic and fear amongst computer users, the
virus writer is getting notoriety and fame. This is shown in a
statement from Stephen D. Morrison, a student from the University
of Manitoba. When asked about the future of viruses, he responded
with the following: "The scenario could be a mad-hacker, plugging
away at a keyboard in the back of a dimly lit office, creating a
virus like no virus ever seen before." This view angers
professionals in the computing field.

Ivars Balkits, an official from Computing Services at the
University of California - Davis, stated, "Depicting the virus
writer as a gothic/romantic figure (like pirates have been, like
gangsters have been, like gang members now are) contributes to the
problem. Continuing to fictionalize the virus writer as a mad
scientist, a Doctor Frankenstein whose genius gives us a secret
thrill, whose lawlessness challenges us, is just the wrong way to
go."

Another approach to stopping the hype and actually
tracking the viruses is "The Dirty Dozen" maintained by Eric
Newhouse [6]. This is a file, originally started by Tom Neff,
which lists unlawfully copied or modified programs that have
appeared on various IBM bulletin boards across the country.
Newhouse hopes that this list will act as a "clearing-house" for
the latest examples of "bogusware," i.e. software that is damaging
to one or more parties. Currently there are almost 50 destructive
programs listed.

In addition to the list of bad software, the Dirty Dozen
contains definitions of viruses and other destructive programs,
instructions on what to do if a virus causes damage to a system,
and a glossary of many of the confusing acronyms and terms used in
the computer field. A list of addresses to send additions and
corrections to the Dirty Dozen, along with comments to Eric
Newhouse, is included in APPENDIX 1. Copies of the Dirty Dozen
can also be obtained from the bulletin boards in the list mentioned
above, as well as from many different electronic bulletin boards
across the country.

DETECTION

Fred Cohen, now a member of the Electrical Engineering
faculty at the University of Cincinnati, stated in a lecture at the
IBM Watson Research Laboratory in Hawthorne, NY, that there are
three ways to detect a virus: by its appearance, by its behavior,
or by the changes it causes. Detection by appearance is
undecidable since all viruses do not "look" alike. It is extremely
difficult to look at a good-sized program written in assembly
language and tell what it does. With an executable program, it is
nearly impossible.

Detection by behavior involves examining programs as they
are executing and is also not very promising. Besides being
disruptive by slowing down execution times, it produces too many
false positives and false negatives. Initially, viruses were
caught by having a monitor program watch for certain internal MS-
DOS and BIOS system calls which are normally used to access system
hardware, but now that is no longer the case.

BIOS is an acronym for basic input/output services. Since
hardware varies from machine to machine, the BIOS is used to
abstract the operating system from the specific hardware it's
running on. The BIOS directly controls all of the input/output
devices, such as the monitor and the disk drives, according to
instructions received from MS-DOS or an executing program.

Unfortunately, viruses can bypass MS-DOS and BIOS system
calls. It is relatively simple to go to a computer store and
purchase literature that describes where MS-DOS and the BIOS keep
the information they need about a disk, and also tells what port
addresses do what on a PC. In order to insure compatibility
between different brands of PC's, every computer manufacturer has
to use the same BIOS data areas and the same port addresses. It is
no mystery to find out exactly what a program has to do to get its
hands on the hardware.

Detection by change is easy to forge and can be very
costly. Early viruses were found to simply append themselves onto
files and thus change the file size or possibly change the file
date, as in the Lehigh virus, viruses have become much more
elusive. Existing files can have viruses implanted inside without
changing their file length or modification date. It is also not
very beneficial to use an erased hard disk as an indicator of viral
presence.

PREVENTION STRATEGIES

"Prevention is the best medicine" is a phrase heard many
times before, but this small advice is very true in the case
against viruses. The key is education. There must be an awareness
among users from the hobbyist to system managers of the potential
dangers of viruses. Obviously, paranoia is not the goal but a
general understanding must be achieved.

With today's ever growing dependence on computers,
ignorance will cost a heavy price, if it has not already.
Therefore, steps must be taken to curtail the likelihood of viral
destruction. Governmental legislation needed is already in
progress: a House bill, the Computer Virus Eradication Act of
1988, was introduced in June that will make infesting computers
with viruses a federal crime. A copy of this pending bill is in
APPENDIX 2. Several other legislative acts have also been
proposed. Currently, 48 states have computer crime laws.

Fortunately, there are some guidelines that, if followed,
will go a long way in keeping one's computer system virus-free. Of
course, these guidelines are only as effective as the extent to
which users are willing to implement them. These guidelines are
divided into three areas - protection of diskettes, protection for
the computer, and protection of systems interconnected by a local
area network (LAN).

DISK PROTECTION

The first thing to do is not to use the original or master
diskettes to execute the programs. Copies of all the original
source disks should be made and used instead. The originals should
then be stored in a safe place, out of sight. Although it is
inconvenient, it is better to have the storage place far away from
the computer or system itself. If there ever is any question as to
the integrity of one of these copied files or disks, it can always
be compared against the safely stored-away master copy.

It is a very good idea to start using the write/protect
tabs that so often get thrown away. These little stickers, usually
black or aluminum colored gummed paper tags, can really save the
day when it comes to inadvertent writes. Once a tab is in place,
it is impossible for the computer to write on the disk.

Besides being found on every system disk, the COMMAND.COM
file is also a favorite hiding place for viruses. This file, as
well as most others, can and should be made read-only without
affecting its use. This can be easily done with the MS-DOS
"ATTRIB.COM" program. Many other utility programs, such as those
listed following the paper in APPENDIX 3, can also accomplish this
task.

COMPUTER PROTECTION

The goal of virus protection can only be accomplished by
limiting computer access. This strategy is simple: keep the
computer "clean" by keeping the virus out. First and foremost,
only tested software should be used. Also, a computer should never
be booted up with an unfamiliar disk. This means that a user must
be especially cautious and extremely careful with public-domain or
shareware programs. Most viruses have a hibernation or incubation
period, so even a seemingly good disk from a friend, co-worker, or
other source can be infected.

To protect a computer's existing files, it is advisable to
establish a good method for backing up files on a regular basis.
One strategy is to do incremental backups three times a week and
perform a complete backup every two months. File attribute (FAT)
tables can and should also be backed up. The intervals between
backups should correspond to the amount of activity on the
computer.

When the computer is not in use, turn it off and lock it
up. When a machine is left turned on and unattended, there is no
way to know what has been installed or run on it while it was
unsupervised. This implies that a computer should never be used
unless the user personally boots it up. As far as locks are
concerned, it is usually negligible to have a key lock installed.
Software locks on PC's are easy to bypass and should not be
trusted.

LANS AND VIRUSES

Beside interconnecting users, LAN's can provide a
excellent route of propagation for viruses. In response to their
initial virus attack, the computing center at Lehigh University has
been taking many steps to reduce the possibilities of any new
outbreaks. According to Kenneth van Wyk, a senior consultant at
Lehigh, additional precautions to those mentioned above should be
taken. The procedures in effect at Lehigh University's PC
laboratories, which can also be applied to other distributed
computing environments, are the following:

1) All public microcomputers contain dual floppy drives
and are connected to LANs (Novell on 3COM boards).
The hard disks were removed.
2) All boot disks are notchless and contain nothing
other than the operating system boot files and the
Novell software needed for the LAN.
3) All Novell hard disks on the file servers are read-
only, with the exception of a "scratch" area where
users can place their temporary files.
4) The "scratch" areas get erased periodically by
Lehigh's student employees.
5) Users logging into the LAN are not automatically
placed in the scratch directory.

VACCINES

With the growing publicity and concern over viruses, there
has been a sudden upspring of so called "vaccines". It may even
seem that the number of these programs are quickly catching up to
the number of known viruses. Keep in mind, however, that none of
these programs are 100% cures, and that many take a different
approach in trying to solve the same problem.

Probably the best attitude to take regarding these
"vaccines" is the that of the Paul Mace Software Company -
"Understand, the people who make these (viruses) are clever and we
haven't seen their worst. We're clever too, and will keep on
improving the vaccine." Several of the software/hardware products
of this nature that are designed for personal computer use at home
and in industry are listed in APPENDIX 4.

AFTER THE ATTACK

Even though precautions are taken, the worst sometimes
happens: a virus evades the lines of defense and wreaks havoc.
Even if a hard disk does manage to crash, regardless of whether it
was virus-induced or not, all is not necessarily lost. Some
investment of time may be needed, but the data can usually be
recovered.

There is no better remedy for a crash of any kind than a
recent backup. Unfortunately, if the virus was backed up along
with the rest of the disk, restoring the backup contents may bring
the virus back to life. If this happens and another crash occurs
from the restoration, it is time to do either a lot of detective
work or seek professional help.

Once a crash has occurred, the first step is to remain
calm. The strong urge to shout and destroy nearby office furniture
has to be suppressed. After this is done, the damage must be
surveyed. The crash is probably a result of the virus doing one of
the following:
1) Formatting the disk
2) Scrambling the FAT (File Attribute) table
3) Erasing files
4) Corrupting the disk's boot sector
The amount of data that can be recovered depends on the cause of
the crash.

At this point if you do not know what you are doing, it is
well worth the time and money to find someone who does. Recovering
data from a crashed disk is a highly technical matter. Further
information on the above causes and their remedies are provided in
APPENDIX 5. Any improper attempts by an inexperienced user can
result in permanent data loss.

FURTHER INFORMATION

One of the best ways to learn more about viruses and
related topics is through VIRUS-L, an electronic mail discussion
forum for sharing information about computer viruses. The computer
that handles this forum is located at Lehigh University and is a
result of the need for more information about viruses after the
Lehigh outbreak.

There are currently several hundred subscribers to the
list from academic and corporate institutions from all over the
world. Discussions on the list include current events, virus
"sightings," practical and theoretical virus prevention methods,
and questions/answers about viruses. The discussions on this list
are extremely informative and educational.

The list is non-moderated and non-digested, which means
that any message sent to the forum goes out immediately to all
subscribers. All submissions to VIRUS-L are stored in weekly log
files which can be down-loaded for later reference. Also, there is
a small archive of some of the public anti-virus programs which are
currently available.

In order to get on the mailing list, a user must have
access to the BITNET network, which is possible through ARPANET,
Internet, and several other networks. If this is the case, than
the user only has to send the message "SUB VIRUS-L <user name>" to
<[email protected]>. Questions and comments about VIRUS-L
can sent to the list's moderator, Kenneth van Wyk, at the addresses
listed in APPENDIX 6.

SUMMARY

Computer viruses, like their biological counterparts, are
constantly changing. It is impossible to predict the course that
future viruses will take. According to William H. Murray of Ernst
& Whinney, "if you can conceive it, and if it could be done by any
other program, then it can be done by a virus." The prevention and
protection methods discussed here are not infallible since they
will need to adapt to the dynamic nature of viruses. This paper is
meant to serve as a useful introduction to the nature of viruses
and how they must be confronted. If this information is
understood, the warnings heeded, and the basic precautions taken,
the probability of a virus attack should be lessened.

APPENDIX 1: The Dirty Dozen

Eric Newhouse, the editor of the Dirty Dozen, can be
contacted for more information at the following addresses:

1) The Crest RBBS/CAMS (160/50 MB), 213-471-2518,
1200/2400. (This is Eric Newhouse's bulletin board)

2) The West LA PC-STORE (50 MB), 213-559-6954,
300/1200/2400.

3) Camelot PC-Board (80 MB), 213-204-6158, 300/1200/2400
- leave E-mail to "NORMAN TEETER" and it will be
relayed.

4) The Source - leave E-mail to "Doctor File Finder"
(Mike Callahan) in IBM SIG #4 and it will be relayed.


APPENDIX 2: The Computer Virus Eradication Act of 1988

Whoever knowingly --

(1) inserts into a program for a computer information or
commands, knowing or having reason to believe that
such information or commands will cause loss to users
of a computer on which such program is run or to
those who rely on information processed on such
computer; and

(2) provides such program to others in circumstances in
which those others do not know of the insertion or
its effects;

or attempts to do so, shall, if any of such conduct affects
interstate or foreign commerce, be fined under this title or
imprisoned not more than 10 years, or both.

Entered July 14th 1988 by Mr. Wally Herger (Congressman from CA)
for himself and Mr. Bob Carr (Congressman from MI); referred to
Committee on the Judiciary.


APPENDIX 3: Disk Utility Programs

1) PC-Tools, Central Point Software. $80.

2) Mace+ Utilities, Paul Mace. $100.

3) Advanced Norton Utilities, Peter Norton. $150.


APPENDIX 4: Vaccine Products

1) Antidote by Quaid Software, Toronto, Canada. Detects
viruses but allows the user to correct the problem.
$60.

2) C-4(Cylene-4) by InterPath Corp., Santa Clara, CA. A
program that resides in ROM and looks out for
viruses. If found, computer activity halts and C-4
warns the user. $30.

3) Data Physician by Digital Dispatch Inc., Minneapolis,
MN. Protects and remove viruses from MS-DOS based
computers.

4) Disk Defender by Director Technologies Inc.,
Evanston, IL. An add on board that will guard the
hard disk.

5) Disk Watcher by RG Software Systems, Willow Grove,
PA. A memory resident utility that "watches" the
disk drives to prevent accidental writes or formats.
$80.

6) Dr. Panda Utilities by Panda Systems, Wilmington, DE.
A set of programs that checks files from BBS and
other software before letting them used. $80.

7) FluShot by Byte's BIX. A free utility. Contact BYTE
magazine or BIX for more information. FREE.

8) Mace Vaccine by Paul Mace Software, Ashland, OR. It
provides write protection for system files. $20.

9) NTIVIRUS by Orion Microsystems, Quebec, Canada.
Monitors the system files for viruses. $30.

10) Passcode System by Dynamics Security Inc., Cambridge,
MA. Complete hardware software protection system.
$200-$2000 depending the size and components needed.

11) Syringe,Canary,Infect by Sophco, Boulder, CO. Three
programs that will "quarantine" a bad disk, test and
remove viruses. $30.

12) Vaccinate by Sophco. A "milder virus" that will warn
the user of other viruses. $195.

13) Virusafe by ComNetco Inc., Bernardsville, NJ. Checks
the system memory for viruses then prevents them from
being used. $250.

14) VirAlarm by Lasertrieve Inc., Metuchen, NJ. Stores
programs on CD-ROM after making sure they are virus-
free.

15) Virus Implant Protection by LeeMah DataCom Security
Corp., Hayward, CA. Uses a dedicated PC to "monitor
unauthorized activities" on other networked
computers.

16) Vaccine by FoundationWare, Cleveland, OH. "5 levels"
of protection from write-protect to checksums. $189.


APPENDIX 5: Recovery from a Disk Crash

Recovering information on a formatted disk depends on the
method of formatting. If the disk was low-level formatted, then
the contents of the files and the directories referencing them have
been over-written. The only hope of recovery is a backup. If the
disk was high-level formatted, then the disk contents have not been
erased and are recoverable to some degree.
Unformatting programs have been written to reconstruct the
contents on the disk. Since MS-DOS breaks up or fragments large
files and stores the pieces wherever there is room on the disk,
complete recovery is only possible if the unformatting programs
have a "picture" of the disk before the crash. This picture is
generally taken by a utility accompanying the unformatting program.
Several of these programs are listed above in APPENDIX 3.
If the FAT table has been scrambled, it can be rebuilt.
Two of the three disk utility programs listed below, Norton
Utilities and PC-Tools, include editors that allow an experienced
user to piece together a FAT table. This is not easy and requires
a large amount of experience and a high degree of proficiency. The
other alternative involves finding a FAT backup program and making
periodic backups. A number of FAT backup programs are public
domain and can thus be obtained from a trusted friend or trusted
computer bulletin board.
If files were erased and the FAT tables are still intact,
then the files may simply have to be unerased. All three of the
disk utility programs listed in APPENDIX 3 can do this. When a
file is erased, the first character of its name is usually changed
to a non-printable character to indicate that it is no longer a
valid directory entry. Everything else is left intact. Since the
contents of erased programs are over-written by newer programs, it
is best to unerase the files the most recent files first. If this
is not done, a previously erased program may grab part of a newer
file.
The last cause of a disk crash is when the boot sector is
either erased or formatted. In this case, the data is still safe
on the disk, but the disk cannot be booted from. Another system
disk in a floppy drive can be used to boot the system. Before
proceeding any further, backup the hard disk in case any damage is
done trying to restore the disk to boot status.
The first thing to try is running the MS-DOS "SYS.COM"
program. This program will copy the system files from one disk to
another. After this is done, COMMAND.COM will have to be copied to
the crashed disk using a simple "COPY" command. Information on
this procedure is available in the MS-DOS manual. If this does not
work, Mace+ Utilities has a function called "restore boot sector"
which should be tried.
If all else fails, the disk should be first backed up and
then low-level reformatted. Instructions for this procedure should
either come with the computer or are available from a computer
store. After this is done, the MS-DOS program "FDISK.COM" be run
to prepare the disk for high-level formatting. This formatting is
done with the DOS "FORMAT.EXE" program. The DOS manual should be
consulted before running any of these MS-DOS commands or programs.
When everything is completed, the backup can be restored.


APPENDIX 6: VIRUS-L

The moderator of VIRUS-L, Kenneth van Wyk, can be
contacted for more information at the following addresses:

1) <[email protected]> on Internet

2) <[email protected]> on BITNET

3) Kenneth van Wyk
User Services Senior Consultant
Lehigh University Computing Center
Bethlehem, PA 18015
(215) 758-3900


REFERENCES

[1] Fred Cohen, "Computer Viruses", PhD dissertation,
University of Southern California, 1985.

[2] P. Honan, "Beware: It's Virus Season", Personal Computing,
July 1988, p36.

[3] P. Karon, "The Hype Behind Computer Viruses", PC Week, May
31, 1988, p49.

[4] Fred Cohen, "On The Implications of Computer Viruses and
Methods of Defense", University of Cincinnati,
unpublished.

[5] J. Pournelle, "Computing at Chaos Manor", BYTE, July 1988,
pp198-200.

[6] E. Newhouse, "The Dirty Dozen", Issue #8a, February 21,
1988.




 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS