Copy Link
Add to Bookmark
Report

Tolmes News Service 35

eZine's profile picture
Published in 
Tolmes News Service
 · 5 years ago

  




#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################


Issue Number: 35
Release Date: April 30, 1988


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Virus Wars: A Serious Warning
FROM: PC Magazine
DATE: February 29, 1988
by: John C. Dvorak

-----------------------------------------------------------------------
A new computer virus is infecting microcomputers around the world.
Where is the utility that will prevent our PCs from becoming victims in
this epidemic?
-----------------------------------------------------------------------

A computer virus (sometimes called a Trojan horse or a worm) is a
small and sinister piece of software code that literally infects your
machine. It is inserted into a public-domain or bootleg program and,
when the program is used, the virus code is alerted and rewrites itself
into something in your system and typically (and eventually) calls a
hard disk routine and tells the disk to erase itself. Computer
sabotage. It's getting worse and we should all be aware of it. On the
West Coast a battle wages where Apple Macintosh users and IBM PC users
are loading software with viruses to "attack" their foe: a user of the
other kind of machine.

THE LEHIGH VIRUS

Meanwhile, one virus has made headlines. It was released at Lehigh
University. Here's an excerpt from a memo sent out over UseNet from
Kenneth R. van Wyk, User Services Senior Consultant, Lehigh University
Computing Center. It describes the virus that was set loose just
before Thanksgiving last year and is now floating around the world.
"Last week, some of our student consultants discovered a virus
program that's been spreading rapidly throughout Lehigh University. It
has the chance of spreading much farther than just our University. We
had no idea where the virus started, but some users have told me that
other universities have recently had similar problems.
"The virus itself is contained in the stack space of COMMAND.COM.
When a PC is booted from an infected disk, all a user need do to spread
the virus is to access another disks via TYPE, COPY, DIR, etc. If the
other disk contains COMMAND.COM, the virus code is copied to the other
disk. Then, a counter is incremented on the parent. When this counter
reaches a value of 4, and and every disk in the PC is erased
thoroughly. The boote the FAT tables, etc.
All Norton's horses couldn't put it back together again. This affects
both floppy and hard disks. Meanwhile, the four children that were
created go on to tell four friends, and then they tell four friends,
and so on, and so on.
"Detection: while the virus appears to be very well written, the
author did leave behind a couple footprints. First, the write date of
COMMAND.COM changes. Second, if there's a write protect tab on an
uninfected disk, you will get a WRITE PROTECT ERROR. So, boot up from a
suspected virus'd disk and access a write-protected disk--if an error
comes up, then you're sure. Note that the length of COMMAND.COM Does
not get altered.
"I urge anyone who comes in contact with publicly accessible disks to
periodically check their own disks. Also, exercise safe computer--
always wear a write protect tab.
"This is not a joke. A large percentage of our public site disks has
been gonged by this virus in the last couple days."
The mainstream computer magazines seldom discuss these destructive
little gags, even though there are plenty of them. PC users must make
themselves aware of these things. If a virus program got into a
corporation and started eating hard disks, you can be sure that the
next time someone brought in some software from home, it would quickly
be confiscated. This kind of thing only encourages MIS departments to
take total control of the microcomputer installation. Remember, that
most talented of the hackers love to design programs like this just to
harass the average PC user.
We need some utilities that check the integrity of our computer
systems. Of course, these programs would be quickly defeated by some
maniac who would find the loophole in the algorithm, and the integrity
checker would have to be forever updated. (Sounds like a money-maker!)
Some say that the solution to these sick jokes is to perpetually back
up the hard disk like a good little boy. Great. I back up my hard
disk once a year whether it needs it or not. So what am I (and most
users) supposed to do in between times?
All you can do is be careful and know that someone out there is about
to make your life miserable if you're not prudent.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:


Viruses seem to be a very hot item these days as I've explained in previous
issues of TNS. Besides the many articles on viruses that have been published
(many of which are in previous issues of TNS or future issues) I have seen
several news reports on the dangers of computer viruses. All of this hysteria
has been caused by a few incidents at several universities here and Hebrew
University. Other tensions are still around because of the Chaos Computer
break-ins in NASA's SPAN network.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

TOLMES NEWS SERVICE INDEX:
--------------------------


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #1
----------------------------

Introduction to TNS Magazine

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #2
----------------------------

Introduction to Issue #2

They Sure Can Talk in Raleigh

Teaching Computer Ethics in the Schools

Cash-Machine Magician

Cheaper Electronics Makes It a Snap to Snoop

Los Alamos Nuclear Facility Security Boost

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #3
----------------------------

Making Computers Snoop-Proof

War Against Phone Hacking Heats Up

Toll Fraud Trial Sets New Tone

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #4
----------------------------

Cellular Technology

Pirate BBS

Scanning Bust

Rip Offs

How the Soviets Are Bugging America

Deadly Bugs

The Newest Dating Game

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #5
----------------------------

Electronic Cryptography Report

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #6
----------------------------

HD Sentry: Hard Disk Protection from Trojan Horse Programs

Check This: Ma Bell is a Generous Soul

Sign In and then Sign On

How To Beat Phone Assault

Prisoner Phone Phreaks

Suburban Kids Are Too Dumb to Steal

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #7
----------------------------

Federal Sting Nets 25 for Cellular Phone Fraud in NYC

18 Are Seized in Illegal Use of Mobile Telephones

Hello Anywhere

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #8
----------------------------

Keeping the Secrets Inside the Computer

Bugging

Urine Hot-Line

Innovation? Just Hold the Phone

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #9
----------------------------

The National Guards

The Caller That Isn't Long-Winded

A Call to Stop Long-Distance Scam

Online Junkies- Artificial Intelligence

Hacking Through NASA: A Threat- Or Only an Embarassment

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #10
-----------------------------

The Bust of Shadow Hawk

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #11
-----------------------------

Shadow Hawk's Bust: Continued from TNS Issue #10

US Sprint Sues "Ring" of Hackers for $20 Million

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #12
-----------------------------

The Blue Box and Ma B- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #13
-----------------------------

Capt. Zap: Informant?

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #14
-----------------------------

411: Life at Directory Assistance

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #15
-----------------------------

The Max Headroom TV Pirate

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #16
-----------------------------

The Celling of America

Tales That Do Not Compute

Responses to Issue #12's Article

Introduction: TNS QuickNotes

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #17
-----------------------------

New Security Measures at ITT

Capt. Zap's Defense

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #18
-----------------------------

2600 Magazine's Official Bulletin Boards

Some Things about Phrack Inc.

Syndicate Report: Will It Return?

TNS QuickNotes

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #19
-----------------------------

'If You Need Help, Press 3'

Satellite Paging

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #20
-----------------------------

AT&T's Attempt at a Comeback

The 1-900 Report

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #21
-----------------------------

AT&T and Sun Microsystems

1-900's

AT&T Credit Card Fraud Causes a $5,430 Bill

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #22
-----------------------------

TNS Issue Directory

FON Card Review

Credit Card Fraud Arrests

Radio ANI

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #23
-----------------------------

Dial-a-Porn Restrictions

Changes at 2600

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #24
-----------------------------

1-900 Abuses

Gab Lines

Phone Aid

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #25
-----------------------------

Return of The Rebel

Problems for Mafia Dude

The Foreign Legion

Return of the Private Connection

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #26
-----------------------------

Computer Terrorism!

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #27
-----------------------------

Changes at 2600 Magazine

Virus Report

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #28
-----------------------------

Viruses Threatening an Era of Computer Freedom

The Tulsa Busts

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #29
-----------------------------

Telecom Update

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #30
-----------------------------

Federal Phone Snafu

The Trojan Wars

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #31
-----------------------------

Computer Systems Under Seige

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #32
-----------------------------

Computer Terror

Youths Suspected in Phone Fraud

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #33
-----------------------------

Breaking and Entering: High Tech Style

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Tolmes News Service Issue #34
-----------------------------

Multi-State Computer Theft Ring

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT