470 lines
14 KiB
Plaintext
470 lines
14 KiB
Plaintext
|
|
||
|
|
||
|
|
||
|
#######################################
|
||
|
# #
|
||
|
# #
|
||
|
# ======== =\ = ====== #
|
||
|
# == = \ = = #
|
||
|
# == = \ = ====== #
|
||
|
# == = \ = = #
|
||
|
# == = \= ====== #
|
||
|
# #
|
||
|
# #
|
||
|
# <Tolmes News Service> #
|
||
|
# ''''''''''''''''''''' #
|
||
|
# #
|
||
|
# #
|
||
|
# > Written by Dr. Hugo P. Tolmes < #
|
||
|
# #
|
||
|
# #
|
||
|
#######################################
|
||
|
|
||
|
|
||
|
Issue Number: 35
|
||
|
Release Date: April 30, 1988
|
||
|
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|
||
|
|
||
|
TITLE: Virus Wars: A Serious Warning
|
||
|
FROM: PC Magazine
|
||
|
DATE: February 29, 1988
|
||
|
by: John C. Dvorak
|
||
|
|
||
|
-----------------------------------------------------------------------
|
||
|
A new computer virus is infecting microcomputers around the world.
|
||
|
Where is the utility that will prevent our PCs from becoming victims in
|
||
|
this epidemic?
|
||
|
-----------------------------------------------------------------------
|
||
|
|
||
|
A computer virus (sometimes called a Trojan horse or a worm) is a
|
||
|
small and sinister piece of software code that literally infects your
|
||
|
machine. It is inserted into a public-domain or bootleg program and,
|
||
|
when the program is used, the virus code is alerted and rewrites itself
|
||
|
into something in your system and typically (and eventually) calls a
|
||
|
hard disk routine and tells the disk to erase itself. Computer
|
||
|
sabotage. It's getting worse and we should all be aware of it. On the
|
||
|
West Coast a battle wages where Apple Macintosh users and IBM PC users
|
||
|
are loading software with viruses to "attack" their foe: a user of the
|
||
|
other kind of machine.
|
||
|
|
||
|
THE LEHIGH VIRUS
|
||
|
|
||
|
Meanwhile, one virus has made headlines. It was released at Lehigh
|
||
|
University. Here's an excerpt from a memo sent out over UseNet from
|
||
|
Kenneth R. van Wyk, User Services Senior Consultant, Lehigh University
|
||
|
Computing Center. It describes the virus that was set loose just
|
||
|
before Thanksgiving last year and is now floating around the world.
|
||
|
"Last week, some of our student consultants discovered a virus
|
||
|
program that's been spreading rapidly throughout Lehigh University. It
|
||
|
has the chance of spreading much farther than just our University. We
|
||
|
had no idea where the virus started, but some users have told me that
|
||
|
other universities have recently had similar problems.
|
||
|
"The virus itself is contained in the stack space of COMMAND.COM.
|
||
|
When a PC is booted from an infected disk, all a user need do to spread
|
||
|
the virus is to access another disks via TYPE, COPY, DIR, etc. If the
|
||
|
other disk contains COMMAND.COM, the virus code is copied to the other
|
||
|
disk. Then, a counter is incremented on the parent. When this counter
|
||
|
reaches a value of 4, and and every disk in the PC is erased
|
||
|
thoroughly. The boote the FAT tables, etc.
|
||
|
All Norton's horses couldn't put it back together again. This affects
|
||
|
both floppy and hard disks. Meanwhile, the four children that were
|
||
|
created go on to tell four friends, and then they tell four friends,
|
||
|
and so on, and so on.
|
||
|
"Detection: while the virus appears to be very well written, the
|
||
|
author did leave behind a couple footprints. First, the write date of
|
||
|
COMMAND.COM changes. Second, if there's a write protect tab on an
|
||
|
uninfected disk, you will get a WRITE PROTECT ERROR. So, boot up from a
|
||
|
suspected virus'd disk and access a write-protected disk--if an error
|
||
|
comes up, then you're sure. Note that the length of COMMAND.COM Does
|
||
|
not get altered.
|
||
|
"I urge anyone who comes in contact with publicly accessible disks to
|
||
|
periodically check their own disks. Also, exercise safe computer--
|
||
|
always wear a write protect tab.
|
||
|
"This is not a joke. A large percentage of our public site disks has
|
||
|
been gonged by this virus in the last couple days."
|
||
|
The mainstream computer magazines seldom discuss these destructive
|
||
|
little gags, even though there are plenty of them. PC users must make
|
||
|
themselves aware of these things. If a virus program got into a
|
||
|
corporation and started eating hard disks, you can be sure that the
|
||
|
next time someone brought in some software from home, it would quickly
|
||
|
be confiscated. This kind of thing only encourages MIS departments to
|
||
|
take total control of the microcomputer installation. Remember, that
|
||
|
most talented of the hackers love to design programs like this just to
|
||
|
harass the average PC user.
|
||
|
We need some utilities that check the integrity of our computer
|
||
|
systems. Of course, these programs would be quickly defeated by some
|
||
|
maniac who would find the loophole in the algorithm, and the integrity
|
||
|
checker would have to be forever updated. (Sounds like a money-maker!)
|
||
|
Some say that the solution to these sick jokes is to perpetually back
|
||
|
up the hard disk like a good little boy. Great. I back up my hard
|
||
|
disk once a year whether it needs it or not. So what am I (and most
|
||
|
users) supposed to do in between times?
|
||
|
All you can do is be careful and know that someone out there is about
|
||
|
to make your life miserable if you're not prudent.
|
||
|
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|
||
|
NOTA:
|
||
|
|
||
|
|
||
|
Viruses seem to be a very hot item these days as I've explained in previous
|
||
|
issues of TNS. Besides the many articles on viruses that have been published
|
||
|
(many of which are in previous issues of TNS or future issues) I have seen
|
||
|
several news reports on the dangers of computer viruses. All of this hysteria
|
||
|
has been caused by a few incidents at several universities here and Hebrew
|
||
|
University. Other tensions are still around because of the Chaos Computer
|
||
|
break-ins in NASA's SPAN network.
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|
||
|
TOLMES NEWS SERVICE INDEX:
|
||
|
--------------------------
|
||
|
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #1
|
||
|
----------------------------
|
||
|
|
||
|
Introduction to TNS Magazine
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #2
|
||
|
----------------------------
|
||
|
|
||
|
Introduction to Issue #2
|
||
|
|
||
|
They Sure Can Talk in Raleigh
|
||
|
|
||
|
Teaching Computer Ethics in the Schools
|
||
|
|
||
|
Cash-Machine Magician
|
||
|
|
||
|
Cheaper Electronics Makes It a Snap to Snoop
|
||
|
|
||
|
Los Alamos Nuclear Facility Security Boost
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #3
|
||
|
----------------------------
|
||
|
|
||
|
Making Computers Snoop-Proof
|
||
|
|
||
|
War Against Phone Hacking Heats Up
|
||
|
|
||
|
Toll Fraud Trial Sets New Tone
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #4
|
||
|
----------------------------
|
||
|
|
||
|
Cellular Technology
|
||
|
|
||
|
Pirate BBS
|
||
|
|
||
|
Scanning Bust
|
||
|
|
||
|
Rip Offs
|
||
|
|
||
|
How the Soviets Are Bugging America
|
||
|
|
||
|
Deadly Bugs
|
||
|
|
||
|
The Newest Dating Game
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #5
|
||
|
----------------------------
|
||
|
|
||
|
Electronic Cryptography Report
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #6
|
||
|
----------------------------
|
||
|
|
||
|
HD Sentry: Hard Disk Protection from Trojan Horse Programs
|
||
|
|
||
|
Check This: Ma Bell is a Generous Soul
|
||
|
|
||
|
Sign In and then Sign On
|
||
|
|
||
|
How To Beat Phone Assault
|
||
|
|
||
|
Prisoner Phone Phreaks
|
||
|
|
||
|
Suburban Kids Are Too Dumb to Steal
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #7
|
||
|
----------------------------
|
||
|
|
||
|
Federal Sting Nets 25 for Cellular Phone Fraud in NYC
|
||
|
|
||
|
18 Are Seized in Illegal Use of Mobile Telephones
|
||
|
|
||
|
Hello Anywhere
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #8
|
||
|
----------------------------
|
||
|
|
||
|
Keeping the Secrets Inside the Computer
|
||
|
|
||
|
Bugging
|
||
|
|
||
|
Urine Hot-Line
|
||
|
|
||
|
Innovation? Just Hold the Phone
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #9
|
||
|
----------------------------
|
||
|
|
||
|
The National Guards
|
||
|
|
||
|
The Caller That Isn't Long-Winded
|
||
|
|
||
|
A Call to Stop Long-Distance Scam
|
||
|
|
||
|
Online Junkies- Artificial Intelligence
|
||
|
|
||
|
Hacking Through NASA: A Threat- Or Only an Embarassment
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #10
|
||
|
-----------------------------
|
||
|
|
||
|
The Bust of Shadow Hawk
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #11
|
||
|
-----------------------------
|
||
|
|
||
|
Shadow Hawk's Bust: Continued from TNS Issue #10
|
||
|
|
||
|
US Sprint Sues "Ring" of Hackers for $20 Million
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #12
|
||
|
-----------------------------
|
||
|
|
||
|
The Blue Box and Ma B- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #13
|
||
|
-----------------------------
|
||
|
|
||
|
Capt. Zap: Informant?
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #14
|
||
|
-----------------------------
|
||
|
|
||
|
411: Life at Directory Assistance
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #15
|
||
|
-----------------------------
|
||
|
|
||
|
The Max Headroom TV Pirate
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #16
|
||
|
-----------------------------
|
||
|
|
||
|
The Celling of America
|
||
|
|
||
|
Tales That Do Not Compute
|
||
|
|
||
|
Responses to Issue #12's Article
|
||
|
|
||
|
Introduction: TNS QuickNotes
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #17
|
||
|
-----------------------------
|
||
|
|
||
|
New Security Measures at ITT
|
||
|
|
||
|
Capt. Zap's Defense
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #18
|
||
|
-----------------------------
|
||
|
|
||
|
2600 Magazine's Official Bulletin Boards
|
||
|
|
||
|
Some Things about Phrack Inc.
|
||
|
|
||
|
Syndicate Report: Will It Return?
|
||
|
|
||
|
TNS QuickNotes
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #19
|
||
|
-----------------------------
|
||
|
|
||
|
'If You Need Help, Press 3'
|
||
|
|
||
|
Satellite Paging
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #20
|
||
|
-----------------------------
|
||
|
|
||
|
AT&T's Attempt at a Comeback
|
||
|
|
||
|
The 1-900 Report
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #21
|
||
|
-----------------------------
|
||
|
|
||
|
AT&T and Sun Microsystems
|
||
|
|
||
|
1-900's
|
||
|
|
||
|
AT&T Credit Card Fraud Causes a $5,430 Bill
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #22
|
||
|
-----------------------------
|
||
|
|
||
|
TNS Issue Directory
|
||
|
|
||
|
FON Card Review
|
||
|
|
||
|
Credit Card Fraud Arrests
|
||
|
|
||
|
Radio ANI
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #23
|
||
|
-----------------------------
|
||
|
|
||
|
Dial-a-Porn Restrictions
|
||
|
|
||
|
Changes at 2600
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #24
|
||
|
-----------------------------
|
||
|
|
||
|
1-900 Abuses
|
||
|
|
||
|
Gab Lines
|
||
|
|
||
|
Phone Aid
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #25
|
||
|
-----------------------------
|
||
|
|
||
|
Return of The Rebel
|
||
|
|
||
|
Problems for Mafia Dude
|
||
|
|
||
|
The Foreign Legion
|
||
|
|
||
|
Return of the Private Connection
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #26
|
||
|
-----------------------------
|
||
|
|
||
|
Computer Terrorism!
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #27
|
||
|
-----------------------------
|
||
|
|
||
|
Changes at 2600 Magazine
|
||
|
|
||
|
Virus Report
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #28
|
||
|
-----------------------------
|
||
|
|
||
|
Viruses Threatening an Era of Computer Freedom
|
||
|
|
||
|
The Tulsa Busts
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #29
|
||
|
-----------------------------
|
||
|
|
||
|
Telecom Update
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #30
|
||
|
-----------------------------
|
||
|
|
||
|
Federal Phone Snafu
|
||
|
|
||
|
The Trojan Wars
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #31
|
||
|
-----------------------------
|
||
|
|
||
|
Computer Systems Under Seige
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #32
|
||
|
-----------------------------
|
||
|
|
||
|
Computer Terror
|
||
|
|
||
|
Youths Suspected in Phone Fraud
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #33
|
||
|
-----------------------------
|
||
|
|
||
|
Breaking and Entering: High Tech Style
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Tolmes News Service Issue #34
|
||
|
-----------------------------
|
||
|
|
||
|
Multi-State Computer Theft Ring
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|