Copy Link
Add to Bookmark
Report

Tolmes News Service 26

eZine's profile picture
Published in 
Tolmes News Service
 · 26 Apr 2019

  




#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################


Issue Number: 26
Release Date: February 20, 1988

Tolmes News Service Issue #26 will deal with computer viruses;the Trojan Horse.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

TITLE: COMPUTER TERRORISM!
FROM: The Chicago Sun-Times
DATE: January 17, 1988

By Jim Ritter


Malicious hackers have discovered a new weapns for disabling computers:
an electronic "virus" that bears similarities to the AIDS virus.
An electronic virus is a set of instruction hidden within a computer
that destroys programs, wipes out data and does other mischief. Worst of all,
it reproduces itself like a biological viruse, and "infects" other computers
it contacts.
"It might do to computers what AIDS has done to sex," said Shai Bushinsky,
an Israeli computer expert. "The current free flow of information will stop.
Everyone will be careful who they come into contact and with whom they share
their information."
In Jerusalem, a virus infecting Hebrew University computers threatens to
destroy thousands of electronic files and wipe out years of research. Whoever
introduced it "wanted to wield power over others and didn't care how he did
it," said programmer Yisrael Radan.
Last November, a virus spread through personal computers at Lehigh
University in Bethlehem, Pa. Several hundred people lost data and programs,
including term papers written on word processors and financial ledgers
prepared for business classes.
An before Christmas, some grinch infected computers in IBM corporate
offices with a virus that brought the corporation's computer mail network to
a virtual halt for a few hours.
"The problem has really just surfaced," said Donn Parker, an expert on
computer security for SRI International. "Once one of these things is done,
it's like a break in the dam. Malicious hackers will pick up on the idea and
try to do one better than the next guy."
Computer viruses are the latest weapons to be used by the disgruntled
employees, irresponsible hackers and teenage "twits" who have been terrorizing
computer users throughout the 1980s.
The saboteur begins by using a secret code to hide his virus in a
seemingly legitimate program known as a Trojan Horse.
At first, the virus lays dormant and the unsuspecting user doesn't notice
anything wrong. The program continues to do its intended job, such as word
processing or accounting functions.
Meanwhile, the virus spreads to programs in other computers. The
affliction can spread quickly because computer users swap programs all the
time. One common method is putand lending it out.
Another popular practice is hooking up to elec-


-------------------------------------------------------------------------------

Weapons of Computer Sabotage


TROJAN HORSE: Program within a program, containing secret instructions. Attacks
unsuspecting user by unleashing sinister activities known as viruses, time
bombs, worms, and salami attacks.


VIRUS: Destroys data or program instructions stored in a computer disc by
writing over it. Reproduces itself so that it can "infect" and destroy other
programs it contacts.


TIME BOMB: Instructions that tell a virus when to attack. It may explode, for
example, on Friday the 13th, or the moment a fired employee's I.D. number is
removed from the payroll records.


WORM: Destroys data as it wriggles through a program. For example, one type
of worm makes thousands of copies of itself, wiping out everything else in
the program's memory.


SALAMI ATTACK: Instructs computer in a financial institution to divert small
ammount of money from thousands of accounts into the user's accout. It's
like stealing thin slices of salami from other people's sausages to make your
own roll.


-------------------------------------------------------------------------------

tronic "bulletin boards," where users swap programs, games, and messages over
telephone lines.
The virus attacks at a predetermined time. At Hebrew University,
for example, the virus was programmed to do damage every Friday and on the
13th day of each month.
Not all viruses are destructive. Indeed, one computer game involves a
viruse that reproduces itself within the computer without damaging anything.
The object is to write instructions that search out and destroy the virus.
The virus that infected IBM's computer mail network may have been
meant more as a prank than a malicious act. The prankster's "letter" was a
drawing of a Christmas tree. It appeared on the screen when the receiver
opened his electronic mail.
The virus spread rapidly, like a chain letter. It would go to every
colleague on the user's mailing list, and then to every one on his colleagues'
mailing lists. Before long, the network was as jammed as the Dan Ryan at rush
hour. But no permanent damage was done.
By contrast, a virulent virus is meant to destroy data or progrms stored
in a computer, known as software. Such a virus doesn't harm the computer itself
but the software is more valuable. Unleashing a virus is like destroying an
authors 400 page manuscript but leaving his typewriter alone.
Viruses can be killed by writing search-and-destroy programs. But
because viruses can do great damage before their detected, it's best not to
contact them in the first place.
There are several defenses. One example is protective software, such as
the program CHK4BOMB ("check for bomb"). CHK4BOMB screens programs for
suspicious instructions that may contain a virus.
Users also record backup copies of valuable software on floppy discs. They
should be stored away from the computer where they can't be infected. Perhatant, users should swap programs only with people they trust.
But none of these measures are foolproof. As with AIDS, the only
completely safe strategy is abstinence: Never trade discs or swap programs on
bulletin boards.
But computer celibacy isn't likely to catch on, said Curtis Sahakian, a
leading bulletin board operator. The Chicago area alone has at least 100
bulletin boards, some receiving hundreds of calls a day.
"People will not stop using them," Sahakian said. "Nor will they stop
having sex."


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

I like the how they compared it with AIDS..... yeah.. right.


Some things to not about the article:

-------------------------------------------------------------------------------

"malicious hackers"-

Whenever they use the word hacker, they have the work malicious or perhaps
irresponsible in front of it.

-------------------------------------------------------------------------------

"bears similarities to the AIDS virus"-

It's nice that they could compare those things.

-------------------------------------------------------------------------------
"'The problem has really just surfaced,' said Donn Parker, an expert on
computer security for SRI International. 'Once one of these things is done,
it's like a break in the dam. Malicious hackers will pick up on the idea and
try to do one better than the next guy.'-

I know very little about Donn Parker but I do know that every time there is
some news story about hackers they always consult him. It seems like they
always have a quote from Donn Parker on computer security. You'll notice how he
says "malicious" hackers.

And doesn't everybody want to make the latest K-R/\D virus....d00d??

Hackers aren't trying to create better and better viruses.

-------------------------------------------------------------------------------

"At first, the virus lays dormant and the unsuspecting user doesn't notice
anything wrong."-

Viruses can remain dormant. This is true. One example it the GIMME A COOKIE
virus and the ARF! ARF! GOTCHA virus.

-------------------------------------------------------------------------------

"Computer viruses are the latest weapons to be used by the disgruntled
employees, irresponsible hackers and teenage 'twits' who have been terrorizing
computer users throughout the 1980s."-

Actually computer viruses have been used for quite some time.. all the way
back to the first hackers. Yes there have been some people who have terrorized
computer users... but these people are... what's the word??...twits.

-------------------------------------------------------------------------------

ABOUT THE DEFINITIONS:

My favorite definition is the "Salami Attack." Where did they get that one?
hmm.... wasn't there something like that in Superman III or something like
that... Anyway, I've never heard of that one before.

-------------------------------------------------------------------------------

"The virus that infected IBM's computwork may have been
meant more as a prank than a malicious act. The prankster's 'letter' was a
drawing of a Christmas tree. It appeared on the screen when the receiver
opened his electronic mail."-

I might have even heard of this. I know of a case very similar to this where
the electronic mail service was all screwed up. It might be the same case..
I'm not sure.

-------------------------------------------------------------------------------

EXTRA NOTES:


Right below the title to the article is a drawing of a computer. On the screen
is some guy holding an M-60 machine gun (some Ramboish guy)...; thereby giving
a picture of the danger of computer terrorism.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT