Home |
About |
Comments |
Lectures |
Notice |
Registration
TODAY'S LESSON ...
Time : All lectures are designed to be completed in less than 30 minutes. This time includes the time necessary for registered students to answer questions and submit suggestions Check out our sponsors infoDAM Technologies |
JUNE 2000 PUBLIC LECTURE ... Short Worm History On November 2, 1988, a computer "worm" was introduced into the Internet. It replicated uncontrollably for several days by taking advantage of a flaw in the e-mail program "send.mail". Eventually, it infected over 6,200 computers nationwide, and overwhelmed the processing capabilities of many infected machines until they failed completely. The author of the worm did not write the worm to destroy data which it could have done easily, but to show that UNIX the most popular operating systems for internet servers had a security hole. The total monetary costs of his infection was estimated at US $98,253,260. In May 1998, the Autostart Worm was discovered, it takes advantage of a QuickTime feature used with CDs to initiate itself on an operating system. The Autostart 9805 worm, the first ever worm, only effects Power Macintosh systems. It was originally found in Hong Kong and Taiwan, quickly spreading to four continents. AutoStart 9805 is capable of overwriting files with random data. Virus Update In May 2000, the "Love Bug" struck. It was called the fastest-moving and most widespread computer virus ever seen, affecting computer systems worldwide. The original virus appears in emails as "I LOVE YOU," enticing people to open the message, only to cripple their email systems. One of its variants uses the word "joke" in the subject line. By fooling users to think it is a joke it is acting more like a Trojan Horse than a virus. In December 1999, Melissa an email virus clogged up email networks. It is believed that it was named after a stripper known to David Smith, 31 its author. Protecting your system 1. Always have an anti-virus program properly installed. This program must be updated regularly. For users connected to the Internet it is advisable to update the signature file monthly. - For users not connected to the Internet your major concern would be the diskettes you use on your systems. If you are using a diskette or diskettes that were used at some office that provides computer services to the general public you are in a very high risk group. You are a prime candidate for a computer virus attack. 2. The widespread use of email, combined with the use of more elaborate email messages, has provided an effective new means for viruses to spread. As a rule do not open any email when you do not know from whom it is comming especially if it has an attractive name to interest you. Unfortunately a friend may send you an attachment which has a virus without knowing. To be sure don't even preview the attachments with programs like Microsoft Outlook. Simply delete the message without opening the file. 3. Stop using the Word .doc format; instead, save documents in pure Rich Text Format because this format does not support macro language viruses but still supports .doc formatting. 4. Change your CMOS boot-up sequence so that rather than booting from the A drive if you leave a floppy disk in your machine by accident , you boot from the C drive instead. This should stop all boot-sector viruses. Boot-sector viruses are in the boot sector of a bootable disk. This sector contains the startup code that actually loads DOS. All formatted diskettes are capable of carrying boot sector viruses. They can be quite a challenge to get rid of. Many persons have had to reformat the hard disk to clean it thus loosing all programs and all data. The Alternative There is of course another option. One that many have not taken seriously yet, no doubt due to the Marketing efforts of Microsoft. Switch completely form Microsoft applications and the Windows operating system. Use another operating system like Linux which does not have virus problems. Some say that as Linux becomes more popular then viruses will emerge but Linux has a better approach to security. Rather that the quick fix approach of using antivirus software which must be updated regularly the security hole is stopped. This model offers far better protection against the loss of data. Although it is possible to write Unix-based viruses we have yet to see any instance of a non-experimental virus in that environment. Conclusion There are thousands of computer viruses and many work in different ways. One should have a good backup policy which ensures that the anti-virus program one uses is updated regularly. Document the recommended steps to clean viruses off your system. Have a hard copy easily available along with clean system bootable disks should a virus strike. There is no perfect solution. The best approach is to be eternally vigilant and or switch to a safer operating systems environment. For more information visit :
2 of 2 Back |