The Usenet Virus: a case history.
Charles Lambert
cl at datlog.co.uk
Thu Oct 20 01:12:39 AEST 1988
I have a question about Pete's "speedhack" fiction. Why would using the
guise of a standard C library routine, such as malloc() or perror(), make
the virus any more or less insidious?
In Pete's scenario, the active code of the virus as scattered under
innocuous names throughout the source. Is the well-known name a necessary
hook?
I wonder, too, whether a good static tracer like CSCOPE would help to reveal
such a virus.
As a general comment, I was delighted to see such a detailed dissertation
about viruses on the net. The idea that we should not discuss hacking for
fear of giving ideas away is fundamentally flawed. If knowledge is power,
ignorance is weakness; and as a fledgeling system manager I don't want to
be weak.
----------
Charlie
More information about the Comp.unix.wizards
mailing list