Computer Virus Myths

                                 by Rob Rosenberger
                                with Ross Greenberg


              A number of myths have popped up recently  about  the threat
         of computer "viruses".  There are myths about how widespread they
         are, how dangerous they are, and even myths about what a computer
         virus really is.  We'd like the facts to be known.

              The first thing you have to understand is that a virus  is a
         programming technique that falls in the realm of "Trojan horses."
         All viruses are Trojan horses, but very few Trojan horses  can be
         called a virus.

              That having been said, it's  time to go over the terminology
         we use when we lecture:

         BBS            Bulletin Board System.    If you have a modem, you
                        can call a BBS and leave  messages,  transfer com-
                        puter files back &  forth,  and  learn a lot about
                        computers.  (What you're  reading  right  now most
                        likely came to you from a BBS, for example.)

         Bug            an accidental flaw  in  the  logic  of  a computer
                        program that  makes  it  do  things  it  shouldn't
                        really be doing.  Programmers  don't  mean  to put
                        bugs in their program, but they  always  creep in.
                        The  first  bug was discovered  by  pioneer  Grace
                        Hopper when she  found  a dead moth shorting out a
                        circuit in the  early  days  of  computers.   Pro-
                        grammers  tend to spend more time debugging  their
                        programs than they do writing  them  in  the first
                        place.

         Hacker         someone  who really loves computers and who  wants
                        to push  them to the limit.  Hackers don't release
                        Trojan horses onto the world, it's the wormers who
                        do that.  (See  the  definition  for  a "wormer".)
                        Hackers have a healthy  sense  of  curiosity: they
                        try doorknobs just to see if  they're  locked, and
                        they tinker with a piece of  equipment  until it's
                        "just right."

         Shareware      a distribution method for quality  software avail-
                        able on a "try before you buy" basis.  You pay for
                        the program only if you find it useful.  Shareware
                        programs can be downloaded from BBSs  and  you are
                        encouraged to give  an evaluation copy to friends.
                        There are few advertising & distribution costs, so
                        many shareware applications can rival the power of
                        off-the-shelf counterparts, at just a  fraction of
                        the price.



         Copyright (c) 1988 Rob Rosenberger & Ross Greenberg        Page 1






         Trojan horse   a  generic  term  describing  a  set  of  computer
                        instructions  purposely  hidden  inside a program.
                        Trojan horses tell  a  program  to  do  things you
                        don't  expect it to do.  The  term  comes  from  a
                        historic battle in which the ancient city  of Troy
                        was offered the "gift"  of  a  large  wooden horse
                        that secretly held soldiers  in  its  belly.   The
                        Trojans rolled it into their fortified city....

         Virus          a term for a very  specialized  Trojan  horse that
                        can   spread   to   other  computers  by  secretly
                        "infecting" programs with a  copy  of  itself.   A
                        virus is the only  type  of  Trojan horse which is
                        contagious, like the common cold.   If  it doesn't
                        meet this definition, then it isn't a virus.

         Worm           a term similar to a  Trojan horse, but there is no
                        "gift" involved.  If  the  Trojans  had  left that
                        wooden horse outside  the city, they wouldn't have
                        been  attacked  --   but  worms  can  bypass  your
                        defenses.   An example is an unauthorized  program
                        designed to spread itself by exploiting a bug in a
                        network  software  package.   (Such programs could
                        possibly also contain  a virus that activates when
                        it reaches  the  computer.)    Worms  are  usually
                        released by someone who has normal  access  to the
                        computer or network.

         Wormers        the  name  given  to   the   people   who  unleash
                        destructive  Trojan horses.  Let's face it,  these
                        people aren't angels.    What  they  do  hurts us.
                        They deserve our disrespect.

              Viruses, like all Trojan horses, are  purposely  designed to
         make a program do things you don't expect it to do.  Some viruses
         are just an annoyance, perhaps only displaying a "Peace on earth"
         message.  The viruses we're worried about are  the  ones designed
         to destroy your files and waste the valuable time you'll spend to
         repair the damage.

              Now you know the  difference  between  a  virus and a Trojan
         horse and a bug.  Let's get into some of the myths:

         All purposely destructive code comes as a virus.
              Wrong.  Remember, "Trojan horse"  is  the  general  term for
         purposely destructive  code.  Very few Trojan horses are actually
         viruses.

         All Trojan horses are bad.
              Believe it or not, there are a few useful Trojan horse tech-
         niques in the world.  A "side door" is any command not documented
         in the user manual, and it's a Trojan horse by definition.   Some
         programmers install side doors to  help them locate bugs in their




         Computer Virus Myths                                       Page 2






         programs.  Sometimes a command  may have such an obscure function
         that it makes sense not to document it.

         Viruses and Trojan horses are a recent phenomenon.
              Trojan horses have been around since the first  days  of the
         computer.  Hackers  toyed  with  viruses  in the early 1960s as a
         form of amusement.    Many different Trojan horse techniques were
         developed over the years  to  embezzle  money, destroy data, etc.
         The general public wasn't aware of this problem until the  IBM PC
         revolution brought it into the spotlight.  Just  five  years ago,
         banks  were still covering up computerized embezzlements  because
         they believed they'd lose too many customers.

         Computer viruses are reaching epidemic proportions.
              Wrong again.  Viruses may be spread all over the  planet but
         they aren't taking over the world.  There are only about fifty or
         so known virus "strains" at this time and a few of them have been
         completely eliminated.   Your  chances of being infected are slim
         if you take proper precautions.  (Yes, it's still safe to turn on
         your computer!)

         Viruses could destroy all the files on my disks.
              Yes, and a spilled cup of coffee will do the same thing.  If
         you have adequate backup copies of your data, you will be able to
         recover from  a virus/coffee attack.  Backups mean the difference
         between a nuisance and a disaster.

         Viruses have been documented on over 300,000 computers.
              This statistic comes from John McAfee,  a  self-styled virus
         fighter who seems to come up  with  all the quotes the media love
         to hear.  We  assume  it includes every floppy disk ever infected
         by a virus, as well as all of the computers participating  in the
         Christmas worm attack.  (That  worm was designed for a particular
         IBM network software package; it  never  infected  the computers.
         Therefore, it wasn't a virus.  The Christmas worm attack can't be
         included in virus infection statistics.)  Most of the media don't
         understand computer  crimes, so they tend to call almost anything
         a virus.

         Viruses can be hidden inside a data file.
              Data files can't wreak  havoc  on  your  computer -- only an
         executable program can do that.  If a virus were to infect a data
         file, it would be a wasted effort.

         Most BBSs are infected with viruses.
              Here's another scary myth drummed up in the big virus panic.
         Very few BBSs are  really  infected.  (If they are infected, they
         won't be around for long!)  It's possible a dangerous  file could
         be  available  on  a BBS, but that doesn't mean the BBS itself is
         infected.







         Computer Virus Myths                                       Page 3






         BBSs and shareware programs spread viruses.
              "The truth," says PC Magazine publisher  Bill  Machrone, "is
         that all major viruses to  date  were  transmitted  by commercial
         packages and private  mail  systems, often in universities."  The
         Peace virus, for example, made its way into a commercial software
         product sold to thousands of customers.  Machrone goes on  to say
         that "bulletin boards  and shareware authors work extraordinarily
         hard at policing themselves to keep viruses out."  Many reputable
         sysops check all new  files  for  Trojan horses; nationwide sysop
         networks help spread the word  about dangerous files.  You should
         be careful about software that  comes from friends & BBSs, that's
         definitely true -- but you must also be careful with the software
         you buy at computer stores.  The Peace virus proves it.

         My computer could be infected if I call an infected BBS.
              BBSs can't write information on your disks -- that's handled
         by the communications software you use.  You can only  transfer a
         dangerous file if you let your software do it.  (In rare cases, a
         computer hooked into a network could be sent a dangerous  file or
         directly infected, but it takes specialized software to connect a
         computer into a network.  BBSs are NOT networks.)

         My files are damaged, so it must have been a virus attack.
              It could also have been caused by a power  flux,  or  static
         electricity, or a fingerprint on a floppy disk, or a bug  in your
         software, or perhaps a simple error on your part.  Power failures
         and spilled cups of coffee have destroyed more data than  all the
         viruses combined.

         Donald Burleson was convicted of releasing a virus.
              A recent Texas computer crime  trial was hailed all over the
         country as a "virus" trial.  Donald Burleson was in a position to
         release a complex, destructive worm on  his  employer's mainframe
         computer.  This particular worm wasn't able to  spread  itself to
         other computers, so it wasn't a virus.  The prosecuting attorney,
         Davis McCown, claims he "never  brought up the word virus" during
         the trial.  So why did the media call it a virus?
            1.  David Kinney, an expert witness testifying for the defense
                (oddly  enough), claimed he believed Burleson unleashed  a
                virus.   This is despite the fact  that  the  programs  in
                question had no  capability  to infect other systems.  The
                prosecuting attorney didn't argue the point  and  we don't
                blame him --  Kinney's  bizarre claim on the witness stand
                probably helped  sway the jury to convict Burleson, and it
                was the defense's fault for letting him testify.
            2.  McCown doesn't offer reporters a definition  for  the word
                virus.  He gives the facts behind the case  and  lets  the
                reporters deal with the definitions.  The Associated Press
                and USA Today, among  others,  used  such vague terms that
                any program could be called a virus.  If we  applied their
                definitions in the medical world,  we  could  safely claim
                penicillin is a biological virus (which is absurd).





         Computer Virus Myths                                       Page 4






            3.  McCown claims many of  the  quotes  attributed to him "are
                misleading or fabricated" and identified one in particular
                which "is total fiction."  Reporters occasionally  print a
                quote out of context, and McCown apparently fell victim to
                it.  (It's possible a few bizarre quotes from David Kinney
                or John McAfee were accidentally attributed to McCown.)

         Robert Morris Jr. released a benign virus on a defense network.
              It may have been benign, but it wasn't a virus in the strict
         technical sense.  Morris, the son of a chief  scientist  for  the
         National Security Agency, allegedly became bored  and  decided to
         take advantage of a tiny  bug in the Defense Department's network
         software.  (We  say  "alleged" because Morris hadn't been charged
         with a crime  when we went to press.)  That tiny bug let him send
         a worm through the network and have it execute  when  it  reached
         certain computers.  Among other things, Morris's  "Internet" worm
         was able to tell some computers to send copies of itself to other
         computers in the network.  The network became clogged in a matter
         of hours.  The media called the Internet worm a "virus"  (like it
         called the Christmas worm a virus) because it was able  to spread
         itself to other computers.  But it didn't infect those computers,
         so  it can't be called a virus.  (We can't really fault the press
         for calling it one, though.  It escapes the definition of a virus
         because of a technicality.)  A few notes:
            1.  This worm worked only on Sun-3 & Vax computers with a UNIX
                operating system that was linked to the Internet network;
            2.  The 6,200  affected computers should not be counted in any
                virus infection statistics (they weren't infected);
            3.  Yes, Morris could easily have added some infection code to
                make it a worm/virus if he'd had the urge; and,
            4.  The network bug Morris exploited has since been fixed.

         Viruses can spread to all sorts of computers.
              All Trojan horses are limited  to a family of computers, and
         this is especially true for viruses.  A virus designed  to spread
         on IBM PCs cannot infect an IBM 4300-series mainframe, nor can it
         infect a Commodore C64, nor can it infect an Apple MacIntosh.

         My backup disks will be destroyed if I back up a virus.
              No, they won't.  Let's suppose a virus does  get  backed  up
         with your other files.  Backups are just a form of data, and data
         can't harm your system.  You can recover the important files from
         your backups without triggering the virus.

         Anti-virus software will protect me from viruses.
              Anti-virus  packages offer some good front-line  protection,
         but they can be tricky to use at times.  You could make a crucial
         mistake in deciding whether to  let a "flagged" event take place.
         Also, Trojan horses can be designed to take advantage of holes in
         your defense.







         Computer Virus Myths                                       Page 5






         Copy-protected software is safe from an attack.
              This is  totally wrong.  Copy-protected software is the most
         vulnerable software in a  Trojan  horse attack.  You may have big
         problems trying to use or re-install such software, especially if
         the master disk was attacked.  It should also be noted that copy-
         protection schemes rely on extremely tricky techniques which have
         occasionally "blown up" on users.  Some people mistakenly believe
         they were attacked by a clever virus.

         Viruses are written by hackers.
              Yes,  hackers  have  written viruses -- just to see how they
         operate.  But they DON'T  unleash them to an unsuspecting public.
         Wormers are the  ones who do that.  (You can think of a wormer as
         a hacker who was seduced by the Dark Side of The Force.)  Hackers
         got a bum rap when the press corrupted the name.


              We hope  this dispels the myths surrounding the virus scare.
         Viruses DO exist, many of them will cause damage, and all of them
         can spread to other computers.  But you can defend  yourself from
         an attack if you keep a cool head and a set of backups.

              The following guidelines can shield you  from  Trojan horses
         and viruses.  They will lower your chances of being  attacked and
         raise your chances of recovering from one.

            1.  Download files only from reputable BBSs where sysops check
                every program  for Trojan horses.  If you're still afraid,
                consider getting your programs from a BBS or "disk vendor"
                company which gets its programs directly from the author;

            2.  Let a newly uploaded file "mature" on a BBS for one or two
                weeks before you  download  it (others will put it through
                its paces).

            3.  Set  up  a  procedure to regularly back up your files, and
                follow  it  religiously.    Consider  purchasing  a  user-
                friendly backup program that  takes  the  drudgery  out of
                backing up your files.

            4.  Rotate between two sets  of  backups  for  better security
                (use set #1, then set #2, then set #1...).

            5.  Consider  using  a  program  which  will  create  a unique
                "signature" of all the programs on your computer.  Once in
                a while, you can  run  this program to determine if any of
                your applications  have been modified -- either by a virus
                or by a stray gamma ray.

            6.  If your computer starts acting weird, DON'T PANIC.  It may
                be a virus, but then again it may not.  Immediately reboot
                from a legitimate  copy  of  your  master DOS disk.  Put a
                write-protect tab on that disk just to be safe.    Do  NOT
                run any programs on your regular disks (you might activate



         Computer Virus Myths                                       Page 6






                a Trojan horse).  If  you don't have adequate backups, try
                to  bring them up to date.  Yes, you might be backing up a
                virus as well, but it can't hurt you as long as  you don't
                run any of your normal programs.  Set your backups  off to
                the side.  Only then can you safely hunt for the problem.

            7.  If you can't  figure  out what's wrong with your computer,
                and you aren't sure of yourself, just turn it off and call
                for help.   Consider calling a local computer group before
                you hire an expert to fix your problem.    If  you  need a
                professional,  consider hiring a regular computer  consul-
                tant before you call on a "virus expert."

            8.  If you can't  figure  out what's wrong with your computer,
                and you are  sure  of yourself, execute a low-level format
                on all of your regular disks  (you  can learn how to do it
                from almost any BBS), then  do a high-level format on each
                one of them.   Next,  carefully  re-install  your software
                from legitimate copies  of  the master disks, not from the
                backups.  Then, carefully restore only the data files (not
                the executable program files!) from your backup disks.

              If you DO find a Trojan horse or a virus, we'd appreciate it
         if you'd mail a copy to us.  (But please, don't handle one unless
         you know what you're doing.)  Include as much information  as you
         can, and put a label on the disk that says  it  contains a Trojan
         horse or virus.  Send it to Ross Greenberg, 594 Third Avenue, New
         York, NY 10016.  Thank you.

              -------------------------------------------------------
              Ross Greenberg is the author of a  popular Trojan/virus
              detection program.   Rob Rosenberger is the author of a
              modem analysis program.   These  men  have never met in
              person; they worked on this story completely by modem.
              -------------------------------------------------------

                Copyright (c) 1988 Rob Rosenberger & Ross Greenberg


         You may give copies of this to anyone if you pass it along in its
         entirety.  Publications must obtain written permission to reprint
         this article.  Write to Rob Rosenberger, P.O. Box #643, O'Fallon,
         IL 62269.














         Computer Virus Myths                                       Page 7