VIRUS-L Digest Monday, 28 Nov 1988 Volume 1 : Issue 21
Today's Topics:
local tv broadcast
Re: German laws on computer crime
Software on the LISTSERV (PC)
internet beating
How good is Virex? (Mac virus remover)
Virus History
Passing Viruses
---------------------------------------------------------------------------
Date: Mon, 28 Nov 88 14:58 EST
From: Mitchel Ludwig <
[email protected]>
Subject: local tv broadcast
Last Tuesday (Nov. 22, 1988), Loren Keim was interviewed by a
local (Bethlehem, PA) television station regarding the release of his
anti-virus packages. As someone fairly familiar with the workings of
some of the more popular packages, I was wondering if you would
enlighten us as to what, exactly, makes yours any better than the
rest, Loren?
I was particularly interested in the mention of the fact that,
by some type of key encryption, you expect each package to be
'different'. More specifically, I believe you made mention that if a
virus was able to penetrate the defenses offered by your package, it
would most probably be because of the encryption key used by that
particular user. You went on to say that this would not mean that the
same virus would be able to get by the same program if it were used
with a different key. Now forgive my possible ignorance, but it seems
to me that if a virus could bypass an encryption algorithm, the key
used wouldn't matter. It's possible that I misunderstood what was
said, it's even possible that what you (Loren) said is possible, but
if it is, then I'm in need of some serious enlightenment.
Additionally, (and finally... :-) you made mention of
anti-virus packages you plan on releasing for the larger machines.
I've done quite a bit of work on security on UN*X machines, and
without seriously restricting user privileges, I can't really seem to
come up with any real practical ways of securing a system beyond those
which the system already uses. As far as I've been able to tell, you
would have two choices available to you when setting up security
separate from that provided by the system. Either you would have to
set the particular security program readable to all (which sets us up
for problems) or give a user's login process momentary higher access
(which set us up for disaster...) Again, I may be mistaken, and if
so, enlightenment would be appreciated.
Anyone else have any ideas? Anyone else see the broadcast?
Anyone else know what I'm talking about?
Mitch
BITnet :
[email protected] Phonet : 215-861-2637
INTnet :
[email protected] Slonet : Box 72 Lehigh Univ.
UUCP : lehi3b15!rastro!mfl Bethlehem, PA 18015
------------------------------
Date: Fri, 25 Nov 88 10:34:56 +0100 (MEZ)
From: Otto Stolz +49 7531 88 2645 RZOTTO at DKNKURZ1
Subject: Re: German laws on computer crime
To: Cliff Stoll cliff at LBL
cc: Virus discussion list VIRUS-L at LEHIIBM1
In-Reply-To: Your message of Thu, 24 Nov 88 09:43:19 PST
Hello there!
The following remarks pertain only to the Federal Republic of Germany
(not to the German Democratic Reepublic) and are given under the proviso
that I'm no lawyer and hence may well overlook or misunderstand some
regulation.
> Is it true that under German law, an offense takes place only if files
> are erased?
No, this isn't true. According to +303a of German Criminal Code, he who
illegally CHANGES data (not necessarily in files, but on machine-readable
media, e.g. a boot sector, a FAT, ...) can be punished with 2 years
emprisonment. According to +303b, the same fact (and also physical
damage done to computer media or equipment) can by punished with up to
5 years, if the inflicted data-processing is essential for a company or
authority, other than the one the perpetrator is employed in.
These regulation enhance or qualify the usual +303 (damage to property).
> That it is not a violation to simply enter a computer and read infor-
> mation?
Though this situation is not covered by the above-mentioned rules, there
are many regulations in German law to handel particular cases falling
into this broad category. However, most of these regulations to not
apply specifically to computer-stored or -handeled data; normally they
apply to specific nature of the data, regardless wether they are stored
on magnetic media, written down on paper, or whispered into your ear.
Commercial secrets are protected by law against unfair competition.
These may neither be disclosed unauthorized, nor read by intrudors.
Also, trade-marks are protected: you may not e.g. use the Microsoft
Logo for your own programs, and you may even run into trouble, if you
imitate their menu-technique too closely. In such cases, it doesn't
matter, whether you actally copied the programs (menu) or data (logo)
from their computer, or developped them yourself. Cf. also patenting
law.
Artistic, scientific, and technical presentations are protected by
copyright law. As opposed to US regulations, there's no need to state
the copyright explicitly in the publication itself, nor to register the
opus somewhere. You only need to produce something sufficently new.
The law enforces that the original author be mentioned in copies,
citations, performances, and adaptions. The law generally forbids
unouthorized copies and performances (there are exceptions). Some
lawyers argue, that even the loading of a program or data from secondary
to primary storage (in due course of running, or displaying it, respec-
tively) constitutes an unauthorized copy. I think, this is ridiculous,
but you never know the outcome of a law suit, beforehand! However, I
reckon, the running of a program (e.g. a computer-game) may constitute
an unouthorized performance (similar to a video, a movie, or a piece
of music).
A broad class of protected data are "Data Related to (natural) Persons".
Many of those are protected by special regulations (e.g. professional
descretion of doctors, lawyers, or confessors; privacy of mail and other
communication). If you break into a computer of a hospital and read
patient's data, you will prosecuted according to the pertinent regula-
tions of criminal and/or social law; if you illegally read data (as
notes addressed to 3rd parties, or traffic-related data) from a Federal
Post-Office and Telecommunication Authorities' computer, you will be
prosecuted under "break of the tele-communication secret".
Data Related to Persons that do not qualify for special rules (as above)
are protected by the "Laws to Prevent Mis-Use of Person Related Data
during Data-Processing". There are several such laws, pertaining to
data-processing for private purposes (including companies) and by
various authorities (remarkably, the only area apparently not covered
by any such law is data-processing by churches and religious communities
for their own purposes). The maxim of these laws seems to be, that
processing of person-related data is generally forbidden, if not allowed
by some specific law, by consent of the person reffered to, or if the
data are evident (Beware: your name and address may well be evident, but
if they are to be put on some particular list it is not+all evident
that you should belong to this very list -- hence putting evident data
on particular lists or into files falls under these laws). According to
+41(1)2 of the Federal Law to Prevent ..., and similar Paragraphs in
the other laws mentioned, "he, who ... recalls person-related data, that
are not evident, or takes them from a collection that is enclosed in a
container, will be punished with imprisoning up to one year, or with a
fine".
You see, in German Law it doesn't matter whether you break into a com-
puter, or brake privacy in other respects: the regulations pertain to
the nature of the data not to the medium of recording.
> I have heard these rumors, but I do not know if they are true.
Please excuse any contribution from my side to mis-conseption in these
issues. As I have posted remarks to VIRUS-L which may have raised
these rumours, I send a copy of this note also there.
Best regards
Otto
------------------------------
Date: Mon, 28 Nov 1988 15:19:02 EST
From: Ken van Wyk <
[email protected]>
To: virus-l
Subject: Software on the LISTSERV (PC)
I just got some additional software for the LISTSERV file list (thanks
to David Bader) which is now available to all. The new files are:
FSP_14 UUE FluShot + version 1.4
CHKUP18 UUE Checkup version 1.8
TRAPDISK UUE Trapdisk version ???
DPROT102 UUE Disk Protect (?) version 1.02
As with all the files on our LISTSERV, these are free for the taking.
As such, they're on an as-is basis.
Ken
P.S. One of the local BITNET links has been unavailable for most of
the U.S. Thanksgiving weekend, so if you don't see your submission(s)
in this digest, they'll undoubtedly be coming along shortly since the
floodgate has just been opened... :-(
------------------------------
Date: Mon, 28 Nov 88 15:16 EST
From: Mitchel Ludwig <
[email protected]>
Subject: internet beating
In light of the recent slew of kill him/thank him messages
regarding the internet virus/worm/whatever, I would like to express my
opinions via the following quote taken from a Monty Python skit. The
quote is taken entirely out of context, and has no relevence
whatsoever (is that really a word?) but it will suffice to get my
point across...
"Oh Lord, we beseach thee. Prey tell us who croaked the
Bishop of Lestor..."
"He did it, the one in the red sweater."
"Right, arrest that man.."
"It's a fair cop, but society's to blame."
"Fine, we'll arrest them too."
Now, did I say irrelevent or what? But if you replace the
Bishop of Lestor with the word Internet, and the one in the red
sweater with our Internet whacker, we have an interesting parallel.
True there was a large waste of manpower... True there was a large
amount of downtime... But now that it's over let it be over. Think
of the extra time being wasted deciding whether or not he should be
knighted or damned for all eternity. After three weeks of virus-l
being monopolized by this sort of thing, it would be nice to start
seeing more about what's going on. If anyone has any *NEW* info
regarding what happened, I'd love to hear it, but reducing the list to
a browbeating session really isn't my idea of a good time. But that's
only my opinion...
Mitch
BITnet :
[email protected] Phonet : 215-861-2637
INTnet :
[email protected] Slonet : Box 72 Lehigh Univ.
UUCP : lehi3b15!rastro!mfl Bethlehem, PA 18015
------------------------------
Date: Mon, 28 Nov 88 09:43 EDT
From: "$CAROL@OBERLIN (BITNET)" <$CAROL@OBERLIN>
Subject: How good is Virex? (Mac virus remover)
Does anyone have experience yet with a program called "Virex" from HJC
software?
According to MacWEEK, it's supposed to remove nVIR, SCORES and Peace
viruses. They don't say if this includes system files. It's
described in their blurb as the "great grandchild" of Interferon and
sells for $99.95.
Responses to PRUSSELL@OBERLIN or to the list. Thanks.
------------------------------
Date: Sun, 27 Nov 88 13:43:53 EDT
From: John Planck <34TVIGX@CMUVM>
Subject: Virus History
Hello,
I am interested in doing a brief paper (5 pages) on the history
of computer viruses. If you know of any books or articles that
address the origin and pioneers of computer viruses I would very much
like to know of them. Thank You.
Regards,
John Planck
Acknowledge-To: <34TVIGX@CMUVM>
------------------------------
Date: Thu, 24 Nov 88 11:28 MDT
From: "David D. Grisham" <DAVE@UNMB>
Subject: Passing Viruses
We at UNM have been dealing with what appears to be
a mutated or modified version of nVir. As a result I have
had multiple requests for a 'copy' of the strain. All of
which I have filed for future action. In discussions with
my administration, it has been decided to NOT mail any
virus to anyone until- the local FBI office gives us an OK,
that the requestee has been confirmed as a legitimate researcher
for the firm s/he claims to be, and I get the time to send registered
mail to these individuals.
Question- what do others of you do with similar requests?
dave
*----------------------------------------------------------------------------*
| Dave Grisham |
| Senior Staff Consultant/Virus Security Phone (505) 277-8148 |
| Information Resource Center |
| Computer & Information Resources & Technology |
| University of New Mexico USENET
[email protected] |
| Albuquerque, New Mexico 87131 BITNET DAVE@UNMB |
*----------------------------------------------------------------------------*
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253