VIRUS-L Digest Friday, 2 Dec 1988 Volume 1 : Issue 30
Today's Topics:
Font Fooler (Mac)
Re: Font Fooler (Mac)
RE: Various anti-virus software
genetic engineering of computer viruses
Is Morris the Only Culpable Party?
---------------------------------------------------------------------------
Date: Fri, 02 Dec 88 09:17:19 EST
From: Jim Kenyon <
[email protected]>
Subject: Font Fooler (Mac)
We have had two people that have been give a programme called
Font Fooler (Mac) that was supposed to be a neat utility for playing
with Fonts. When run, (after checking for the usual little critters)
the programme finds Font files and trashes them.
Anyone else seen this little gem?
Jim Kenyon (TGHVET@UTORONTO
Director, Veterinary Services
Toronto General Hospital
Lecturer, Department of Anaesthesia
University of Toronto
------------------------------
Date: Fri, 02 Dec 88 10:07:55 EST
From: Joe McMahon <
[email protected]>
Subject: Re: Font Fooler (Mac)
>From: Jim Kenyon <
[email protected]>
>Subject: Font Fooler (Mac)
>We have had two people that have been give a programme called
>Font Fooler ... When run, (after checking for the usual little critters)
>the programme finds Font files and trashes them.
This sounds like a local Trojan. We haven't had any reports of it around
here. I'll forward this to the INFO-MAC list -- if I get any responses I'll
post them back.
- --- Joe M.
[Ed. Thanks for the prompt reply, Joe! For those who may be wondering
how we could get a query and an answer to the query in the same
digest, I forwarded the message to Joe when I received it, as Joe has
more Mac experience than I (read: any Mac experience at all) and has
graciously offerred to help out with Mac problems whenever possible.
Thank you for your time, Joe!]
------------------------------
Date: Fri, 2 Dec 88 10:58:48 est
From:
[email protected]
Subject: RE: Various anti-virus software
I'd also like to hear something about anti-virus software for Sun Work
Stations.
Pat Reedy
------------------------------
Date: Fri, 2 Dec 88 10:29 CDT
From: David W. Richardson <C044DWR@UTARLG>
Subject: genetic engineering of computer viruses
As Mitchel Ludwig (
[email protected]) pointed out, a virus
COULD be used to eradicate another virus. It could also be used for
many other things, such as killing off worms, trojan horses, etc. It
could even be used to update system files or software on PCs (or
mainframes, or whatever).
(putting on flame-retardent)
But if I EVER HEAR OF ANYONE DOING THIS TO MY SYSTEM WITHOUT MY
PERMISSION, I WILL CALL THE APPROPRIATE AUTHORITIES.
(removing flame-retardent)
If the virus were nice enough to alert you of what it was doing AND
give you a chance to stop it in its tracks, that MIGHT be ok, provided
it also had an auto-eradication option and didn't interfere in the use
of my computer in any way.
Any comments? Direct useful stuff to the list, flames or trivial
stuff to me.
David Richardson
bitnet c044dwr@utarlg (this address will change in early January, do a
REVEIW from listserv@lehiibm1 around 1/15/89
for my new address)
phonenet:(817)273-3656
SlowNet: PO 192053 Arlington, TX 76013
------------------------------
Date: 2 December 1988, 13:53:29 EST
From: John A. Pershing Jr. PERSHNG at YKTVMH
Subject: Is Morris the Only Culpable Party?
I am somewhat surprised at the lack of comments on the culpability of
(1) the programmer who implemented the gaping trap door in the mailer
which RTM exploited, and/or (2) the organizations that
sold/distributed this software.
Is Morris the only person to blame for the debacle?
John Pershing
IBM Research, Yorktown Heights
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253