VIRUS-L Digest             Wednesday, 5 Apr 1989        Volume 2 : Issue 80

Today's Topics:
Possible Trojan Horse...
Coping With Computer Viruses and Related Problems
CSI Program for Virus '89
VirusDetective (Mac)

---------------------------------------------------------------------------

Date: Mon, 03 Apr 89 09:01:04 EST
From: [email protected]
Subject: Possible Trojan Horse...

Several bulleting boards in the Washington DC metropolitan area have
had a "Stuffit 2.0" uploaded to them.  This does not appear to be a
legitimate update to Ray Lau's Stuffit utility.  A cursory check of
the "Get Info" box will show some rather funky information in the
application name and version fields.

We (myself and the Sysops of the boards that have had this uploaded
to) have no evidence that this utility does anything harmful, but then
again, why would someone upload a bogus version of Stuffit.

David Gursky, W-143
Member of the Technical Staff
Special Projects Department
The MITRE Corporation

------------------------------

Date: 3 April 1989, 11:41:52 EDT
From: David M. Chess   <[email protected]>
Subject: Coping With Computer Viruses and Related Problems

Thanks for making the report available, Ken!  The full reference
is something like

Coping With Computer Viruses and Related Problems
 by Steve R. White, David M. Chess and Chengi Jimmy Kuo
    IBM T.J. Watson Research Center
    IBM Los Angeles Scientific Center
    Research Report (RC 14405) January 30, 1989

(Three authors!)

Abstract
         We discuss computer viruses and related problems.  Our
         intent is to help both executive and technical managers
         understand the problems that viruses pose, and to suggest
         practical steps they can take to help protect their
         computing systems.

It's also available (in ARC format) as VIRUSD.ARC in LIB 0 (at
the moment) of the IBMSYS forum on CompuServ.

While it's written for a management-type audience, general users
should find it interesting as well.   Except for one appendix
(which describes some places in PC-DOS that should be watched for
viruses), it's very non-specific, and applies to any sort of
computer.

DC

------------------------------

Date: Tue, 04 Apr 89 14:03:07 EST
From: Gene Spafford <[email protected]>
Subject: CSI Program for Virus '89

I dunno if this has already been sent out and if it is appropriate for
VIRUS-L, but here it is:


          COMPUTER VIRUSES '89 at the IBM & DEC Users Conference
              May 1-3, 1989 * Hyatt Regency O'Hare * Chicago
                 Sponsored by Computer Security Institute

                             PROGRAM OVERVIEW


Partial list of speakers addressing virus-related topics:

    Eugene H. Spafford, Purdue University, will present an in-depth
         analysis of the Internet worm incident.

    Michael Karels, head of UNIX development at UC Berkeley, will
           discuss how UNIX is meeting the virus challenge.

    Kenneth R. van Wyk, creator of Lehigh University's VIRUS-L bulletin
         board, will talk about lessons learned.

    Richard D. Pethia, Carnegie Mellon University, will describe the
         first DARPA CERT (Computer Emergency Response Team), which he
         heads.

    Davis McCown, prosecutor in the "Texas Virus Trial" which
         convicted Donald Gene Burleson in September 1988, will
         recount the investigation and the trial.

- -----------------------------------------------------------------------------
Demonstrations of viruses, hacking, bulletin boards:

    Ross Greenberg, author of FLU_SHOT+, will demo viruses and describe
         PC Magazine's evaluation of 11 anti-virus products.

    Thomas V. Sobczak of Application Configured Computers will
         demonstrate hacking, underground bulletin boards, virus
         behavior, and public domain solutions.

    John McAfee, Computer Virus Industry Association, will demonstrate
         virus and anti-virus programs and present new statistical
         information on viruses.

- -----------------------------------------------------------------------------
Information on new security-related products:

    CA-ACF2/VAX and CA-Top Secret/VAX, which can help unify security and
         access control in mixed IBM-DEC shops.

    ClydeSentry, LJK/Security, Secure Pak, and The Security Toolkit,
         for assessing and monitoring security in DEC environments.

- -----------------------------------------------------------------------------
Exhibition -- A wide range of computer security products will be
displayed
   during this two-day show.

Workshop Orientation -- 42 half-day sessions; attendees choose two
   each day




                            PROGRAM DETAILS


COMPUTER VIRUS WORKSHOPS

1. Computer Viruses: Background, Detection,      John McAfee, Computer Virus
   and Recovery                                  Industry Association

2. Applying Traditional Management Techniques    Roger Shaw,
   to Controlling Computer Viruses               IBM Corp.

3. Protecting Against Unauthorized System        Albert H. Decker,
   Attacks                                       Coopers & Lybrand

4. Virus Emergency Response                      Richard Pethia, Software
                                                 Engineering Institute,
                                                 Carnegie Mellon University

5. Virus-Resistant Networked Unix System         Michael J. Karels, Univ.
                                                 of California, Berkeley

6. Viruses and Worms--What Can You Do?           Stanley A. Kurzban,
                                                 IBM Corp.

15.  Policies and Procedures for Controlling      John G.  O'Leary,
   the Virus Threat                              Computer Security Institute

16.  A Technical Analysis of the Internet Worm    Eugene H.  Spafford,
   Incident                                      Purdue University

17.  Practical Risk Management Techniques for     Robert V.  Jacobson,
   Controlling Computer Viruses                  International Security
                                                 Technology, Inc.

18.  An Evaluation of Anti-Virus PC Software      Ross M.  Greenberg,
                                                 PC Magazine

19.  Legal & Insurance Issues of Computer         Robert W.  Baker, Jr.,
    Viruses                                      Weinberg and Green

20.  Managing a Virus Awareness Program           Nicholas M.  Elsberg,
                                                 Aetna Life & Casualty

29.  System Attack Demonstrations                 Thomas V.  Sobczak, Ph.D.,
                                                 Application Configured
                                                 Computers (ACC,Inc.)

30.  The Successful Prosecution of Donald Gene    Davis McCown, Tarrant
   Burleson: A Case History                      Cty (TX) Dist Atty's Ofc

31.  Setting the Record Straight on Computer      Robert H.  Courtney, Jr.,
   Viruses                                       RCI

32.  Lessons Learned from Computer Viruses        Kenneth R.  van Wyk,
                                                 Lehigh University

33.  Auditing Techniques for Controlling Viruses  Michael Thayer,
                                                 Price Waterhouse

34.  Computer Viruses and Your Disaster Recovery  Edward S.  Devlin,
   Plan                                          Harris Devlin Associates

- -----------------------------------------------------------------------------
IBM-SPECIFIC WORKSHOPS

7. Overview of IBM Security                      Curtis L. Symes, IBM Corp.

8. Using CA-ACF2 to Protect Against Computer     Georgene Piper, Computer
   Viruses                                       Associates International

9. Controlling Security Risks of Personal        James P. Dwyer, Blue Cross
   Computers                                     Blue Shield of Maryland

10.  Comparing the Security Review Process in     Emily Lonsford,
   IBM and DEC Environments                      The Mitre Corp.

21.  AS/400 Security and Control                  Wayne O.  Evans, IBM Corp.

22.  RACF Overview                                Robert W.  Spitz, IBM Corp.

23.  Network Security for an IBM Environment      William H.  Murray,
                                                 Ernst & Whinney

24.  Introducing CA-ACF2/VAX                      Dan Wilkinson, Computer
                                                 Associates International

35.  Living with DB2 Security                     Martin G.  Hubel,
                                                 The Systems Center

36.  Using CA-Top Secret to Protect Against       Kimberly Bell, Computer
   Computer Viruses                              Associates International

37.  Auditing MVS and VM System Software          F. J.  (Phil) Dolan,
                                                 IBM Corp.

38.  Managing Security in a Large-Scale IBM       John Blackley, Capital
   Environment                                   Holding Corporation

- -----------------------------------------------------------------------------
DEC-SPECIFIC WORKSHOPS

11.  Overview of Digital Security Features and    Steve Bold,
   Products                                      Digital Equipment Corp.

12.  Introduction to VAX/VMS Security             Edward J.  Norris,
                                                 Digital Equipment Corp.

13.  Managing a Comprehensive Security Program    Robert J.  Melford,
   in a DEC Environment                          R.J. Melford Associates

14.  Security for Networked VAX/VMS Systems       Geoff Cooke,
                                                 DEMAC Software

25.  Mapping VAX/VMS and IBM Mainframe Security   Colin C.  Rous, Digital
                                                 Equipment of Canada

26.  Advanced VAX/VMS Security                    Pamela Kelly,
                                                 Digital Equipment Corp.

27.  Security Tools for Safeguarding the DEC      Adolph F.  Cecula, Jr.,
   Environment: A Panel                          Bureau of the Census

28.  Building Applications Security on            Andy Goldstein,
   Operating System Security                     Digital Equipment Corp.

39.  Introducing CA-Top Secret/VAX                Kurt Seibert, Computer
                                                 Associates International

40.  DECnet Security                              Lawrence J.  Kilgallen,
                                                 Software Consultant

41.  The Ethernet Security System                 Jeffrey R.  Sebring,
                                                 Digital Equipment Corp.

42.  A Checklist Approach to Auditing             Pat McGovern,
   VMS Security                                  Bankers Trust Company


For more information, Contact:

                  Van McGuirk    (508) 393-2600
                  Computer Security Institute
                  360 Church Street
                  Northborough, MA 01532

------------------------------

Date:         Tue, 04 Apr 89 21:17:52 EST
From:         Steve Rocke <[email protected]>
Subject:      VirusDetective (Mac)

    Is anybody familiar with the Mac desk accessory VirusDetective?
How reliable is it?  Does it merely identify infected files or will it
also remove viruses from files?

    If anybody has experience with it, I would like to hear from you.
Thanks.

    Steve Rocke
    Central Michigan University
    BITNET address:  34JIOMV@CMUVM
Acknowledge-To: <34JIOMV@CMUVM>

------------------------------

End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253