Berkeley CSUA MOTD:Entry 17264
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2000/1/18-19 [Computer/SW/Virus] UID:17264 Activity:high
1/18    http://www.cnn.com/2000/TECH/computing/01/18/virus.boom.idg/index.html
        This reporter doesn't seem to know the difference between Apple and
        java APPLEt. BAHHAHAHAHAHAHA!!!
        \_ Funny, I didn't get that impression.  However, the bit about
           antivirus programs automagically grabbing suspicious code and
           uploading it to the antivirus company is a little
           worrisome.  -geordan
           \_ Neither did I.  The dude was talking about Macs being mostly
              immune to macro viruses, and Macs being more susceptible to
              naughty Java applets, which are cross-platform
              \_ Motd entry 1/18.  This luser doesn't seem to know how to
                 read English! BAHHAHAHAHAHAHAHAHA!!!!
                 \_ And you.
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/3/31-4/20 [Health/Disease/AIDS, Health/Disease/General, Computer/SW/Virus] UID:54067 Activity:nil
3/21    what are these virus phages? Can they be repurposed?
        \_ are you <b>insane?</b> you really want to start messing with
           recombinant <ul>rna</ul> crap when we don't even understand
           the normal virus lifecycle?
	...
2010/7/9-23 [Computer/SW/Virus, Computer/SW/OS/Windows] UID:53879 Activity:nil
7/9     I'm adding a larger and faster HD to my XP machine, and I want
        to move my installation to the new drive, can anyone recommend
        a tool that can do this? I'd perfer somethng inexpensive as
        it's a one time thing.
        \_ There's a lot of software that does this, but Norton/Symantec Ghost
           seems to be the standard and I have used it successfully many
	...
2009/5/7-14 [Computer/HW/Laptop, Computer/SW/Virus, Computer/SW/OS/OsX] UID:52968 Activity:nil
5/7     Help, I think something's wrong with my network setting. I'd go to
        a web site, and then it would say "cannot find address". Then I'd
        reload again, occassionally 3 times, to load the page. Is this
        due to DNS being too slow, TTL setting, or something else?
        \_ windows mac or linux ?
           \_ windows (company issued laptop, no alternative)
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
2008/3/4-7 [Computer/SW/Virus] UID:49325 Activity:kinda low
3/4     Hi, what's the best free anti-virus software for XP?  What about
        anti-spyware?  Currently I'm using Active Virus Shield and Spybot.
        Thanks.
        \_ I've used: avg, spybot s&d, adaware, trend micro's housecall.
           \_ Does Spybot S&D protect Firefox?  It soulds like the injection
              feature only supports IE.
	...
Cache (4925 bytes)
www.cnn.com/2000/TECH/computing/01/18/virus.boom.idg/index.html
BUSINESS 10 SPORTS * 11 TECHNOLOGY 12 computing 13 personal technology 14 SPACE 15 HEALTH 16 ENTERTAINMENT 17 BOOKS 18 TRAVEL 19 FOOD 20 ARTS & STYLE 21 NATURE 22 IN-DEPTH 23 ANALYSIS 24 myCNN 25 Headline News brief 26 news quiz 27 daily almanac MULTIMEDIA: 28 video 29 video archive 30 audio 31 multimedia showcase 32 more services E-MAIL: Subscribe to one of our news e-mail lists. Enter your address: Or: 33 Get a free e-mail account 34 E-MAIL DISCUSSION: 35 message boards 36 chat 37 feedback CNN WEB SITES: 38 CNN Websites 39 AsiaNow 40 En Espaol 41 Em Portugus 42 Svenska 43 Norge 44 Danmark 45 Italian FASTER ACCESS: 46 europe 47 japan TIME INC. InfoWorld Image (IDG) -- Year-2000 viruses proved to be as impotent as the infamous year-2000 bug itself. As the long-anticipated date approached, fears grew that hackers would take advantage of the millennium to launch new attacks. If it rears its head, it will do something unexpected the hallmark of a Trojan horse. In this case, the unexpected action is simply that the program with the bug is still running. Such year-2000 problems are a direct consequence of the fact that programmers never expected their code to last so long. Although year 2000 didn't initiate the onslaught of viruses expected, the proliferation of computer viruses today has been ushered in by technical innovations such as the Internet that created infinite opportunities for unsuspecting technology users to be thwarted. A hacker's dream Imagine an exploding population of homogeneous organisms, with each one able to initiate intimate contact with any other. Add a small group of wily predators who love to tinker with the forces of nature, and the stage is set for artificially induced epidemics. Not only do the unscrupulous have a bigger field to play in, they also have tools that are easier to use and potentially more dangerous. As it becomes easier to use, we will see more mobile virus code," Viveros says, adding that this kind of mobile virus code is particularly scary because it can be activated simply by surfing to a Web site. It can also be argued that Microsoft is a victim of its own success when it comes to malicious code. It is precisely because Windows is the predominant platform that almost all attacks are targeted at the Windows environment. And most of these are completely impotent on the Macintosh. Steve Lipner, manager of the security response team at Microsoft, points out that because Java is cross platform, it might offer an even more tempting target for hackers. Most analysts and users agree that it is only a matter of time before the invasion of the bad applets begins. However, analysts tend to support all of the above concerns. And while they, too, stress the need for calm, they also caution against complacency. Krantz emphasizes that businesses need to find the right balance when implementing an anti-virus solution. In other words, productivity lost from constant software upgrades can easily be greater than the productivity lost from a new virus. No-hands attack strategy Two of the biggest anti-virus vendors, NAI and Symantec, are scrambling to make their anti-virus code smart enough to automatically upgrade only when necessary. This method has yet to be proven, but if successful, it could give network managers a little more breathing room. Anti-virus software operates by scanning for a match with a signature file. These signatures are the fingerprints that identify malicious code. Signature scanning technology is mature, and the software is now quite effective. But no matter how good the software is, it can't finger a new virus unless that virus's signature is known and filed in a repository. When viruses used to spread primarily via "sneakernet," upgrades to such databases every few months were usually adequate to protect most networks. But Web and e-mail viruses have increased the rate of transmission by several orders of magnitude. This is why NAI and Symantec are working to completely automate the process of providing signature updates. NAI calls it the AutoImmune system, and Symantec has its Digital Immune system. Neither is fully functional yet, but both employ heuristic technology to identify suspicious code. The code is analyzed, and if it is indeed malicious, experts will create both a signature file and a fix. These will then be sent via the Internet as automatic upgrades. This last concern is a direct consequence of the new methods employed by hackers "We aren't just scanning for binary code inside an executable anymore," Krantz says. At the same time, IT can count on anti-virus vendors to work on fighting the latest exploits. RELATED STORIES: 89 Protect against Trojan Horses January 17, 2000 90 Windows 2000 virus: Stunt or preview? RELATED SITES: 100 Forrester Research 101 Symantec Antivirus Center Note: Pages will open in a new browser window External sites are not endorsed by CNN Interactive.