home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.80
< prev
next >
Wrap
Text File
|
1995-01-03
|
12KB
|
305 lines
VIRUS-L Digest Wednesday, 5 Apr 1989 Volume 2 : Issue 80
Today's Topics:
Possible Trojan Horse...
Coping With Computer Viruses and Related Problems
CSI Program for Virus '89
VirusDetective (Mac)
---------------------------------------------------------------------------
Date: Mon, 03 Apr 89 09:01:04 EST
From: dmg@mwunix.mitre.org
Subject: Possible Trojan Horse...
Several bulleting boards in the Washington DC metropolitan area have
had a "Stuffit 2.0" uploaded to them. This does not appear to be a
legitimate update to Ray Lau's Stuffit utility. A cursory check of
the "Get Info" box will show some rather funky information in the
application name and version fields.
We (myself and the Sysops of the boards that have had this uploaded
to) have no evidence that this utility does anything harmful, but then
again, why would someone upload a bogus version of Stuffit.
David Gursky, W-143
Member of the Technical Staff
Special Projects Department
The MITRE Corporation
------------------------------
Date: 3 April 1989, 11:41:52 EDT
From: David M. Chess <CHESS@YKTVMV.BITNET>
Subject: Coping With Computer Viruses and Related Problems
Thanks for making the report available, Ken! The full reference
is something like
Coping With Computer Viruses and Related Problems
by Steve R. White, David M. Chess and Chengi Jimmy Kuo
IBM T.J. Watson Research Center
IBM Los Angeles Scientific Center
Research Report (RC 14405) January 30, 1989
(Three authors!)
Abstract
We discuss computer viruses and related problems. Our
intent is to help both executive and technical managers
understand the problems that viruses pose, and to suggest
practical steps they can take to help protect their
computing systems.
It's also available (in ARC format) as VIRUSD.ARC in LIB 0 (at
the moment) of the IBMSYS forum on CompuServ.
While it's written for a management-type audience, general users
should find it interesting as well. Except for one appendix
(which describes some places in PC-DOS that should be watched for
viruses), it's very non-specific, and applies to any sort of
computer.
DC
------------------------------
Date: Tue, 04 Apr 89 14:03:07 EST
From: Gene Spafford <spaf@cs.purdue.edu>
Subject: CSI Program for Virus '89
I dunno if this has already been sent out and if it is appropriate for
VIRUS-L, but here it is:
COMPUTER VIRUSES '89 at the IBM & DEC Users Conference
May 1-3, 1989 * Hyatt Regency O'Hare * Chicago
Sponsored by Computer Security Institute
PROGRAM OVERVIEW
Partial list of speakers addressing virus-related topics:
Eugene H. Spafford, Purdue University, will present an in-depth
analysis of the Internet worm incident.
Michael Karels, head of UNIX development at UC Berkeley, will
discuss how UNIX is meeting the virus challenge.
Kenneth R. van Wyk, creator of Lehigh University's VIRUS-L bulletin
board, will talk about lessons learned.
Richard D. Pethia, Carnegie Mellon University, will describe the
first DARPA CERT (Computer Emergency Response Team), which he
heads.
Davis McCown, prosecutor in the "Texas Virus Trial" which
convicted Donald Gene Burleson in September 1988, will
recount the investigation and the trial.
- -----------------------------------------------------------------------------
Demonstrations of viruses, hacking, bulletin boards:
Ross Greenberg, author of FLU_SHOT+, will demo viruses and describe
PC Magazine's evaluation of 11 anti-virus products.
Thomas V. Sobczak of Application Configured Computers will
demonstrate hacking, underground bulletin boards, virus
behavior, and public domain solutions.
John McAfee, Computer Virus Industry Association, will demonstrate
virus and anti-virus programs and present new statistical
information on viruses.
- -----------------------------------------------------------------------------
Information on new security-related products:
CA-ACF2/VAX and CA-Top Secret/VAX, which can help unify security and
access control in mixed IBM-DEC shops.
ClydeSentry, LJK/Security, Secure Pak, and The Security Toolkit,
for assessing and monitoring security in DEC environments.
- -----------------------------------------------------------------------------
Exhibition -- A wide range of computer security products will be
displayed
during this two-day show.
Workshop Orientation -- 42 half-day sessions; attendees choose two
each day
PROGRAM DETAILS
COMPUTER VIRUS WORKSHOPS
1. Computer Viruses: Background, Detection, John McAfee, Computer Virus
and Recovery Industry Association
2. Applying Traditional Management Techniques Roger Shaw,
to Controlling Computer Viruses IBM Corp.
3. Protecting Against Unauthorized System Albert H. Decker,
Attacks Coopers & Lybrand
4. Virus Emergency Response Richard Pethia, Software
Engineering Institute,
Carnegie Mellon University
5. Virus-Resistant Networked Unix System Michael J. Karels, Univ.
of California, Berkeley
6. Viruses and Worms--What Can You Do? Stanley A. Kurzban,
IBM Corp.
15. Policies and Procedures for Controlling John G. O'Leary,
the Virus Threat Computer Security Institute
16. A Technical Analysis of the Internet Worm Eugene H. Spafford,
Incident Purdue University
17. Practical Risk Management Techniques for Robert V. Jacobson,
Controlling Computer Viruses International Security
Technology, Inc.
18. An Evaluation of Anti-Virus PC Software Ross M. Greenberg,
PC Magazine
19. Legal & Insurance Issues of Computer Robert W. Baker, Jr.,
Viruses Weinberg and Green
20. Managing a Virus Awareness Program Nicholas M. Elsberg,
Aetna Life & Casualty
29. System Attack Demonstrations Thomas V. Sobczak, Ph.D.,
Application Configured
Computers (ACC,Inc.)
30. The Successful Prosecution of Donald Gene Davis McCown, Tarrant
Burleson: A Case History Cty (TX) Dist Atty's Ofc
31. Setting the Record Straight on Computer Robert H. Courtney, Jr.,
Viruses RCI
32. Lessons Learned from Computer Viruses Kenneth R. van Wyk,
Lehigh University
33. Auditing Techniques for Controlling Viruses Michael Thayer,
Price Waterhouse
34. Computer Viruses and Your Disaster Recovery Edward S. Devlin,
Plan Harris Devlin Associates
- -----------------------------------------------------------------------------
IBM-SPECIFIC WORKSHOPS
7. Overview of IBM Security Curtis L. Symes, IBM Corp.
8. Using CA-ACF2 to Protect Against Computer Georgene Piper, Computer
Viruses Associates International
9. Controlling Security Risks of Personal James P. Dwyer, Blue Cross
Computers Blue Shield of Maryland
10. Comparing the Security Review Process in Emily Lonsford,
IBM and DEC Environments The Mitre Corp.
21. AS/400 Security and Control Wayne O. Evans, IBM Corp.
22. RACF Overview Robert W. Spitz, IBM Corp.
23. Network Security for an IBM Environment William H. Murray,
Ernst & Whinney
24. Introducing CA-ACF2/VAX Dan Wilkinson, Computer
Associates International
35. Living with DB2 Security Martin G. Hubel,
The Systems Center
36. Using CA-Top Secret to Protect Against Kimberly Bell, Computer
Computer Viruses Associates International
37. Auditing MVS and VM System Software F. J. (Phil) Dolan,
IBM Corp.
38. Managing Security in a Large-Scale IBM John Blackley, Capital
Environment Holding Corporation
- -----------------------------------------------------------------------------
DEC-SPECIFIC WORKSHOPS
11. Overview of Digital Security Features and Steve Bold,
Products Digital Equipment Corp.
12. Introduction to VAX/VMS Security Edward J. Norris,
Digital Equipment Corp.
13. Managing a Comprehensive Security Program Robert J. Melford,
in a DEC Environment R.J. Melford Associates
14. Security for Networked VAX/VMS Systems Geoff Cooke,
DEMAC Software
25. Mapping VAX/VMS and IBM Mainframe Security Colin C. Rous, Digital
Equipment of Canada
26. Advanced VAX/VMS Security Pamela Kelly,
Digital Equipment Corp.
27. Security Tools for Safeguarding the DEC Adolph F. Cecula, Jr.,
Environment: A Panel Bureau of the Census
28. Building Applications Security on Andy Goldstein,
Operating System Security Digital Equipment Corp.
39. Introducing CA-Top Secret/VAX Kurt Seibert, Computer
Associates International
40. DECnet Security Lawrence J. Kilgallen,
Software Consultant
41. The Ethernet Security System Jeffrey R. Sebring,
Digital Equipment Corp.
42. A Checklist Approach to Auditing Pat McGovern,
VMS Security Bankers Trust Company
For more information, Contact:
Van McGuirk (508) 393-2600
Computer Security Institute
360 Church Street
Northborough, MA 01532
------------------------------
Date: Tue, 04 Apr 89 21:17:52 EST
From: Steve Rocke <34JIOMV@CMUVM.BITNET>
Subject: VirusDetective (Mac)
Is anybody familiar with the Mac desk accessory VirusDetective?
How reliable is it? Does it merely identify infected files or will it
also remove viruses from files?
If anybody has experience with it, I would like to hear from you.
Thanks.
Steve Rocke
Central Michigan University
BITNET address: 34JIOMV@CMUVM
Acknowledge-To: <34JIOMV@CMUVM>
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253