home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!noc.near.net!ceylon!hsdndev!news.cs.umb.edu!betsys
- From: betsys@cs.umb.edu (Elizabeth Schwartz)
- Newsgroups: comp.org.eff.talk
- Subject: Re: Beneficial Virus?
- Message-ID: <BETSYS.93Jan5233720@ra.cs.umb.edu>
- Date: 6 Jan 93 04:37:20 GMT
- References: <1992Dec31.145332.9194@nastar.uucp> <67iRwB1w165w@ruth.UUCP>
- <1993Jan5.153018.18935@nastar.uucp> <C0EJAu.HuI@panix.com>
- Sender: news@cs.umb.edu (USENET News System)
- Organization: University of Massachusetts at Boston
- Lines: 19
- In-Reply-To: rpowers@panix.com's message of 5 Jan 93 22: 18:29 GMT
- Nntp-Posting-Host: ra.cs.umb.edu
-
- You are missing a basic point. For a virus to "check for the presence
- of a marker file" that virus has to be executing on my system, whether
- or not I have authorized it to.
-
- Besides, how does the virus *get* to my system? Either it cracked my
- security, again without my permission, or it was hidden on a file
- imported onto my system, without my knowledge (if I *know* about it,
- and import it deliberately, then packaging it as a virus was not
- necessary.)
-
- As another poster said, I don't see that there's anything you can do
- with a virus that doesn't have a non-viral alternative that is safer
- for the rest of the world.
-
- --
- System Administrator Internet: betsys@cs.umb.edu
- MACS Dept, UMass/Boston Phone : 617-287-6448
- 100 Morrissey Blvd Staccato signals
- Boston, MA 02125-3393 of constant information....
-