Please consider a donation to the Higher Intellect project. See https://preterhuman.net/donate.php or the Donate to Higher Intellect page for more info.

Computer Virus Myths: Difference between revisions

From Higher Intellect Vintage Wiki
(Created page with "<pre> Computer Virus Myths by Rob Rosenberger with Ross Greenberg...")
(No difference)

Revision as of 01:27, 15 September 2019

                                 Computer Virus Myths

                                  by Rob Rosenberger
                                 with Ross Greenberg


               A number of myths have popped up recently  about  the threat
          of computer "viruses".  There are myths about how widespread they
          are, how dangerous they are, and even myths about what a computer
          virus really is.  We'd like the facts to be known.

               The first thing you have to understand is that a virus  is a
          programming technique that falls in the realm of "Trojan horses."
          All viruses are Trojan horses, but very few Trojan horses  can be
          called a virus.

               That having been said, it's  time to go over the terminology
          we use when we lecture:

          BBS            Bulletin Board System.    If you have a modem, you
                         can call a BBS and leave  messages,  transfer com-
                         puter files back &  forth,  and  learn a lot about
                         computers.  (What you're  reading  right  now most
                         likely came to you from a BBS, for example.)

          Bug            an accidental flaw  in  the  logic  of  a computer
                         program that  makes  it  do  things  it  shouldn't
                         really be doing.  Programmers  don't  mean  to put
                         bugs in their program, but they  always  creep in.
                         The  first  bug was discovered  by  pioneer  Grace
                         Hopper when she  found  a dead moth shorting out a
                         circuit in the  early  days  of  computers.   Pro-
                         grammers  tend to spend more time debugging  their
                         programs than they do writing  them  in  the first
                         place.

          Hacker         someone  who really loves computers and who  wants
                         to push  them to the limit.  Hackers don't release
                         Trojan horses onto the world, it's the wormers who
                         do that.  (See  the  definition  for  a "wormer".)
                         Hackers have a healthy  sense  of  curiosity: they
                         try doorknobs just to see if  they're  locked, and
                         they tinker with a piece of  equipment  until it's
                         "just right."

          Shareware      a distribution method for quality  software avail-
                         able on a "try before you buy" basis.  You pay for
                         the program only if you find it useful.  Shareware
                         programs can be downloaded from BBSs  and  you are
                         encouraged to give  an evaluation copy to friends.
                         There are few advertising & distribution costs, so
                         many shareware applications can rival the power of
                         off-the-shelf counterparts, at just a  fraction of
                         the price.



          Copyright (c) 1988 Rob Rosenberger & Ross Greenberg        Page 1
�





          Trojan horse   a  generic  term  describing  a  set  of  computer
                         instructions  purposely  hidden  inside a program.
                         Trojan horses tell  a  program  to  do  things you
                         don't  expect it to do.  The  term  comes  from  a
                         historic battle in which the ancient city  of Troy
                         was offered the "gift"  of  a  large  wooden horse
                         that secretly held soldiers  in  its  belly.   The
                         Trojans rolled it into their fortified city....

          Virus          a term for a very  specialized  Trojan  horse that
                         can   spread   to   other  computers  by  secretly
                         "infecting" programs with a  copy  of  itself.   A
                         virus is the only  type  of  Trojan horse which is
                         contagious, like the common cold.   If  it doesn't
                         meet this definition, then it isn't a virus.

          Worm           a term similar to a  Trojan horse, but there is no
                         "gift" involved.  If  the  Trojans  had  left that
                         wooden horse outside  the city, they wouldn't have
                         been  attacked  --   but  worms  can  bypass  your
                         defenses.   An example is an unauthorized  program
                         designed to spread itself by exploiting a bug in a
                         network  software  package.   (Such programs could
                         possibly also contain  a virus that activates when
                         it reaches  the  computer.)    Worms  are  usually
                         released by someone who has normal  access  to the
                         computer or network.

          Wormers        the  name  given  to   the   people   who  unleash
                         destructive  Trojan horses.  Let's face it,  these
                         people aren't angels.    What  they  do  hurts us.
                         They deserve our disrespect.

               Viruses, like all Trojan horses, are  purposely  designed to
          make a program do things you don't expect it to do.  Some viruses
          are just an annoyance, perhaps only displaying a "Peace on earth"
          message.  The viruses we're worried about are  the  ones designed
          to destroy your files and waste the valuable time you'll spend to
          repair the damage.

               Now you know the  difference  between  a  virus and a Trojan
          horse and a bug.  Let's get into some of the myths:

          All purposely destructive code comes as a virus.
               Wrong.  Remember, "Trojan horse"  is  the  general  term for
          purposely destructive  code.  Very few Trojan horses are actually
          viruses.

          All Trojan horses are bad.
               Believe it or not, there are a few useful Trojan horse tech-
          niques in the world.  A "side door" is any command not documented
          in the user manual, and it's a Trojan horse by definition.   Some
          programmers install side doors to  help them locate bugs in their




          Computer Virus Myths                                       Page 2
�





          programs.  Sometimes a command  may have such an obscure function
          that it makes sense not to document it.

          Viruses and Trojan horses are a recent phenomenon.
               Trojan horses have been around since the first  days  of the
          computer.  Hackers  toyed  with  viruses  in the early 1960s as a
          form of amusement.    Many different Trojan horse techniques were
          developed over the years  to  embezzle  money, destroy data, etc.
          The general public wasn't aware of this problem until the  IBM PC
          revolution brought it into the spotlight.  Just  five  years ago,
          banks  were still covering up computerized embezzlements  because
          they believed they'd lose too many customers.

          Computer viruses are reaching epidemic proportions.
               Wrong again.  Viruses may be spread all over the  planet but
          they aren't taking over the world.  There are only about fifty or
          so known virus "strains" at this time and a few of them have been
          completely eliminated.   Your  chances of being infected are slim
          if you take proper precautions.  (Yes, it's still safe to turn on
          your computer!)

          Viruses could destroy all the files on my disks.
               Yes, and a spilled cup of coffee will do the same thing.  If
          you have adequate backup copies of your data, you will be able to
          recover from  a virus/coffee attack.  Backups mean the difference
          between a nuisance and a disaster.

          Viruses have been documented on over 300,000 computers.
               This statistic comes from John McAfee,  a  self-styled virus
          fighter who seems to come up  with  all the quotes the media love
          to hear.  We  assume  it includes every floppy disk ever infected
          by a virus, as well as all of the computers participating  in the
          Christmas worm attack.  (That  worm was designed for a particular
          IBM network software package; it  never  infected  the computers.
          Therefore, it wasn't a virus.  The Christmas worm attack can't be
          included in virus infection statistics.)  Most of the media don't
          understand computer  crimes, so they tend to call almost anything
          a virus.

          Viruses can be hidden inside a data file.
               Data files can't wreak  havoc  on  your  computer -- only an
          executable program can do that.  If a virus were to infect a data
          file, it would be a wasted effort.

          Most BBSs are infected with viruses.
               Here's another scary myth drummed up in the big virus panic.
          Very few BBSs are  really  infected.  (If they are infected, they
          won't be around for long!)  It's possible a dangerous  file could
          be  available  on  a BBS, but that doesn't mean the BBS itself is
          infected.







          Computer Virus Myths                                       Page 3
�





          BBSs and shareware programs spread viruses.
               "The truth," says PC Magazine publisher  Bill  Machrone, "is
          that all major viruses to  date  were  transmitted  by commercial
          packages and private  mail  systems, often in universities."  The
          Peace virus, for example, made its way into a commercial software
          product sold to thousands of customers.  Machrone goes on  to say
          that "bulletin boards  and shareware authors work extraordinarily
          hard at policing themselves to keep viruses out."  Many reputable
          sysops check all new  files  for  Trojan horses; nationwide sysop
          networks help spread the word  about dangerous files.  You should
          be careful about software that  comes from friends & BBSs, that's
          definitely true -- but you must also be careful with the software
          you buy at computer stores.  The Peace virus proves it.

          My computer could be infected if I call an infected BBS.
               BBSs can't write information on your disks -- that's handled
          by the communications software you use.  You can only  transfer a
          dangerous file if you let your software do it.  (In rare cases, a
          computer hooked into a network could be sent a dangerous  file or
          directly infected, but it takes specialized software to connect a
          computer into a network.  BBSs are NOT networks.)

          My files are damaged, so it must have been a virus attack.
               It could also have been caused by a power  flux,  or  static
          electricity, or a fingerprint on a floppy disk, or a bug  in your
          software, or perhaps a simple error on your part.  Power failures
          and spilled cups of coffee have destroyed more data than  all the
          viruses combined.

          Donald Burleson was convicted of releasing a virus.
               A recent Texas computer crime  trial was hailed all over the
          country as a "virus" trial.  Donald Burleson was in a position to
          release a complex, destructive worm on  his  employer's mainframe
          computer.  This particular worm wasn't able to  spread  itself to
          other computers, so it wasn't a virus.  The prosecuting attorney,
          Davis McCown, claims he "never  brought up the word virus" during
          the trial.  So why did the media call it a virus?
             1.  David Kinney, an expert witness testifying for the defense
                 (oddly  enough), claimed he believed Burleson unleashed  a
                 virus.   This is despite the fact  that  the  programs  in
                 question had no  capability  to infect other systems.  The
                 prosecuting attorney didn't argue the point  and  we don't
                 blame him --  Kinney's  bizarre claim on the witness stand
                 probably helped  sway the jury to convict Burleson, and it
                 was the defense's fault for letting him testify.
             2.  McCown doesn't offer reporters a definition  for  the word
                 virus.  He gives the facts behind the case  and  lets  the
                 reporters deal with the definitions.  The Associated Press
                 and USA Today, among  others,  used  such vague terms that
                 any program could be called a virus.  If we  applied their
                 definitions in the medical world,  we  could  safely claim
                 penicillin is a biological virus (which is absurd).





          Computer Virus Myths                                       Page 4
�





             3.  McCown claims many of  the  quotes  attributed to him "are
                 misleading or fabricated" and identified one in particular
                 which "is total fiction."  Reporters occasionally  print a
                 quote out of context, and McCown apparently fell victim to
                 it.  (It's possible a few bizarre quotes from David Kinney
                 or John McAfee were accidentally attributed to McCown.)

          Robert Morris Jr. released a benign virus on a defense network.
               It may have been benign, but it wasn't a virus in the strict
          technical sense.  Morris, the son of a chief  scientist  for  the
          National Security Agency, allegedly became bored  and  decided to
          take advantage of a tiny  bug in the Defense Department's network
          software.  (We  say  "alleged" because Morris hadn't been charged
          with a crime  when we went to press.)  That tiny bug let him send
          a worm through the network and have it execute  when  it  reached
          certain computers.  Among other things, Morris's  "Internet" worm
          was able to tell some computers to send copies of itself to other
          computers in the network.  The network became clogged in a matter
          of hours.  The media called the Internet worm a "virus"  (like it
          called the Christmas worm a virus) because it was able  to spread
          itself to other computers.  But it didn't infect those computers,
          so  it can't be called a virus.  (We can't really fault the press
          for calling it one, though.  It escapes the definition of a virus
          because of a technicality.)  A few notes:
             1.  This worm worked only on Sun-3 & Vax computers with a UNIX
                 operating system that was linked to the Internet network;
             2.  The 6,200  affected computers should not be counted in any
                 virus infection statistics (they weren't infected);
             3.  Yes, Morris could easily have added some infection code to
                 make it a worm/virus if he'd had the urge; and,
             4.  The network bug Morris exploited has since been fixed.

          Viruses can spread to all sorts of computers.
               All Trojan horses are limited  to a family of computers, and
          this is especially true for viruses.  A virus designed  to spread
          on IBM PCs cannot infect an IBM 4300-series mainframe, nor can it
          infect a Commodore C64, nor can it infect an Apple MacIntosh.

          My backup disks will be destroyed if I back up a virus.
               No, they won't.  Let's suppose a virus does  get  backed  up
          with your other files.  Backups are just a form of data, and data
          can't harm your system.  You can recover the important files from
          your backups without triggering the virus.

          Anti-virus software will protect me from viruses.
               Anti-virus  packages offer some good front-line  protection,
          but they can be tricky to use at times.  You could make a crucial
          mistake in deciding whether to  let a "flagged" event take place.
          Also, Trojan horses can be designed to take advantage of holes in
          your defense.







          Computer Virus Myths                                       Page 5
�





          Copy-protected software is safe from an attack.
               This is  totally wrong.  Copy-protected software is the most
          vulnerable software in a  Trojan  horse attack.  You may have big
          problems trying to use or re-install such software, especially if
          the master disk was attacked.  It should also be noted that copy-
          protection schemes rely on extremely tricky techniques which have
          occasionally "blown up" on users.  Some people mistakenly believe
          they were attacked by a clever virus.

          Viruses are written by hackers.
               Yes,  hackers  have  written viruses -- just to see how they
          operate.  But they DON'T  unleash them to an unsuspecting public.
          Wormers are the  ones who do that.  (You can think of a wormer as
          a hacker who was seduced by the Dark Side of The Force.)  Hackers
          got a bum rap when the press corrupted the name.


               We hope  this dispels the myths surrounding the virus scare.
          Viruses DO exist, many of them will cause damage, and all of them
          can spread to other computers.  But you can defend  yourself from
          an attack if you keep a cool head and a set of backups.

               The following guidelines can shield you  from  Trojan horses
          and viruses.  They will lower your chances of being  attacked and
          raise your chances of recovering from one.

             1.  Download files only from reputable BBSs where sysops check
                 every program  for Trojan horses.  If you're still afraid,
                 consider getting your programs from a BBS or "disk vendor"
                 company which gets its programs directly from the author;

             2.  Let a newly uploaded file "mature" on a BBS for one or two
                 weeks before you  download  it (others will put it through
                 its paces).

             3.  Set  up  a  procedure to regularly back up your files, and
                 follow  it  religiously.    Consider  purchasing  a  user-
                 friendly backup program that  takes  the  drudgery  out of
                 backing up your files.

             4.  Rotate between two sets  of  backups  for  better security
                 (use set #1, then set #2, then set #1...).

             5.  Consider  using  a  program  which  will  create  a unique
                 "signature" of all the programs on your computer.  Once in
                 a while, you can  run  this program to determine if any of
                 your applications  have been modified -- either by a virus
                 or by a stray gamma ray.

             6.  If your computer starts acting weird, DON'T PANIC.  It may
                 be a virus, but then again it may not.  Immediately reboot
                 from a legitimate  copy  of  your  master DOS disk.  Put a
                 write-protect tab on that disk just to be safe.    Do  NOT
                 run any programs on your regular disks (you might activate



          Computer Virus Myths                                       Page 6
�





                 a Trojan horse).  If  you don't have adequate backups, try
                 to  bring them up to date.  Yes, you might be backing up a
                 virus as well, but it can't hurt you as long as  you don't
                 run any of your normal programs.  Set your backups  off to
                 the side.  Only then can you safely hunt for the problem.

             7.  If you can't  figure  out what's wrong with your computer,
                 and you aren't sure of yourself, just turn it off and call
                 for help.   Consider calling a local computer group before
                 you hire an expert to fix your problem.    If  you  need a
                 professional,  consider hiring a regular computer  consul-
                 tant before you call on a "virus expert."

             8.  If you can't  figure  out what's wrong with your computer,
                 and you are  sure  of yourself, execute a low-level format
                 on all of your regular disks  (you  can learn how to do it
                 from almost any BBS), then  do a high-level format on each
                 one of them.   Next,  carefully  re-install  your software
                 from legitimate copies  of  the master disks, not from the
                 backups.  Then, carefully restore only the data files (not
                 the executable program files!) from your backup disks.

               If you DO find a Trojan horse or a virus, we'd appreciate it
          if you'd mail a copy to us.  (But please, don't handle one unless
          you know what you're doing.)  Include as much information  as you
          can, and put a label on the disk that says  it  contains a Trojan
          horse or virus.  Send it to Ross Greenberg, 594 Third Avenue, New
          York, NY 10016.  Thank you.

               -------------------------------------------------------
               Ross Greenberg is the author of a  popular Trojan/virus
               detection program.   Rob Rosenberger is the author of a
               modem analysis program.   These  men  have never met in
               person; they worked on this story completely by modem.
               -------------------------------------------------------

                 Copyright (c) 1988 Rob Rosenberger & Ross Greenberg


          You may give copies of this to anyone if you pass it along in its
          entirety.  Publications must obtain written permission to reprint
          this article.  Write to Rob Rosenberger, P.O. Box #643, O'Fallon,
          IL 62269.