Computer Viruses In Unix Networks
Paper which examines in detail the problem of computer viruses as they relate to
Unix and Unix-like systems.

  • Computer Viruses In Unix Networks Computer Viruses In Unix Networks Copyright © August 1995, February 1996 by Peter V

  • The first computer viruses created were on Unix systems

  • Computer worms preserve themselves by migration while computer viruses use propagation

  • While the hostile algorithms that have captured the general public's imagination are viruses and worms, the more common direct problem on Unix systems are Trojan horses and time bombs

  • Example: cp /bin/sh /tmp/gotu ; chmod 4777 /tmp/gotu Trojan horses and time bombs can be located using the same methods required to locate viruses in the Unix environment

  • A virus or worm attack is more important because these programs are mobile and can integrate themselves into the operating system

  • Of these two forms of attack, the virus attack is the hardest to detect and has the best chance of survival

  • Worms can be seen in the system process tables and eliminated since they exist as individual processes while virus attacks are protected from this form of detection by their host programs

  • All of the methods used to detect and prevent viruses are also effective against the other forms of attack, therefore, the remainder of this paper will deal with the more serious problem of viral attacks

    X-Cleaner Spyware Remover and Privacy Protection Software
    Antispy and browser cleaner software.

    Softpanorama(slightly skeptical) Malware Defense Strategy
    A skeptical look at anti-virus protection.

    Waco: A New Revelation, Reviewed by Gavin Phillips [Free Republic]
    Raises questions about a documentary film and suggests violation of human rights
    in the Waco incident.


    Lancers Reactor: Where Simulation is only the Beginning
    Information on Starlancer and Freelancer. Walkthrough and forum.

    Theseus - The Athenian Adventurer
    Abridged modern English version of Plutarch's life of Theseus, the founder of Athens.

    alt.spam FAQ or "Figuring out fake E-Mail & Posts".
    A comprehensive guide on how to track down the source of the spam.

  • The three sections to this twelve portion FAQ (With apologies to Douglas Adams:-)) : o o The Easy Way To Get Rid Of spam o o What computer did this e-mail originate from? o MAILING LIST messages o o o o What to do with "strange" looking Web links o Getting a World Wide Web page busted o o Viruses / Trojans / Spyware o Fraud on the Internet and The MMF (Make Money Fast) Posts o Nigerian Advance Fee Fraud o Hoaxes o Open system spammers love o o Rejecting E-Mail from domains that continue to Spam o I couldn't think to putanywhere else

    Tony Fletcher’s iJamming!
    Created by author/journalist Tony Fletcher. Includes reviews, interviews and
    personal commentary.

  • Benefits

    The Holy Scripture of Elite 0.0256
    Humorous, semi-fictional religious style history of the Elite community.

  • As the staff at Frontier Developments breath a sigh of relief, a song starts playing in the background...'I am Elite, a lover, baby you'll discover, life with me could be so sweet...') (The employee that was hit over the head walks out of the building, looking dazed, wondering what's been going on...) 'Hey, come on guys, we gotta get back to work, or we'll never finish putting those giant insect viruses into Elite 4!' The quest of Archangel Vlad First we must retake our holy and sacred land of

    Orlando Bloom Biography
    Features comprehensive biography and full filmography.

    A Tour of the Worm
    Donn Seeley tells the story of the Internet Worm of 1988 and how it effectively
    shut down the Internet. Proceedings of the Winter USENIX Technical Conference, ...

    Mr. Dew blogs about about his life in Singapore.


    Grand Theft Auto: Vice City PS2 cheats
    Contains codes, cheats, and hints. (Playstation 2)

    Adrian Sherwood
    Profile and production credits, from the official site of his record label.

    The Classics Pages - Euripides' Orestes
    From The Classics Pages.

  • Otherwise each generation passes on the murder virus to the next

    Map of the Underworld, Greek Mythology Link.
    Map showing the descents to the Underworld made by Odysseus and Aeneas.

    White Man Tweak With Forked Tongue - Charles Carreon's Blog ...
    Charles Carreon discusses political news and current events.

    An account of a month long trip in 1998.

    Roman Mythology
    Various ancient Roman beliefs, rituals, and other observances concerning the

    idleworm: home
    Features commentary and Flash animations about celebrities, current event, politics
    and war.


    Home @CallCenter