[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[RT] test: delete



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2919.6307" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>test</FONT></DIV></BODY></HTML>
</x-html>From ???@??? Thu May 04 17:56:57 2000
Return-Path: <listmanager@xxxxxxxxxxxxxxx>
Received: from mail.pajo.com (mail.pajo.com [216.116.96.4])
	by purebytes.com (8.9.3/8.9.3) with ESMTP id RAA23779
	for <neal@xxxxxxxxxxxxx>; Thu, 4 May 2000 17:32:21 -0700
Received: from REALTRADERS.COM ([208.179.56.198])
	by mail.pajo.com (8.9.1a/8.9.0) with ESMTP id RAA28371;
	Thu, 4 May 2000 17:31:12 -0700
Received: from mail.rdc2.bc.home.com by realtraders.com
	with SMTP (MDaemon.v3.0.3.R)
	for <realtraders@xxxxxxxxxxxxxxx>; Thu, 04 May 2000 17:21:54 -0700
Received: from gwallace ([24.65.19.97]) by mail.rdc2.bc.home.com
          (InterMail vM.4.01.02.17 201-229-119) with SMTP
          id <20000505002439.JWEX17124.mail.rdc2.bc.home.com@xxxxxxxx>
          for <realtraders@xxxxxxxxxxxxxxx>; Thu, 4 May 2000 17:24:39 -0700
Message-ID: <003301bfb628$4c1ed7a0$61134118@xxxxxxxxxxxxxxxxxxxxxx>
Reply-To: "Glen Wallace" <gwallace@xxxxxxxx>
From: "Glen Wallace" <gcwallace@xxxxxxxx>
To: <realtraders@xxxxxxxxxxxxxxx>
References: <004301bfb5eb$b0093a40$0122fea9@xxxxxxxxxxxxxxxx> <004101bfb5ee$19d69380$61134118@xxxxxxxxxxxxxxxxxxxxxx> <005201bfb5f0$557b84c0$0122fea9@xxxxxxxxxxxxxxxx>
Subject: [RT] Re: Question about viruses
Date: Thu, 4 May 2000 17:22:37 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2919.6600
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600
X-MDaemon-Deliver-To: realtraders@xxxxxxxxxxxxxxx
X-Return-Path: gcwallace@xxxxxxxx
X-MDRcpt-To: realtraders@xxxxxxxxxxxxxxx
Sender: listmanager@xxxxxxxxxxxxxxx
Precedence: bulk
X-MDMailing-List: realtraders@xxxxxxxxxxxxxxx
X-MDSend-Notifications-To: listmanager@xxxxxxxxxxxxxxx
Status:   

----- Original Message -----
From: Bill Daniel
To: Glen Wallace
Sent: Thursday, May 04, 2000 10:44 AM
Subject: Re: [RT] Re: Question about viruses

> Glen,
>
> Thanks for the info. What is the difference between a virus and a worm?
>
> Thanks.
>
> Bill


Bill:

>From the Computer Associates site ( www.cai.com )

Trojan Horse
A trojan horse is a program that does something undocumented which the
programmer intended, but that the user would not approve of if he knew about
it. According to some people, a virus is a particular case of a Trojan Horse,
namely one which is able to spread to other programs (i.e., it turns them into
Trojans too). According to others, a virus that does not do any deliberate
damage (other than merely replicating) is not a Trojan. Finally, despite the
definitions, many people use the term "Trojan" to refer only to a
non-replicating malicious program, so that the set of Trojans and the set of
viruses are disjoint.

Virus
A virus is a piece of software designed and written to make additional copies
of itself and spread from location to location, typically without user
knowledge or permission.
Viruses, by definition, add their code to your system in such a way that when
the infected part of the system executes, the virus does to:
Boot viruses place their code in the sector whose code the machine will
automatically execute when booting, so that when the machine boots, they load
and run. After they are finished loading, they load the original boot code,
which they have previously moved to another location.
File viruses attach to executable program files in such a way that when you
run the infected program, the virus code first executes. After the virus is
finished loading and executing, it loads and executes the program it has
infected.
Macro viruses attach to templates and other files in such a way that, when an
application loads the file and executes the instructions in it, the first
instructions to execute are those of a virus.
A companion virus attaches to the operating system, rather than files or
sectors. In DOS, when you run a file named "ABC", the rule is that ABC.COM
would execute before ABC.EXE. A companion virus places its code in a COM file
whose first name matches the name of an existing EXE. You run "ABC", and the
actual sequence is "ABC.COM", "ABC.EXE"

Worm
Worms are similar to viruses in that they make copies of themselves, but
differ in that they need not attach to particular files or sectors at all.
Once a worm is executed, it seeks other systems - rather than parts of
systems - to infect, then copies its code to them.