[citw150] CITW 150 L3 Q4

  • From: "Azrael Leviticus" <azeral777@xxxxxxxxx>
  • To: citw150@xxxxxxxxxxxxx
  • Date: Mon, 20 Feb 2006 19:46:28 -0500

Viruses and I have become intimately familiar over time; through mass
infection, research, removal, and even writing a few of my own (purely for
C++ practice, none of them released to the Internet or tested anywhere
outside of my virus-testing computer). They're fascinating little bits of
code.

Backdoors and keyloggers (typically trojans, those viruses that do not
self-replicate) are particularly insidious, the former either creating or
exploiting weaknesses in a system to allow a user entry and, potentially, to
control the system on a basic level. The latter requires less technical
knowledge to design, but requires a great deal of finesse to work out. To
steal any sort of data, in this case a log of keystrokes that will often
reveal several passwords and private information, it has to be sent
somewhere - potentially allowing someone who's carefully monitoring their
connection or logging program activities to trace the data's path to the
beneficiary, unless the creator is very, very careful. Thus, the 'safest'
variety involves on-site pickup, but that requires you to have physical
access to the machine in question.

Anyway, more information about the various varieties of virus, hoax, and
general malware can be found at: http://www.viruslist.com/

--------------------------
Ryan Bailey
Azeral777@xxxxxxxxx

"Men occasionally stumble over the truth, but most of them pick themselves
up and hurry off is if nothing ever happened."
- Sir Winston Churchill

Other related posts: