SlideShare a Scribd company logo
COMPUTER WORMS:
HOW SCHOOLS ARE FIGHTING A NEW KIND OF VIRUS

November 24, 2003

While federal authorities are cracking down on hackers who create computer viruses, schools
across the country are fighting back with tech savvy staff and updated software.

They may bear seductive names, like Shakira, Britney Spears or Jennifer Lopez, but with the
capacity to spread to thousands of computers within minutes and cause billions of dollars in
damage to North American businesses, viruses are being recognized as acts of criminals and not
just pet projects of lonely computer geeks.

Fred Cohen spread the first computer virus 20 years ago. As a Ph.D. student at the University of
Southern California, Cohen designed a program that could quot;infect other programs by modifying
them to include a … version of itself.quot;

Today, viruses spread through shared documents and e-mails, and exploit flaws in software.
Writers of a recent virus, Mimail, targeted Web sites that filter for viruses and unsolicited e-
mails, or “spam,” while gathering e-mail addresses.

In an attempt to find and punish virus authors, Microsoft has created a $5 million antivirus
reward program. The bounty includes $250,000 for evidence leading to the capture and
conviction of the original author of the MSBlast.A worm or SoBig virus.

In August, Jeffrey Parson, known online as “teekid,” was charged in federal court in Seattle for
spreading a variant of the Blaster worm. The 18-year-old senior from Hopkins High School
could get up to 10 years in prison and $250,000 in fines for infecting 7,000 computers and
causing millions of dollars in damage to Microsoft alone.

What schools are doing to beat viruses

Technically, Blaster is a worm, a program that begins with a single machine and infects other
machines, leaving a copy of the worm behind, so the infected machine hunts for others to attack.

At Parson's Hopkins High School in Minnetonka, Minn., the Blaster worm was more of an
annoyance than a major threat to the school's network, according to Peter Markham, head of the
technology department. Hopkins' two-man information technology staff watched Blaster in real
time using Symantec, the school's antivirus software, and was immediately able to locate and
work on the 12 computers it infected.



                                                  1
Hopkins has avoided serious virus problems because many of their computers are Macintoshes.
Most viruses, Markham said, don't cause damage to Macs.

“Ninety-nine percent (of viruses) were written against Windows operating systems, because
they're the most popular. Not many write (viruses) for Macs, which works for me.quot;

Most of the viruses come into Hopkins as e-mail attachments. Their antivirus software now
blocks any attachment that ends in “.exe,” “.vbs” or “.ser.,” common extensions for infected
files.

Karen House, webmaster for Regina Dominican High School, a small private all-girls school
outside Chicago, said most of their viruses are transferred from disks.

House worries most about students receiving e-mails from hackers that direct them to delete
antivirus software. One particular message cons the recipient into believing they are deleting a
corrupted file, when they are really destroying their virus protection. Regina relies on antivirus
software and has suffered some problems, but nothing major, said House.

Cesar Valle, the lone technology coordinator at Eastern High School in Washington, D.C.,
downloads updates from the Norton antivirus system all D.C. public schools use every night
around 11 p.m. and midnight. Valle said that is the prime time for teenagers hacking away at
home to send out viruses.

“We were not touched by the Blaster worm,” said Valle. “But every other school in D.C. was
affected.”

Cracking down

Though virus author Parson may not receive the maximum sentence if he is found guilty,
authorities are trying to set an example that hackers will be sought out and prosecuted.

“With this arrest we want to deliver a message to cyberhackers here and around the world,” U.S.
attorney John McKay said at a press conference in Seattle. “We will devote all available
resources to tracking down those who attack our technological infrastructure. Let there be no
mistake about it. Cyberhacking is a crime.”

By Michael Melia, Online NewsHour
© 2003 MacNeil/Lehrer Productions




                                                 2

More Related Content

What's hot

Automated classification and analysis of internet malware
Automated classification and analysis of internet malwareAutomated classification and analysis of internet malware
Automated classification and analysis of internet malware
UltraUploader
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
IRJET Journal
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
IJNSA Journal
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
WorkSmart Integrated Marketing
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham_Indrawat
 
Penn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer WormsPenn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer Worms
dgrinnell
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
Aditya K Sood
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Gisha Mathyari
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
Solomon Sunday Oyelere
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
 
Top 10 exploited vulnerabilities 2019 (thus far...)
Top 10 exploited vulnerabilities 2019 (thus far...) Top 10 exploited vulnerabilities 2019 (thus far...)
Top 10 exploited vulnerabilities 2019 (thus far...)
Jonathan Cran
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
subramanian K
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
IOSR Journals
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
Felipe Prado
 

What's hot (19)

Automated classification and analysis of internet malware
Automated classification and analysis of internet malwareAutomated classification and analysis of internet malware
Automated classification and analysis of internet malware
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Computer virus
Computer virusComputer virus
Computer virus
 
Penn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer WormsPenn State Researchers Code Targets Stealthy Computer Worms
Penn State Researchers Code Targets Stealthy Computer Worms
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
 
Information security
Information securityInformation security
Information security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Top 10 exploited vulnerabilities 2019 (thus far...)
Top 10 exploited vulnerabilities 2019 (thus far...) Top 10 exploited vulnerabilities 2019 (thus far...)
Top 10 exploited vulnerabilities 2019 (thus far...)
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 

Similar to virus_11-24

Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
wirelessbroadbandinternet57
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Souman Guha
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
shoib_245
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
Aditya Singh
 
Virus
VirusVirus
Virus
sushant292
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
East West University
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Dark Side
 
File000145
File000145File000145
File000145
Desmond Devendran
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
LadyChristianneCalic
 
Computer Virus
Computer VirusComputer Virus
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
Fathoni Mahardika II
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Viruses
VirusesViruses
Viruses
yuvan80
 

Similar to virus_11-24 (20)

Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Virus
VirusVirus
Virus
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
File000145
File000145File000145
File000145
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
Viruses
VirusesViruses
Viruses
 

More from Uskidz

adcampaignrelease
adcampaignreleaseadcampaignrelease
adcampaignrelease
Uskidz
 
event_clips
event_clipsevent_clips
event_clipsUskidz
 
MLDVProgramList_premium
MLDVProgramList_premiumMLDVProgramList_premium
MLDVProgramList_premium
Uskidz
 
NVG9702
NVG9702NVG9702
NVG9702
Uskidz
 
Frida
FridaFrida
Frida
Uskidz
 
ClimateChampionsReportJuly07
ClimateChampionsReportJuly07ClimateChampionsReportJuly07
ClimateChampionsReportJuly07
Uskidz
 
spring_2008
spring_2008spring_2008
spring_2008
Uskidz
 
artic_02
artic_02artic_02
artic_02
Uskidz
 
WB2U11
WB2U11WB2U11
WB2U11
Uskidz
 
061127
061127061127
061127
Uskidz
 
pagea8
pagea8pagea8
pagea8
Uskidz
 
newsletter_issue_2
newsletter_issue_2newsletter_issue_2
newsletter_issue_2
Uskidz
 
NALIP-PressRelease-0710
NALIP-PressRelease-0710NALIP-PressRelease-0710
NALIP-PressRelease-0710
Uskidz
 
programa_foro-latino
programa_foro-latinoprograma_foro-latino
programa_foro-latino
Uskidz
 
howto_uncertainty
howto_uncertaintyhowto_uncertainty
howto_uncertainty
Uskidz
 
133_UNR
133_UNR133_UNR
133_UNR
Uskidz
 
MexicanPrsrls
MexicanPrsrlsMexicanPrsrls
MexicanPrsrls
Uskidz
 
4hispanosMatamoscasChicano
4hispanosMatamoscasChicano4hispanosMatamoscasChicano
4hispanosMatamoscasChicano
Uskidz
 
Vogue_06_2005
Vogue_06_2005Vogue_06_2005
Vogue_06_2005Uskidz
 
Morningstar
MorningstarMorningstar
Morningstar
Uskidz
 

More from Uskidz (20)

adcampaignrelease
adcampaignreleaseadcampaignrelease
adcampaignrelease
 
event_clips
event_clipsevent_clips
event_clips
 
MLDVProgramList_premium
MLDVProgramList_premiumMLDVProgramList_premium
MLDVProgramList_premium
 
NVG9702
NVG9702NVG9702
NVG9702
 
Frida
FridaFrida
Frida
 
ClimateChampionsReportJuly07
ClimateChampionsReportJuly07ClimateChampionsReportJuly07
ClimateChampionsReportJuly07
 
spring_2008
spring_2008spring_2008
spring_2008
 
artic_02
artic_02artic_02
artic_02
 
WB2U11
WB2U11WB2U11
WB2U11
 
061127
061127061127
061127
 
pagea8
pagea8pagea8
pagea8
 
newsletter_issue_2
newsletter_issue_2newsletter_issue_2
newsletter_issue_2
 
NALIP-PressRelease-0710
NALIP-PressRelease-0710NALIP-PressRelease-0710
NALIP-PressRelease-0710
 
programa_foro-latino
programa_foro-latinoprograma_foro-latino
programa_foro-latino
 
howto_uncertainty
howto_uncertaintyhowto_uncertainty
howto_uncertainty
 
133_UNR
133_UNR133_UNR
133_UNR
 
MexicanPrsrls
MexicanPrsrlsMexicanPrsrls
MexicanPrsrls
 
4hispanosMatamoscasChicano
4hispanosMatamoscasChicano4hispanosMatamoscasChicano
4hispanosMatamoscasChicano
 
Vogue_06_2005
Vogue_06_2005Vogue_06_2005
Vogue_06_2005
 
Morningstar
MorningstarMorningstar
Morningstar
 

Recently uploaded

The Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job OpportunitiesThe Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job Opportunities
LetsFAME
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
etycev
 
Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23
get joys
 
Sunny and Rishi 3 Written by Basak Serin
Sunny and Rishi 3 Written by Basak SerinSunny and Rishi 3 Written by Basak Serin
Sunny and Rishi 3 Written by Basak Serin
Basak24
 
The Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy townThe Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy town
John Emmett
 
The Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling cityThe Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling city
John Emmett
 
HD Video Player All Format - 4k & live stream
HD Video Player All Format - 4k & live streamHD Video Player All Format - 4k & live stream
HD Video Player All Format - 4k & live stream
HD Video Player
 
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women MagazineTaylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
CIOWomenMagazine
 
From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28
get joys
 
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and LegaciesBrian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
greendigital
 
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen StageAbraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
DiaDan Holdings Ltd
 
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
juliancopeman444
 
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
abqenm
 
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
ytunuq
 
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite GameLeonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
greendigital
 
Anasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award WinnerAnasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award Winner
Diwitya Bajwa
 
Clyde the cat and Space Poems by Basak Serin
Clyde the cat and Space Poems by Basak SerinClyde the cat and Space Poems by Basak Serin
Clyde the cat and Space Poems by Basak Serin
Basak24
 
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate PortfolioLeonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
greendigital
 
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
x0l4b5ho
 
The Enigma of the Midnight Canvas, In the heart of Paris
The Enigma of the Midnight Canvas, In the heart of ParisThe Enigma of the Midnight Canvas, In the heart of Paris
The Enigma of the Midnight Canvas, In the heart of Paris
John Emmett
 

Recently uploaded (20)

The Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job OpportunitiesThe Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job Opportunities
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
 
Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23
 
Sunny and Rishi 3 Written by Basak Serin
Sunny and Rishi 3 Written by Basak SerinSunny and Rishi 3 Written by Basak Serin
Sunny and Rishi 3 Written by Basak Serin
 
The Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy townThe Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy town
 
The Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling cityThe Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling city
 
HD Video Player All Format - 4k & live stream
HD Video Player All Format - 4k & live streamHD Video Player All Format - 4k & live stream
HD Video Player All Format - 4k & live stream
 
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women MagazineTaylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
Taylor Swift: Conquering Fame, Feuds, and Unmatched Success | CIO Women Magazine
 
From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28
 
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and LegaciesBrian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
Brian Peck Leonardo DiCaprio: A Unique Intersection of Lives and Legacies
 
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen StageAbraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
 
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
欧洲杯赌球-欧洲杯赌球竞猜官网-欧洲杯赌球竞猜网站|【​网址​🎉ac10.net🎉​】
 
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
一比一原版(mcmaste毕业证书)加拿大麦克马斯特大学毕业证如何办理
 
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
一比一原版(UCSF毕业证)旧金山分校毕业证如何办理
 
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite GameLeonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
 
Anasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award WinnerAnasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award Winner
 
Clyde the cat and Space Poems by Basak Serin
Clyde the cat and Space Poems by Basak SerinClyde the cat and Space Poems by Basak Serin
Clyde the cat and Space Poems by Basak Serin
 
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate PortfolioLeonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
 
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
定制(mu毕业证书)美国迈阿密大学牛津分校毕业证学历证书原版一模一样
 
The Enigma of the Midnight Canvas, In the heart of Paris
The Enigma of the Midnight Canvas, In the heart of ParisThe Enigma of the Midnight Canvas, In the heart of Paris
The Enigma of the Midnight Canvas, In the heart of Paris
 

virus_11-24

  • 1. COMPUTER WORMS: HOW SCHOOLS ARE FIGHTING A NEW KIND OF VIRUS November 24, 2003 While federal authorities are cracking down on hackers who create computer viruses, schools across the country are fighting back with tech savvy staff and updated software. They may bear seductive names, like Shakira, Britney Spears or Jennifer Lopez, but with the capacity to spread to thousands of computers within minutes and cause billions of dollars in damage to North American businesses, viruses are being recognized as acts of criminals and not just pet projects of lonely computer geeks. Fred Cohen spread the first computer virus 20 years ago. As a Ph.D. student at the University of Southern California, Cohen designed a program that could quot;infect other programs by modifying them to include a … version of itself.quot; Today, viruses spread through shared documents and e-mails, and exploit flaws in software. Writers of a recent virus, Mimail, targeted Web sites that filter for viruses and unsolicited e- mails, or “spam,” while gathering e-mail addresses. In an attempt to find and punish virus authors, Microsoft has created a $5 million antivirus reward program. The bounty includes $250,000 for evidence leading to the capture and conviction of the original author of the MSBlast.A worm or SoBig virus. In August, Jeffrey Parson, known online as “teekid,” was charged in federal court in Seattle for spreading a variant of the Blaster worm. The 18-year-old senior from Hopkins High School could get up to 10 years in prison and $250,000 in fines for infecting 7,000 computers and causing millions of dollars in damage to Microsoft alone. What schools are doing to beat viruses Technically, Blaster is a worm, a program that begins with a single machine and infects other machines, leaving a copy of the worm behind, so the infected machine hunts for others to attack. At Parson's Hopkins High School in Minnetonka, Minn., the Blaster worm was more of an annoyance than a major threat to the school's network, according to Peter Markham, head of the technology department. Hopkins' two-man information technology staff watched Blaster in real time using Symantec, the school's antivirus software, and was immediately able to locate and work on the 12 computers it infected. 1
  • 2. Hopkins has avoided serious virus problems because many of their computers are Macintoshes. Most viruses, Markham said, don't cause damage to Macs. “Ninety-nine percent (of viruses) were written against Windows operating systems, because they're the most popular. Not many write (viruses) for Macs, which works for me.quot; Most of the viruses come into Hopkins as e-mail attachments. Their antivirus software now blocks any attachment that ends in “.exe,” “.vbs” or “.ser.,” common extensions for infected files. Karen House, webmaster for Regina Dominican High School, a small private all-girls school outside Chicago, said most of their viruses are transferred from disks. House worries most about students receiving e-mails from hackers that direct them to delete antivirus software. One particular message cons the recipient into believing they are deleting a corrupted file, when they are really destroying their virus protection. Regina relies on antivirus software and has suffered some problems, but nothing major, said House. Cesar Valle, the lone technology coordinator at Eastern High School in Washington, D.C., downloads updates from the Norton antivirus system all D.C. public schools use every night around 11 p.m. and midnight. Valle said that is the prime time for teenagers hacking away at home to send out viruses. “We were not touched by the Blaster worm,” said Valle. “But every other school in D.C. was affected.” Cracking down Though virus author Parson may not receive the maximum sentence if he is found guilty, authorities are trying to set an example that hackers will be sought out and prosecuted. “With this arrest we want to deliver a message to cyberhackers here and around the world,” U.S. attorney John McKay said at a press conference in Seattle. “We will devote all available resources to tracking down those who attack our technological infrastructure. Let there be no mistake about it. Cyberhacking is a crime.” By Michael Melia, Online NewsHour © 2003 MacNeil/Lehrer Productions 2