Friday, April 19, 2024
03:38 PM (GMT +5)

Go Back   CSS Forums > Off Topic Section > Computers and Technology

Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies.

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #1  
Old Tuesday, June 30, 2009
ravaila's Avatar
Senior Member
 
Join Date: Jan 2008
Location: city of miTTi kaTTA
Posts: 877
Thanks: 1,549
Thanked 798 Times in 436 Posts
ravaila is a glorious beacon of lightravaila is a glorious beacon of lightravaila is a glorious beacon of lightravaila is a glorious beacon of lightravaila is a glorious beacon of lightravaila is a glorious beacon of light
Post email viruses!

E-mail Viruses

Virus authors adapted to the changing computing environment by creating the e-mail virus. For example, the Melissa virus in March 1999 was spectacular. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this:

Someone created the virus as a Word document and uploaded it to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. At that rate, the Melissa virus quickly became the fastest-spreading virus anyone had seen at the time. As mentioned earlier, it forced a number of large companies to shut down their e-mail systems.

The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.

The Melissa virus took advantage of the programming language built into Microsoft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus. It created a huge mess.

Microsoft applications have a feature called Macro Virus Protection built into them to prevent this sort of virus. With Macro Virus Protection turned on (the default option is ON), the auto-execute feature is disabled. So when a document tries to auto-execute viral code, a dialog pops up warning the user. Unfortunately, many people don't know what macros or macro viruses are, and when they see the dialog they ignore it, so the virus runs anyway. Many other people turn off the protection mechanism. So the Melissa virus spread despite the safeguards in place to prevent it.

In the case of the ILOVEYOU virus, the whole thing was human-powered. If a person double-clicked on the program that came as an attachment, then the program ran and did its thing. What fueled this virus was the human willingness to double-click on the executable.
__________________
Jo ALLAH karay c .. o sohna karay c
jab bhi kaam aaya mera PARVARIGAAR kaam aaya

Last edited by Princess Royal; Tuesday, June 30, 2009 at 04:19 PM.
Reply With Quote
  #2  
Old Tuesday, July 07, 2009
Member
 
Join Date: Jul 2009
Posts: 43
Thanks: 14
Thanked 19 Times in 11 Posts
ThaHawk is on a distinguished road
Default

Latest worms using email-spread are storm worm etc. Some of the advanced versions of storm worm might be using some exploit pack which will execute exe only on visit of a website spammed in an email or probably a html email itself. Sad that Microsoft And FBI cant do anything to hunt down the authors of storm and conficker.

Last edited by Viceroy; Tuesday, July 07, 2009 at 08:36 PM.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Web Mail? ravaila Computers and Technology 0 Saturday, July 11, 2009 11:00 AM
Computer Viruses Predator Computers and Technology 1 Saturday, June 28, 2008 12:52 PM
Viruses – Types and Examples pakfame Computers and Technology 0 Thursday, February 14, 2008 10:13 AM
Computer Virus Timeline Aarwaa General Knowledge, Quizzes, IQ Tests 0 Wednesday, December 12, 2007 12:52 AM
All About Microbes atifch General Science & Ability 1 Monday, October 23, 2006 05:55 AM


CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.