Pages

Wednesday, November 3, 2010

REALITY OF VIRUS

Reality of insecure internet activity. threat of virus attack,Reality of remove virus,Reality of virus removers,of virus software,Reality of free virus removal tool,Reality of how to remove a virus,Reality of scan virus,Reality of conflictor virus,Reality of confliker virus,Reality of cornficker virus,Reality of userinit.exe virus,Reality of confiker virus,Reality of virus april,Reality of happy virus,of virus site,Reality of virus 20,Reality of virus total,Reality of virus protections,Reality of win32.zafi.b virus,Reality of monkey virus,Reality of virus scare,Reality of bo heap virus,Reality of the conficker virus,of conficker c virus,Reality of go google virus,Reality of huge virus coming,Reality of list of virus,Reality of conficker virus removal,Reality of 360 virus removal,Reality of a360 virus removal,Reality of remove trojan virus,Reality of virus codes,Reality of privacy center virus,of a360virus,Reality of internet virus pro,Reality of remove a virus,Reality of zombie virus,Reality of configure virus,Reality of virus reproduction,Reality of artemis virus,Reality of virus download,Reality of anti virus,Reality of scan for virus,Reality of go google com virus,Reality of winlogon exe virus,Reality of free virus removal for windows xp,Reality of free virus software,Reality of april fool virus,Reality of ca virus,Reality of how to remove a trojan virus.

A computer virus is a program which intentionally makes copies of itself. It may contain some sort of "payload", which can be destructive or non-destructive program code, that is activated and run when certain conditions are fulfilled.

LEGALITY OF VIRUSES

The laws about writing and releasing viruses vary from country to country and state to state. In the US there are both Federal and State laws preventing damage to data and property, and these ensure that virus writers whose viruses infect large numbers of computers pay the penalty. David Smith, writer of the infamous Melissa MACRO virus, has been successfully prosecuted and awaits sentencing, with a possible fine of anything up to $150,000 and up to 10 years in prison.
In the UK the Computer Misuse Act makes it illegal to modify a computer without authorization, and this was successfully used to prosecute the author of the SMEG virus Christopher Pile, AKA the Black Baron, who received a total of 18 months in prison. During sentencing the judge commented that "those who seek to wreak mindless havoc on one of the vital tools of our age cannot expect lenient treatment". Not every country is so active in finding and prosecuting virus writers, however. A Taiwanese university only reprimanded and demoted the author of the highly destructive and costly CIH virus. Even just collecting viruses, passing source code and writing viruses for non-destructive purposes is illegal in some places, and any wannabe virus writer needs to understand the implications of the law, wherever they are based.
From a more hackish viewpoint I can understand the attraction of looking at the theory of virus writing, the appeal of studying virus source code to see how viruses work, the thrill of capturing and disassembling live viruses, and even, to some extent, the pride felt when writing a new virus as "proof of concept". All of this is fine, as it combines a very healthy curiosity coupled with sound technical skills, something that draws respect from hackers the world over. But, and it's a very big "but", the juvenile egotistic idiots who release these viruses "in the wild", often with their handle and the name of their group in it, have crossed the ethical border that distinguishes hacking from crime.
On a more personal note, I resent the amount of time wasted cleaning up networks of PCs after an infection, evaluating anti-virus software, installing anti-virus software and updating signature files - time that could have been put to more productive use, like hacking. Anyone who chooses to write a virus had better be sure that it never escapes, because if it causes major damage and the police break in their door, the authorities are not going to be convinced by any lame argument about "proof of concept".

No comments:

Post a Comment