Return-Path: XPUM04@prime-a.central-services.umist.ac.uk
Received: from G.SEI.CMU.EDU by ubu.cert.sei.cmu.edu (5.61/2.3)
        id AA03437; Tue, 19 Jun 90 05:00:48 -0400
Received: from SEI.CMU.EDU by g.sei.cmu.edu (5.61/2.5)
        id AA28352; Tue, 19 Jun 90 05:00:46 -0400
Received: from nsfnet-relay.ac.uk by sei.cmu.edu (5.61/2.3)
        id AA01309; Tue, 19 Jun 90 05:00:37 -0400
Received: from sun.nsfnet-relay.ac.uk by vax.NSFnet-Relay.AC.UK 
           via Janet with NIFTP  id aa04669; 19 Jun 90 9:24 BST
From: Anthony Appleyard <XPUM04@prime-a.central-services.umist.ac.uk>
To: DAVIDF@cs.heriot-watt.ac.uk
Date:         Tue, 19 Jun 90 09:38:48 BST 
Message-Id:   <$TGWFCWKBBCTD at UMPA>
Subject:      Here is Virus-L vol 0 #0906



Virus-L Digest Tue, 6 Sep 88, Volume 0 : Issue #0906

Today's Topics

Re: SCORES spread question
** no subject, date = Tue, 6 Sep 88 12:45:00 EDT
Virus wars
hypercard virus question

------------------------------

Date:         Tue, 6 Sep 88 02:35:59 EDT
From:         Amanda B Rosen <abr1@CUNIXC.CC.COLUMBIA.EDU>
Subject:      Re: SCORES spread question
In-Reply-To:  Your message of Fri, 2 Sep 88 14:50:00 CST

Re: The library infected with scores- If this  is  the  SCORES  virus  that
we've  seen  before,  there  is  NO  CHANCE that a data file can carry this
virus. There is the minute  possibility  that  somebody  has  modified  the
virus. I hope not, it was pretty nasty already...
/a

--------------------

Date:         Tue, 6 Sep 88 12:45:00 EDT
From:         WHMurray@DOCKMASTER.ARPA
In-Reply-To:  Message of 29 Aug 88 15:12 EDT from "GUYDOSRM%SNYPLABA.BITNET at
              CUNYVM.CUNY.EDU"

I use  "sterilize"  and  "disable"  to  convey  the  notion  of  preventing
reproductive  behavior  while preserving other information and perhaps even
other behavior. I use "kill" and "destroy" both in the  sense  of  destroy;
i.e., erase, delete, and overwrite.
William Hugh Murray, Fellow, Information System Security, Ernst & Whinney
2000 National City Center Cleveland, Ohio 44114
21 Locust Avenue, Suite 2D, New Canaan, Connecticut 06840

--------------------

Date:         Tue, 6 Sep 88 10:19:00 CDT
From:         PETCHER%eg.csc.ti.com@RELAY.CS.NET
Subject:      Virus wars

> From: WHMurray%DOCKMASTER.ARPA@cunyvm.cuny.edu
> Viruses are the tools of the immature, the sneaks, and the cowards; not
> those of the hero.

That could be said of the atom bomb, too, but when the  time  came  it  was
used,  it  worked, and it probably saved countless lives. I don't intend to
spend my time writing viri, but if my country is threatened and a virus  is
what  it  takes to alleviate the threat, you're going to see me crank out a
virus so fast it makes your head spin!

Malcolm Petcher, Texas Instruments, Inc.

--------------------

Date:         Tue, 6 Sep 88 16:48:00 EDT
Comments:     Warning -- RSCS tag indicates an origin of SMTPUSER@OBERLIN
From:         "$CAROL@OBERLIN (BITNET)" <$CAROL@OBERLIN>
Subject:      hypercard virus question

My colleague (bitnet address PRUSSELL@OBERLIN) asks: Does  anyone  know  if
Hypercard  stacks  are  capable  of  carrying  Macintsosh viruses? Are they
considered applications or data? Thanks much.

        |  Carol Conti-Entin   (216) 775-8290
        |  $carol@oberlin   -or-   pconti@oberlin  (BITNET)
        |  Academic Computing Consultant
        |  Houck Computing Center
        |  Oberlin College
        |  Oberlin, OH  44074

--------------------

*** end of Virus-L issue ***
