A global hunt for the programmer

Published: 6 April 1999 y., Tuesday
A man has been arrested and charged with originating the e-mail virus known as Melissa, the New Jersey attorney general_s office announced Friday. David L. Smith, 30, of Aberdeen, was arrested Thursday night. Mr. Smith originated the virus, which caused worldwide e-mail disruption earlier this week, from his apartment in Aberdeen.Ms. Mr. Smith was snared with the help of America Online Inc. technicians and a computer task force composed of federal and state agents. No information was immediately available as to what charges Mr. Smith faces.The Melissa virus spread around the world last Friday and over the weekend, apparently having been uploaded to the Internet newsgroup alt.sex from a stolen America Online account. It affected personal computers that have Microsoft Corp._s Word software and its mail programs, Outlook or Outlook Express. Once activated by unwary users, the virus causes each PC to tap into the mail program_s address list and send 50 copies of a message containing a list of pornographic Web sites to e-mail addresses on that list, generating a flood of traffic that brought many corporate e-mail systems to a halt last Friday. The virus crafted a subject line for the e-mail that begins with "Important message from" followed by the name of the person who unwittingly passed on the message. The virus isn_t activated unless users call up a Word file, named "list.doc," that is attached to the mail message. A global hunt for the programmer responsible began soon after the virus began winging its way around the world. Computer researchers were soon hard at work tracing Melissa_s path and poring over the style of coding used by its author. Some of the earliest evidence in the hunt, ironically, came from an identification number generated by some versions of Word -- a feature that was the subject of harsh scrutiny from privacy advocates after its existence was brought to light last month.The identification numbers, called global unique identifiers (GUID), are generated by Word 97 and associated with specific documents. Though only one number is generated for each data file or Word document, sometimes virus creators work from someone else_s file rather than creating a new one. It is also possible for clever programmers to change a GUID to cast suspicion on a machine other than their own.There is ample reason for virus authors to cloak their identity: Knowingly transmitting a computer virus is a federal crime punishable by as much as 10 years in prison, depending on the amount of damage created.
Šaltinis: Internet
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Gemalto Teams Up with Venezuelan Bankcard Market Leaders to Accelerate EMV Migration

Gemalto teaming up with two banking technology leaders to help banks in Venezuela move to a new, high-tech smart credit card that will better protect their customers from fraud and identity theft. more »

Thanks to the new Bull supercomputer for the Jülich Research Center

The new Bull HPC-FF1 supercomputer with 100 Teraflops-capacity will host applications for the European Union Fusion community. more »

Gemalto reports fourth quarter and full year 2008 revenue

Gemalto, the world leader in digital security today announced its revenue for the full year and fourth quarter of 2008. more »

Wincor World 2009: keen interest in combined solution portfolio

Wincor World 2009, which was held in Paderborn from January 20 to 22, has once more proven to be the place where experts from retail banking and retailers gather, even in times of economic crisis. more »

Motorola Honored with Prestigious iF Product Design Award

Motorola Inc. announced it has been recognized with one of the world’s foremost industrial design honors, an iF product design award. more »

Parliament online this week: the key issues

The EU’s antiterrorism coordinator, Gilles de Kerchove, and Interpol representatives, will brief MEPs on Thursday about progress in combating terrorism. more »

Tesco, Poland's leading retail enterprise, awards service contract to Wincor Nixdorf

The Tesco retail chain in Poland has chosen Wincor Nixdorf to maintain its 4,600-strong estate of POS systems and servers from different vendors. more »

Gemalto Provides Kingdom of Bahrain with Additional One Million New-Generation e-ID Cards

Gemalto, the world leader in digital security, announces it will deliver an additional one million of its latest generation electronic ID cards for citizens and residents of the Kingdom of Bahrain. more »

China's Largest CAD/CAM Software Developer Selects Aladdin HASP SRM

CAXA increases sales and reduces costs with Aladdin HASP SRM. more »

OPT chooses Bull to launch innovative telecommunications services

Bull extends the deployment of Comptel Dynamic OSS, at the heart of the telco's information systems. more »