Path: utzoo!mnetor!uunet!husc6!mit-eddie!uw-beaver!cornell!batcomputer!itsgw!imagine!pawl23.pawl.rpi.edu!jesup
From: jesup@pawl23.pawl.rpi.edu (Randell E. Jesup)
Newsgroups: comp.misc
Subject: Re: Trojan Horse a Myth?
Message-ID: <129@imagine.PAWL.RPI.EDU>
Date: 7 Dec 87 07:00:47 GMT
References: <459@gtx.com> <22190@cca.CCA.COM>
Sender: news@imagine.PAWL.RPI.EDU
Reply-To: lunge!jesup@beowulf.UUCP
Organization: RPI Public Access Workstation Lab - Troy, NY
Lines: 14

In article <22190@cca.CCA.COM> g-rh@CCA.CCA.COM.UUCP (Richard Harter) writes:
>Other than inconvenience and loss of disk space, I don't know of deliberate
>harm.  I have seen a virus program on VM/CMS infect an entire system  -- the
>systems people spent an entire weekend rooting it out.  Does that count?

	There are viruses/Trojan horses in the micro world that do VERY
nasty things, like reformat ones hard drives, or destroy games with custom
boot code (by writing themselves over it).  And on the local mainframe,
one student once got peoples passwords and used their (funny, but hard to
replace) money.
     //	Randell Jesup			Lunge Software Development
    //	Dedicated Amiga Programmer	13 Frear Ave, Troy, NY 12180
 \\//	userb9zv@mts.rpi.edu MIGHT work	(518) 272-2942
  \/