Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!husc6!cca!g-rh
From: g-rh@cca.CCA.COM (Richard Harter)
Newsgroups: comp.misc
Subject: Re: Trojan Horse a Myth?
Message-ID: <22190@cca.CCA.COM>
Date: Sun, 6-Dec-87 00:33:54 EST
Article-I.D.: cca.22190
Posted: Sun Dec  6 00:33:54 1987
Date-Received: Thu, 10-Dec-87 22:42:44 EST
References: <459@gtx.com>
Reply-To: g-rh@CCA.CCA.COM.UUCP (Richard Harter)
Organization: Computer Corp. of America, Cambridge, MA
Lines: 26

In article <459@gtx.com> al@gtx.UUCP (Al Filipski) writes:
>
>It seems to me that the Professor is being quite naive.  We all know
>how easy it would be to create a Trojan Horse Program, and even, with a
>little more difficulty, make it infect the user's system in subtle
>ways.  As for the question, "has anyone actually been hurt by one of
>these?", I only know third-hand accounts.  Can anyone relate a
>first-hand account of damage done to his/her system by a malicious
>Trojan Horse?
>

Other than inconvenience and loss of disk space, I don't know of deliberate
harm.  I have seen a virus program on VM/CMS infect an entire system  -- the
systems people spent an entire weekend rooting it out.  Does that count?

Should one count the time spent playing 'wheel wars' which often involves
subtle use of trojan horses.  It might be interesting if some of our now
reformed readers regaled us with some of the more amusing tricks they played
on their compatriots.  [I remember slipping someone a trojan horse that
printed out "Your account is exactly as you left it -- now" when he logged
in.  And, of course, when he checked it, it was.]
-- 

In the fields of Hell where the grass grows high
Are the graves of dreams allowed to die.
	Richard Harter, SMDS  Inc.