Path: utzoo!mnetor!uunet!husc6!mit-eddie!uw-beaver!cornell!batcomputer!itsgw!imagine!pawl23.pawl.rpi.edu!jesup From: jesup@pawl23.pawl.rpi.edu (Randell E. Jesup) Newsgroups: comp.misc Subject: Re: Trojan Horse a Myth? Message-ID: <129@imagine.PAWL.RPI.EDU> Date: 7 Dec 87 07:00:47 GMT References: <459@gtx.com> <22190@cca.CCA.COM> Sender: news@imagine.PAWL.RPI.EDU Reply-To: lunge!jesup@beowulf.UUCP Organization: RPI Public Access Workstation Lab - Troy, NY Lines: 14 In article <22190@cca.CCA.COM> g-rh@CCA.CCA.COM.UUCP (Richard Harter) writes: >Other than inconvenience and loss of disk space, I don't know of deliberate >harm. I have seen a virus program on VM/CMS infect an entire system -- the >systems people spent an entire weekend rooting it out. Does that count? There are viruses/Trojan horses in the micro world that do VERY nasty things, like reformat ones hard drives, or destroy games with custom boot code (by writing themselves over it). And on the local mainframe, one student once got peoples passwords and used their (funny, but hard to replace) money. // Randell Jesup Lunge Software Development // Dedicated Amiga Programmer 13 Frear Ave, Troy, NY 12180 \\// userb9zv@mts.rpi.edu MIGHT work (518) 272-2942 \/