Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!husc6!cca!g-rh From: g-rh@cca.CCA.COM (Richard Harter) Newsgroups: comp.misc Subject: Re: Trojan Horse a Myth? Message-ID: <22190@cca.CCA.COM> Date: Sun, 6-Dec-87 00:33:54 EST Article-I.D.: cca.22190 Posted: Sun Dec 6 00:33:54 1987 Date-Received: Thu, 10-Dec-87 22:42:44 EST References: <459@gtx.com> Reply-To: g-rh@CCA.CCA.COM.UUCP (Richard Harter) Organization: Computer Corp. of America, Cambridge, MA Lines: 26 In article <459@gtx.com> al@gtx.UUCP (Al Filipski) writes: > >It seems to me that the Professor is being quite naive. We all know >how easy it would be to create a Trojan Horse Program, and even, with a >little more difficulty, make it infect the user's system in subtle >ways. As for the question, "has anyone actually been hurt by one of >these?", I only know third-hand accounts. Can anyone relate a >first-hand account of damage done to his/her system by a malicious >Trojan Horse? > Other than inconvenience and loss of disk space, I don't know of deliberate harm. I have seen a virus program on VM/CMS infect an entire system -- the systems people spent an entire weekend rooting it out. Does that count? Should one count the time spent playing 'wheel wars' which often involves subtle use of trojan horses. It might be interesting if some of our now reformed readers regaled us with some of the more amusing tricks they played on their compatriots. [I remember slipping someone a trojan horse that printed out "Your account is exactly as you left it -- now" when he logged in. And, of course, when he checked it, it was.] -- In the fields of Hell where the grass grows high Are the graves of dreams allowed to die. Richard Harter, SMDS Inc.