Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 4127idx.qxd 6/19/02 5:53 PM Page 503 INDEX Note to the Reader: Throughout this index boldfaced page numbers indicate primary discus- sions of a topic. Italicized page numbers indicate illustrations. Symbols & Numbers ADfilter, 475 ADinf, 146 @nonymouse.com, 409 Adleman, Len, 7 9/11 Contributions hoax, 456 Adleman, Leonard M., 393 “100% Done! Safe recovery successful!” administrator account, attack using, 228 message, 119 ADP file extension, 26, 57 419 Fraud, 350 AdsGone, 470, 475 666test virus, 70, 110 AdSubtract, 470, 475 777 virus, 70 Advanced Rule Settings dialog box (Sygate 2014 virus, 52 Personal Firewall), 294–295, 295 Advanced Settings dialog box (Internet A Connection Firewall), 287, 287 advertising AAAZAO macro, 62 pop-up windows for, 466–472 AAAZFS macro, 62 removing banner and other from Web page, Aadcom, 368 473–476 ABC Banners, 474 spyware for, 366–368 Achilles’Shield and MailDefense, 146 Advertising Killer, 470, 475 Acoragil virus, 118 adware, 259–260, 366–368, 493 ActiveX, 10, 22, 68–69 companies, 368 configuration to prevent auto-run, 76–78 and P2P file swapping, 367 disabling scripting, 184 AIM (AOL Instant Messenger), 124 McAfee to block, 161 AirSnort, 272 from Web page, 29 algorithm, 493 Activis, 117 AltaVista AV Family Filter, 489 Ad-aware, 372, 373, 373–374 Altnet SecureInstall, 260 Ad Extinguisher, 475 COPYRIGHTED MATERIALuninstalling, 261 Ad Muncher, 475 Amazon.com AdDelete, 475, 476 attack on, 208 AdDesigner.com, 474 privacy policy, 315–316 address book user profiling, 312 digital IDs in, 395 America Online, e-mail blocking, 442–443, 443 virus spread by, 8 American Civil Liberties Union, 334 ADE file extension, 26, 57 Cyber-Liberties, 490 4127idx.qxd 6/19/02 5:53 PM Page 504 504 American Library Association Office of Intellectual Freedom • AVI file extension American Library Association Office of using, 149–164 Intellectual Freedom, 490 automatically running, 178 American Management Association, 321, 325 McAfee VirusScan, 157–164 “And finally I would like to say…” message, 60 Norton AntiVirus, 149–156 AnnaKournikova (VBS/SST) virus, 67, 75, 111 using multiple, 186 anonymity virus definition updates, 179–180 in communities, 415–416 importance, 167–168 in e-mailing, 411–413 in McAfee VirusScan, 163–164 in instant messaging, 414–415 in Norton AntiVirus, 156 in IRC, 415 AOL Instant Messenger, 251–252, 256 in newsgroups, 414 Apple Learning Interchange, 489 in Web surfing, 406–411 Applebee’s Gift Certificates hoax, 457 Anonymize.net, 409, 412, 414, 415 Ask Jeeves for Kids, 489 Anonymizer.com, 409, 410, 410–411 assault, with Internet-based attacks, 218 anonymizers, 332, 406, 493 Atom virus, 57 how they work, 407, 407 Atomic virus, 57 popular sites, 409–410 attachments to e-mail, 15, 23 as proxy server, 407–408 avoiding unrequested, 174–175 Anonymizers.com, 409 opening in Eudora, 115, 116 Anonymous Newsfeed, 414 risk from, 30, 33, 94, 107 Anonymous.To, 412 scanning by antivirus software, 180 ANT 4 MailChecking, 446 treatment of, 111–112 anti-spam software, 446 attack by virus. See computer viruses AntiCode Archives, 229 auction fraud online, 342–348 Antigen, 170 protection on eBay, 344–348 AntiOnline InfoSec Mailing List, 229 types, 343–344 AntiOnline.com, 222 audio files, 26 AntiPopUp, 470 on Web sites, 479 AntiSniff, 301 Audiogalaxy, 253, 257, 367 antispy software, 372 authentication, 493. See also digital ID antivirus software, 16, 138–164, 493 with biometrics, 403 benefits from virus reports, 37 racing, 231–232 commercial programs, 140–145 Authenticode software, 400 e-mail scanning, 112 Auto-DCC-Get mIRC feature, 118 ease of use, 178 disabling, 94, 122 features to look for, 138–140 auto-execute macros, 56, 493 online services, 147–148 Auto-Protect feature of Norton AntiVirus, problem resolution with, 149 152–153, 153 quarantined file analysis and repair, automatic execution of macros, disabling, 184 155–156 avast!, 146 shareware and freeware, 146–147 AVG Professional Edition, 140, 141 Trojan horses pretending to be, 84 AVI file extension, 26 4127idx.qxd 6/19/02 5:53 PM Page 505 Babylonia virus • BrowseSafe 505 B behavior analysis, 171, 171–172 Bell Labs, 6 Babylonia virus, 71, 110 Better Business Bureau, 341 Back Orifice, 87, 88, 119 BHO (browser helper object), 367, 494 backdoor, 493 BHO Cop, 372 backdoor software, for Internet-based attacks, 215 bidding on eBay, 346–348 BackDoor-Sub7 Trojan, 87 BidPay, 339 backdoor Trojan horses, 85, 86–87, 493 “bill caricature” e-mail subject, 99–100 and data-driven attack, 235 “Bill Gates is guilty of monopoly” message, Netstat addresses for, 93 73–74 Netstat utility to search for, 91–93 biological virus, 5 Background Check Gateway, 329 biometrics, 493 background operation of McAfee VirusScan, 160 for authentication, 403 BackTrace feature, in Sygate Personal blackhole lists, 426, 493 Firewall, 292 BlackICE PC Protection, 281, 282 backtracing software, 221, 303, 493 block lists, 433, 493 backup files, 16, 182, 245 blocking banner ads, 474–476 backdoor programs in, 303 Bloodhound feature in Norton, 153, 167 managing, 271 Blue Mountain Cards hoax, 129 restoring, 199 BMP file extension, 26 Backup Plus, 182 BOClean, 95 Badman Trojan, 87 BoDetect, 146 Badtrans worm, 14, 88–89, 97–98, 110 boot process of computer, 43, 43 banner ads, 493 virus effect on, 44 blocking, 474–476 boot sector, 493 creating, 474 boot sector viruses, 6, 9, 42–47, 493 how they work, 474 common examples, 45–46 types, 473, 473–474 current risk, 46 Banner Zapper, 475 detection, 46 BannerSwap, 474 how they work, 42–45 BAS file extension, 26 protection against, 47 BAT file extension, 25, 26 removal, 46–47 Bat worm, 119 boserve.exe, 88 batch files, 25, 493 Bounce, 486, 486 BBBOnline, 319 Brain virus, 7 BeanHive virus, 71 Break the Chain, 461 BearShare, 260, 367 Brightmail, 447 behavior Brilliant Digital Entertainment, 260, 368 moderately safe, 29–31 uninstalling software, 261 overreaction, 37–39 browser. See Web browser risky, 31–34 browser helper object (BHO), 367, 494 very safe, 28–29 BrowseSafe, 484 4127idx.qxd 6/19/02 5:53 PM Page 506 506 Brunner, John • CNN.com, attack on Brunner, John, The Schockwave Rider, 97 hoaxes, 456–459 brute-force password crack, 389 scams, 460–461 BubbleBoy virus, 71, 98, 110 urban legends, 459–460 buffer overflow, 229, 494 chat. See instant messaging bulletin board services, 7 chat and instant messaging viruses, 11, 24, bullying and flaming, 355–356 117–122 Buy.com, attack on, 208 risk from, 31, 33–34 chat channel, 494 Chernobyl virus, 50 C Child Abducted from Sam’s Club urban cabinet (CAB) files, 202 legend, 459 cable connection, and risk of attack, 219, 239 children caching Web pages on proxy server, 268 content filtering of Web sites, 482–483 California hoax, 132 as cracker, 212 Canter, Laurence, 431 hoaxes involving, 458 Carey, Allan, 309 online predators, 358–361 Carnivore software, 331–332, 368–371, 494 protection against, 360–362 how it works, 369 risk from, 358–359 case sensitivity in passwords, 390 privacy for, 313–314 cashier’s checks for eBay payment, 346, 347 search sites for, 489 CASPER virus, 50 Web browsers for, 485–486 catching a virus. See computer viruses, Children’s Internet Protection Act, 490 transmission process Children’s Online Privacy Protection Act, 313 CD-ROMs Choke worm, 124 from Microsoft, macro viruses in, 56 Cisco, 285 purchasing for addresses, 438 Class Project hoax, 458 Celent Communications, 339 The Cleaner, 95 censorship, vs. content filtering, 490 cleaning infected files, 196–198 censorware, 494 in McAfee VirusScan, 161 Censorware Project, 490 of specific viruses, 198 Center for Digital Democracy, 334 clear GIFs, 477, 494 Center for Internet Studies, 321 click-through, 474, 494 Center for Media Education, 313 ClickTillUWin program, 260, 368 Cerasale, Jerry, 451 client/server computing, 251 CERT Coordination Center, 222, 303 climateprediction.com, 255 certificate authority, 494 closing files, and virus damage, 62 certificate store, 494 CMD file extension, 26 chain letters, 430–431, 454–455, 494 CMOS settings, 35–36 dealing with, 461 CNET, 32 information about, 461 Download.com, 181 types, 455–461 News.com, 185 classic chain, 455 CNN.com, attack on, 208 4127idx.qxd 6/19/02 5:53 PM Page 507 Coalition Against Unsolicited Commercial Email • computer viruses 507 Coalition Against Unsolicited Commercial Email, minimal measures, 189–190 334, 428 moderate measures, 179–185 code signature of virus, 138, 494 vs. biological virus, 5 CodeRed virus, 98 dangers, 4–5 costs, 5 and data-driven attack, 235 impact, 4 finding new, 167 Colors virus, 57 history, 6–8 COM file extension, 25 vs. hoaxes, 133–134 and virus spread, 20 how they work, 5–6 Comet Cursor, 479 infected file possibilities, 25–28 Command AntiVirus, 140, 142 life cycle, 12 Command on Demand, 147–148 rate of increase, 166 common sense, 246 recognition of infection, 35–37 Communications Decency Act, 490 response to attack, 37–39 communities, anonymity in, 415–416 cleaning system, 196–198 Compact Flash cards, and virus spread, 21 disaster preparation, 192–193 companies. See corporations immediate response, 193–196 companion viruses, 48, 494 restoring system, 198–202 complacency, and Internet-based attacks, 219 risks, 28–34 compressed files assessment, 34–35 content filtering and, 170 moderately safe behavior, 29–31 scanning by antivirus software, 144 risky behavior, 31–34 computer very safe behavior, 28–29 boot process, 43, 43 threat from new, 166 spyware to monitor activity, 364–366 heuristic scanning and, 169–172 surveillance by employer, 323 integrity checking and, 168, 168–169 Computer
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Coronavirus Community Member Survey Appendix
    Billings Community Coronavirus Assessment CORONAVIRUS COMMUNITY MEMBER SURVEY APPENDIX December 2020 AmeriCorps VISTAs: Blake Matthew & Amber Nichols Page 1 of 173 V12/14/202020 INDEX Q1. How has the coronavirus pandemic impacted you and/or your family since April 1, 2020? Check all that apply. 3 Q2. To what degree were/are you and or your family impacted by the following? 9 Q3. If you lost income, or lost your job, what is/was your job title or job type? 12 Q5. To what degree do you have a support system in each of the following areas? 19 Q7. How aware are you of the following resources available through the State of Montana? 20 Q8. Please provide the degree to which you and your family have CURRENT access to the following resources. 21 Q9. Did you, or anyone in your household, apply for public assistance BEFORE April 1, 2020? 22 Q10. Did you, or anyone in your household, apply for public assistance AFTER April 1, 2020? 23 Q13. Did your total household members, or household makeup, change AFTER April 1, 2020? 24 Q14. Please share the race / ethnicity with which you and your household members identify. Please select the number of household members in each race(s) line AND select yes or no within the Hispanic or Latino column. 30 Q19. What is your household's greatest need relative to the coronavirus pandemic? 31 Q20. What do you believe is the Billings community's greatest need related to the coronavirus pandemic? 79 Q21. Is there anything else you would like to say regarding coronavirus impact(s) or how the Billings community should respond? 134 Page 2 of 173 V12/14/202020 CORONAVIRUS COMMUNITY MEMBER SURVEY Community Comments from Survey Questions This document contains comments from the Coronavirus Community Member Survey of Fall 2020.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Way of the Ferret: Finding and Using Resources on the Internet
    W&M ScholarWorks School of Education Books School of Education 1995 Way of the Ferret: Finding and Using Resources on the Internet Judi Harris College of William & Mary Follow this and additional works at: https://scholarworks.wm.edu/educationbook Part of the Education Commons Recommended Citation Harris, Judi, "Way of the Ferret: Finding and Using Resources on the Internet" (1995). School of Education Books. 1. https://scholarworks.wm.edu/educationbook/1 This Book is brought to you for free and open access by the School of Education at W&M ScholarWorks. It has been accepted for inclusion in School of Education Books by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. DOCUMENT RESUME IR 018 778 ED 417 711 AUTHOR Harris, Judi TITLE Way of the Ferret: Finding andUsing Educational Resources on the Internet. SecondEdition. Education, Eugene, INSTITUTION International Society for Technology in OR. ISBN ISBN-1-56484-085-9 PUB DATE 1995-00-00 NOTE 291p. Education, Customer AVAILABLE FROM International Society for Technology in Service Office, 480 Charnelton Street,Eugene, OR 97401-2626; phone: 800-336-5191;World Wide Web: http://isteonline.uoregon.edu (members: $29.95,nonmembers: $26.95). PUB TYPE Books (010)-- Guides -Non-Classroom (055) EDRS PRICE MF01/PC12 Plus Postage. Mediated DESCRIPTORS *Computer Assisted Instruction; Computer Communication; *Educational Resources;Educational Technology; Electronic Mail;Information Sources; Instructional Materials; *Internet;Learning Activities; Telecommunications; Teleconferencing IDENTIFIERS Electronic Resources; Listservs ABSTRACT This book is designed to assist educators'exploration of the Internet and educational resourcesavailable online. An overview lists the five basic types of informationexchange possible on the Internet, and outlines five corresponding telecomputingoptions.
    [Show full text]
  • Hoax and Fake News During Covid-19: Is the Law Effective in Overcoming It?
    REVIEW ARTICLE HOAX AND FAKE NEWS DURING COVID-19: IS THE LAW EFFECTIVE IN OVERCOMING IT? Khoirum Lutfiyah Independent Center for Law and Technology Studies, Yogyakarta Indonesia Email: [email protected] The world is currently experiencing a pandemic due to a new virus. This virus, called Corona, attacks the respiratory system in humans. Symptoms experienced if infected with the Corona virus (COVID-19) in the form of flu, dry cough, high fever, and shortness of breath. A bad result of contracting the corona virus is that it can cause death. Corona virus can affect anyone, especially in people who have weak body immunity. In matters of emergency like this, it turns out that it is still a person who exploits it by spreading false or fake news. The elements, making lies and then spread through social media, such as Facebook, Instagram, Twitter and the like. They spread hoaxes with a fad. Resulting in people becoming panicked and worried about the corona virus. Hoax news is news that is not necessarily true and its source is not necessarily valid. In this event, the role of government is needed for the community. Persons who spread false news will be charged with Law Number 11 Year 2008 regarding Information and Electronic Transactions as Sanctions imposed on them. Keywords: Corona Virus; Hoax News; Government’s Role I. INTRODUCTION In modern times like today, all technology has become increasingly sophisticated. The information system that can be obtained by the public The Indonesian Journal of International Clinical Legal Education DOI: https://doi.org/10.15294/ijicle.v2i3.38422 Submitted: April 11, 2020 Revised: May 30, 2020 Accepted: June 21, 2020 Available online at https://journal.unnes.ac.id/sju/index.php/iccle © 2020 Authors.
    [Show full text]
  • Computer Virus Tutorial
    Computer Virus Tutorial Computer Virus Tutorial License Copyright 1996-2005, Computer Knowledge. All Rights Reserved The Computer Knowledge Virus Tutorial is a copyright product of Computer Knowledge. It also contains copyrighted material from others (used with permission). Please honor the copyrights. Read the tutorial, learn from the tutorial, download and run the PDF version of the tutorial on your computer, link to the tutorial. But, please don't copy it and claim it as your own in whole or part. The PDF version of the Computer Knowledge Virus Tutorial is NOT in the public domain. It is copyrighted by Computer Knowledge and it and all accompanying materials are protected by United States copyright law and also by international treaty provisions. The tutorial requires no payment of license fees for its use as an educational tool. If you are paying to use the tutorial please advise Computer Knowledge (PO Box 5818,www.co-bw.com Santa Maria, CA 93456 USA). Please provide contact information for those charging the fee; even a distribution fee. License for Distribution of the PDF Version No royalties are required for distribution. No fees may be charged for distribution of the tutorial. You may not use, copy, rent, lease, sell, modify, decompile, disassemble, otherwise reverse engineer, or transfer the licensed program except as provided in this agreement. Any such unauthorized use shall result in immediate and automatic termination of this license. In no case may this product be bundled with hardware or other software without written permission from Computer Knowledge (PO Box 5818, Santa Maria, CA 93456 USA).
    [Show full text]
  • INFOSEC UPDATE 2001 Student Workbook Norwich University Eprotectit Conference March 21-22, 2001
    INFOSEC UPDATE 2001 Student Workbook Norwich University eProtectIT Conference March 21-22, 2001 M. E. Kabay, PhD, CISSP Security Leader, AtomicTangerine, Inc. [email protected] Category 11 Breaches of confidentiality Page 1 Copyright © 2001 M. E. Kabay. All rights reserved. INFOSEC UPDATE WORKSHOP -- March 20-21, 2001 11 Breaches of confidentiality 2000-02-06 Keywords: bank financial system leak confidentiality windfall investors market RISKS Vol 20 # 78 An error at the Reserve Bank of Australia caused e-mail to be sent to 64 subscribers of the bank's alert service informing them of a planned 0.5% increase in the prime interest rate. However, the message was sent out six minutes early, allowing some of those traders to sell A$3B of treasury bill and bond futures -- and making some people a great deal of money. 2000-02-06 Keywords: confidentiality human factors workstations home computer Web browsing RISKS, New York Times <http://www.nytimes.com/yr/mo/day/news/washpol/cia-impeach- deutch.html > Vol 20 # 78 The former director of the CIA, John Deutch, kept thousands of highly classified documents on his unsecured home Macintosh computer. Critics pointed out that the system was also used for browsing the Web, opening the cache of documents up to unauthorized access of various kinds. Category 11 Breaches of confidentiality Page 2 Copyright © 2001 M. E. Kabay. All rights reserved. INFOSEC UPDATE WORKSHOP -- March 20-21, 2001 2000-02-20 Keywords: confidentiality Web site RISKS, CNet < http://news.cnet.com/category/0-1005-200-1550948.html > Vol 20 # 80 H&R Block had to shut down its Web-based online tax-filing system after the financial records of at least 50 customers were divulged to other customers.
    [Show full text]
  • Antivirus HAX! Presented by Ehab Hussein Synapse Malware Research Team : Sofiane Talmat (Algeria) Ehab Hussein (Egypt) Saadtalaat (Egypt) Amr Thabet (Egypt)
    AntiVirus HAX! Presented by Ehab Hussein Synapse Malware research team : Sofiane Talmat (Algeria) Ehab Hussein (Egypt) SaadTalaat (Egypt) Amr Thabet (Egypt) http://www.synapse-labs.com [email protected] Synapse Intro History AV Detection Techniques Bypassing Sophos :) Demo Student Bounty Challenge $$$ http://www.synapse-labs.com [email protected] Security Corporate Services Services Solution Development Trainings http://www.synapse-labs.com [email protected] Viruses don't harm, ignorance does! « The Evolution of malware within the last ten years is described by the evolution of people who develop that » (Eugene kaspersky) http://www.synapse-labs.com [email protected] http://www.synapse-labs.com [email protected] – 1948 – 1966 (First theroical Approach) John von Neumann « Theory of self-reproducing automata » http://www.synapse-labs.com [email protected] – 1971 (First Worm) Robert (Bob) H. Thomas (BBN technologies) "I'm the creeper, catch me if you can!" Machine : PDP-10 System : TENEX Transport : ARPANET was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. Funded by Darpa http://www.synapse-labs.com [email protected] WORM http://www.synapse-labs.com [email protected] TROJAN HORSE http://www.synapse-labs.com [email protected] – 1974/1975 (First Trojan Virus) John Walker « ANIMAL » UNIVAC 1108 http://www.synapse-labs.com [email protected] – 1982/1982 (First microcomputer Virus) Rich Skrenta « Elk Cloner » Apple II Boot Sector http://www.synapse-labs.com [email protected] BOOT SECTOR http://www.synapse-labs.com [email protected] – 1986 (First IBM-PC Virus) Basit & Amjad Farooq Alvi « Brain Boot Sector » « Pakistan Flu » « Lahore » http://www.synapse-labs.com [email protected] – 1986 (First File Infector Virus) VirDem Ver.: 1.06 (Generation #) aktive.
    [Show full text]