• Contents Announcements

• Contents Announcements

I I ewsletter t l Contents Announcements 1 • • Announcements • Hewlett-Packard Font Changes Hewlett-Packard Font Changes ...• 45 The One Constant is Change ...... .45 Hewlett-Packard recently announced changes concerning LaserJet Sticker Shock ....................•....... 53 printer cartridges. For more information on these changes, see Help Wanted .............................. 53 the Book Center Notes column. + Reviews and Services • The One Constant Is Change Virus Update .............................. 46 Here is a test to help you keep past and future microcomputer SoftPC ...................................... 47 changes in perspective and to test your knowledge of happenings Columns in the microcomputer world in the last decade. Match happenings Ma Micro Notes: from column A with their year in column B (answers on page 53). Virus-Checker Column A Column B for IBM-compatibles .......... 51 1. Borland releases Turbo Pascal for DOS: 198_. 1. 1981 Site License Forum: 2. Microsoft ships Windows: 198_. 2. 1981 UNIX Users: Upgrade Notice ... 52 3. IBM introduces the PC; it uses the DOS operating Book Center Notes: system, 5.25-inch 160K (single-sided) floppy 3. 1982 While Supplies Last drives, and an 8088 CPU: 198_. 4. 1982 Mac Memory Upgrades ..•.. 54 4. IBM announces the XT, an "extended" PC, with a 5. 1982 Mathematica .................... 54 built-in 10 megabyte hard disk: 198_. Thunderscan .................... 54 5. IBM introduces the AT, an "advanced" PC, with an 6. 1983 H-P Font Changes 80286 CPU: 198_. 7. 1983 6. IBM announces the PS/2 line that come standard Microsoft Z and #C02 ....... 55 with 3.5-inch floppy drives. Some PS/2s use the 8. 1984 Other Old Cartridges ......... 55 Micro Channel Architecture: 198_. 9. 1984 Replacement Cartridges .... 55 7. IBM discontinues the IBM XT and AT: 198_. And Books, Too .......................... 55 8. IBM ships OS/2 version 1.1: 198_. 10. 1984 9. Apple introduces the Macintosh; it has a 3.5-inch, 1984 The Microcomputer Newsletter is published monthly 11. 400K (single-sided) floppy drive and 128K of by the Microcomputer and Workstation Networks Center (a/k/a Microcomputer Center) with funds RAM: 198_. 12. 1985 provided by the Minnesota Book Center. The 10. Apple announces the Macintosh II, a 68020- 13. 1985 University of Minnesota is committed to the policy based machine: 198_. 14. 1985 that all persons should have equal access to its 11. Apple introduces the LaserWriter with a built-in programs, facilities, and employment without regard PostScript controller: 198_. 15. 1986 to race, religion, color, sex, national origin, handi­ 12. Compaq announces its first portable: 198_. cap, age, veteran status, or sexual orientation. 13. Compaq releases the Deskpro 386; it has an 16. 1987 Direct comments and subscription cancellations, 80386 CPU: 198_. changes, and additions to the editors at the 17. 1987 14. Hewlett-Packard introduces the LaserJet: 198_. address on the closing page. This newsletter is an 18. 1987 15. Rrst 80486 systems shown: 198_. information resource for the University of Minne­ sota; subscriptions are free but are mailed only 16. University of Minnesota initiates Microcomputer 19. 1988 within U.S. Discount Program: 198_. 17. MicroPro ships Wordstar for the Apple II: 198_. The Microcomputer Newsletter does not represent 20. 1989 18. Lotus announces 1-2-3 for the IBM PC: 198_. any manufacturer, distributor, or retail outlet, and 19. WordPerfect for DOS released: 198_. we cannot be responsible for any error or change in price, description, or availability with respect to any 20. Aldus announces Page Maker for the Macintosh; product or service. documents have a 16-page limit: 198_. (... ANNOUNCEMENTS CONTINUED ON....................... PAGE 53 a virus hiding in the operating system can find out about it. Virus Update The virus can then insert a copy of itself into the program being opened. The next time that infected program is Since a new Macintosh virus has made its debut at the started, its copy of the virus can look around for other University of Minnesota in the past month, it's time to talk programs or operating systems to infect, and so on. One about viruses again. IBM-compatible users may want to implication of this replication strategy is that non­ read the OPerview and Protecting Yourself sections below, executable data files (such as word-processing documents) and then tum to MaMicro Notes on page 51 to learn are "immune" to infection by viruses. about VIRSCAN. In the past, one strategy for protecting machines from The new Macintosh virus is called WDEF, and its method infection was to keep all executable programs (software of operation is considerably different from that used by applications) on locked disks, and to keep data files on previous Macintosh viruses. separate, unlocked disks. If a disk is locked, nothing can be written to the disk, so a Overview virus cannot write a copy of itself into a Generally, computer viruses, like flu program on that disk. Thus you could viruses, impose annoying but not life save data files on the unlocked disks, threatening complications on your life. while the programs used to create Computer viruses are small programs those files were safe from infection. whose prime objective is to go forth and multiply. Left unchecked The new WDEF virus uses a differ­ computer viruses can reproduce ent replication strategy. Instead of themselves at least once on every infecting programs, it writes a copy disk with which they come in of itself into a specialized Macintosh contact. Although most computer file call the Desktop file (the Macintosh viruses are not malicious, they cannot Finder uses the Desktop file to manage coexist with some applications; and as icons on the Desktop). The Desktop the viruses spread, their incompati­ file is so specialized it is invisible; it bilities show up as weird behavior by has no icon. Vrrtually every Macin­ previously well-behaved software. tosh disk, whether or not the disk Potentially, viruses can crash your contains executable code, has this computer's hard disk, forcing you to invisible Desktop file. This means that rebuild the information on it. Because WDEF can travel on a "data-file-only" of this potential, you should practice safe disk just as easily as on a program disk. computing and stamp out infections as soon as Once WDEF infects a disk, inserting it into you notice them. another machine spreads the infection to other disks attached to or inserted into that machine. The Dealing with an infection is relatively simple; just delete the WDEF virus can spread even if you do not open anything. infected files and replace them with clean copies. Of course, by the time you realize that the virus has infected Although the WDEF virus apparently is not intended to do your files, the damage is done, and you may have lost a lot any harm, some bugs in the virus cause it to do nasty of your hard work. An understanding of viruses' methods things. WDEF causes both the Macintosh Ilci and the of operation, together with some simple tools and precau­ Portable to crash; it can severely degrade performance of tions, can protect you from the damage caused by viral AppleShare file servers; it may crash a Macintosh when an infection. attempt is made to save a file under MultiFinder; and it may damage disks, forcing you to reformat them to make Old vs. New: How They Work them usable again. Older Macintosh viruses, such as nVIR and Scores, travel from machine to machine by inserting copies of themselves Protecting Yourself into programs such as MacWrite or MacPaint (executable In order to protect yourself from viruses, you must follow machine code) on a disk. They generally target the some basic precautions. operating system software of a computer first. Once the virus has infected the operating system, it is in the perfect Be a Backup Fanatic position to infect other programs. When you start up First and foremost, back up all information that you cannot spreadsheet or word processing software, the operating afford to lose onto floppy disks (or other media) on a system does the work of loading the program, allocating regular basis. At a minimum, you should do a backup once memory for it, etc. Thus, every time you open a program, !r ' every week. If you have backups of all of your work, To rebuild the Desktop file on a floppy disk, you must be replacing damaged files is relatively easy. in the Finder. Hold down the 00 and [Option) keys as you insert the disk, and click the OK button when you see a Lock Your Disks message similar to the one in Figure 1. Second, when you purchase new software, lock the disks as soon as you take them out of the package and make copies Figure 1: Hold down the 00 and [Option) keys I of the disks for use. Always keep original disks locked. This to get this message. ) way, you will always have an uninfected copy of a program if you need to replace an infected one. To lock any 3.5- Are you sure you want the desktop inch disk, slide the little black rectangle in the upper right rebuilt on the disk "600 RH'"7 (This may take a few minutes.) l corner of the disk up, so that the hole is open. e-a-... tt ,...---.. ( OK J (Cancel ) t Beware of the Trojan Horse Third, do not use pirated software or disks "borrowed" from someone else. Aside from the fact that using pirated software is illegal, using only legitimate copies of locked Lastly, the Mac Information server has new versions of two l original disks greatly reduces the risk of viral infection. virus-checker programs that can find the WDEF virus.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us