skip to main content
editorial
Free Access

Some notes on malware

Published:01 August 2005Publication History

Abstract

No abstract available.

References

  1. 1 These review materials were prepared for students in the undergraduate and graduate programs in information assurance at Norwich University. I hope that they will be helpful to other instructors and to the general reader. For free access to additional teaching materials see my Web site at http://www2.norwich.edu/mkabayGoogle ScholarGoogle Scholar
  2. 2 Associate Professor, Information Assurance & Program Director, Master of Science in Information Assurance, Division of Business & Management, Norwich University, Northfield, VT 05663-1035 USA. mailto: mkabay "at" norwich "dot" eduGoogle ScholarGoogle Scholar
  3. 3 Gerrold, D. (1972). When HARLIE was One. Republished 1988 by Spectra Books (ISBN 0-553-26465-6). AMAZON link http://tinyurl.com/dxztw.Google ScholarGoogle Scholar
  4. 4 See "A taste of computer security: Viruses" http://kernelthread.com/publications/security/viruses.htmlGoogle ScholarGoogle Scholar
  5. 5 Brunner, J. (1975). Shockwave Rider. Republished 1995 by Del Rey (ISBN 0-345-46717-5). AMAZON link http://tinyurl.com/9s5jv Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Smith, G. Crypt Newsletter. Review of James Adam's 1998 book The Next World War. http://www.soci.niu.edu/~crypt/other/adams.htmGoogle ScholarGoogle Scholar
  7. 7 The number on the WildList for May 2005 was 569 on the main list and 3255 for all sightings. See http://www.wildlist.org/Google ScholarGoogle Scholar
  8. 8 For a good list of reputable vendors, see the Anti-Virus Product Developer's Consortium run by ICSA Labs (for which I was Director of Education from 1991 to 2000) at http://www.icsa.net/html/communities/antivirus/avpdmembers.shtml.Google ScholarGoogle Scholar
  9. 9 Bullfinch, T. (1855). The Age of Fable. Now part of Bullfinch's Mythology. Modern Library Edition, Random House (c. 1940, no ISBN). P. 185. Currently available edition as Modern Library Paperback; AMAZON link http://tinyurl.com/7c46v.Google ScholarGoogle Scholar
  10. 10 Kabay, M. E. (2005). INFOSEC Year in Review. See http://www2.norwich.edu/mkabay/iyir for details and instructions on downloading this free database. PDF reports are also available for download.Google ScholarGoogle Scholar
  11. 11 Tate, C. (1994). Hardware-borne Trojan Horse programs. RISKS 16.55 "http://catless.newcastle.ac.uk/Risks/16.55.html#subj3Google ScholarGoogle Scholar
  12. 12 Internet Movie Database entry at http://www.imdb.com/title/tt0083866/Google ScholarGoogle Scholar
  13. 13 http://grc.com/optout.htmGoogle ScholarGoogle Scholar
  14. 14 Gibson, S. (2005). The ethics of anonymous surveillance for profit. http://grc.com/oo/ethics.htmGoogle ScholarGoogle Scholar
  15. 15 Center for Democracy and Technology: Spyware. http://www.cdt.org/privacy/spyware/Google ScholarGoogle Scholar
  16. 16 http://www.simplythebest.net/info/spyware.htmlGoogle ScholarGoogle Scholar
  17. 17 Livingston, B. (2005). Anti-adware misses most malware. WindowsSecrets. http://windowssecrets.com/050127/Google ScholarGoogle Scholar
  18. 18 AOL/NCSA Online Safety Study http://www.staysafeonline.info/news/safety_study_v04.pdfGoogle ScholarGoogle Scholar
  19. 19 NCSA (Security) http://www.staysafeonline.info/Google ScholarGoogle Scholar
  20. 20 http://www.didtheyreadit.comGoogle ScholarGoogle Scholar
  21. 21 Glassman, M. (2004). Who got the message? There's a way to know. New York Times. http://www.nytimes.com/2004/06/03/technology/circuits/03spyy.htmlGoogle ScholarGoogle Scholar
  22. 22 http://www.msgtag.comGoogle ScholarGoogle Scholar
  23. 23 http://www.readnotify.com/Google ScholarGoogle Scholar
  24. 24 Kabay, M. E. (20004). HTML e-mail not worth the risk. Network World Fusion. http://www.nwfusion.com/newsletters/sec/2004/0517sec1.htmlGoogle ScholarGoogle Scholar
  25. 25 http://www.wizard-industries.com/trackingblocker.htmlGoogle ScholarGoogle Scholar
  26. 26 http://www.emailaddressmanager.com/email_sentinel.htmlGoogle ScholarGoogle Scholar
  27. 27 For overviews of the scumware problem, see http://www.thiefware.com/http://office.microsoft.com/assistance/2002/articles/oQuickSmartTags.aspxhttp://news.cnet.com/news/0-1003-200-6210768.html?tag=mn_hdhttp://www.alistapart.com/stories/smarttags/http://scumware.com/press.htmlGoogle ScholarGoogle Scholar
  28. 28 Administrator (2003). How Surf+ works. http://tinyurl.com/4mf25Google ScholarGoogle Scholar
  29. 29 See eZula's description at http://www.ezula.com/TopText/TopText.asp and compare the critical analysis at http://www.doxdesk.com/parasite/TopText.htmlGoogle ScholarGoogle Scholar
  30. 30 Searle, G. (2001). New technology for sneaky advertising. RISKS 21.47 http://catless.ncl.ac.uk/Risks/21.47.html#subj8Google ScholarGoogle Scholar
  31. 31 Martin, M. (2003). Gater eWallet. http://tinyurl.com/5cy3rGoogle ScholarGoogle Scholar
  32. 32 "jcokos" (2003). Scumbag: Gator / Claria http://tinyurl.com/79vycGoogle ScholarGoogle Scholar
  33. 33 Spector, L. (2002). Invasion of the browswer snatchers. http://www.pcworld.com/news/article/0,aid,84464,tk,dnWknd,00.aspGoogle ScholarGoogle Scholar
  34. 34 Arnold, J. (2001). Office XP modified what you type. http://catless.ncl.ac.uk/Risks/21.42.html#subj12Google ScholarGoogle Scholar
  35. 35 http://www.newsscan.comGoogle ScholarGoogle Scholar
  36. 36 Brent, G. (2002). Excel cut-and-pasting behavior. RISKS 21.88 http://catless.ncl.ac.uk/Risks/21.88#subj10Google ScholarGoogle Scholar
  37. 37 The behavior described was still true for Excel 2002 (Excel "XP") version 10.6501.6735 SP3 running in July 2005.Google ScholarGoogle Scholar
  38. 38 Olsen, S. (2001). Nobody's going to skin this Gator. Cnet http://news.com.com/2008-1082-272563.html?legacy=cnetGoogle ScholarGoogle Scholar
  39. 39 Featherly, K. (2001). Gator chomps first, sues Internet Advertising Bureau. BizReport http://www.bizreport.com/news/1990/Google ScholarGoogle Scholar
  40. 40 The IAB press release was originally at http://www.iab.net/news/content/08_28_01.html but is no longer on the Web at that URL. I checked GOOGLE again in July 2005 but could not locate the original statementGoogle ScholarGoogle Scholar
  41. 41 See also the dated but still useful and interesting course Cyberspace Law for Non-Lawyers by law professors Larry Lessig, David Post and Eugene Volokh from the mid-1990s; archived at http://www.eff.org/legal/CyberLaw_Course/Google ScholarGoogle Scholar
  42. 42 Al Fasoldt has an excellent set of commentaries along these lines: Scumware, Part 1: Sneaky software hits a new low. http://twcny.rr.com/technofile/texts/bit100301.html Scumware, Part 2: Typical scumware programs and what they do. http://twcny.rr.com/technofile/texts/bit101001.html Scumware, Part 3: How to hunt it down and get rid of it. http://twcny.rr.com/technofile/texts/bit101701.htmlGoogle ScholarGoogle Scholar
  43. 43 See http://www.politechbot.com/p-03439.html for details.Google ScholarGoogle Scholar
  44. 44 See http://store.ca.com/v2.0-img/operations/safer/site/0605/1.htm for current information.Google ScholarGoogle Scholar

Index Terms

  1. Some notes on malware

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Ubiquity
          Ubiquity  Volume 2005, Issue August
          August 2005
          16 pages
          EISSN:1530-2180
          DOI:10.1145/1088431
          Issue’s Table of Contents

          Copyright © 2005 Author

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 August 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • editorial

        HTML Format

        View this article in HTML Format .

        View HTML Format