Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
I don't know how this got changed to a discussion on viruses but... When computer viruses were a new thing, most software was supplied on diskettes or via download since CDs were not common. Viruses could show up on commercial software either directly from a vendor who's system became infected or, more commonly, through software returned to the store. Computer stores would routinely re-shrinkwrap returned software, possibly after some QA. As vendors, including MIcrosoft, shipped virus infected media most vendors instituted some rigorous virus protection. Similarly, most major archives run virus checkers on their downloadable software. One problem is with email programs that can execute embedded code automatically (eg. Microsoft Outlook (and Outlook Express). "Derek D. Martin" wrote: > Very simply. A virus must execute its code to infect your system. I > don't execute anything that I didn't write myself (or at least > compile), or didn't come from a reputable vendor. It isn't impossible > that a reputable vendor might supply me with a virus, but it's very > unlikely. And most virii produce very obvious results, like degrading > system performance, or making text appear to drip down your screen. > I've never had any such problems. -- Jerry Feldman <gaf at blu.org> Boston Linux and Unix user group http://www.blu.org PGP key id:C5061EA9 PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |