⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer chrime - current practices, problems and proposed so.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 5 页
字号:
          have been developed in South Africa,  which destroys a computer's          file allocation table. Id.                                 Id.               Some viruses also  carry a message when  they are activated.          A  virus that is  though to  have been  developed by  students at          Wellington, New  Zealand,  tells the  user  that they  have  been          "stoned" and requests that marijuana should be legalized.  Id.                                                                     Id.               Approximately 80  or 90 of  the 300 viruses counted  for the          IBM  personal computer originated in Bulgaria according to Morton          Swimmer of Germany's Hamburg University Virus Test Center.          23.  A report in  La Liberation, a French  newspaper, stated that                            La Liberation          computer viruses  could be planted  in French EXOCET  missiles to          misguide  them  when  fired.    La  Liberation,  Jan.  10,  1991,          reprinted in  Klaus Brunnstein,  Risks-Forum, vol.  10, iss.  78,          reprinted in          Jan. 22  1991 (available at American Journal of International Law          and Policy Office).          24.  A  "trojan horse"  is a  program that  does not  seem to  be          infected, however,  when used  in a computer,  the virus  is then          transferred  the uninfected machine.   On trojan  horse destroyed          168,000 files in Texas.  Commitment to Security, 34 (1989).          25.  Ring, Computer Viruses; Once Revered as Hackers, Technopaths                     Computer Viruses; Once Revered as Hackers, Technopaths          Threaten  Security of  Computer-Dependent Society,  ComputerGram,          Threaten  Security of  Computer-Dependent Society          July 7, 1989.          26.  Highland, One Wild  Computer "Worm" Really Isn't  a  Federal                         One Wild  Computer "Worm" Really Isn't  a  Federal          Case, Newsday, Jan. 23, 1990, 51.          Case          27.  Stoll, at 346.   The amount of computers  that were actually          infected by the worm  is still the subject of debate.   Mr. Stoll          estimates that  2,000 computers  where infected,  while the  most          commonly  cited  number is  6,000.   Commitment  to  Security, 34          (1989).    The 6,000  estimate  was  based  on  an  Massachusetts          Institute of Technology estimate that 10 percent of the  machines          at the school  were infected and was  then inferred to  the total          number  of  machines  across  the  country  that  were  affected.          General Accounting  Office, Computer  Security: Virus  Highlights          Need for Improved  Internet Management, 17  (1989).  This  number          may be inaccurate  because not all locations had  the same amount          of vulnerable machines. Id.                                  Id.          28.       For the  first  eight months  of  1988, there  were 800          incidents  concerning computer  viruses. Commitment  to Security,          34.  The Computer  Virus Industry  Association  reported that  96          percent of  these reported infections were incorrectly identified          as viruses. Id.                      Id.          29.   Robinson, Virus Protection  for Network Users,   Washington          Post, Washington Business, p.44, Feb. 11, 1991.          30.  Ross,  Hacking   Away  at  the   Counterculture,  3   (1990)          (available at the  American University  Journal of  International          Law  and Policy).  On Saturday Night Live, during the news update          segment, Dennis Miller stated, in comparing a computer viruses to          the   AIDS  virus,  "Remember,  when  you  connect  with  another          computer, you're connecting  to every computer that  computer has          ever been connected to."  Id.                                    Id.          31.  Id. at 8-9.               Id.          32.  Computer Virus Legislation, Hearing on  H.R. 55 and H.R. 287          before the Subcomm. on Criminal Justice of the House Comm. on the          Judiciary, 100th  Cong., 1st Sess.  49 (1989) (statement  of Marc          Rotenberg,   Director,   Computer    Professionals   for   Social          Responsibility).   In Israel,  Hebrew University used  a computer          virus to  detect and  destroy a virus  that would  have destroyed          data files. Id.                      Id.          33.  Computergram International, October 14, 1990.          34.          35.  Watts, Fears of Computer Virus Attack from East Europe grow,                      Fears of Computer Virus Attack from East Europe grow          The Independent, November 24, 1990, p.6.   On a trip to Bulgaria,          a British computer consultant  returned with 100 viruses  that do          not exist in the West. Id.                                 Id.          36.  Id.          37.  McGourty, When a Hacker Cracks the Code, The Daily Telegraph                         When a Hacker Cracks the Code          (London), October 22, 1990, p. 31.          38.  The equipment would cost about 50 (British) pounds. Id.                                                                   Id.          39.  Id.   A British company, has stated that they have developed               Id.          a glass that  will reduce this problem.   Tieman, Spy-Proof Glass          to Beat the Hackers, The (London) Times, Jan 17, 1991.               A  more  recent  problem concerns  the  ability  of computer          hackers to access into fax  machines and either change or reroute          information from the machine. Becket, Espionage fears mounting as                                                Espionage fears mounting as          hackers tap into faxes, The Daily Telegraph (London), December 1,          hackers tap into faxes          1990,  p. 23.  This problem  can be  circumvented by  the  use of          encryption devices or passwords on the machine.  Id.                                                           Id.          40.  Stoll  at 9.  The  word itself originally had  two meanings.          People originally called themselves hackers were software wizards          who thoroughly knew computer systems.  Id.  In U.S. v. Riggs, 739                                                         U.S. v. Riggs          F. Supp. 414, 423 (N.D. Ill.  1990) the court defined hackers  as          "individuals involved  with the  unauthorized access  of comp

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -