From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.5-pre1 (2020-06-20) on ip-172-31-74-118.ec2.internal X-Spam-Level: X-Spam-Status: No, score=-0.0 required=3.0 tests=BAYES_20 autolearn=ham autolearn_force=no version=3.4.5-pre1 Date: Thu, 14 Jan 1993 06:51 EDT From: SAHARBAUGH@ROO.FIT.EDU Subject: Virus Collection for research!!!! Message-ID: <9301141201.AA24601@ajpo.sei.cmu.edu> List-Id: Jason Haught (The Master) asks for virus code. I don't have any (I killed all that I did have, I think) BUT I will use the opening to make a comment. I have long thought that we should study virus code. It has two properties of great interest to systems engineers, it works and it is robust. I would put it to work managing networked workstations. As the world "downsizes" the computer rooms disappear and central management nust be redesigned. Even in our small company it is difficult to make sure that every wworkstaion on the net upgrades applications software to the latest version at the same time. Ironically the upgrade we pay most attention to is the virus protection. A virus could be sent out to search and destroy Excel 3.0 and replace it with version 4.0. Work products could be similarly managed. A virus could be sent out to search and destroy all old versions of a document and replace them with the latest. We will need a virus stop at the door of the archive library of course. Jason, please tell us (me) the objective of your research or your thesis if that is the case. And please change the name of your computer next week [Jason@Quayle.MU.WVnet.edu (Internet)] sam harbaugh ---