
June 1999
The mass media coverage surrounding the
Melissa virus neatly illustrates the level to which IT has
become the dominant commercial force where once heavy industry
and mining ruled the roost.
IT is still reported with a high degree
of inaccuracy and hype as befits those whose journalistic
education was never quite honed for the modern e-world, but
with the stock boom examples of the businesses that are being
punted as the leaders of the “new way” of doing business
uppermost in even the most luddite news editor’s mind, they
have little choice left but to pay attention. And even more so
because I would guess that any organisation that uses MS Word
will have been afflicted by one or more of the so-called
“word-macro viruses” that are by now, utterly endemic.
But blaming Microsoft is like blaming gun
makers when folks get shot. Word has a powerful inbuilt
programming language that allows the users to lots of good
things, and by the same token, allows the miscreants to do
many bad things. For example, I have here a word document
where an embedded macro tunes the Winradio radio tuner card
installed in the system.
There is a simple way to tackle word
macro viruses – don’t open any word document attachments.
Anything that turns up here with the file extension .doc
gets wiped immediately unless I am very, very certain of the
source. I then virus check it (using the supremely simple to
use Mijenix FixIt 99 virus checker – just right click on the
file in explorer) , and if you have a mail client that is
stupid enough to auto-open attachments, throw it away
immediately.
Sending files in the alternative Rich
Text Format (.rtf) loses very little content-wise but
the macro virus. So if anyone send you a doc file, then ask
them to send it as an .rtf file instead (one of the
numberous “save as” options).
Word macro viruses tend to operate in the
relatively closed loop of the MS Word environment, but other
now endemic email parasites are to be found as attachments of
html documents that keep on spawning themselves unless you
ALT-F4 them quickly enough.
In terms of classic infections at the
system level, for example, mail attachments in the form of
executables (.exe) – well anyone daft enough to run
those without first virus checking AND being absolutely
certain of the origin, deserves what they get. Would you eat
your dinner off the toilet floor..?
I should like to remind you all that
thanks to the way that Unix manages files and permissions, a
virus is an unlikely thing, as Charles Stross, Linux guru of
this parish advises:
“To infect a program, a virus
must append itself to a program file or do something similar,
such as load itself into memory and scribble over the boot
sector of a hard disk.
However, it's pretty damned hard for a
virus to live on a system that has a user/group access
permission system. If it can't open an executable file and
write to it, how's the thing going to replicate itself? And it
can't infect other programs in memory because the UNIX or
Linux kernel is _really_ fascist about not giving programs
access to one another's working memory. All it can do is hope
that the victim is silly enough to execute a virus-infected
program as root so that it gets privileged access to the
system.
Thus, virus source code for Linux
has been written -- but to date, in nine years of Linux and
twenty eight years of UNIX, there have been NO viruses
detected in the wild.”
So here we have one PC operating system
that costs around £70-100 and can result in the entire email
productivity of a PC-based nation grinding to a sudden halt;
and the other costs £0 and doesn’t. So which one does
everyone use..?
It’s a funny old world, isn’t it..?
Gotcha..?
From all the fuss around Melissa also
comes the news that Word .doc and .dot file
format saves the details of the user’s unique MAC (media
access control) number that every ethernet card includes. Now,
MAC addresses are issued to ethernet card manufacturers in a
similarish sort of way to the way that IP addresses are
handled.
This is the closest thing to a
fingerprint for a specific PC that existed before the hoo-haa
that erupted around the Intel Pentium 3 “serial number”
malarkey. Network managers have known for a long time (over
twenty years…) that users of ethernet apparatus leave a
lovely trail of the whereabouts courtesy of the unique MAC
address.
But neither the MAC address of the
Pentium serial number are of any use until someone ties the
unique number together with the details of the user of the
equipment. It’s then that the fun starts, and the news that
this information is potentially being stored by Microsoft is
grist to the security and privacy lobby.
As someone pointed out in the letters
column of a US trade magazine, lawyers everywhere should start
subpoenaing Microsoft to produce evidence of who they know
owns which MAC address, since this would very quickly lead a
trail back to a number of miscreants, not least the
originators of the various word macro viruses!
|