Tilted Forum Project Discussion Community  

Go Back   Tilted Forum Project Discussion Community > Chatter > General Discussion


 
 
LinkBack Thread Tools
Old 02-05-2004, 08:21 AM   #1 (permalink)
Tilted
 
TNJ4555's Avatar
 
Location: Jersey
Today's (2/5/04) NY Times

Technology Section:
"Geeks Put the Unsavvy on Alert: Learn or Log off"

Whaddaya think?

***EDIT: Please scroll down a few posts to see the text of this article thanks to Cynthetiq***

Last edited by SecretMethod70; 02-05-2004 at 06:32 PM..
TNJ4555 is offline  
Old 02-05-2004, 08:23 AM   #2 (permalink)
Darth Papa
 
ratbastid's Avatar
 
Location: Yonder
I have no idea what to think because you haven't posted anything. I don't have the Times in front of me this morning, so I have no way to interact with this thread.

The body of the article would be very nice, if you can find it online somewhere. Or at least a link.
ratbastid is offline  
Old 02-05-2004, 08:26 AM   #3 (permalink)
Death Leprechaun
 
Confederate's Avatar
 
Location: College Station, TX
Quote:
Geeks Put the Unsavvy on Alert: Learn or Log Off
By AMY HARMON

As the MyDoom virus continues its travels, the computer-savvy are becoming hostile toward those who still open unknown e-mail attachments.



that's all i could get without creating an account to see the rest
EDIT: nevermind see below
Confederate is offline  
Old 02-05-2004, 08:26 AM   #4 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
please don't just toss something into the fray without actual meat and bones for the people to gnaw on and discuss.

-------

for the link challenged:

Geeks Put the Unsavvy on Alert: Learn or Log Off
By AMY HARMON

hen Scott Granneman, a technology instructor, heard that one of his former students had clicked on a strange e-mail attachment and infected her computer with the MyDoom Internet virus last week, empathy did not figure anywhere in his immediate response.

"You actually got infected by the virus?" he wrote in an e-mail message to the former student, Robin Woltman, a university grant administrator. "You, Robin? For shame!"

As MyDoom, the fastest-spreading virus ever, continues to clog e-mail in-boxes and disrupt business, the computer-savvy are becoming openly hostile toward the not-so-savvy who unwittingly play into the hands of virus writers.

The tension over the MyDoom virus underscores a growing friction between technophiles and what they see as a breed of technophobes who want to enjoy the benefits of digital technology without making the effort to use it responsibly.

The virus spreads when Internet users ignore a basic rule of Internet life: never click on an unknown e-mail attachment. Once someone does, MyDoom begins to send itself to the names in that person's e-mail address book. If no one opened the attachment, the virus's destructive power would never be unleashed.

"It takes affirmative action on the part of the clueless user to become infected," wrote Scott Bowling, president of the World Wide Web Artists Consortium, expressing frustration on the group's discussion forum. "How to beat this into these people's heads?"

Many of the million or so people who have so far infected their computers with MyDoom say it is not their fault. The virus often comes in a message that appears to be from someone they know, with an innocuous subject line like "test" or "error." It is human nature, they say, to open the mail and attachments.

But computer sophisticates say it reflects a willful ignorance of basic computer skills that goes well beyond virus etiquette. At a time when more than two-thirds of American adults use the Internet, they say, such carelessness is no longer excusable, particularly when it messes things up for everyone else.

For years, many self-described computer geeks seemed eager to usher outsiders onto their electronic frontier. Everyone, it seemed, had a friend or family member in the geek elite who could be summoned — often frequently — in times of computer crisis.

But as those same friends and family members are called upon again and again to save the computer incompetents from themselves, the geeks' patience is growing thin. As it does, a new kind of digital divide is opening up between populations of computer users who must coexist in the same digital world.

"Viruses are just the tip of the iceberg," said Bill Melcher, who runs his own technical support business in San Francisco. "When it comes to computers, a lot of intelligent people and fast learners just decide that they don't know."

Many of the computationally confused say they suffer from genuine intimidation and even panic over how to handle the mysterious machines they have come to rely on for so much of daily life. Virus writers, spammers and scammers, they say, are the ones who should be held accountable for the chaos they cause.

But as the same people equip themselves with fancy computers and take advantage of the Internet for things like shopping and banking, critics say that their perpetual state of confusion has begun to get tiresome. And while the Internet's traditional villains remain elusive, those inadvertently helping them tend to be friends and neighbors.

Some in the technocamp imagine requiring a license to operate a computer, just like the one required to drive a car. Others are calling for a punishment that fits a careless crime. People who click on virus attachments, for instance, could be cut off by their Internet service providers until they proved that their machines had been disinfected.

And some, tired of being treated like free help lines, are beginning to rebel. They are telling friends, relatives and random acquaintances to figure it out on their own.

"Go out, get a book," suggests Zack Rubenstein, 28, who has for years provided free technical support for his extended social network. "You went to college and you got a degree, you obviously can learn something. Play around with it; it's not going to kill you."

Mr. Rubenstein, a member of the technical support staff at a New York City law school he thought it best not to identify, is not at liberty to dispense such advice at work. Instead, he answers endless calls about malfunctioning monitors that turn out not to be plugged in, and broken printers that start working again as soon as he removes the single piece of paper obviously jamming them.

"Especially dealing with academics," Mr. Rubenstein added, "you'd think they'd have some ability to deduce or think problems through for a minute."

Not so long ago, he took pleasure in showing people around the brave new digital world that he moved in with such ease. Now that everyone has a technical question, he says, being a tour guide has lost its charm.

But his girlfriend, Miriam Tauber, 24, makes no apologies for her lack of computer knowledge. To her, computers are like "moody people" who behave illogically. If people like Mr. Rubenstein expect her to understand them, she suggests, perhaps they should learn to speak in a language she can understand, rather than ridiculous acronyms and suffixes.

"There are these MP3's and PDF's and a million other things that you don't even know what they are," Ms. Tauber said. "I don't feel like I need to figure out computers, because my instinct is there's just no way."

Still, if there is any evidence that the antagonism of the technical elite is having an effect, it may be in the mounting degree of shame among those who make obvious mistakes, or ask obvious questions too often.

When Julie Dillon, 33, had trouble installing a wireless card in her Macintosh laptop last weekend, for instance, she stopped herself from calling a friend three blocks away who works for Apple Computer because she knows he is besieged.

"There's this whole complicated interchange — are you calling them as a friend or are you calling them as tech support — and I definitely feel a little bit guilty," said Ms. Dillon, a musician in San Francisco. "It's a fine line that has changed because I remember a few years ago it was no big deal."

Instead, Ms. Dillon called Mr. Melcher, who has built his technical support business in part on referrals from friends who no longer wanted to handle the demands of other friends.

Ms. Dillon, who considers her laptop "a blessing" that helps her promote her music, said she was happy to pay for the help. She has also frequently received technical support in exchange for dinner, and, once, for a song.

Even parents are being left to fend for themselves as their children tire of dispensing advice.

David Hale, 25, a lawyer in St. Louis, said he had rebuilt his parents' virus-ridden computer from scratch several times in recent months before he learned that his father, Dale, was replying to every piece of his spam e-mail, asking to be taken off the spammers' mailing lists. Dale Hale, 47, also frequently clicked on pop-up ads that appeared to be messages from Microsoft telling him to upgrade his computer.

"It would cause fights between my parents because they would argue about whether a particular one was legitimate and I'm like, `It is NEVER legitimate,' " said Mr. Hale, who explained as patiently as he could that answering spam and clicking on pop-ups only invite more of the same.

After that, Dale Hale said, his son would sometimes become frustrated by his and his wife's questions. They in turn would get frustrated with their son's instructions, especially over the phone. Eventually they bought antivirus software.

"We've learned by the lumps and bumps," the father said.

(People who had installed the major antivirus software programs from companies like McAfee were largely protected from the MyDoom virus after downloading updates available a few hours after the virus's appearance on Jan. 26.)

Perhaps the one thing that technophobes and technophiles can agree on is that software companies like Microsoft should make things easier and more secure for all kinds of computer users. But Microsoft, whose Web site has so far withstood a continuing attack by the MyDoom virus, had a reminder for users, too.

"Responsibility is shared," said Scott Charney, Microsoft's chief security strategist. "With some of these viruses that require user action, people have a responsibility to be careful and protect themselves."


link
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not.
Cynthetiq is offline  
Old 02-05-2004, 08:49 AM   #5 (permalink)
Banned
 
I completely agree. People need to get a clue. It's just a computer. Deal with it, learn to use it properly, or don't use it at all. It's not that difficult to learn the basics, and from there it's just hands-on experience. I don't care what generation someone is from, you still have a brain (i'm assuming) so make it happen.
analog is offline  
Old 02-05-2004, 08:55 AM   #6 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
Quote:
Originally posted by analog
I completely agree. People need to get a clue. It's just a computer. Deal with it, learn to use it properly, or don't use it at all. It's not that difficult to learn the basics, and from there it's just hands-on experience. I don't care what generation someone is from, you still have a brain (i'm assuming) so make it happen.
it's like driving... those that are casual drivers and don't know how to "fit into the routine" cause more grief to the commuters. That does not mean that the casuals don't have the same right to the roads, but they do have to at least learn the BASIC FOUNDATIONS of operations and regulations.
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not.

Last edited by Cynthetiq; 02-05-2004 at 09:41 AM..
Cynthetiq is offline  
Old 02-05-2004, 09:17 AM   #7 (permalink)
Tilted
 
TNJ4555's Avatar
 
Location: Jersey
I guess I have my answer

BTW all knowing moderators..... notice a couple of things to the left of this post:
1) No band width glombing avatar
2) "Rookie" tag
And, I would assume, the most important
3) "Donor"

Now I'll sit back down and let the "cool" kids rule
TNJ4555 is offline  
Old 02-05-2004, 09:34 AM   #8 (permalink)
Talk nerdy to me
 
God of Thunder's Avatar
 
Location: Flint, MI
I assosiated with so many things in that article it wasn't funny. I think it nailed it on the head pretty good.

Yes, users need to get smarter about what they are doing on a computer. But, in their defense, the latest viruses have become a little harder to detect.
Quote:
The virus often comes in a message that appears to be from someone they know, with an innocuous subject line like "test" or "error." It is human nature, they say, to open the mail and attachments.
But I refuse to feel sorry for anyone who still clicks on deceptive pop-ups and then cry when they have spyware. Or, worse yet, download something like "Bonzi Buddy"

The free tech support part of the article hit home the most. I get calls all the time from relatives I haven't talked to in years. "Can I ask you something about my computer?"

I've often wondered if doctors, mechanics and other proffesionals get the same thing. I couldnt imagine calling up a friend who was a doctor at home to ask something as silly as "I got a mosquito bite, what should I do about it?"
__________________
I reject your reality, and substitute my own

-- Adam Savage
God of Thunder is offline  
Old 02-05-2004, 09:39 AM   #9 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
Quote:
Originally posted by TNJ4555
I guess I have my answer

BTW all knowing moderators..... notice a couple of things to the left of this post:
1) No band width glombing avatar
2) "Rookie" tag
And, I would assume, the most important
3) "Donor"

Now I'll sit back down and let the "cool" kids rule
your rookie tag was the reason i sent you a PM say to please add more information to your threads. it's customary that people here help out each other, not just the moderators and admins.

as far as not having an avatar, there are a number of people who have no avatar by choice.

as far as the DONOR tag, thanks for donating, it's important to keep this place running.

welcome and I hope to see more posts and threads from you
Cynthetiq is offline  
Old 02-05-2004, 10:44 AM   #10 (permalink)
Cracking the Whip
 
Lebell's Avatar
 
Location: Sexymama's arms...
God,

That article is so true.

The straw that broke this camel's back was when I was asked, not by a friend, but by a FRIEND OF A FRIEND for technical help on his Compaq running winME.

After 2 days and about 5 hours, this asshole offers to take me out to LUNCH! Friggin' LUNCH when I saved him over 300$ worth of work.

Screw that.

Now I make my living off these people.

Just the other day I had a service call to a company (WITH an IT person ON-SITE) to replace a CD-ROM drive.

Forty minutes and 65$ later, drive replaced and tested, and paperwork filed.

(I wanted to go to that IT person's boss and ask what division they promoted that woman out of and why IT? Why not something she could actually DO??)
__________________
"Of all tyrannies, a tyranny exercised for the good of its victims may be the most oppressive. It may be better to live under robber barons than under omnipotent moral busybodies. The robber baron's cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our own good will torment us without end, for they do so with the approval of their own conscience." – C. S. Lewis

The ONLY sponsors we have are YOU!

Please Donate!
Lebell is offline  
Old 02-05-2004, 10:52 AM   #11 (permalink)
Professor of Drinkology
 
If all you computer users out there want to open all the virus-ridden attachments in the world, then by all means, go head! You're only making more high-paying jobs for geeks like me. Keep it up!
__________________
Blah.
tritium is offline  
Old 02-05-2004, 10:53 AM   #12 (permalink)
Professor of Drinkology
 
Quote:
Originally posted by Lebell
Just the other day I had a service call to a company (WITH an IT person ON-SITE) to replace a CD-ROM drive.
Now, that is sad. Need any more employees?
__________________
Blah.
tritium is offline  
Old 02-05-2004, 11:48 AM   #13 (permalink)
More Freedom, Less Bullshit
 
Location: Tulsa, OK
I agree that the amount of people who use computers but know nothing is staggering. I started knowing nothing when I got my first computer in '00. Now I'm the guy everyone asks when they have problems. I am a nice guy so I always help whomever I can, and occasionally someone will pay me. I'd really just like people to RTFM occasionally. I have no problem helping my close friends/family with computer stuff, but friends of friends is rediculous.
__________________
-Erik

Stupid people shouldn't breed.
Elitegibson is offline  
Old 02-05-2004, 11:59 AM   #14 (permalink)
Junkie
 
Quote:
Originally posted by God of Thunder
I've often wondered if doctors, mechanics and other proffesionals get the same thing. I couldnt imagine calling up a friend who was a doctor at home to ask something as silly as "I got a mosquito bite, what should I do about it?"
When I was a mechanic I would get that a fair amount.

Computers are no different than cars or guns. People want them for the good they can do, but in too many cases refuse to accept that there is some responsibility that goes with it.
laconic1 is offline  
Old 02-05-2004, 01:02 PM   #15 (permalink)
42, baby!
 
Dragonlich's Avatar
 
Location: The Netherlands
Ditto.

I've got a friend with a nice laptop. Now, once in a while, his Windows is so full of spyware, crappy programs and other assorted stuff, that he wants a fresh install. At first, I had to do it, the next time he tried it himself, but failed. Slowly he's getting the hang of it, though... (Last time he tried and tried, and I finally gave in, and installed it for him. I'm too nice, I guess.)
Dragonlich is offline  
Old 02-05-2004, 01:10 PM   #16 (permalink)
Fucking Hostile
 
tinfoil's Avatar
 
Location: Springford, ON, Canada
People should be licensed before they can go online. Plain and simple.
__________________
Get off your fuckin cross. We need the fuckin space to nail the next fool martyr.
tinfoil is offline  
Old 02-05-2004, 01:27 PM   #17 (permalink)
Talk nerdy to me
 
God of Thunder's Avatar
 
Location: Flint, MI
Quote:
Originally posted by crazybill5280
When I was a mechanic I would get that a fair amount.

Computers are no different than cars or guns. People want them for the good they can do, but in too many cases refuse to accept that there is some responsibility that goes with it.
Glad to see other people get the abuse as well
__________________
I reject your reality, and substitute my own

-- Adam Savage
God of Thunder is offline  
Old 02-05-2004, 02:17 PM   #18 (permalink)
Rawr!
 
skier's Avatar
 
Location: Edmontania
I'm all for these people learning how their computers work. Many of the concepts are no more difficult than driving a car. If these people treated owning a car the same as they did a computer the results would be alot like this:

General Motors doesn't have a help line for people who don't know how to drive, because people don't buy cars like they buy computers, but imagine if they did....

HELPLINE: "General Motors Helpline, how can I help you?"


CUSTOMER: "Your cars stink!"


HELPLINE: "What's wrong?"


CUSTOMER: "It crashed, that's what's wrong!"


HELPLINE: "What were you doing?"


CUSTOMER: "I wanted to go faster, so I pushed the accelerator pedal all the way to the floor. It worked for a while, and then it crashed -- and now it won't even start up!"


HELPLINE: "I'm sorry, sir, but it's your responsibility if you misuse the product."

CUSTOMER: "Misuse it? I was just following this darned manual of yours. It said to make the car go to put the transmission in 'D' and press the accelerator pedal. That's exactly what I did -- now the darn thing's crashed."

HELPLINE: "Did you read the entire operator's manual before operating the car sir?"

CUSTOMER: "What? Of course I did! I told you I did EVERYTHING the manual said and it didn't work!"

HELPLINE: "Didn't you attempt to slow down so you wouldn't crash?"

CUSTOMER: "How do you do THAT?"

HELPLINE: "You said you read the entire manual, sir. It's on page 14. The pedal next to the accelerator."

CUSTOMER: "Well, I don't have all day to sit around and read this manual you know."

HELPLINE: "Of course not. What do you expect us to do about it?"

CUSTOMER: "I want you to send me one of the latest versions that goes fast and won't crash anymore!"



HelpLine: "General Motors HelpLine, how can I help you?"

Customer: "My car ran fine for a week and now it won't go anywhere!"

HelpLine: "Is the gas tank empty?"

Customer: "Huh? How do I know?"

HelpLine: "There's a little gauge on the front panel with a needle and markings from 'E' to 'F'. Where is the needle pointing?"

Customer: "It's pointing to 'E'. What does that mean?"

HelpLine: "It means you have to visit a gasoline vendor and purchase some more gasoline. You can install it yourself or pay the vendor to install it for you."

Customer: "What? I paid $12,000 for this car! Now you tell me that I have to keep buying more components? I want a car that comes with everything built in!"


HelpLine: "General Motors HelpLine, how can I help you?"

Customer: "Hi, I just bought my first car, and I chose your car because it has automatic transmission, cruise control, power steering, power brakes, and power door locks."

HelpLine: "Thanks for buying our car. How can I help you?"

Customer: "How do I work it?"

HelpLine: "Do you know how to drive?"

Customer: "Do I know how to what?"

HelpLine: "Do you know how to drive?"

Customer: "I'm not a technical person. I just want to go places in my car!"


HelpLine: "General Motors HelpLine, how can I help you?"

Customer: "I got in my car and closed the door and nothing happened!"

HelpLine: "Did you put the key in the ignition slot and turn it?"

Customer: "What's an ignition?"

HelpLine: "It's a starter motor that draws current from your battery and turns over the engine."

Customer: "Ignition? Motor? Battery? Engine? How come I have to know all these technical terms just to use my car?"


At least this echos my sentiments on this topic.
__________________
"Asking a bomb squad if an old bomb is still "real" is not the best thing to do if you want to save it." - denim
skier is offline  
Old 02-05-2004, 04:55 PM   #19 (permalink)
Cosmically Curious
 
onodrim's Avatar
 
Location: Chicago, IL
I couldn't agree with the article more! I'm the 'computer geek' in my group of friends, and so often I'm called upon to fix problems that should be simple common sense. If you want a computer, learn to use it.
__________________
"The world is so exquisite with so much love and moral depth, that there is no reason to deceive ourselves with pretty stories for which there’s little good evidence. Far better it seems to me, in our vulnerability, is to look death in the eye and to be grateful every day for the brief but magnificent opportunity that life provides"
-Carl Sagan
onodrim is offline  
Old 02-05-2004, 04:59 PM   #20 (permalink)
Death Leprechaun
 
Confederate's Avatar
 
Location: College Station, TX
As far as my family and my roommates go, and even my outfit in the corps, I was always the computer knowledgeable one, it stinks when I'm working on something on my computer and all of a sudden I get an IM from someone asking me for help. the worst is when they try to explain the problem without knowing anything or accurately tell me what the problem is. It's even worse when they try to get my help over the IM and I can't look at their computer. 90% of the time i need to be sitting at the computer to make any kind of progress helping them. and they just get frustrated with me when I can't help them over the IM.
Confederate is offline  
Old 02-05-2004, 05:37 PM   #21 (permalink)
beauty in the breakdown
 
Location: Chapel Hill, NC
I must say, I agree with it. I work at the IT support center here at school, and we were *swamped*. Had to shut down the SMTP access from all the dorms to save the servers. Im getting to the point that I think a basic computer skills class should be mandatory for all entering freshmen.
__________________
"Good people do not need laws to tell them to act responsibly, while bad people will find a way around the laws."
--Plato
sailor is offline  
Old 02-05-2004, 06:08 PM   #22 (permalink)
Free Mars!
 
feelgood's Avatar
 
Location: I dunno, there's white people around me saying "eh" all the time
Quote:
Originally posted by sailor
Im getting to the point that I think a basic computer skills class should be mandatory for all entering freshmen.
Or maybe for every person that purchase a computer?

Most of the situations that other posters posted about people being stupid or not being responsible for products they've brought: Too bad there's no law against idiots. If there was, I'm sure that half of the world population would wind up in jail...
__________________
Looking out the window, that's an act of war. Staring at my shoes, that's an act of war. Committing an act of war? Oh you better believe that's an act of war
feelgood is offline  
Old 02-05-2004, 06:09 PM   #23 (permalink)
Death Leprechaun
 
Confederate's Avatar
 
Location: College Station, TX
Quote:
Originally posted by sailor
I must say, I agree with it. I work at the IT support center here at school, and we were *swamped*. Had to shut down the SMTP access from all the dorms to save the servers. Im getting to the point that I think a basic computer skills class should be mandatory for all entering freshmen.
I know it was required at my high school, the earlier the better
Confederate is offline  
Old 02-06-2004, 02:04 AM   #24 (permalink)
Watcher
 
billege's Avatar
 
Location: Ohio
Quote:
Originally posted by sailor
I must say, I agree with it. I work at the IT support center here at school, and we were *swamped*. Had to shut down the SMTP access from all the dorms to save the servers. Im getting to the point that I think a basic computer skills class should be mandatory for all entering freshmen.

Yes, most certainly. How can someone expect to have a higher education, and not be able to use one of our most basic productivity tools?


skier,
That was brilliantly written. Mad props!


The thing is, we only have to wait for this generation of compu-dumbies to die off. Have you interacted with a 10 year old computer user lately?

Those little fuckers know everything! During my IT internship at my college's IT dept, we hosted some grade school quiz bowl.

Those were the smart kids, lemme tell you...those little buggers did just about everything the boxes were set up NOT to allow them to do. These kids will create skynet and cause the Matrix to rule us all from a Borg ship THEY BUILT!
__________________
I can sum up the clash of religion in one sentence:
"My Invisible Friend is better than your Invisible Friend."

Last edited by billege; 02-06-2004 at 02:07 AM..
billege is offline  
Old 02-06-2004, 04:12 PM   #25 (permalink)
Junkie
 
Education system needs to train people to think. Too oriented around being a task monkey, I think that is very simplistically why the younger generation has gone to shit comparatively.
Xell101 is offline  
Old 02-06-2004, 06:49 PM   #26 (permalink)
Addict
 
A-FUCKING-MEN!!!

I'm also the go to guy in my family and social circle when someones computer breaks, and I'm tired of it.

It especially bites my ass when these people refer me to thier friends and family, like I live to serve thier computers... grrr...
yakimushi is offline  
Old 02-06-2004, 09:30 PM   #27 (permalink)
Deliberately unfocused
 
grumpyolddude's Avatar
 
Location: Amazon.com and CDBaby
True exchange from work:

Voice on the phone: "Could you come up here? My computer won't play my music CD."

Me: " Do you have your speakers turned on?"

VOTP: "Oh....." click

It should be noted that I am the manager of an auto parts store, not a corporate IT guy.

I've cut out doing free house calls for friends and relatives. Just because I'm not afraid to open a few files, or replace some hardware, doesn''t make me a "computer guru." It's time for them all to start participating in the economy.
__________________
"Regret can be a harder pill to swallow than failure .With failure you at least know you gave it a chance..." David Howard
grumpyolddude is offline  
Old 02-07-2004, 02:35 PM   #28 (permalink)
Junkie
 
meembo's Avatar
 
Location: Connecticut
If you can, check out the NYT Magazine article this week about the dudes writing these viruses. They don't think highly of most Microsoft users who make all of their creations multiply across the planet.

FYI the article is available online, with a free membership. Look for the "Magazine" section on the left hand menu
__________________
less I say, smarter I am

Last edited by meembo; 02-07-2004 at 02:58 PM..
meembo is offline  
Old 02-08-2004, 07:44 PM   #29 (permalink)
Ssssssssss
 
Kaos's Avatar
 
Location: Ontario
I will do Tech support for friends, but I charge a basic $20.00 fee for "friends of a friend"

I've made some good beer money just installing new CD-Writers/Hard Drives and Re-Installing Windows for people.
Kaos is offline  
Old 02-09-2004, 03:41 AM   #30 (permalink)
The Northern Ward
 
Location: Columbus, Ohio
Some people just don't get computers. I'm not sure why, maybe they're afraid it will blow up, or transform into Megatron and rip their torsos off or something. But when people tell me "Thanks for the help! I can't hardly turn the thing off! hur hur hur!" I have ask them "Well, are you sure you're just not retarded?"
__________________
"I went shopping last night at like 1am. The place was empty and this old woman just making polite conversation said to me, 'where is everyone??' I replied, 'In bed, same place you and I should be!' Took me ten minutes to figure out why she gave me a dirty look." --Some guy
Phaenx is offline  
Old 02-09-2004, 06:38 AM   #31 (permalink)
Tilted
 
TNJ4555's Avatar
 
Location: Jersey
meembo:

(Let's see if I can do this)
This should be the link to the article in yesterday's (2/8/04) NYT magazine...

http://www.nytimes.com/2004/02/08/magazine/08WORMS.html
TNJ4555 is offline  
Old 02-09-2004, 06:50 AM   #32 (permalink)
Junkie
 
cchris's Avatar
 
Location: Sydney
This one time at band camp I stuck my flute up my Lap top and got a nasty virus and...........
__________________
There's a fine line between participation and mockery
cchris is offline  
Old 02-09-2004, 07:02 AM   #33 (permalink)
is Nucking Futs!
 
Dano069's Avatar
 
Location: On the edge of sanity
I agree. The time for hand holding is over! When I go out on service calls, I'm always pleasant and take the time to explain what happened and why. I guess I'm fortunate because my users have started to solve their own problems or, at least, I can walk them through the solution without them asking where the any key is or I can't find my desktop. It wasn't always like this. Let's not forget the "id10t" or "Pebkac" errors.

I think part of the problem is the marketing campaigns put out by the various computer manufactureres. "It's so easy to operate our system. It does this and that for you. Even a child can fix it!" That last one really bugs me, especially since it's an AOL commercial.
__________________
I may look attentive, but I'm taking peeks down your blouse faster than the human eye can follow.

Last edited by Dano069; 02-09-2004 at 07:05 AM..
Dano069 is offline  
Old 02-09-2004, 08:34 AM   #34 (permalink)
Junkie
 
Location: RI
So, my fiancee's uncle is a mechanic, he charges his friends and family twice the amount to repair their car then he would a normal customer. And awhile back, her and I were talking to another mechanic, and he said he won't do repairs for a friend or family. We asked him why and he told us that if he did do work for them, they'd ALL walk all over him. And another accountant that I ride the bus with was telling us that he ALWAYS gets people coming up to him and asking him tax questions, espically now and what they should do on this or that. So now, he said whenever someone asks him a question, he says a quick answer and if they need more info, then it'd be $60 an hour.
I think it's getting to about that point for stuff like that for us. I've got a life too, and I'd kind of like to live it, and if I can't live it, I'm definately going to be making something for it.
Fallon is offline  
Old 02-09-2004, 08:50 AM   #35 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
Quote:
Originally posted by TNJ4555
meembo:

(Let's see if I can do this)
This should be the link to the article in yesterday's (2/8/04) NYT magazine...

http://www.nytimes.com/2004/02/08/magazine/08WORMS.html
PLEASE TRY TO INCLUDE THE TEXT OF THE LINKS FOR THOSE THAT DO NOT WANT TO REGISTER OR CLICK THRU.

Quote:
The Virus Underground
By CLIVE THOMPSON

his is how easy it has become.

Mario stubs out his cigarette and sits down at the desk in his bedroom. He pops into his laptop the CD of Iron Maiden's ''Number of the Beast,'' his latest favorite album. ''I really like it,'' he says. ''My girlfriend bought it for me.'' He gestures to the 15-year-old girl with straight dark hair lounging on his neatly made bed, and she throws back a shy smile. Mario, 16, is a secondary-school student in a small town in the foothills of southern Austria. (He didn't want me to use his last name.) His shiny shoulder-length hair covers half his face and his sleepy green eyes, making him look like a very young, languid Mick Jagger. On his wall he has an enormous poster of Anna Kournikova -- which, he admits sheepishly, his girlfriend is not thrilled about. Downstairs, his mother is cleaning up after dinner. She isn't thrilled these days, either. But what bothers her isn't Mario's poster. It's his hobby.

When Mario is bored -- and out here in the countryside, surrounded by soaring snowcapped mountains and little else, he's bored a lot -- he likes to sit at his laptop and create computer viruses and worms. Online, he goes by the name Second Part to Hell, and he has written more than 150 examples of what computer experts call ''malware'': tiny programs that exist solely to self-replicate, infecting computers hooked up to the Internet. Sometimes these programs cause damage, and sometimes they don't. Mario says he prefers to create viruses that don't intentionally wreck data, because simple destruction is too easy. ''Anyone can rewrite a hard drive with one or two lines of code,'' he says. ''It makes no sense. It's really lame.'' Besides which, it's mean, he says, and he likes to be friendly.

But still -- just to see if he could do it -- a year ago he created a rather dangerous tool: a program that autogenerates viruses. It's called a Batch Trojan Generator, and anyone can download it freely from Mario's Web site. With a few simple mouse clicks, you can use the tool to create your own malicious ''Trojan horse.'' Like its ancient namesake, a Trojan virus arrives in someone's e-mail looking like a gift, a JPEG picture or a video, for example, but actually bearing dangerous cargo.

Mario starts up the tool to show me how it works. A little box appears on his laptop screen, politely asking me to name my Trojan. I call it the ''Clive'' virus. Then it asks me what I'd like the virus to do. Shall the Trojan Horse format drive C:? Yes, I click. Shall the Trojan Horse overwrite every file? Yes. It asks me if I'd like to have the virus activate the next time the computer is restarted, and I say yes again.

Then it's done. The generator spits out the virus onto Mario's hard drive, a tiny 3k file. Mario's generator also displays a stern notice warning that spreading your creation is illegal. The generator, he says, is just for educational purposes, a way to help curious programmers learn how Trojans work.

But of course I could ignore that advice. I could give this virus an enticing name, like ''britney--spears--wedding--clip.mpeg,'' to fool people into thinking it's a video. If I were to e-mail it to a victim, and if he clicked on it -- and didn't have up-to-date antivirus software, which many people don't -- then disaster would strike his computer. The virus would activate. It would quietly reach into the victim's Microsoft Windows operating system and insert new commands telling the computer to erase its own hard drive. The next time the victim started up his computer, the machine would find those new commands, assume they were part of the normal Windows operating system and guilelessly follow them. Poof: everything on his hard drive would vanish -- e-mail, pictures, documents, games.

I've never contemplated writing a virus before. Even if I had, I wouldn't have known how to do it. But thanks to a teenager in Austria, it took me less than a minute to master the art.

Mario drags the virus over to the trash bin on his computer's desktop and discards it. ''I don't think we should touch that,'' he says hastily.


Computer experts called 2003 ''the Year of the Worm.'' For 12 months, digital infections swarmed across the Internet with the intensity of a biblical plague. It began in January, when the Slammer worm infected nearly 75,000 servers in 10 minutes, clogging Bank of America's A.T.M. network and causing sporadic flight delays. In the summer, the Blaster worm struck, spreading by exploiting a flaw in Windows; it carried taunting messages directed at Bill Gates, infected hundreds of thousands of computers and tried to use them to bombard a Microsoft Web site with data. Then in August, a worm called Sobig.F exploded with even more force, spreading via e-mail that it generated by stealing addresses from victims' computers. It propagated so rapidly that at one point, one out of every 17 e-mail messages traveling through the Internet was a copy of Sobig.F. The computer-security firm mi2g estimated that the worldwide cost of these attacks in 2003, including clean-up and lost productivity, was at least $82 billion (though such estimates have been criticized for being inflated).

The pace of contagion seems to be escalating. When the Mydoom.A e-mail virus struck in late January, it spread even faster than Sobig.F; at its peak, experts estimated, one out of every five e-mail messages was a copy of Mydoom.A. It also carried a nasty payload: it reprogrammed victim computers to attack the Web site of SCO, a software firm vilified by geeks in the ''open source'' software community.

You might assume that the blame -- and the legal repercussions -- for the destruction would land directly at the feet of people like Mario. But as the police around the globe have cracked down on cybercrime in the past few years, virus writers have become more cautious, or at least more crafty. These days, many elite writers do not spread their works at all. Instead, they ''publish'' them, posting their code on Web sites, often with detailed descriptions of how the program works. Essentially, they leave their viruses lying around for anyone to use.

Invariably, someone does. The people who release the viruses are often anonymous mischief-makers, or ''script kiddies.'' That's a derisive term for aspiring young hackers, usually teenagers or curious college students, who don't yet have the skill to program computers but like to pretend they do. They download the viruses, claim to have written them themselves and then set them free in an attempt to assume the role of a fearsome digital menace. Script kiddies often have only a dim idea of how the code works and little concern for how a digital plague can rage out of control.

Our modern virus epidemic is thus born of a symbiotic relationship between the people smart enough to write a virus and the people dumb enough -- or malicious enough -- to spread it. Without these two groups of people, many viruses would never see the light of day. Script kiddies, for example, were responsible for some of the damage the Blaster worm caused. The original version of Blaster, which struck on Aug. 11, was clearly written by a skilled programmer (who is still unknown and at large). Three days later, a second version of Blaster circulated online, infecting an estimated 7,000 computers. This time the F.B.I. tracked the release to Jeffrey Lee Parson, an 18-year-old in Minnesota who had found, slightly altered and re-released the Blaster code, prosecutors claim. Parson may have been seeking notoriety, or he may have had no clue how much damage the worm could cause: he did nothing to hide his identity and even included a reference to his personal Web site in the code. (He was arrested and charged with intentionally causing damage to computers; when his trial begins, probably this spring, he faces up to 10 years in jail.) A few weeks later, a similar scene unfolded: another variant of Blaster was found in the wild. This time it was traced to a college student in Romania who had also left obvious clues to his identity in the code.

This development worries security experts, because it means that virus-writing is no longer exclusively a high-skill profession. By so freely sharing their work, the elite virus writers have made it easy for almost anyone to wreak havoc online. When the damage occurs, as it inevitably does, the original authors just shrug. We may have created the monster, they'll say, but we didn't set it loose. This dodge infuriates security professionals and the police, who say it is legally precise but morally corrupt. ''When they publish a virus online, they know someone's going to release it,'' says Eugene Spafford, a computer-science professor and security expert at Purdue University. Like a collection of young Dr. Frankensteins, the virus writers are increasingly creating forces they cannot control -- and for which they explicitly refuse to take responsibility.


"Where's the beer?'' Philet0ast3r wondered.

An hour earlier, he had dispatched three friends to pick up another case, but they were nowhere in sight. He looked out over the controlled chaos of his tiny one-bedroom apartment in small-town Bavaria. (Most of the virus writers I visited live in Europe; there have been very few active in the United States since 9/11, because of fears of prosecution.) Philet0ast3r's party was crammed with 20 friends who were blasting the punk band Deftones, playing cards, smoking furiously and arguing about politics. It was a Saturday night. Three girls sat on the floor, rolling another girl's hair into thick dreadlocks, the hairstyle of choice among the crowd. Philet0ast3r himself -- a 21-year-old with a small silver hoop piercing his lower lip -- wears his brown hair in thick dreads. (Philet0ast3r is an online handle; he didn't want me to use his name.)

Philet0ast3r's friends finally arrived with a fresh case of ale, and his blue eyes lit up. He flicked open a bottle using the edge of his cigarette lighter and toasted the others. A tall blond friend in a jacket festooned with anti-Nike logos put his arm around Philet0ast3r and beamed.

''This guy,'' he proclaimed, ''is the best at Visual Basic.''

In the virus underground, that's love. Visual Basic is a computer language popular among malware authors for its simplicity; Philet0ast3r has used it to create several of the two dozen viruses he's written. From this tiny tourist town, he works as an assistant in a home for the mentally disabled and in his spare time runs an international virus-writers' group called the ''Ready Rangers Liberation Front.'' He founded the group three years ago with a few bored high-school friends in his even tinier hometown nearby. I met him, like everyone profiled in this article, online, first e-mailing him, then chatting in an Internet Relay Chat channel where virus writers meet and trade tips and war stories.

Philet0ast3r got interested in malware the same way most virus authors do: his own computer was hit by a virus. He wanted to know how it worked and began hunting down virus-writers' Web sites. He discovered years' worth of viruses online, all easily downloadable, as well as primers full of coding tricks. He spent long evenings hanging out in online chat rooms, asking questions, and soon began writing his own worms.

One might assume Philet0ast3r would favor destructive viruses, given the fact that his apartment is decorated top-to-bottom with anticorporate stickers. But Philet0ast3r's viruses, like those of many malware writers, are often surprisingly mild things carrying goofy payloads. One worm does nothing but display a picture of a raised middle finger on your computer screen, then sheepishly apologize for the gesture. (''Hey, this is not meant to you! I just wanted to show my payload.'') Another one he is currently developing will install two artificial intelligence chat-agents on your computer; they appear in a pop-up window, talking to each other nervously about whether your antivirus software is going to catch and delete them. Philet0ast3r said he was also working on something sneakier: a ''keylogger.'' It's a Trojan virus that monitors every keystroke its victim types -- including passwords and confidential e-mail messages -- then secretly mails out copies to whoever planted the virus. Anyone who spreads this Trojan would be able to quickly harvest huge amounts of sensitive personal information.

Technically, ''viruses'' and ''worms'' are slightly different things. When a virus arrives on your computer, it disguises itself. It might look like an OutKast song (''hey--ya.mp3''), but if you look more closely, you'll see it has an unusual suffix, like ''hey--ya.mp3.exe.'' That's because it isn't an MP3 file at all. It's a tiny program, and when you click on it, it will reprogram parts of your computer to do something new, like display a message. A virus cannot kick-start itself; a human needs to be fooled into clicking on it. This turns virus writers into armchair psychologists, always hunting for new tricks to dupe someone into activating a virus. (''All virus-spreading,'' one virus writer said caustically, ''is based on the idiotic behavior of the users.'')

Worms, in contrast, usually do not require any human intervention to spread. That means they can travel at the breakneck pace of computers themselves. Unlike a virus, a worm generally does not alter or destroy data on a computer. Its danger lies in its speed: when a worm multiplies, it often generates enough traffic to brown out Internet servers, like air-conditioners bringing down the power grid on a hot summer day. The most popular worms today are ''mass mailers,'' which attack a victim's computer, swipe the addresses out of Microsoft Outlook (the world's most common e-mail program) and send a copy of the worm to everyone in the victim's address book. These days, the distinction between worm and virus is breaking down. A worm will carry a virus with it, dropping it onto the victim's hard drive to do its work, then e-mailing itself off to a new target.

The most ferocious threats today are ''network worms,'' which exploit a particular flaw in a software product (often one by Microsoft). The author of Slammer, for example, noticed a flaw in Microsoft's SQL Server, an online database commonly used by businesses and governments. The Slammer worm would find an unprotected SQL server, then would fire bursts of information at it, flooding the server's data ''buffer,'' like a cup filled to the brim with water. Once its buffer was full, the server could be tricked into sending out thousands of new copies of the worm to other servers. Normally, a server should not allow an outside agent to control it that way, but Microsoft had neglected to defend against such an attack. Using that flaw, Slammer flooded the Internet with 55 million blasts of data per second and in only 10 minutes colonized almost all vulnerable machines. The attacks slowed the 911 system in Bellevue, Wash., a Seattle suburb, to such a degree that operators had to resort to a manual method of tracking calls.

Philet0ast3r said he isn't interested in producing a network worm, but he said it wouldn't be hard if he wanted to do it. He would scour the Web sites where computer-security professionals report any new software vulnerabilities they discover. Often, these security white papers will explain the flaw in such detail that they practically provide a road map on how to write a worm that exploits it. ''Then I would use it,'' he concluded. ''It's that simple.''

Computer-science experts have a phrase for that type of fast-spreading epidemic: ''a Warhol worm,'' in honor of Andy Warhol's prediction that everyone would be famous for 15 minutes. ''In computer terms, 15 minutes is a really long time,'' says Nicholas Weaver, a researcher at the International Computer Science Institute in Berkeley, who coined the Warhol term. ''The worm moves faster than humans can respond.'' He suspects that even more damaging worms are on the way. All a worm writer needs to do is find a significant new flaw in a Microsoft product, then write some code that exploits it. Even Microsoft admits that there are flaws the company doesn't yet know about.

Virus writers are especially hostile toward Microsoft, the perennial whipping boy of the geek world. From their (somewhat self-serving) point of view, Microsoft is to blame for the worm epidemic, because the company frequently leaves flaws in its products that allow malware to spread. Microsoft markets its products to less expert computer users, cultivating precisely the sort of gullible victims who click on disguised virus attachments. But it is Microsoft's success that really makes it such an attractive target: since more than 90 percent of desktop computers run Windows, worm writers target Microsoft in order to hit the largest possible number of victims. (By relying so exclusively on Microsoft products, virus authors say, we have created a digital monoculture, a dangerous thinning of the Internet's gene pool.)

Microsoft officials disagree that their programs are poor quality, of course. And it is also possible that their products are targeted because it has become cool to do so. ''There's sort of a natural tendency to go after the biggest dog,'' says Phil Reitinger, senior security strategist for Microsoft. Reitinger says that the company is working to make its products more secure. But Microsoft is now so angry that it has launched a counterattack. Last fall, Microsoft set up a $5 million fund to pay for information leading to the capture of writers who target Windows machines. So far, the company has announced $250,000 bounties for the creators of Blaster, Sobig.F and Mydoom.B.


The motivations of the top virus writers can often seem paradoxical. They spend hours dreaming up new strategies to infect computers, then hours more bringing them to reality. Yet when they're done, most of them say they have little interest in turning their creations free. (In fact, 99 percent of all malware never successfully spreads in the wild, either because it expressly wasn't designed to do so or because the author was inept and misprogrammed his virus.) Though Philet0ast3r is proud of his keylogger, he said he does not intend to release it into the wild. His reason is partly one of self-protection; he wouldn't want the police to trace it back to him. But he also said he does not ethically believe in damaging someone else's computer.

So why write a worm, if you're not going to spread it?

For the sheer intellectual challenge, Philet0ast3r replied, the fun of producing something ''really cool.'' For the top worm writers, the goal is to make something that's brand-new, never seen before. Replicating an existing virus is ''lame,'' the worst of all possible insults. A truly innovative worm, Philet0ast3r said, ''is like art.'' To allow his malware to travel swiftly online, the virus writer must keep its code short and efficient, like a poet elegantly packing as much creativity as possible into the tight format of a sonnet. ''One condition of art,'' he noted, ''is doing good things with less.''

When he gets stuck on a particularly thorny problem, Philet0ast3r will sometimes call for help from other members of the Ready Rangers Liberation Front (which includes Mario). Another friend in another country, whom Philet0ast3r has never actually met, is helping him complete his keylogger by writing a few crucial bits of code that will hide the tool from its victim's view. When they're done, they'll publish their invention in their group's zine, a semiannual anthology of the members' best work.

The virus scene is oddly gentlemanly, almost like the amateur scientist societies of Victorian Britain, where colleagues presented papers in an attempt to win that most elusive of social currencies: street cred. In fact, I didn't meet anyone who gloated about his own talent until I met Benny. He is a member of 29A, a super-elite cadre within the virus underground, a handful of coders around the world whose malware is so innovative that even antivirus experts grudgingly admit they're impressed. Based in the Czech Republic, Benny, clean-cut and wide-eyed, has been writing viruses for five years, making him a veteran in the field at age 21. ''The main thing that I'm most proud of, and that no one else can say, is that I always come up with a new idea,'' he said, ushering me into a bedroom so neat that it looked as if he'd stacked his magazines using a ruler and level. ''Each worm shows something different, something new that hadn't been done before by anyone.''

Benny -- that's his handle, not his real name -- is most famous for having written a virus that infected Windows 2000 two weeks before Windows 2000 was released. He'd met a Microsoft employee months earlier who boasted that the new operating system would be ''more secure than ever''; Benny wrote (but says he didn't release) the virus specifically to humiliate the company. ''Microsoft,'' he said with a laugh, ''wasn't enthusiastic.'' He also wrote Leviathan, the first virus to use ''multithreading,'' a technique that makes the computer execute several commands at once, like a juggler handling multiple balls. It greatly speeds up the pace at which viruses can spread. Benny published that invention in his group's zine, and now many of the most virulent bugs have adopted the technique, including last summer's infamous Sobig.F.

For a virus author, a successful worm brings the sort of fame that a particularly daring piece of graffiti used to produce: the author's name, automatically replicating itself in cyberspace. When antivirus companies post on their Web sites a new ''alert'' warning of a fresh menace, the thrill for the author is like getting a great book review: something to crow about and e-mail around to your friends. Writing malware, as one author e-mailed me, is like creating artificial life. A virus, he wrote, is ''a humble little creature with only the intention to avoid extinction and survive.''

Quite apart from the intellectual fun of programming, though, the virus scene is attractive partly because it's very social. When Philet0ast3r drops by a virus-writers chat channel late at night after work, the conversation is as likely to be about music, politics or girls as the latest in worm technology. ''They're not talking about viruses -- they're talking about relationships or ordering pizza,'' says Sarah Gordon, a senior research fellow at Symantec, an antivirus company, who is one of the only researchers in the world who has interviewed hundreds of virus writers about their motivations. Very occasionally, malware authors even meet up face to face for a party; Philet0ast3r once took a road trip for a beer-addled weekend of coding, and when I visited Mario, we met up with another Austrian virus writer and discussed code for hours at a bar.

The virus community attracts a lot of smart but alienated young men, libertarian types who are often flummoxed by the social nuances of life. While the virus scene isn't dominated by those characters, it certainly has its share -- and they are often the ones with a genuine chip on their shoulder.

''I am a social reject,'' admitted Vorgon (as he called himself), a virus writer in Toronto with whom I exchanged messages one night in an online chat channel. He studied computer science in college but couldn't find a computer job after sending out 400 resumes. With ''no friends, not much family'' and no girlfriend for years, he became depressed. He attempted suicide, he said, by walking out one frigid winter night into a nearby forest for five hours with no jacket on. But then he got into the virus-writing scene and found a community. ''I met a lot of cool people who were interested in what I did,'' he wrote. ''They made me feel good again.'' He called his first virus FirstBorn to celebrate his new identity. Later, he saw that one of his worms had been written up as an alert on an antivirus site, and it thrilled him. ''Kinda like when I got my first girlfriend,'' he wrote. ''I was god for a couple days.'' He began work on another worm, trying to recapture the feeling. ''I spent three months working on it just so I could have those couple of days of godliness.''

Vorgon is still angry about life. His next worm, he wrote, will try to specifically target the people who wouldn't hire him. It will have a ''spidering'' engine that crawls Web-page links, trying to find likely e-mail addresses for human-resource managers, ''like careers@microsoft.com, for example.'' Then it will send them a fake resume infected with the worm. (He hasn't yet decided on a payload, and he hasn't ruled out a destructive one.) ''This is a revenge worm,'' he explained -- for ''not hiring me, and hiring some loser that is not even half the programmer I am.''


Many people might wonder why virus writers aren't simply rounded up and arrested for producing their creations. But in most countries, writing viruses is not illegal. Indeed, in the United States some legal scholars argue that it is protected as free speech. Software is a type of language, and writing a program is akin to writing a recipe for beef stew. It is merely a bunch of instructions for the computer to follow, in the same way that a recipe is a set of instructions for a cook to follow. A virus or worm becomes illegal only when it is activated -- when someone sends it to a victim and starts it spreading in the wild, and it does measurable damage to computer systems. The top malware authors are acutely aware of this distinction. Most every virus-writer Web site includes a disclaimer stating that it exists purely for educational purposes, and that if a visitor downloads a virus to spread, the responsibility is entirely the visitor's. Benny's main virus-writing computer at home has no Internet connection at all; he has walled it off like an airlocked biological-weapons lab, so that nothing can escape, even by accident.

Virus writers argue that they shouldn't be held accountable for other people's actions. They are merely pursuing an interest in writing self-replicating computer code. ''I'm not responsible for people who do silly things and distribute them among their friends,'' Benny said defiantly. ''I'm not responsible for those. What I like to do is programming, and I like to show it to people -- who may then do something with it.'' A young woman who goes by the handle Gigabyte told me in an online chat room that if the authorities wanted to arrest her and other virus writers, then ''they should arrest the creators of guns as well.''

One of the youngest virus writers I visited was Stephen Mathieson, a 16-year-old in Detroit whose screen name is Kefi. He also belongs to Philet0ast3r's Ready Rangers Liberation Front. A year ago, Mathieson became annoyed when he found members of another virus-writers group called Catfish_VX plagiarizing his code. So he wrote Evion, a worm specifically designed to taunt the Catfish guys. He put it up on his Web site for everyone to see. Like most of Mathieson's work, the worm had no destructive intent. It merely popped up a few cocky messages, including: Catfish_VX are lamers. This virus was constructed for them to steal.

Someone did in fact steal it, because pretty soon Mathieson heard reports of it being spotted in the wild. To this day, he does not know who circulated Evion. But he suspects it was probably a random troublemaker, a script kiddie who swiped it from his site. ''The kids,'' he said, shaking his head, ''just cut and paste.''

Quite aside from the strangeness of listening to a 16-year-old complain about ''the kids,'' Mathieson's rhetoric glosses over a charged ethical and legal debate. It is tempting to wonder if the leading malware authors are lying -- whether they do in fact circulate their worms on the sly, obsessed with a desire to see whether they will really work. While security officials say that may occasionally happen, they also say the top virus writers are quite likely telling the truth. ''If you're writing important virus code, you're probably well trained,'' says David Perry, global director of education for Trend Micro, an antivirus company. ''You know a number of tricks to write good code, but you don't want to go to prison. You have an income and stuff. It takes someone unaware of the consequences to release a virus.''

But worm authors are hardly absolved of blame. By putting their code freely on the Web, virus writers essentially dangle temptation in front of every disgruntled teenager who goes online looking for a way to rebel. A cynic might say that malware authors rely on clueless script kiddies the same way that a drug dealer uses 13-year-olds to carry illegal goods -- passing the liability off to a hapless mule.

''You've got several levels here,'' says Marc Rogers, a former police officer who now researches computer forensics at Purdue University. ''You've got the guys who write it, and they know they shouldn't release it because it's illegal. So they put it out there knowing that some script kiddie who wants to feel like a big shot in the virus underground will put it out. They know these neophytes will jump on it. So they're grinning ear to ear, because their baby, their creation, is out there. But they didn't officially release it, so they don't get in trouble.'' He says he thinks that the original authors are just as blameworthy as the spreaders.

Sarah Gordon of Symantec also says the authors are ethically naive. ''If you're going to say it's an artistic statement, there are more responsible ways to be artistic than to create code that costs people millions,'' she says. Critics like Reitinger, the Microsoft security chief, are even harsher. ''To me, it's online arson,'' he says. ''Launching a virus is no different from burning down a building. There are people who would never toss a Molotov cocktail into a warehouse, but they wouldn't think for a second about launching a virus.''

What makes this issue particularly fuzzy is the nature of computer code. It skews the traditional intellectual question about studying dangerous topics. Academics who research nuclear-fission techniques, for example, worry that their research could help a terrorist make a weapon. Many publish their findings anyway, believing that the mere knowledge of how fission works won't help Al Qaeda get access to uranium or rocket parts.

But computer code is a different type of knowledge. The code for a virus is itself the weapon. You could read it in the same way you read a book, to help educate yourself about malware. Or you could set it running, turning it instantly into an active agent. Computer code blurs the line between speech and act. ''It's like taking a gun and sticking bullets in it and sitting it on the counter and saying, 'Hey, free gun!''' Rogers says.

Some academics have pondered whether virus authors could be charged under conspiracy laws. Creating a virus, they theorize, might be considered a form of abetting a crime by providing materials. Ken Dunham, the head of ''malicious code intelligence'' for iDefense, a computer security company, notes that there are certainly many examples of virus authors assisting newcomers. He has been in chat rooms, he says, ''where I can see people saying, 'How can I find vulnerable hosts?' And another guy says, 'Oh, go here, you can use this tool.' They're helping each other out.''

There are virus writers who appreciate these complexities. But they are certain that the viruses they write count as protected speech. They insist they have a right to explore their interests. Indeed, a number of them say they are making the world a better place, because they openly expose the weaknesses of computer systems. When Philet0ast3r or Mario or Mathieson finishes a new virus, they say, they will immediately e-mail a copy of it to antivirus companies. That way, they explained, the companies can program their software to recognize and delete the virus should some script kiddie ever release it into the wild. This is further proof that they mean no harm with their hobby, as Mathieson pointed out. On the contrary, he said, their virus-writing strengthens the ''immune system'' of the Internet.

These moral nuances fall apart in the case of virus authors who are themselves willing to release worms into the wild. They're more rare, for obvious reasons. Usually they are overseas, in countries where the police are less concerned with software crimes. One such author is Melhacker, a young man who reportedly lives in Malaysia and has expressed sympathy for Osama bin Laden. Antivirus companies have linked him to the development of several worms, including one that claims to come from the ''Qaeda network.'' Before the Iraq war, he told a computer magazine that he would release a virulent worm if the United States attacked Iraq -- a threat that proved hollow. When I e-mailed him, he described his favorite type of worm payload: ''Stolen information from other people.'' He won't say which of his viruses he has himself spread and refuses to comment on his connection to the Qaeda worm. But in December on Indovirus.net, a discussion board for virus writers, Melhacker urged other writers to ''try to make it in the wild'' and to release their viruses in cybercafes, presumably to avoid detection. He also told them to stop sending in their work to antivirus companies.

Mathieson wrote a critical post in response, arguing that a good virus writer shouldn't need to spread his work. Virus authors are, in fact, sometimes quite chagrined when someone puts a dangerous worm into circulation, because it can cause a public backlash that hurts the entire virus community. When the Melissa virus raged out of control in 1999, many Internet service providers immediately shut down the Web sites of malware creators. Virus writers stormed online to pillory the Melissa author for turning his creation loose. ''We don't need any more grief,'' one wrote.


If you ask cyberpolice and security experts about their greatest fears, they are not the traditional virus writers, like Mario or Philet0ast3r or Benny. For better or worse, those authors are a known quantity. What keeps antivirus people awake at night these days is an entirely new threat: worms created for explicit criminal purposes.

These began to emerge last year. Sobig in particular alarmed virus researchers. It was released six separate times throughout 2003, and each time the worm was programmed to shut itself off permanently after a few days or weeks. Every time the worm appeared anew, it had been altered in a way that suggested a single author had been tinkering with it, observing its behavior in the wild, then killing off his creation to prepare a new and more insidious version. ''It was a set of very well-controlled experiments,'' says Mikko Hypponen, the director of antivirus research at F-Secure, a computer security company. ''The code is high quality. It's been tested well. It really works in the real world.'' By the time the latest variant, Sobig.F, appeared in August, the worm was programmed to install a back door that would allow the author to assume control of the victim's computer. To what purpose? Experts say its author has used the captured machines to send spam and might also be stealing financial information from the victims' computers.

No one has any clue who wrote Sobig. The writers of this new class of worm leave none of the traces of their identities that malware authors traditionally include in their code, like their screen names or ''greetz,'' shout-out hellos to their cyberfriends. Because criminal authors actively spread their creations, they are cautious about tipping their hand. ''The F.B.I. is out for the Sobig guy with both claws, and they want to make an example of him,'' David Perry notes. ''He's not going to mouth off.'' Dunham of iDefense says his online research has turned up ''anecdotal evidence'' that the Sobig author comes from Russia or elsewhere in Europe. Others suspect China or other parts of Asia. It seems unlikely that Sobig came from the United States, because American police forces have been the most proactive of any worldwide in hunting those who spread malware. Many experts believe the Sobig author will release a new variant sometime this year.

Sobig was not alone. A variant of the Mimail worm, which appeared last spring, would install a fake pop-up screen on a computer pretending to be from PayPal, an online e-commerce firm. It would claim that PayPal had lost the victim's credit-card or banking details and ask him to type it in again. When he did, the worm would forward the information to the worm's still-unknown author. Another worm, called Bugbear.B, was programmed to employ sophisticated password-guessing strategies at banks and brokerages to steal personal information. ''It was specifically designed to target financial institutions,'' said Vincent Weafer, senior director of Symantec.

The era of the stealth worm is upon us. None of these pieces of malware were destructive or designed to cripple the Internet with too much traffic. On the contrary, they were designed to be unobtrusive, to slip into the background, the better to secretly harvest data. Five years ago, the biggest danger was the ''Chernobyl'' virus, which deleted your hard drive. But the prevalence of hard-drive-destroying viruses has steadily declined to almost zero. Malware authors have learned a lesson that biologists have long known: the best way for a virus to spread is to ensure its host remains alive.

''It's like comparing Ebola to AIDS,'' says Joe Wells, an antivirus researcher and founder of WildList, a long-established virus-tracking group. ''They both do the same thing. Except one does it in three days, and the other lingers and lingers and lingers. But which is worse? The ones that linger are the ones that spread the most.''

In essence, the long years of experimentation have served as a sort of Darwinian evolutionary contest, in which virus writers have gradually figured out the best strategies for survival.

Given the pace of virus development, we are probably going to see even nastier criminal attacks in the future. Some academics have predicted the rise of ''cryptoviruses'' -- malware that invades your computer and encrypts all your files, making them unreadable. ''The only way to get the data back will be to pay a ransom,'' says Stuart Schechter, a doctoral candidate in computer security at Harvard. (One night on a discussion board I stumbled across a few virus writers casually discussing this very concept.) Antivirus companies are writing research papers that worry about the rising threat of ''metamorphic'' worms -- ones that can shift their shapes so radically that antivirus companies cannot recognize they're a piece of malware. Some experimental metamorphic code has been published by Z0mbie, a reclusive Russian member of the 29A virus-writing group. And mobile-phone viruses are probably also only a few years away. A phone virus could secretly place 3 a.m. calls to a toll number, sticking you with thousand-dollar charges that the virus's author would collect. Or it could drown 911 in phantom calls. As Marty Lindner, a cybersecurity expert at CERT/CC, a federally financed computer research center, puts it, ''The sky's the limit.''

The profusion of viruses has even become a national-security issue. Government officials worry that terrorists could easily launch viruses that cripple American telecommunications, sowing confusion in advance of a physical 9/11-style attack. Paula Scalingi, the former director of the Department of Energy's Office of Critical Infrastructure Protection, now works as a consultant running disaster-preparedness exercises. Last year she helped organize ''Purple Crescent'' in New Orleans, an exercise that modeled a terrorist strike against the city's annual Jazz and Heritage Festival. The simulation includes a physical attack but also uses a worm unleashed by the terrorists designed to cripple communications and sow confusion nationwide. The physical attack winds up flooding New Orleans; the cyberattack makes hospital care chaotic. ''They have trouble communicating, they can't get staff in, it's hard for them to order supplies,'' she says. ''The impact of worms and viruses can be prodigious.''


This new age of criminal viruses puts traditional malware authors in a politically precarious spot. Police forces are under more pressure than ever to take any worm seriously, regardless of the motivations of the author.

A young Spaniard named Antonio discovered that last fall. He is a quiet 23-year-old computer professional who lives near Madrid. Last August, he read about the Blaster worm and how it exploited a Microsoft flaw. He became intrigued, and after poking around on a few virus sites, found some sample code that worked the same way. He downloaded it and began tinkering to see how it worked.

Then on Nov. 14, as he left to go to work, Spanish police met him at his door. They told him the anti-virus company Panda Software had discovered his worm had spread to 120,000 computers. When Panda analyzed the worm code, it quickly discovered that the program pointed to a site Antonio had developed. Panda forwarded the information to the police, who hunted Antonio down via his Internet service provider. The police stripped his house of every computer -- including his roommate's -- and threw Antonio in jail. After two days, they let him out, upon which Antonio's employer immediately fired him. ''I have very little money,'' he said when I met him in December. ''If I don't have a job in a little time, in a few months I can't pay the rent. I will have to go to my parents.''

The Spanish court is currently considering what charges to press. Antonio's lawyer, Javier Maestre, argued that the worm had no dangerous payload and did no damage to any of the computers it infected. He suspects Antonio is being targeted by the police, who want to pretend they've made an important cyberbust, and by an antivirus company seeking publicity.

Artificial life can spin out of control -- and when it does, it can take real life with it. Antonio says he did not actually intend to release his worm at all. The worm spreads by scanning computers for the Blaster vulnerability, then sending a copy of itself to any open target. Antonio maintains he thought he was playing it safe, because his computer was not directly connected to the Internet. His roommate's computer had the Internet connection, and a local network -- a set of cables connecting their computers together -- allowed Antonio to share the signal.

But what Antonio didn't realize, he says, was that his worm would regard his friend's computer as a foreign target. It spawned a copy of itself in his friend's machine. From there it leapfrogged onto the Internet -- and out into the wild. His creation had come to life and, like Frankenstein's monster, decided upon a path of its own.
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not.
Cynthetiq is offline  
Old 02-09-2004, 03:03 PM   #36 (permalink)
Tilted
 
Location: San Francisco
Call me guilty.

I'm somewhat techincal, having worked at Cisco for a number of years, but on my personal laptop, on my network, I don't have all their fancy firewalls and anti-virus software that came pre-installed on my work machines.

I've had spyware galore, I've had a few viruses, but mostly that came from surfing for porn, or just clicking on interesting links. Fortunately, I am married to an uber geek, so that helps me out- I'd be up shit creek if I didn't have his help regularly to flush my system *snicker*.

I don't think it's justifiable for anyone to blame anyone else for being a dolt where their computer is concerned. Everyone should be personally responsible for ensuring they know what they're clicking, opening, running etc.
__________________
Cute, but useless.
teriaki is offline  
 

Tags
alert, geeks, learn, log, put, times, unsavvy


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT -8. The time now is 11:06 AM.

Tilted Forum Project

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360