Segment 2 Of 2 So it is a whole attitude change that has to take place, and I think that the resource issue is a challenge. Well, people are very serious. Zip, an especially vindictive virus designed to destroy Microsoft Word, Excel and Powerpoint files. Example: if file extension display is turned off, example. Harris Miller, who is President of the Information Technology Association of America. I think they're going to say ''no, thanks,'' and move on. They come in the form of something that you have to anticipate based on past experience at the very least.
Segment 2 Of 2 Do you solemnly swear that the testimony you are about to give is the truth, the whole truth, and nothing but the truth? Variant M Subject: Thank you For Flying with Arab Airlines Message: Please check if the bill is correct, by opening the attached file. Segment 2 Of 2 The airplanes themselves only got about ten-fold better, more safe and so on. Today's kids are the first generation of true cyber citizens. It seems to me like the Melissa virus. Gone are the days of accidental, widespread and destructive virus infections.
I just have a brief follow-up. So 65 percent of North American companies, we believe, were infected by the Love Bug virus on Thursday. The senator who pushed the bill, Ramon Magsaysay Jr. While that seems unlikely, Mr. It seems to be that some people are at risk. There is going to be no web designer that is ever going to develop a technology that is going to say that no hacker is going to break into your web site. Segment 2 Of 2 So we see62 companies of 63 that were surveyed yesterdaythese are randomized companies in North America that have more than 200 computers, so this is medium and large organizations62 out of the 63, or 98 percent, experienced the Love Bug virus.
I would like to give you each an opportunity to give us what you see as kind of the key elements that we in Congress have a responsibility to fulfill. I think at this point I can indicate who the panelists are. First of all, as Mr. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. But I think that more technology needs to be created, creative such as what we have with Outbreak Manager that looks for patterns to help stop this kind of destructive virus. The identity behind the two accounts proved difficult to trace--the perpetrator had used a series of faked and stolen e-mail addresses and anonymous, prepaid Internet-access cards.
One, if anyone has the least inclination to open an unknown email containing an unknown attachment from a heretofore unknown lover, then perhaps they're not really love-worth. Spyware is software that is installed on a computing device without the user's knowledge. I don't understand exactly why it is that with all of the technology that is available, with all of the consistent patterns that we're seeingand this is the easy stuff. This doesn't even do anything terribly pernicious once it gets in there and we couldn't stop it. The gentlelady from Michigan, Ms.
Windows would file names from right to left, stopping at the first period character, showing only those elements to the left of this. So this shy, spiky-haired young man is playing a risky game of wink and nod: giving occasional interviews in which he refuses to own up to the virus, but tries to cash in on the dark glory it confers. Miller's position and say, ''I am going to have to build a very hard sandbox around us and I can't exchange information except through an air gap. The worm propagated itself by sending out one copy of the payload to each entry in the address book Windows Address Book. What the consumers appear to wantwhether business or individual consumersis instant e-mail. Like a real Asian influenza, the virus first emerged in Hong Kong.
Unlike his cybernaut Vice President, Al Gore, whose campaign was largely unaffected, Clinton rarely reads his e-mail. Segment 2 Of 2 One of the interesting problems of network security that Ms. Once copied into this directory the virus will then send itself to all the individuals in your address book. Embedded in the virus' code--or blueprint--were the alias spyder, an e-mail address and the words Manila,Philippines. We have a virus that looks a lot like the Melissa virus that caused an enormous amount of damage theoretically and was recognized throughout the world that was created by a not particularly well-educated or well-trained person who wanted to pay homage to a stripper in Florida. Yes, Microsoft is an easy target because they own the market, but you have an environment where the software industry is delivering for a market.
There are other controls Segment 2 Of 2 Mr. New Legislation Cannot Apply Until President Joseph Estrada signed a new law in June covering electronic commerce and computer hacking, the Philippines had no laws specifically against computer crimes. This new technology is aptly called Outbreak Manager and is designed to protect potential and real virus threats. Imagine what a well-designed Love Bug could do when we have become even more dependent on computer networks and those networks are wireless. Gutknecht had to leave, but I will guarantee you one thing: we will be back here having another hearing on another virus attack. By week's end, the work of investigators was further complicated by the appearance of a number of copycat viruses, created either by others or by the Love Bug's author.