Information Technology Reference
In-Depth Information
requiring humans to physically transport and deliver the media from machine to ma-
chine. Network based replication is often the fastest. Many Trojan horses immediately
spread after infection without any requirements of user activation while others are
software executables named after attractive sports figured requiring. Invariably hostile
code that requires user intervention spread slower than code that does not.
The next stage of the Melissa virus is infection. The code segment below shows the
infection portion of the Melissa virus.
During infection, the Melissa virus sets a permanent key within the operating sys-
tem to indicate that the system has been infected and proceeds to infect the default
document template for Microsoft Word and the current document if it is not already
Search WWH ::




Custom Search