Preview

I LOVE YOU COMPUTER VIRUS

Good Essays
Open Document
Open Document
366 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
I LOVE YOU COMPUTER VIRUS
“I LOVE YOU COMPUTER VIRUS” Onel De Guzman’s “I LOVE YOU” Virus, also referred to as “Love Letter”, was a computer worm that attacked tens of millions of Windows personal computers on and after May 5
2000 (Philippine Time), when it started spreading as an email message with the subject line
ILOVEYOU” and the attachment “LOVE­LETTER­FOR­YOU.txt.vbs”.
Opening the attachment activated the “Visual Basic Script”. The worm did damage on the local machine overwriting image files, and sent a copy of itself to the first 50 contacts in email. The virus, unleashed May 4, rapidly replicated itself via e­mail, overloading corporate e­mail systems in many countries and causing damage estimated at up to $10 billion. Computer forensic experts dissected the worm and discovered the codeword ‘Barok’ among its architecture. A professor at the AMA Computer College in the Philippines recognized the codeword, having seen it in a program submitted as an assignment by student Onel de Guzman.
Police searched Guzman’s apartment and discovered discs relating to the Love Bug’s creation, implicating Guzman as the perpetrator. Until President Joseph Estrada signed a new law in June covering electronic commerce and computer hacking, the Philippines had no laws specifically against computer crimes. The new legislation, however, cannot be applied retroactively to the “Love Bug” creator, and investigators instead charged de Guzman with traditional crimes such as theft and violation of a law that normally covers credit card fraud. The National Bureau of Investigation had waited more than a month to file the charges against de Guzman while it attempted to find applicable laws Prosecutors dismissed all charges filed against a former computer college student accused of having released the “ILOVEYOU” computer virus that crippled e­mail systems worldwide. The

You May Also Find These Documents Helpful

  • Good Essays

    This stems from his actions while on duty because he was robbing Hispanic drivers during traffic stop. In the investigation the Tulsa Police Special Investigation Division and the Oklahoma Bureau of Narcotics set up and conducted a sting operation. This operation was put in…

    • 477 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week2 lab#4

    • 258 Words
    • 2 Pages

    5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS (326830), MS08-067 is a security vulnerability that allows an attacker to take advantage of an exploit that allows a computer worm to remotely run code without user intervention. (Zero day exploit). The patch titled kb958644 fixes the vulnerability.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the year of 1877, Reconstruction started and was a big success in resolving political, social, and economic problems. Furthermore, it restored the United States as a unified nation. The era was established to fix all the conflicts between the North and South. Additionally three more amendments were stated, the 13th, 14th, and 15th; declaring former slaves the right to vote, earning their citizenship, and making slavery illegal. Although the former black slaves were now free, they had no land and very few rights, and most did not even have family. However with the reconstruction, blacks were able to gain rights, but were continuously harassed by the white southerners. The formation of the Ku Klux Klan sabotaged hopes for freedom and progress for African Americans.…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses.…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Even though Mexico has a legal system, there are many flaws to it. When Toño was arrested he honestly thought he was being kidnapped. The police threw him in the car and didn’t read him his rights, adding another layer of iniquity.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Speech Outline

    • 869 Words
    • 4 Pages

    Thesis Statement: How Joaquín Guzmán Loera became a mythical figure in Mexico, both a narco folk hero and a villain…

    • 869 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Global Crime Analysis

    • 1152 Words
    • 5 Pages

    • Viruses created just for computers sent from the Philippines caused computers to crash with numerous United States government entities for a week long.…

    • 1152 Words
    • 5 Pages
    Better Essays