1996-08-29 - Re: stego virus

Header Data

From: Hack Watch News <kooltek@iol.ie>
To: Moroni <moroni@scranton.com>
Message Hash: 3d1172c9e26c56b59cf7538f6d079e0aefea243fdb55c8ea1489ab961805c0fb
Message ID: <Pine.sol.3.90.960829020001.746C-100000@joyce.iol.ie>
Reply To: <Pine.LNX.3.95.960828195159.3614A-100000@user1.scranton.com>
UTC Datetime: 1996-08-29 04:02:28 UTC
Raw Date: Thu, 29 Aug 1996 12:02:28 +0800

Raw message

From: Hack Watch News <kooltek@iol.ie>
Date: Thu, 29 Aug 1996 12:02:28 +0800
To: Moroni <moroni@scranton.com>
Subject: Re: stego virus
In-Reply-To: <Pine.LNX.3.95.960828195159.3614A-100000@user1.scranton.com>
Message-ID: <Pine.sol.3.90.960829020001.746C-100000@joyce.iol.ie>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 28 Aug 1996, Moroni wrote:

>    If a virus is embedded into a giff ,is it executed when the giff is or
> does it require the usual overwriting etc methods to execute it?
>                       

The GIF would contain the operational data and the viewer would contain 
the engine. Both would be inert until mixed just like binary nerve 
gasses. The problem would be detecting the data in the GIF or indeed any 
other form of file. Theoretically it could even be part of a text file 
using the high bits.

Regards...jmcc 





Thread