From: Hack Watch News <kooltek@iol.ie>
To: Moroni <moroni@scranton.com>
Message Hash: 3d1172c9e26c56b59cf7538f6d079e0aefea243fdb55c8ea1489ab961805c0fb
Message ID: <Pine.sol.3.90.960829020001.746C-100000@joyce.iol.ie>
Reply To: <Pine.LNX.3.95.960828195159.3614A-100000@user1.scranton.com>
UTC Datetime: 1996-08-29 04:02:28 UTC
Raw Date: Thu, 29 Aug 1996 12:02:28 +0800
From: Hack Watch News <kooltek@iol.ie>
Date: Thu, 29 Aug 1996 12:02:28 +0800
To: Moroni <moroni@scranton.com>
Subject: Re: stego virus
In-Reply-To: <Pine.LNX.3.95.960828195159.3614A-100000@user1.scranton.com>
Message-ID: <Pine.sol.3.90.960829020001.746C-100000@joyce.iol.ie>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 28 Aug 1996, Moroni wrote:
> If a virus is embedded into a giff ,is it executed when the giff is or
> does it require the usual overwriting etc methods to execute it?
>
The GIF would contain the operational data and the viewer would contain
the engine. Both would be inert until mixed just like binary nerve
gasses. The problem would be detecting the data in the GIF or indeed any
other form of file. Theoretically it could even be part of a text file
using the high bits.
Regards...jmcc
Return to August 1996
Return to “Moroni <moroni@scranton.com>”