TITLE

Back Orifice is back and it's badder than ever

AUTHOR(S)
Schwartau, Winn
PUB. DATE
August 1999
SOURCE
Network World;08/02/99, Vol. 16 Issue 31, p35
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the launching during the 1999 Def Con of the Back Orifice 2000 virus by the Cult of the Dead Cow (CDC), an organization of computer hackers. Revelation of the lack of security in Windows NT and other Microsoft products; Prevention of computer viruses; Plans to sue CDC.
ACCESSION #
2658453

 

Related Articles

  • Bad rap for Back Orifice 2000? Messmer, Ellen // Network World;07/19/99, Vol. 16 Issue 29, p1 

    Reports that the computer hacker group called Cult of the Dead Cow posted Back Orifice 2000, a free tool for seizing control of an NT-based computer network. Promotion of the program for legitimate use by network managers for remote administration; Highlights of the Def Con hacker convention;...

  • Hacknight. TORSSON, PALLE // Journal Nordic Museology / Nordisk Museologi;2014, Issue 2, p118 

    The article focuses on a hacknight organized by the hackerspace Sparvnästet for around-the-clock conference among computer hackers held in Stockholm, Sweden. Topics covered include the role of the National Museum of Science and Technology of Sweden in the event, and the approach taken by the...

  • If your PC has BO, try Toilet Paper, other software. Machrone, Bill // PC Week;08/24/98, Vol. 15 Issue 34, p53 

    Focuses on Back Orifice, an application developed by the Cult of the Dead Cow which installs itself as a server on one's computer and allows remote access and control. Computers which are at risk from Back Orifice; Products like Toilet Paper and Antigen 1.0 which can protect against Back...

  • The Plague of the Virus. Keefe, Linda // Fleet Equipment;Mar2000, Vol. 26 Issue 3, p13 

    Provides information on computer viruses and how to prevent it. How to differentiate a hardware problem from a virus; Critical parts of anti-virus software; Several Web sites that offer information about specific viruses.

  • Detecting And Recovering From A Virus Incident--Part 1. Stone, John // Business Communications Review;Mar2003, Vol. 33 Issue 3, p42 

    Provides tips in handling computer virus attacks in the U.S. Identification of the attack; Methods of virus distribution; Importance of having updated antivirus software; Assessment of the infection vector. INSETS: Immediate Response: Update Your Antivirus Software;In Search Of System Zero.

  • Cyber Infections. Pietromonaco, Peter // Poptronics;Dec2002, Vol. 3 Issue 12, p14 

    Focuses on the software programs known as viruses, worms and Trojan horses that infect the computer systems causing a wide range of problems. Basic terminology related to the destruction causing programs; Examples of some of the computer viruses; Precautions to be taken to avoid being affected...

  • The Bug Report.  // InfoWorld;11/22/99, Vol. 21 Issue 47, p28 

    Offers a solution to the computer bug associated with the application of Sun-Netscape Alliance's iPlanet Web Server, Enterprise Edition 4.0 Service Pack 2 on a Compaq platform.

  • Virus protection across networks. Walker, Christy // PC Week;08/11/97, Vol. 14 Issue 34, p53 

    Discusses LANDesk Virus Protect 5.0 client/server software from Intel Corp., a virus protection system that provides centralized protection for networks running different operating systems across multiple network operating systems. Features; Manageability; Price; Contact information.

  • Here's a little advice to help you defeat the Internet's leading Trojan horse viruses. McClure, Stuart; Scambray, Joel // InfoWorld;12/04/2000, Vol. 22 Issue 49, p58 

    Gives advice on how to defeat Trojan horse computer viruses. Most popular Trojan horse on the Internet; Ways in which a Subseven infection can occur; How to detect viruses.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics