-Caveat Lector-

'McVeigh Virus' Lurks As Execution Video

Old Hacker Program Can Take Control Of Your Computer

WASHINGTON, 2:32 p.m. EDT June 12, 2001 -- If you get an offer to view a
video of Oklahoma City bomber Timothy McVeigh's execution, be careful.
It probably isn't a video clip, just an old computer trick.

In an Internet chat room on Monday, hours after McVeigh's death, some
participants went to a Web link to see a bootleg video of the execution
only to be duped into downloading a malicious program that can allow a
hacker to take control of another computer.

Brad Chapman, a Brigham Young University computer science student, said
that by visiting a Web site at Internet provider Concentric Networks,
his computer downloaded the program, known as SubSeven.

Chapman didn't run the program, but instead analyzed it and found out
what it really does.

April Goostree, anti-virus manager at computer security firm McAfee.com,
said that SubSeven is an old program that is disguised as many things.

"It was just a matter of time before somebody would attach McVeigh's
name to it," Goostree said.

Goostree said that almost any anti-virus program will detect the
program. Still, SubSeven and its variants are the most common threat to
home computers, according to McAfee.com research.

The execution of McVeigh in Terre Haute, Ind., was broadcast to a
federal facility in Oklahoma City, where victims of his bombing could
watch. The FBI said that there is no indication that the signal was
intercepted.

Copyright 2001 by The Associated Press. All rights reserved.

=======================================================
                      Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

          FROM THE DESK OF:

                    *Michael Spitzer*    <[EMAIL PROTECTED]>

    The Best Way To Destroy Enemies Is To Change Them To Friends
=======================================================

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to