-Caveat Lector- 'McVeigh Virus' Lurks As Execution Video Old Hacker Program Can Take Control Of Your Computer WASHINGTON, 2:32 p.m. EDT June 12, 2001 -- If you get an offer to view a video of Oklahoma City bomber Timothy McVeigh's execution, be careful. It probably isn't a video clip, just an old computer trick. In an Internet chat room on Monday, hours after McVeigh's death, some participants went to a Web link to see a bootleg video of the execution only to be duped into downloading a malicious program that can allow a hacker to take control of another computer. Brad Chapman, a Brigham Young University computer science student, said that by visiting a Web site at Internet provider Concentric Networks, his computer downloaded the program, known as SubSeven. Chapman didn't run the program, but instead analyzed it and found out what it really does. April Goostree, anti-virus manager at computer security firm McAfee.com, said that SubSeven is an old program that is disguised as many things. "It was just a matter of time before somebody would attach McVeigh's name to it," Goostree said. Goostree said that almost any anti-virus program will detect the program. Still, SubSeven and its variants are the most common threat to home computers, according to McAfee.com research. The execution of McVeigh in Terre Haute, Ind., was broadcast to a federal facility in Oklahoma City, where victims of his bombing could watch. The FBI said that there is no indication that the signal was intercepted. Copyright 2001 by The Associated Press. All rights reserved. ======================================================= Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT FROM THE DESK OF: *Michael Spitzer* <[EMAIL PROTECTED]> The Best Way To Destroy Enemies Is To Change Them To Friends ======================================================= <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om