Computer Virus Myths
(10th Edition: October 4, 1993)
by Rob Rosenberger
with Ross M. Greenberg


A number of myths have surfaced about the threat of computer "viruses." There are myths about how widespread they are, how dangerous they are, and even myths about what a computer virus really is. We want you to know the facts.

The first thing you need to learn is that a computer virus falls in the realm of malicious programming techniques known as "Trojan horses." All viruses are Trojan horses, but relatively few Trojan horses can be called a virus.

That having been said, it's time to go over the terminology we use when we lecture:

          BBS         Bulletin Board System.  If you have a modem, you
                      can call a BBS and leave messages, transfer com-
                      puter files back & forth, and learn a lot about
                      computers.  (What you're reading right now, for
                      example, most likely came to you from a BBS.)

          Bug         an accidental flaw in the logic of a program which
                      makes it do things it shouldn't be doing.  Pro-
                      grammers don't mean to put bugs in their programs,
                      but they always creep in.  Programmers often spend
                      more time "debugging" programs than they do
                      writing them in the first place.  Inadvertent bugs
                      have caused more data loss than all viruses
                      combined.

          Hacker      someone who really loves computers and who wants
                      to push them to the limit.  Hackers have a healthy
                      sense of curiosity: they try doorknobs just to see
                      if they're locked, for example.  They also love to
                      tinker with a piece of equipment until it's "just
                      right."  The entire computer revolution itself is
                      largely a result of hackers.

          Shareware   a distribution method for quality software avail-
                      able on a "try before you buy" basis.  You must
                      pay for it if you continue using it after the
                      trial period.  Shareware authors let you download
                      their programs from BBSs and encourage you to give
                      evaluation copies to friends.  Many shareware
                      applications rival their retail-shelf counterparts
                      at a fraction of the price.  (You must pay for the
                      shareware you continue to use -- otherwise you're
                      stealing software.)

          Trojan
          horse       a generic term describing a set of computer
                      instructions purposely hidden inside a program.
                      Trojan horses tell programs to do things you don't
                      expect them to do.  The term comes from the legen-
                      dary battle in which the ancient city of Troy
                      received a large wooden horse to commemorate a
                      fierce battle.  The "gift" secretly held enemy
                      soldiers in its belly and, when the Trojans rolled
                      it into their fortified city, ....

          Virus       a term for a very specialized Trojan horse which
                      spreads to other computers by secretly "infecting"
                      programs with a copy of itself.  A virus is the
                      only type of Trojan horse which is contagious,
                      much like the common cold.  If a Trojan horse
                      doesn't meet this definition, then it isn't
                      a virus.

          Worm        a term similar to a Trojan horse, but there is no
                      "gift" involved.  If the Trojans had left that
                      wooden horse outside the city, they wouldn't have
                      been attacked from inside the city.  Worms, on the
                      other hand, can bypass your defenses without
                      having to deceive you into dropping your guard.
                      An example would be a program designed to spread
                      itself by exploiting bugs in a network software
                      package.  Worms usually come from someone who has
                      legitimate access to the computer or network.

          Wormers     what we call people who unleash Trojan horses onto
                      an unsuspecting public.  Let's face it, these
                      people aren't angels.  What they do hurts us.
                      They deserve our disrespect.

Viruses, like all Trojan horses, purposely make a program do things you don't expect it to do. Some viruses will just annoy you, perhaps only displaying a "Peace on earth" greeting. The viruses we worry about will try to erase your data (the most valuable asset of your computer!) and waste your valuable time in recovering from an attack.

Now you know the differences between a bug and a Trojan horse and a virus. Let's get into some of the myths:

"All purposely destructive code spreads like a virus."

"Viruses and Trojan horses are a recent phenomenon."

"Viruses are written by teenage hackers."

"Viruses infect 25% of all IBM PCs every month."

"Only 500 different viruses? But most experts talk about them in the thousands."

"A virus could destroy all the files on my disks."

"Viruses have been documented on over 300,000 computers {1988}." "Viruses have been documented on over 400,000 computers {1989}." "The Michelangelo virus alone was estimated to be on over 5,000,000 computers {1992}."

"Viruses can hide inside a data file."

"Some viruses can completely hide themselves from all antivirus software, making them truly undetectable."

"BBSs and shareware programs spread viruses."

"My computer could be infected if I call an infected BBS."

"So-called `boot sector' viruses travel primarily in software downloaded from BBSs."

"My files are damaged, so it must have been a virus attack."

"Donald Burleson was convicted of releasing a virus."

"Robert Morris Jr. released a benign virus on a defense network."

"The U.S. government planted a virus in Iraqi military computers during the Gulf War."

"Viruses can spread to all sorts of computers."

"My backups will be worthless if I back up a virus."

"Antivirus software will protect me from viruses."

"Read-only files are safe from virus infections."

"Viruses can infect files on write-protected floppy disks."

We'd appreciate it if you would mail us a copy of any Trojan horse or virus you discover. (Be careful you don't damage the data on your disks while trying to do this!) Include as much information as you can and put a label on the disk saying it con- tains a malicious program. Send it to Ross M. Greenberg, Soft- ware Concepts Design, Virus Acres, New Kingston, NY 12459. Thank you.