𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Securing intranet data with SSL client certificates

✍ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
84 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


The big macro attack, Chad Roll.While most network managers have taken precautions over recent years to protect against virus infection, many corporate networks are still vulnerable to attack. Apart from not taking preventive measures, corporations can expose themselves by not keeping abreast of the latest virus developments. Macro viruses are the most common and rapidly growing viruses ever recorded. They account for 80% of all virus attacks in the NCSA's 1997 Virus Prevalence Survey. Macro viruses have been found infecting spreadsheets and propagating throughout the network. Macro viruses use a third attachment point apart from the boot sector and resident code.These viruses reside on an application that typically uses macros, such as word processors and spreadsheets. Macro viruses are written in Word Basic andvisual Basic and can infect any platform that supports Microsoft Word 6.0 or 7.0 or Excel 5.0 or 7.0. This includes Windows 95, Windows NT, Macintosh System 7 and OS/2. Some macro viruses can infect documents and spreadsheets on multiple platforms and they can be malicious or benignThey circumvent traditional anti-virus solutions by directly infecting Word and Excel documents instead of executable files or programs. Macro viruses can 'auto-execute' when an infected E-mail attachment is opened and can infect files on the recipient's hard drive or tile server.