Order form for THE VIRUS CREATION LABS and THE CRYPT HYPERTEXT by
Dr. George C. Smith, the acclaimed and noted editor of the The
Crypt Newsletter.
---------------------------------------------------------------------------
1.) THE VIRUS CREATION LABS: A JOURNEY INTO THE UNDERGROUND.

   Yes, I want to receive a copy of George Smith's "The Virus
   Creation Labs: A Journey Into the Underground" (ISBN 0-929408-09-8).

   Price: $12.95/copy plus $3.00 shipping 1st book ($1.00 each additional 
          book. International Orders from outside the USA, $5 shipping and 
          handling, $1 each additional book).

   NAME: _____________________________________________

   ADDRESS: __________________________________________

   CITY/STATE/ZIP: __________________________________

   Number of books:__________ 

   Shipping & Handling:__________

   Total Enclosed:_________

   Payment method: Please send a check for $15.95 for a single copy to:

   COMSEC Ltd.
   1545 Waukegan Road Ste 2
   Glenview, IL 60025-2143
   1-708-729-3565


=====================================================================

What readers are saying about THE VIRUS CREATION LABS:

"There are relatively few books on the 'computer underground' that
provide richly descriptive commentary and analysis of personalities
and culture that simultaneously grab the reader with entertaining
prose. Among the classics are Cliff Stoll's 'The Cuckoo's Egg,' Katie
Hafner and John Markoff's 'Cyberpunk,' and Bruce Sterling's 'The
Hacker Crackdown.'  Add George Smith's 'The Virus Creation Labs' to
the list . . . 'Virus Creation Labs' is about viruses as
M*A*S*H is about war!"

                      ----Jim Thomas, Computer underground
                       Digest 7.18, March 5, 1995

"THE VIRUS CREATION LABS dives into the hoopla of the Michelangelo
media blitz and moves on to become an engaging, articulate,
wildly angry diatribe on the world of computer virus writers . . .
Expert reporting."
                      ----McClatchy NewsWire


"I opened the book at random and it grabbed me right from the 
first paragraph. I sat down that same weekend and read the 
whole thing!"
                    
                      ---Victor Sussman, US News & World Report


"The eruption of electronic publications and services has
produced some genuinely novel ways to waste time.  Anyone who
has the time to explore the vast resources of the Internet
should probably read 'The Virus Creation Labs' instead.
Cynical, diverting new book . . ."
                     
                     ----Steven Aftergood, the Federation of
                         American Scientists' SECRECY & GOVERNMENT
                         BULLETIN

"As a satirist I should probably resent this book, because I am
incapable of making up anything as wild as George Smith's true
account of the media-manufactured panic over computer viruses.
But as a reader, I found it riveting.  If you like superstition,
ignorance, greed, demonology and hypocrisy as much as I do,
you'll like it too!
                     
                     ----Floyd Kemske, acclaimed author of "The
                     Virtual Boss" (Catbird Press)


"The Virus Creation Labs" has a sample chapter on the
World Wide Web! View pics of the author and the book.

Set your graphical browser (Mosaic, Netscape, etc.) to:

URL: http://www.soci.niu.edu:80/~crypt
(don't forget the squiggly before the "crypt")

===================================================================== 
 

-------------------------------------------------------------------
"The Virus Creation Labs," as reviewed 
by Jim Thomas, CuD 7.18, March 6, 1995

From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 1--Review of _The Virus Creation Labs_ (by George Smith)

There are relatively few books on the "computer underground" that
provide richly descriptive commentary and analysis of personalities
and culture that simultaneously grab the reader with entertaining
prose. Among the classics are Cliff Stoll's _The Cuckoo's Egg_, Katie
Hafner and John Markoff's _Cyberpunks_, and Bruce Sterling's _The
Hacker Crackdown_.  Add George Smith's _The Virus Creation Labs_ to
the list.

_Virus Creation Labs_ is about viruses as M*A*S*H is about war.
Computer viruses are simply a window through which Smith guides our
gaze into a bizarre Pirandellian world of inflated egos, malicious
territorialism, questionable ethics, and avarice, about equally
divided between the moral entrepreneurs amongst virus fighters and
their nemesis, the virus writers.  Smith writes with irony, cynical
humor, and well-researched prose to provide insights into the
symbiotic, chaotic, and oft-times seemingly pathological relationship
between churlish virus writers and the equally churlish anti-virus
moral entrepreneurs.

At the outset, Smith makes it clear that his is neither a technical
tome nor an expose.  Although his text reads with the ease of a novel,
the subtext is a biting commentary on the Manichean world view
possessed by many in the phalleocentric anti-virus community and on the
maturity-challenged actions of many of the virus writers who coexist
in an uneasy partnership of co-dependency.

Smith begins his narrative with the Michelangelo virus hysteria of
1992, which, he explains, launched his own interest in viruses:

     It sent me down the trail to the rim of cyberspace in search
     of people who, perhaps not surprisingly, turned out to be
     pretty much like most Americans, except with an order of
     magnitude greater interest in the inner workings of the
     desktop personal computer. Like most of us, there wasn't a
     nobleman in the lot--and there were none among the ranks of
     the antivirus software developers and security consultants
     who consider themselves the gatekeepers at a fantasy wall of
     their own construction erected between the Wild West of
     cyberspace and the mannered, sterile environment of safe
     home and business computing (p. 2).

Smith argues with some persuasiveness that Michelangelo was fueled
largely by the anti-virus industry who, while seeming to magnaminously
provide the public with free cleansing software, in fact hyped the
virus to the media to dramatize the dangers of this and other viruses
as an effective commercial strategy.  Although Smith is hardly the
first to make this accusation, he is the first to provide a strong
argument. He notes, for example, that Compuserve made $100,000 in on
line charges from [anti-virus forums], the source of anti-virus software
in the days prior to March 6, the date the virus was supposed to 
strike (p. 7) . . .  and notes how the virus threat [resulted]
in McAfee Associates gaining major dominance in the U.S. 
anti-virus software market.

Smith notes that some anti-virus experts, such as Pam Kane,
tried to temper the hysteria with reasoned writings, but she
and a few others were out-shouted by the "vendor-created hysteria:"

        It's a venal pattern repeated over and over: Anti-virus
     software manufactures and security consultants carping at
     each other and conducting back-stabbing negative publicity
     campaigns in the computer or mainstream press, complicated
     by the entrenched practice within computer industry
     publishing houses allowing corporate heads or their catspaws
     to write books and reviews focused on their merchandise.
     These tricks tend to be hidden behind mock concern over
     high-tech petty atrocities usually perpetrated by
     mysterious, unseen computer vandals or hackers.  Like many
     hardscrabble businessmen vying for commercial advantage in
     an increasingly confined arena dominated by one company,
     such tactics grant them all the charm and panache of a
     60-pound bag of money-mad cockroaches (p 18).

Among [those] Smith singles out as especially dubious
are John Buchanan, who is described as a mercenary and a-moral
huckster with little technical talent but a bent for 
self-promotion . . . [Another], Paul Ferguson, "an obscure 
security consultant," wrote an anonymous letter to RISKS Digests
. . . which resulted in one of the most mean-spirited and
unethical actions on the 'nets.
In the anonymous letter, Ferguson engaged in a good bit of 
disingenuous diatribe, character assassination, and hysteria to 
complain that AIS BBS, a general-information BBS run by the 
Treasury Department's Office of Public Debt, was engaged in unethical
and likely illegal distribution of virus source code. A copy of the
post was sent to Congress, and an inquiry began. Ferguson was later
exposed as the letter's author, but not before his cowardly action
brought the roof down on the AIS sysop, a young woman with a military
background and substantial integrity. The story was picked up by the
national media, and the "good ol' boys" in the anti-virus crowd
succeeded in illustrating that, in the name of their sacred cause,
they were not above engaging in actions as reprehensible as those they
claimed to opposed. Like the virus writers, Ferguson and his cronies
displayed no honor in their devious assault on a security expert whose
opposition to viruses was no less than their own. So much for ethics.

It should be noted that Smith does not dispute the need for
anti-virus software, and he gives credit to those anti-virus
authors who make products that work. His intent is not to disparage
talent where it exists. Instead he criticizes the social
organization of the culture, its exclusiveness, and the often
self-serving shennanigans of some of the practitioners.

Smith is no less gentle on most virus writers than he is on
the anti-virus crowd. A few, such as Little Loc, the teenager
who wrote Satan Bug, and the mysterious Dark Avenger, depicted as one
of the most brilliant of virus writers, are acknowledged for their
talents, but not romanticized. Most virus writers, Smith argues, are
simply untalented kids capable of modifying source code (or running
"virus creation software"), but not of doing any real programming.
Although here I've emphasized some of Smith's discussion of the
anti-virus crowd, he covers both groups fairly evenly.

What do we learn from Smith's book? First, he provides a new look at
the relationship between virus writers and anti-virus software
developers. We learn that the former are not demons and the latter, as
a group, are hardly altruistic heroes. Second, we learn that there is a
difference between those who write viruses and those who plant them.
Smith displays an intellectual appreciation for the talents of
competent programers (of all types), but shares hostility for vandals,
"wannabes," and those who prey on others. Third, Smith describes in
nifty detail the workings of both virus and anti-virus cultures, and
suggests a symbiosis by which each culture is driven. Finally, Smith
drives home the lesson that the best protection against viruses is
simple common sense:  Maintain clean disks, make regular backups, and
practice "safe hex."

That _The Virus Creation Labs_ is both well-written and well
researched is no surprise. Smith, a chemistry Phd, combines a scholars
eye with the skills he honed as a journalist.  If he had chosen a
major publisher for his manuscript, a light routine editing would
smooth over some of the rough edges, and there likely would have been
an index included. However, a major publisher would also have more
than doubled the price of the book.  While there always minor flaws in
all books, and although not all readers will share the perspective or
some of the conclusions, _The Virus Creation Labs_ is one of the best
descriptions of this slice of computer culture to date.  The book will
serve as a handy resource or a supplement for classes.  Unfortunately,
it's not available in bookstores, and must be ordered directly from
American Eagle Publications, an unwise marketing move. But, it's
well-worth ordering.
----------------------------------------------------------
The chapter "A Priest Deploys his Satanic Minions" from
"Virus Creation Labs" was distributed to the nets free and
clear in Computer underground Digest 7.18.

Cu Digest is an electronic publication issued approximately
twice a week which addresses most, if not all, topics concerning
the information highway, hackers, computer security, privacy
and the sociology and on-going development of cyberspace.

=====================================================================


 
           
2.)

              
                CRYPT HYPERTEXT ORDER FORM
---------------------------------------------------------------------
By Mail:

Return this form along with your remittance to:

COMSEC Ltd.
1545 Waukegan Road Ste 2
Glenview, Illinois 60025

Orders:  800-754-8214
Support: 708-729-3565
Fax:     708-729-3575

Questions To: crypt@sun.soci.niu.edu
              70743.1711@compuserve.com

ORDER:

[ ]  ____    Crypt Hypertext(s) @ $30.00 each.
           
[ ] Regular mail shipping, please add $4.00.

[ ] US Priority Mail, please add $6.00.


Checks and money orders must be in U.S. dollars drawn on a U.S. bank.
Do Not Enclose Cash.

Total enclosed . . . . . . . . . . . . . . $______________
      
Payment by:  [] Check  [] Money Order
      
SHIP TO:

Name _____________________________________________________

Address 1 ________________________________________________

Address 2 ________________________________________________

City __________________________ State/Province ___________

Zip/Postal Code ________________ Country _________________

Telephone (______)________________________________________

=======================================================================



The CRYPT NEWSLETTER database is now available as a hypertext
tool.  We've collected all the Crypt Newsletters from the
magazine's initial publication in 1992 to the present and
reworked them into a linked, keyworded, annotated hypertext
database.

The database contains not only the best of Crypt Newsletter but
also a great deal of additional material and notes never published
before.  Where appropriate, additions have also been made to old
issues and articles to provide current perspective and background.

The database also contains a keyworded glossary and extensive 
subject index spanning the length and breadth of the newsletter.

In the database you'll find comprehensive stories, tutorials 
and news on: 

   the computer virus underground and virus-writers

   the anti-virus industry

   on-line culture and sociology

   the secret government within the military industrial complex

   anti-virus software reviews

   book reviews of current titles in security

   annals of computer crime & computer virus spread

   virus descriptions and history

   walkthrough simulations, imagery and displays from computer
  viruses and the legendary virus-making software toolkits

   discussion of legal issues with regard to computer viruses and
  related computer crime

   review of the mainstream media: the shams and scams reported as
  real news. Take a clear-eyed, skeptic's look at the information 
  highway!

And there's much more - five books worth of material - all 
delivered in the acerbic, to-the-point style used by the Crypt 
Newsletter. Take a look at the issues and controversial topics 
in cyberspace on your terms, without fear of being bitten or 
molested by your neighborhood cyberpest.

The Crypt Newsletter database is also extensible.  Future 
hypertext issues can easily be copied to the database's 
directory on your home computer and be seamlessly integrated 
into the collection.

The Crypt Newsletter hypertext database can be purchased
for $30. Comprehensive topic listing included in INDEX.TXT
file. Reference enclosed order form, please. 
----------------------------------------------------------

A little about the author . . .
*******************************

George Smith, Ph.D., aka Urnst Kouch, lives in southern
California where he writes and edits the Crypt Newsletter.
In 1991 he won a journalism fellowship jointly sponsored by
New York University's Center for War, Peace and the Newsmedia
and the Knight Center at the University of Maryland for
newspaper articles "on the nuts and bolts of nuclear
proliferation."  Since then he has written on science and
technology, specializing in the computer underground,
computer crime and viruses for Newsday, American Journalism
Review and others.  His first book, "The Virus Creation Labs,"
was published by American Eagle in early 1995.  Secure Computing
called it "informative and stunningly incisive . . ."; author
Barbara Ehrenreich says "George C. Smith is one of those very
rare people who can see through media hype and hi-tech hi-jinks
with equal clarity.  We're lucky to have him . . . "


=======================================================================

Master Index for Crypt Newsletter (1992-95)


Ŀ
 Crypt Hypertext Index 1992 - 95     

-=A=-
AIS
 AIS Security BBS scandal erupts
 AIS Security BBS scandal, comments
 AIS Security BBS scandal, journalists
 AIS BBS scandal, continued: Molehunt!
 AIS BBS scandal, quotable quotes
 Kim Clancy opens Security BBS at Bureau of Public Debt
Anti-virus
 AVSP: Anti-virus System Protection
 DEA computer expert comments on a-v industry
 Fake viruses and testing
 ---Doren Rosenthal
 GOBBLER II - a freeware anti-virus scanner
 McAfee Associates goes public
 Reviewer gripes about cost of anti-virus software
 Solomon's Anti-virus Toolkit and the Prodigy challenge
 Dr. Solomon's PC Anti-virus Book
 Dr. Solomon's Anti-virus Toolkit
 The security community eats its own young: a case study
 Trend Micro Devices' PC-Cillin
 Symantec dirt
 Victor Charlie 5.0 anti-virus
 Wampeter, foma, and granfalloons: McAfee critiques Microsoft
Aristotle
 Aristotle begins shipping computer viruses
 Aristotle on his virus library
 Merchandising of computer viruses
 NewSara
 Page virus
Artificial life
  --in books:
 Bogus! "Artificial Life" (Pantheon) by Steven Levy
 Comparing computer viruses to their namesake
-=B=-
Badger, Mr.
 Do you suffer from Information Highway
 Mr. Badger assassinates Seymour Papert
 Mr. Badger readies himself for blanket illiteracy
 Mr. Badger takes on the business section
 Mr. Badger on computer journalism
 Mr. Badger hates our information society
 Mr. Badger and the joys of cybersex
 Mr. Badger's Possi-Pullity
 Mr. Badger spins out on Info Highway
 Mr. Badger reviews MONDO 2000
 The New Republic on the Info Highway
 Mr. Badger's Weltschmerz
 Mr. Badger wrestles with supernerds
banned
 Vesselin Bontchev attacks American foes
banned books
 Giant Black Book of Computer Viruses
 National Vanguard mail-bombs
batch file viruses
 Popular Science does computer viruses
Bill Gates
 Chairman Bill's hagiography
 Satire: Bill Gates & Mentufactury
 Triumph of the Shill: Kaiser Bill & Win95
Black books
 Giant Black Book of Computer Viruses
Bontchev, Vesselin
 Approaching Zero
 Comments on virus-writing contests
 Vesselin Bontchev attacks American foes
Bulgarians
 Approaching Zero
 Discover magazine covers mad Bulgarians
 Vesselin Bontchev attacks American foes
Burger, Ralf
 German computer mag interviews virus writers
 Ralf Burger --thumbnail sketch
Burma virus
 "The Swizzler"
Butterflies virus
 Computer virus analysis: partial disassembly
-=C=-
Cansu
 V-Sign virus
CIA
 Hiring at the CIA: no bedwetters allowed
Clancy, Kim (The Fed)
 AIS Security BBS scandal erupts
 AIS Security BBS scandal, comments
 AIS Security BBS scandal, journalists
 Kim Clancy opens Security BBS at Bureau of Public Debt
 AIS BBS scandal, continued: Molehunt!
 AIS BBS scandal, quotable quotes
 Comments on virus-writing contest
Colombians
 Colombian drug lords and computer viruses
Companion virus
 Companion viruses and memory
crime
 E-mail death threats & the President
 FBI notes on Kevin Mitnick
 Hacker Kevin Poulsen charged
 Kevin Mitnick dragnet begins
 Mitnick plea bargains
 Man pranks ex-wife with software boobytrap
 NuKE virus-writer in hot water
 Rusty & Edie's BBS busted on piracy charge
 Secret Service incommoded by Satan Bug virus
 Software piracy bust in Boston
 Songs of the cyber-doomed (mail bombs revisited)
 The American Outlaw: Sonny Barger
 Virus writer cornered by PC forensics
 The WELL's mail is rifled
Crypt
 Crypt exercise: restoring COMMAND.COM from simple viruses
 Crypt 18 feature: A look back at the NRO
 Crypt in Der Spiegel
CVDQ
 Computer Virus Developments Quarterly
Cyberpunk
 Barbara Ehrenreich's cyberpunk Kipper's Game
 "Cyberpunk!"
 Nation of Thieves hacker arrest
 Songs of the cyber-doomed (mail bombs revisited)
 The Hacker Crackdown
 The Real Cyberpunk Fakebook
 TIME magazine covers cyberpunk
-=D=-
 Dark Avenger
 DEN ZUK virus
Digital Ink, Washington Post
 The low spark of well-heeled noise
Dudley computer virus events
 Confusion to your enemies: Clinton Haines & Dudley virus
 Clint Haines and the Dudley saga, continued
 Dudley virus
-=E=-
Economics of computer viruses
 Merchandising of computer viruses
encryption
 Crushing DES code
 Government steps up war on encryption
 KOH encryption computer virus
 Network Security and Protect Your Privacy
epidemiology
 IBM's computers and epidemiology
 IBM computer virus experts and infection modeling
ethics
 Deborah Johnson's Computer Ethics
 Hand puppets to teach computer ethics at national lab
-=F=-
Fidonet
 Songs of the cyber-doomed (mail bombs revisited)
Fred Cohen
-=G=-
 GENVIR: A French virus creation laboratory
 GENVIR screens ----appearance of GENVIR
 GOBBLER II - a freeware anti-virus scanner
Gordon, Sarah
 NewSara
-=H=-
hackers
 A priest deploys his Satanic minions
 Confusion to your enemies: Clinton Haines & Dudley virus
 Clint Haines and the Dudley saga, continued
 Hacker Kevin Poulsen charged
 Kevin Mitnick time line
 Mitnick history, continued
 More on February 1995 Mitnick arrest
 PHRAKR TRAKR hunts hackers
-=I=-
Infection
 Computer viruses in hospitals: anecdotal reports
 IBM computer virus experts and infection modeling
 IBM's computers and epidemiology
 Microsoft distributes FORM virus
 Washington Post meets Stealth Boot C
Info highway
 Cliff Stoll's Silicon Snake Oil
 Internet-On-A-Stick
 Satire: the press release from Hell
 The New Republic on the Info Highway
INFOWAR
 Alvin and Heidi Toffler's "War & Anti-war"
 Infowar & non-lethal weapons
 The military's new scorn flakes
-=J=-
Junkie computer virus
 Junkie
 Panicked by the Junkie virus
-=K=-
Kemske, Floyd
 Floyd Kemske's "Virtual Boss"
-=L=-
law, tort liability, viruses
 Computer viruses and institutional liability
legislation
 Legislative move to curb viruses, 1992
 Peter Tippett's model for computer virus legislation
 Regulation of computer code
LOKJAW virus
 Retaliating computer viruses: LOKJAW virus
-=M=-
MacMag virus
 Richard Brandow charged in MacMag Peace virus incident
Markey, Ed (Congressman)
 Congressman Ed Markey: Camera Hog
McAfee
 Crypt business analysis of McAfee Associates, late 1993
 McAfee Associates goes public
 McAfee and Michelangelo: The little virus that didn't
 Wampeter, foma, and granfalloons: McAfee critiques Microsoft
Michelangelo virus
 McAfee and Michelangelo: The little virus that didn't
 Dick Francis on Michelangelo
Mitnick, Kevin
 "Cyberpunk!"
 Kevin Mitnick dragnet begins
 Kevin Mitnick time line
 Mitnick history, continued
 More on February 1995 Mitnick arrest
 FBI notes on Kevin Mitnick
 Mitnick plea bargains
MONDO 2000
 MONDO 2000: the book
 Mr. Badger reviews MONDO 2000
-=N=-
Natas virus
 A Priest deploys his Satanic minions
Nation of Thieves hacker arrest
National Atomic Museum
 National Atomic Museum: no bookworms allowed
National Reconnaissance Office (NRO)
 Crypt 18 feature: A look back at the NRO
 Keeping up with the NRO's cash flow
 National Reconnaissance Office secret fund
 The NRO: still secret after all these years
NEW WORLD ORDER
 Underground conspiracy theory
 Satire: a New World Order glossary
NuKE
  --virus-writing group
 Aristotle begins shipping computer viruses
 Confusion to your enemies: Clinton Haines & Dudley virus
 Clint Haines and the Dudley saga, continued
 GENVIR: A French virus creation laboratory
 GENVIR screens ---appearance of GENVIR
 NuKE virus-writer in hot water
 Son of VCL: NRLG ---NuKE Randomic Life Generator virus kit
 Virus Creation Laboratory 
 Virus Creation Laboratory walkthrough
-=O=-
 The OBIT computer
-=P=-
phalcon/SKISM
 phalcon/SKISM hacker markets virus toolkit
 A Priest deploys his Satanic minions
Penzias, Arno
 Nobel laureate Arno Penzias on the triumph of fax
PGP, Pretty Good Privacy
 Government steps up war on encryption
 Network Security and Protect Your Privacy  --books reviewed
 Phil Zimmermann's contraband
Pierce, William ("The Turner Diaries")
 National Vanguard mail-bombs
 Underground conspiracy theory
Pile, Chris (Black Baron)
 Virus writer cornered by PC forensics
 British virus writer headed for bighouse
pornography
 Porn programs discovered on OK City network
 Student publishes on-line porn marketing pamphlet
Poulsen, Kevin (Dark Dante)
 Hacker Kevin Poulsen charged
-=Q=-
-=R=-
revenge
 Computer viruses as tools of workplace retribution
 Man pranks ex-wife with software boobytrap
-=S=-
SATAN
 Dan's SATAN adventure
 Dan's SATAN adventure, continued
Satan Bug
 Secret Service incommoded by Satan Bug virus
SNEAKERS: the movie
SMEG virus
 SMEG
 British virus writer headed for bighouse (Black Baron)
 Virus writer cornered by PC forensics    (Black Baron)
 Panicked by the Junkie virus
Solomon, Alan
 Dr. Solomon's Anti-virus Toolkit
 Dr. Solomon's PC Anti-virus Book
 Solomon's Anti-virus Toolkit and the Prodigy challenge
Stang, David
 A Priest deploys his Satanic minions
 David Stang v. Mark Ludwig
 David Stang's Network Security Secrets
 Secret Service incommoded by Satan Bug virus
 The security community eats its own young: a case study
Symantec, Norton Anti-virus
 Symantec dirt
-=T=-
Toffler, Alvin
 Alvin and Heidi Toffler's "War & Anti-war"
 Future Imperfect
trojan
  ----software boobytrap
"The Turner Diaries"
 --- National Vanguard mail-bombs
-=U=-
UNIX-HATERS
-=V=-
van Wyk, Ken - comp.virus
 Ken van Wyk
virtual reality/space
 Ten ways to improve on-line journalism
 The Real Cyberpunk Fakebook
 The Emperor's Virtual Clothes
 The low spark of well-heeled noise
 Virtually no reality
 The Virtual Unemployment Boom
VIRUDOS
 Stupid PC tricks: Virudos command shell
Virus Creation Laboratory, Nowhere Man
 VCS: German Virus Construction Set, 1991
 Virus Creation Laboratory
 Virus Creation Laboratory walkthrough
 Son of VCL: NRLG
Viruses
 Bogus! Computer viruses in the Gulf War
 Comments on virus-writing contests
 Companion viruses and memory
 Computer virus analysis: partial disassembly
 Computer virus awareness day
 Computer viruses as tools of workplace retribution
 Computer viruses and institutional liability
 Computer viruses in hospitals: anecdotal reports
 DEN ZUK virus
 Dudley virus
 Fake viruses and testing
 Giant Black Book of Computer Viruses
 Panicked by the Junkie virus
 KOH encryption computer virus
 Merchandising of computer viruses
 Natas virus
 NewSara
 Retaliating computer viruses: LOKJAW virus
 "The Swizzler"
 Satan Bug
 Virus: the comic book
 V-Sign virus
 ---virus BBSes
 Dial-a-Virus, really
 AIS Security BBS scandal erupts
 AIS Security BBS scandal, comments
 AIS Security BBS scandal, journalists
 AIS BBS scandal, continued: Molehunt!
 AIS BBS scandal, quotable quotes
 Kim Clancy opens Security BBS at Bureau of Public Debt
 ---virus writers
 Aristotle begins shipping computer viruses
 Aristotle on his virus library
 A Priest deploys his Satanic minions
 Confusion to your enemies: Clinton Haines & Dudley virus
 Clint Haines and the Dudley saga, continued
 German computer mag interviews virus writers
 Mark Washburn
 NuKE virus-writer in hot water
 Ralf Burger
 Secret Service incommoded by Satan Bug virus
 British virus writer headed for bighouse (Black Baron)
 Virus writer cornered by PC forensics    (Black Baron)
 ---virus toolkits
 GENVIR: A French virus creation laboratory
 GENVIR screens ----appearance of virus toolkit
 Instant Virus Producer marketed by YAM group
 phalcon/SKISM hacker markets virus toolkit
 Son of VCL: NRLG ----NuKE Randomic Life Generator virus toolkit
 Virus Creation Laboratory walkthrough
 VCS: German Virus Construction Set, 1991
-=W=-
Washington Post
 Washington Post meets Stealth Boot C
 ---Digital Ink
 The low spark of well-heeled noise
Whale virus
 Popular Science does computer viruses
-=X=-
-=Y=-
YAM hacking group
 Instant Virus Producer marketed by YAM group
-=Z=-

-=Common Virus Descriptions in Crypt Hypertext=-
  
    AntiCMOS        Lenart
    AntiExe
    DEN ZUK virus
    Diskwasher
    Dudley          NoFrills.Dudley
    Eddie           Dark Avenger
    Form
    Invisible
    Jumper          Jumper.A/Jumper.B
    Junkie          Dr. White
    Michelangelo
    Natas
    Noint           Stoned.Noint
    Nomenklatura
    NYB             B1, New York Beauty
    Pinworm         Virogen.Pinworm
    Russian Flag    Ekaterina, Slydell
    Satan Bug       Sat_Bug.Natas
    SMEG            Pathogen & Queeg
    Stealth Boot    Stealth Boot - A.B.C.D.E., etc.
    Stoned
    Tremor
    V-Sign          Sigalit or Cansu

 Other unusual virus references
  
    Coffeeshop
    Lehigh
    Groove
    Page            PS-MPC, Swan_Song
    NewSara
    Silly Willy
    "The Swizzler"  Swizzles/Burma
    The Whale       Mother Fish
 
 
 -=MISCELLANY=-
 Glossary

Inquiries on hypertext collection: crypt@sun.soci.niu.edu
Telephones: 800-754-8214; 708-729-3565

   
