greenber@utoday.UU.NET (Ross M. Greenberg) (12/07/89)
(In addition to contacting Ed Wilding, you may also contact me: I'm an editorial board member.. Ross M. Greenberg, greenber@utoday.uu.net) - -------- Call For Papers and Submissions for Virus Bulletin------ Anyone wishing to write on any of these topics, or wishing to receive the Virus Bulletin notes for contributors should contact Edward Wilding, Editor, Virus Bulletin, Haddenham, Aylesbury HP17 8JD, UK. Tel. 0844 290396., Tel Int. +44 844 290396., Fax 0844 291409,. Fax Int. +44 844 291409. For circulation to Virus Bulletin Editorial Board and all interested parties. Virus Bulletin copy submission deadlines 89/90. Issue 1.6 December 1989 Friday 1st December 1989 Issue 1.7 January 1990 Friday 22nd December 1989 Issue 1.8 February 1990 Friday 19th January 1990 Issue 1.9 March 1990 Friday 23rd February 1990 Issue 1.9 April 1990 Friday 23rd March 1990 Issue 1.10 May 1990 Friday 20th April 1990 (Please note that the copy deadline for Issue 1.7 (January 1990) is before the Christmas recess). Forthcoming Subjects The following is a list of possible articles in forthcoming editions. These are only suggestions and I welcome other ideas or more extended examination than listed. 1. Should we trust public domain anti-virus software? There are many arguments both for and against public domain anti-virus software - this article should attempt to outline its pros and cons and provide some guidelines for prospective users. 2. Practical steps for non experts in dealing with a network computer virus attack. What should be done immediately by systems administration in the face of such an attack? 3. Procedural steps to preventing computer virus infection. A checklist of procedures and rules which if observed will minimise the risk of a virus attack. 4. Anti-virus software evaluation in a corporate environment. By which criteria do large corporate microcomputer using organisations judge such software. Is there consensus on this point? 5. How do you test the value of an anti-virus package without having access to computer viruses? 6. 'Lab' viruses versus 'real world' viruses. Is it necessary for researchers to create viruses? What are the benefits and does experimentation present any dangers? 7. Towards a common terminology and nomenclature. 1701, Fall, Cascade, Hailstorm, 1704 - how do we overcome the fact that there is no agreement or consensus about naming or classifying viruses? Why is this? Equally, can we develop an agreed glossary of terms about the types of virus and their methods of infection? 8. Does commercial interest on the part of the 'virus industry' worldwide inhibit the anti-virus war? 9. Case studies. I should very much like to recieve good case studies which detail an actual virus attack, its impact, and the methods used to clear the infected system and restore operations. Specifics about the organisation need not be stated but a clear description of the affected computer environment is necessary. 10. Worm programs. Classifying network vulnerabilities and/or analysis of recent worm programs such as Internet or the two well known NASA SPAN attacks. Are there any universal procedures or methods to prevent such attacks and/or control them? 11. Statistics about virus attacks. Will it ever be possible to collate accurate data about the propagation of computer viruses? Refusal to report incidents means that at best we can only guess about the spread of specific viruses. Can we tell how fast a virus will spread by its design? 12. Mainframe viruses/ replicative attack programs. Fact or fantasy? Specific incidents would be helpful. What factors have served to suppress mainframe virus writing / propagation / reports? Patches (to increase general security) for specific machines would be welcome. 13. Forensic evidence. Most countries have no effective legislation to combat computer misuse. Even if laws to criminalise virus creation are introduced (such as that recommended by the Law Commission, UK, or implemented by the state of California, USA) the courts will face a difficult task in prosecuting. Are methods available to trace or identify computer virus writers? Would this evidence be sufficient to convict in a court of law? - --- Virus dissections (the analysis of a specific computer virus) are always welcome. These should not exceed 2200 words. Also details for programmers providing virus hexadecimal patterns, infective length, entry point and offset.