> If one were to receive a message bearing a virus (e.g. klez), what
> happens to it on a mac?

Generally, absolutely nothing. :)

> Does it get deleted via emptying one's old mail?

Yes it does.

> Does it reside in any particular place?

It resides as an attachment embedded within the email- usually you will see
.pif or a few other names- there are something like 3-4 variants that all
use different tricks such as subject and message lines.

The real nasty thing about the klez virus is that it is incredibly hard to
figure out where it came from. It has its own SMTP engine, and keeps lists
of names of machines it has infected and mixes and matches the "from and
to". So someone might actually get a message that looks like it came from
you that has a virus in it, but you never sent it, or you might get one from
someone you don't know at all.

> I heard someone say it would
> just "sit there". Where? In one's mail app?

Yep, it will essentially sit there within your mail application. Kind of
like if you emailed a PC user an applescript and they double clicked it-
nothing would happen, because their PC doesn't have applescript to hook
into.

But, they could forward that applescript to a mac user and that mac user
could then run it.

> It doesn't latch onto the code of an application?

Nope. :)

Some macro virus's =can= theoretically do that, which is why macs sometimes
can be seen as viral incubators. One of the funniest things I ever saw was
happened at a company I worked for around 3 years ago. One day I was at a
meeting, and came back to the head of operations (boss of the network
admins) berating one of my designers until I thought she would cry. It
turned out someone had sent her the "I love you" virus, she didn't know what
it was and forwarded it on to three network admins, and all hell broke loose
from there.

Her mac wasn't affected by it, but by forwarding the message she essentially
sent all three of them the virus which hit the exchange server... About a
day before it caused havoc around the world. I just said I'd deal with it,
took her into a conference room and sat down and laughed for at least 20
minutes, then told her about how I once accidently deleted an entire virtual
host directory instead of one file via a mistyped / while connected through
telnet. Stuff just happens. Unfortunately microsoft just makes it much
easier for stuff to just happen.

I know some of my above answers were short, so I'll try to clarify with a
little history so it makes some more sense:

Basically, awhile back microsoft decided it would be very cool to build in
all of this neat functionality into its products and exchange servers. If
you've ever used the PC outlook, you've seen this- you can send someone a
message requesting a meeting, they can say "yes I can be there at this and
this time" when they reply. Your server/machine gets the message, updates
your meeting database and you're good to go.

Over a bunch of objections, microsoft chose convenience over security. Most
of their products have a scripting language built in (similar to
applescript) which allows the applications to be controlled via the built in
"hooks". These are essentially what are exploited- because people keep
finding new holes in their implimentation.

Back in the day, MS had a standard policy- all of their products had to be
built on the same code base in order to help eliminate wasted reimplentation
costs. So the same hooks were built into the mac products starting with
version 6.0 (through emulation). Therefore, macs were theoretically able to
be affected by word macro viruses. Outlook express and outlook 2001 never
had functionality that could be exploited- you'd think outlook could be, but
it was never feature compatible- the exchange server only served it RTF
files and stripped out the rest.

So you're essentially left with word files that can have macros embedded
within them, that =can= affect your mac. They theoretically can even
propogate them throughout all your word files by adding itself to a special
file MS uses to create new word docs starting with MS 6.0, 97 and 98.

Here's the thing though- even though theoretically a word virus can
propogate on the mac, and even run- 99.999999999% of the time it expects to
be running on windows, so the code it tries to run (ie, "delete c:") is
meaningless to the mac and nothing happens.

Long, but hopefully it puts your mind at ease a little.


Michael Bryan Bell
------------------
ICQ: 16106263                            Yahoo: mhbell1
No Link for you!                         AIM:  drunkenbatman


-- 
G-Books is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-Books list info:      <http://lowendmac.com/lists/g-books.html>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-books%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to