Good Times virus got you worried? Gee, the thing doesn't even exist

Personal Computers

March 04, 1996|By PETER LEWIS

THE GOOD TIMES virus is a hoax.

For more than a year, people have been sending alarms to one another via electronic mail that an insidious computer virus called Good Times is spreading over the Internet.

According to the warnings, anyone who opens an electronic mail message with the words "Good Times" in its subject line risks all sorts of horrors, ranging from the erasure of hard disc drives to exploding video monitors.

The E-mail warnings sound sufficiently dweeby to impress even experienced computer users. "If the program is not stopped, the computer's processor will be placed in an nth-complexity infinite binary loop which can severely damage the processor if left running too long," according to one warning I received last week. "Unfortunately, most novice computer users will not realize what is happening until it is far too late."

The warning itself is infinitely loopy. And for the nth time, the Good Times virus does not exist. It is a fraud, a cyburban legend, nothing more than an electronic chain letter.

"It's a lot easier to create a message panic than it is to create a good virus," said Jimmy Kuo, a senior virus researcher at McAfee & Associates.

Many computer security experts are reluctant to dismiss Good Times as strenuously as it deserves, fearing that such scorn will only rile someone into creating a real Good Times virus. Goodness knows, there are already viruses around that are more worthy of concern. For example, we are within hours of March 6, the day each year when a virus called Michelangelo pops to life. It can cause damage, but almost any anti-virus program will catch it and kill it.

"Most people are running virus scanners on their computers, and the anti-virus authors are doing a good job," said Marvin J. Christensen, a computer security engineer at the Computer Incident Advisory Capability, the Department of Energy's computer response team. "To me, it would be stupid not to run a virus checker. There are too many ways to get viruses today."

Mr. Christensen pointed to new generations of viruses and so-called Trojan horse programs that can travel on the Internet and other computer networks, in some cases attached to electronic mail or documents that are downloaded from the net. (A computer virus is a piece of code that replicates and spreads from machine to machine; a Trojan horse is a program that purports to do one thing but really does another.)

The new viruses and Trojan horses are not well understood and are difficult to defend against. Most anti-virus programs look for executable programs, but they let electronic mail and other documents pass by unchallenged.

Does this mean that anyone who uses the Internet is in danger? Hardly.

With the exception of a little item called the WinWord macro virus, which primarily affects users of Microsoft Word for Windows version 6.0 or higher, these new bad guys are rare. And for now, at least, they are merely annoying, not destructive.

But the experts are concerned, because each new technology that is intended to make the Internet easier to use also makes it easier for these viruses and Trojan horses to spread.

The current trend is to embed mini-programs, called macros, or simple applications, called applets, in electronic documents, mail files or Web pages. An E-mail message to the boss might contain a snippet of a spreadsheet program that automatically opens when the message is read, or it might signal the user's own spreadsheet program to come alive.

"Just by opening a document, things are executed before the user has a chance to check them out" for nasty attachments, Mr. Christensen explained.

And then there is the dreaded Boza virus, which an alarmed reader informed me is "the first virus that directly infects the 32-bit protected memory Windows environment." In other words, it infects Windows 95 and Windows NT, which were designed to be impervious to traditional computer viruses.

Boza exists, but it is something of a dud. Just as regular computer programs can have bugs, so can viruses. Boza's bugs make it virtually impossible to spread from computer to computer, which is what computer viruses are all about.

Peter Lewis is a columnist for the New York Times.

Baltimore Sun Articles
|
|
|
Please note the green-lined linked article text has been applied commercially without any involvement from our newsroom editors, reporters or any other editorial staff.