1. Even moderately adept computer users easily can go online and find do-it-yourself virus kits and other malicious code, Vatis said. 2. Foley and his group looked specifically at how easy it would be to create and propagate malicious code with one type of PDA, a Palm organizer. 3. He lives in Atlanta but is technical director of malicious code research for TruSecure Corp. in Herndon, Va. 4. If the file is saved to the hard drive, however, any malicious code will still be executed if and when the file is ever opened. 5. In response, at least two software companies have released test versions of software that will protect Palms from malicious code. 6. More ominously, opening a booby-trapped message can make you both a victim and an unwitting carrier of a computer virus conceived by a malicious code writer. 7. Now he is technical director of malicious code research for TruSecure Corp. in Herndon, Va. 8. One is a computer worm, a self-propagating piece of malicious programming code, called Code Red. 9. The malicious code, researchers say, can be hidden in the label, or file name, of an attachment. 10. The malicious code, in this case, translates into viruses and worms. |