Jerry Roylance (glr@WHEATIES.AI.MIT.EDU)
Fri, 4 Nov 88 14:45 EST

A method of finding the culprit:

NYT implies the user is a CS student. The files that compose his system
were stored on disk in his directory; the program is complicated, so the
development probably took a long time; the files were probably stored on
a public machine.

So the first step might be to (quietly) grep unix filesystems for some
appropriate (cleartext) substrings that would appear in his files (ie,
pieces of the infecting shell script). Anyone who owned such files
before the infection would be suspect.

The internet reaction has probably scared the author, so he has
presumably deleted the relevant online files, but probably does not have
access to his system's backup tapes. Scanning those tapes (levels 0-9)
for say Monday or Tuesday would probably turn something up.

Coordinating the search effort would be difficult and possibly not worth

This archive was generated by hypermail 2.0b3 on Thu Mar 09 2000 - 14:43:58 GMT