翻訳と辞書
Words near each other
・ Ilots du Mouillage
・ Ilougane
・ Ilova
・ Ilova River
・ Ilova River (Berzasca)
・ Ilova River (Croatia)
・ Ilova River (Timiș)
・ Ilovaisk
・ Ilovaiski family
・ Ilovača
・ Ilovca
・ Ilovci
・ ILoveMakonnen
・ ILoveMakonnen (EP)
・ ILoveMemphis
ILOVEYOU
・ Ilovice
・ Ilovik
・ Ilovița
・ Ilovka
・ Ilovlinsky District
・ Ilovlya River
・ Ilovu River
・ Ilovăț
・ Ilowiec
・ ILP
・ Ilp
・ ILP Contingent
・ ILP Guild of Youth
・ ILPAP


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

ILOVEYOU : ウィキペディア英語版
ILOVEYOU

ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 4 May 2000〔(【引用サイトリンク】url=http://www.symantec.com/security_response/writeup.jsp?docid=2000-121815-2258-99 )〕 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting random types of files (including Office files, image files, and audio files; however after overwriting MP3 files the virus would hide the file), and sent a copy of itself to all addresses in the Windows Address Book used by Microsoft Outlook. In contrast, the Melissa virus only sent copies to the first 50 contacts.
==Success==
On the machine system level, ILOVEYOU relied on the scripting engine system setting (which runs scripting language files such as .vbs files) being enabled, and took advantage of a feature in Windows that hid file extensions by default, to which malware authors would use as an exploit; to do this, it parsed file names from right to left, stopping at the first period character. The attachment, which had two periods, could thus display the inner fake "txt" file extension. Text files are considered to be innocuous, as they are normally incapable of running executable code. The worm also used social engineering to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure continued propagation. Systemic weaknesses in the design of Microsoft Outlook and Microsoft Windows were exploited that allowed malicious code capable of complete access to the operating system, secondary storage, and system and user data simply by unwitting users clicking on an icon.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「ILOVEYOU」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.