Knowledge

Scores (computer virus)

Source 📝

25: 246:
The second payload, activated after 4 days, will start causing crashes if programs with the ERIC or VULT signatures are run. Both signatures are found on programs written by Electronic Data Systems of Plano, Texas. If a program from the company is run, the virus will crash the system after 25
232:. There is a simple way to identify infection. Normal Notepad and Scrapbook icons will have specific icons under System 7, or little Macintosh icons under System 6. If the icons are blank document icons, it is a good indication the system is infected. 215:
machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.
258:(FBI) soon after the virus was discovered. There were no federal laws with which to charge the author, so they remain free to this day. This loophole resulted in the "Computer Virus Eradication Act of 1988". 250:
The third payload activates after 7 days, and will actively try to stop programs with the VULT signature from writing to disk. If no write to disks happen within 10 minutes, the virus will crash the system.
281: 437: 414: 287: 324: 89: 42: 61: 68: 407: 75: 294: 108: 516: 57: 587: 255: 46: 592: 442: 400: 526: 521: 372: 501: 82: 556: 268: 35: 491: 486: 566: 546: 308: 274: 229: 8: 506: 301: 531: 236: 541: 463: 240: 208: 172: 581: 235:
Scores begins to spread to other applications two days after infection. The
536: 496: 468: 511: 392: 212: 154: 24: 225: 348: 478: 561: 455: 224:
Scores infects the System, Notepad, and Scrapbook files under
288:
Sabotage Aimed at Computer Company Destroys Government Data.
267:
Norstad, John. The Viruses. Disinfectant 3.7.1, 1988-1997
254:
The alleged author of the virus was questioned by the
309:
A description of computer virus epidemic at Miami U.
49:. Unsourced material may be challenged and removed. 295:FBI to investigate rogue computer program at NASA. 302:SCORES Virus (Mac) Sighted At Washington State U. 273:John Norstad. INFO-MAC Digest (through Virus-L), 579: 300:Joshua Yeidel. VIRUS-L Virus Discussion List, 293:Keith Petersen. VIRUS-L Virus Discussion List, 408: 415: 401: 109:Learn how and when to remove this message 422: 243:Handler often become infected as well. 580: 396: 47:adding citations to reliable sources 18: 13: 14: 604: 377:agn-www.informatik.uni-hamburg.de 349:"Scores - The Virus Encyclopedia" 286:The New York Times, Technology, 23: 256:Federal Bureau of Investigation 34:needs additional citations for 365: 341: 317: 1: 307:Joe Simpson, Virus-L Digest, 277:, The Scores Virus 1988-04-18 261: 58:"Scores" computer virus 7: 219: 10: 609: 477: 454: 428: 194: 186: 178: 168: 160: 150: 136: 128: 123: 16:Macintosh computer virus 269:Northwestern University 588:Classic Mac OS viruses 325:"Virus:MacOS/Scores.A" 164:Categorisation needed 593:Hacking in the 1980s 423:Hacking in the 1980s 280:Symantec Antivirus, 43:improve this article 507:Christmas Tree EXEC 532:Lamer Exterminator 275:Volume 6, Issue 40 575: 574: 449: 448: 353:virus.wikidot.com 329:www.microsoft.com 202: 201: 119: 118: 111: 93: 600: 517:Father Christmas 431: 430: 417: 410: 403: 394: 393: 387: 386: 384: 383: 369: 363: 362: 360: 359: 345: 339: 338: 336: 335: 321: 121: 120: 114: 107: 103: 100: 94: 92: 51: 27: 19: 608: 607: 603: 602: 601: 599: 598: 597: 578: 577: 576: 571: 473: 450: 424: 421: 391: 390: 381: 379: 371: 370: 366: 357: 355: 347: 346: 342: 333: 331: 323: 322: 318: 264: 222: 145: 143: 141: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 606: 596: 595: 590: 573: 572: 570: 569: 564: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 509: 504: 499: 494: 489: 483: 481: 475: 474: 472: 471: 466: 460: 458: 452: 451: 447: 446: 440: 435: 434:← — 429: 426: 425: 420: 419: 412: 405: 397: 389: 388: 373:"Scores Virus" 364: 340: 315: 314: 313: 312: 305: 298: 291: 284: 278: 271: 263: 260: 221: 218: 209:computer virus 200: 199: 196: 192: 191: 188: 184: 183: 180: 176: 175: 170: 169:Classification 166: 165: 162: 158: 157: 152: 148: 147: 138: 134: 133: 130: 129:Technical name 126: 125: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 605: 594: 591: 589: 586: 585: 583: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 488: 485: 484: 482: 480: 476: 470: 467: 465: 462: 461: 459: 457: 453: 445: → 444: 441: 439: 436: 433: 432: 427: 418: 413: 411: 406: 404: 399: 398: 395: 378: 374: 368: 354: 350: 344: 330: 326: 320: 316: 310: 306: 303: 299: 296: 292: 289: 285: 283: 279: 276: 272: 270: 266: 265: 259: 257: 252: 248: 244: 242: 238: 233: 231: 227: 217: 214: 210: 206: 197: 193: 189: 185: 181: 177: 174: 171: 167: 163: 159: 156: 153: 149: 139: 135: 131: 127: 122: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 551: 464:The Analyzer 380:. Retrieved 376: 367: 356:. Retrieved 352: 343: 332:. Retrieved 328: 319: 253: 249: 245: 234: 223: 204: 203: 146:San Jose Flu 105: 99:October 2015 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 537:Morris worm 497:Byte Bandit 469:Markus Hess 456:Individuals 582:Categories 512:Elk Cloner 382:2016-03-23 358:2016-03-23 334:2016-03-23 311:1988-04-28 304:1988-11-22 297:1988-07-06 290:1988-07-04 262:References 211:affecting 69:newspapers 567:WANK Worm 542:Ping-Pong 527:Jerusalem 522:Ghostball 247:minutes. 213:Macintosh 155:Macintosh 438:Timeline 230:System 7 226:System 6 220:Overview 502:Cascade 479:Malware 198:Unknown 195:Authors 190:Unknown 182:Unknown 161:Subtype 83:scholar 562:Virdem 557:Stoned 552:Scores 282:Scores 237:Finder 207:was a 205:Scores 187:Origin 179:Family 132:Scores 124:Scores 85:  78:  71:  64:  56:  492:Brain 443:1990s 173:Virus 137:Alias 90:JSTOR 76:books 487:1260 239:and 228:and 151:Type 144:NASA 142:Vult 140:Eric 62:news 547:SCA 45:by 584:: 375:. 351:. 327:. 241:DA 416:e 409:t 402:v 385:. 361:. 337:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Scores" computer virus
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Macintosh
Virus
computer virus
Macintosh
System 6
System 7
Finder
DA
Federal Bureau of Investigation
Northwestern University
Volume 6, Issue 40
Scores
Sabotage Aimed at Computer Company Destroys Government Data.
FBI to investigate rogue computer program at NASA.
SCORES Virus (Mac) Sighted At Washington State U.
A description of computer virus epidemic at Miami U.
"Virus:MacOS/Scores.A"
"Scores - The Virus Encyclopedia"
"Scores Virus"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.