1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
15

Who was responsible for unleashing the melissa computer virus

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
6 0

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

You might be interested in
Whate are some creatures/animals that the robot rex imitates?
Rzqust [24]

<span>The Rex robot imitates the dinosaur perfectly. In terms of its structure, the robot looks like a dinosaur, and this is seen in the robot’s serrated teeth. To some extent, the robot imitates the cheetah due to its speed ability.</span>

3 0
4 years ago
eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
beks73 [17]

Answer: Phishing

Explanation: Phishing is the type of security issue that arises when any individual is contacted by email or message to gain their confidential information through pretending as legal institution so that people can share their information easily.

eBay is also facing such cyber-crime issue so that customer's confidential data like debit card details, credit details details, passwords etc can be achieved through a illegal site posing to be eBay.

3 0
3 years ago
Examine the information in the URL below.
ololo11 [35]

Answer:

B The subdomain is /home/ and the domain name is http://.

Explanation:

7 0
3 years ago
OSHA and the EPA generally give notice before an inspection, so you will have time to clean things up if an inspection is schedu
zhannawk [14.2K]
The answer is B false
8 0
3 years ago
Software which allows user to view the webpage is called as____
melisa1 [442]
“1. Website” is correct.
5 0
3 years ago
Other questions:
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • What is point mode in excel 2013?
    15·1 answer
  • 1) which colour filter is used to pumps up black and white effects?
    13·1 answer
  • Motivation is best defined as
    9·2 answers
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
    9·1 answer
  • Briefly describe the client/server model.
    11·1 answer
  • When was internet started in which year​
    13·2 answers
  • You are required to write a calculator for Geometric shapes(Circle, Square, and Rectangle). The basic idea is that you willprovi
    7·1 answer
  • Briefly explain what are JavaScript librairies​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!