1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
15

Who was responsible for unleashing the melissa computer virus

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
6 0

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

You might be interested in
What's usually kept in database?
Levart [38]
I think this is the answer. I tried. Databases<span> may be </span>stored<span> on a computer and examined using a programs.</span>
7 0
4 years ago
Read 2 more answers
I am in need of a research topics in networking and security?​
cricket20 [7]
No, you will be fine.
8 0
4 years ago
Which of these can be used as a smartphone with the power of a laptop?
sashaice [31]
I would go with A) Tablet because that's basically a bigger phone and mobile cmp combined, its not D) because that's a synonym for a smartphone and not C) because paper and pencil is not like a smartphone, and not B) because that's like reading online books.
4 0
3 years ago
Read 2 more answers
Which behavior demonstrates teamwork
attashe74 [19]
Cooperation, agreements, trust Etc*
3 0
3 years ago
Read 2 more answers
Convert the Binary Number to a Decimal Number
Korolek [52]
There are convertors online for this but the answer is 5
<span />
8 0
4 years ago
Other questions:
  • Which of the following indicates what a reply to all function does in most email programs
    8·1 answer
  • What are the stages in the development of a multimedia project?
    6·1 answer
  • Which of the following is NOT a fixed expense?
    6·1 answer
  • You can send emails to individuals from your address book.<br><br> True<br> False
    12·1 answer
  • Convert the expression ((a+b) + c * (d+e) + f) * (g+h) to a:
    13·1 answer
  • Rey is recording the dialogues and sound effects separately in the studio, as he is not happy with the sound quality recorded on
    9·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • Edhesive assignment 1 movie ratings
    9·1 answer
  • WILL GIVE BRAINLIST Which statements accurately describe electronic tools? Check all that apply. Electronic tools collect large
    12·1 answer
  • Please give answer before explanation
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!