1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
15

Who was responsible for unleashing the melissa computer virus

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
6 0

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

You might be interested in
Types of motherboard​
Arada [10]

Answer:

Types of Motherboard

Explanation:

Motherboards are present in Desktop, Laptop, Tablet, and Smartphone and the components and functionalities are the same. But the size of the components and the way they are accommodated on the board varies due to space availability. In desktops, most of the components are fitted inside the sockets provided on the board and it is easy to replace each of them separately, whereas in Laptops/Smartphones some components are soldered on the board, hence it is difficult to replace/upgrade.

Though different motherboards have varying capabilities, limitations, features, Physical size/shapes (form factor), they are identified/grouped/categorized mostly by their form factors. Each manufacturer has come out with its form factor to suit the design of computers. Motherboard manufactured to suit IBM and its compatible computers fit into other case sizes as well. Motherboards built using ATX form factors were used in most of the computers manufactured in 2005 including IBM and Apple.

6 0
3 years ago
A company is developing a smart TV that connects to a wireless home network. Which technology can best help to establish this co
pantera1 [17]
C wifi A company is developing a smart TV that connects to a wireless home network. Which technology can best help to establish this connection?
Bluetooth
Infrared
C.
WI-FI
D
Internet of things
E
satellite
8 0
3 years ago
Read 2 more answers
Selena needs to insert a comment in a webpage's code to ensure that other web team members who work with the page code understan
ANTONII [103]

Answer:

<!-- Modified by selena ramirez - for html compliance -->

Explanation:

In HTML, <!-- .. --> tag is used to insert comments in the webpage code.

Comments written inside the tag is visible only on the code, and is not displayed in the browsers when the page is requested by the client computer.

<em>Comment tag</em> is useful when there is a lot of code and multiple developers are dealing with the same code.

Comments help developers understand what changed is made and why.

5 0
3 years ago
Which type of collaborative tool allows people to communicate using the
frosja888 [35]
D because people can communicate using video conferencing
7 0
3 years ago
Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
Valentin [98]
<span>Top-down approaches are most often useful when solving problems such as these. Since all the data is already available, taking the overall problem and breaking it down into smaller parts (with more detail as each level is attained) helps to make the overall task easier.</span>
5 0
3 years ago
Other questions:
  • An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
    5·1 answer
  • What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
    7·1 answer
  • Which was the first arcade game that was adapted for mobile phones ????
    13·1 answer
  • A software EULA is an agreement related to which of the following?
    11·2 answers
  • How can data be calculated?
    14·2 answers
  • PLEASE HELP ASAP
    13·2 answers
  • De que material esta hecho la pantalla de la computadora​
    12·1 answer
  • A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing
    12·1 answer
  • Write c++ program from 1to 100 to find prime numbers using statement.<br><br>please help me​
    15·1 answer
  • Completar Fill in the blanks with the correct familiar commands. dar (negative) 1 of 1 Question 2 with 1 blank hacer (affirmativ
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!