1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
15

Who was responsible for unleashing the melissa computer virus

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
6 0

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

You might be interested in
5: what privacy issues have arisen with webcams in mobile devices?
AnnZ [28]

What are the privacy issues that have arisen with webcams and mobile devices? People secretly record and broadcast other people without their permission.

3 0
3 years ago
Your network has been having problems lately when users are participating in video conferences - the video and audio stutters ve
patriot [66]

Answer:

add a secondary link between buildings 147 and 143

Explanation:

Since the link is consistently showing 90% usage it means that the line is completely congested and data is being slowed due to large amounts of traffic. The best solution would be to add a secondary link between buildings 147 and 143 and divide the users between both links. That would divide the traffic and ultimately speed up the data transfer through these links drastically as they will no longer be congested.

6 0
3 years ago
What are ACLs and why are they used?
aniked [119]
A acl is a injury cuz
8 0
2 years ago
Read 2 more answers
True or false when a host gets an IP address from a DHCP server it is said to be configured manually
anyanavicka [17]

The answer to your question is false

6 0
4 years ago
Java and Python are considered rapid development programming languages?<br><br> True<br><br> False
Zepler [3.9K]
That is true because Java was considered a rapid development programming language
8 0
4 years ago
Read 2 more answers
Other questions:
  • Explain Organizational approach to System Analysis and Design
    11·1 answer
  • "Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w
    9·1 answer
  • Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the b
    10·2 answers
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • Discuss two things you want to know about driving
    12·1 answer
  • What are the differences between the various EHRs?
    9·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their nex
    15·1 answer
  • Discuss at least two challenges students face when conducting research on the Internet.
    7·2 answers
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!