Libraries circulating software should take a few extra steps to protect the software (and users) from “pranksters.” For example, a patron might place a trojan horse program [see p. 3] on the disk that would destroy a subsequent user's data. Such a subverted [perverted?] program can be timed to “go off” only after a certain date or under certain conditions, making it difficult or impossible to determine who created the program. Avoid this by keeping archive copies of each disk and recopying the circulating disk every time it's returned, replacing any potentially altered programs with the original(s). Also check the disk's directory and delete any extra files added by patrons. [Reformatting and recopying would be safer since that would obliterate any subdirectories you might forget to look in.]
Article navigation
Review Article|
June 01 1987
NETWORds Available to Purchase
Publisher: Emerald Publishing
Online ISSN: 2377-620X
Print ISSN: 8756-5196
© MCB UP Limited
1987
OCLC Micro (1987) 3 (6): 8–10.
Citation
Moore C (1987), "NETWORds". OCLC Micro, Vol. 3 No. 6 pp. 8–10, doi: https://doi.org/10.1108/eb055871
Download citation file:
113
Views
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
