{"id":1407,"date":"2002-01-11T14:37:40","date_gmt":"2002-01-11T19:37:40","guid":{"rendered":"http:\/\/hill-kleerup.org\/blog\/wp\/?p=1407"},"modified":"2002-01-11T14:37:40","modified_gmt":"2002-01-11T19:37:40","slug":"whats_in_a_name","status":"publish","type":"post","link":"https:\/\/hill-kleerup.org\/blog\/2002\/01\/11\/whats_in_a_name.html","title":{"rendered":"What&#8217;s in a name?"},"content":{"rendered":"<p>How do computer viruses get their names?  An <a href=\"http:\/\/www.newsfactor.com\/perl\/story\/15662.html\">interesting article<\/a> on the subject.<\/p>\n<p class=\"block\">Sometimes the process is more random. Who would have guessed that the Code Red virus got its name from an eEye Digital Security researcher&#8217;s beverage of choice &#8212; the cola variety of Mountain Dew soft drink &#8212; the night they picked through the corruptive code. <\/p>\n<p><small>(Via <a href=\"http:\/\/johnhdoe.com\/me\/b2.php?m=200201#118\">John Doe<\/a>)<\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do computer viruses get their names? An interesting article on the subject. Sometimes the process is more random. Who would have guessed that the Code Red virus got its&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[39],"tags":[],"class_list":["post-1407","post","type-post","status-publish","format-standard","hentry","category-spam"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5491,"url":"https:\/\/hill-kleerup.org\/blog\/2004\/03\/03\/name_that_virus.html","url_meta":{"origin":1407,"position":0},"title":"Name!  That!  Virus!","author":"***Dave","date":"Wed 3-Mar-04 1:58pm","format":false,"excerpt":"Fascinating look behind the scenes of who gets to name computer viruses -- and why every virus seems to have multiple names. The answer is pretty straightforward -- everybody in...","rel":"","context":"In &quot;Spam&quot;","block_context":{"text":"Spam","link":"https:\/\/hill-kleerup.org\/blog\/category\/blogging\/computer-security\/spam"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1670,"url":"https:\/\/hill-kleerup.org\/blog\/2001\/11\/28\/information.html","url_meta":{"origin":1407,"position":1},"title":"Information","author":"***Dave","date":"Wed 28-Nov-01 9:48am","format":false,"excerpt":"\"We want ... Information\" If you're an anti-virus software vendor, your product's job is to detect viruses, worms, and, of course, Trojan Horses. These are bits of code, disguised as...","rel":"","context":"In &quot;Hi-Tech&quot;","block_context":{"text":"Hi-Tech","link":"https:\/\/hill-kleerup.org\/blog\/category\/hi-tech"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1388,"url":"https:\/\/hill-kleerup.org\/blog\/2002\/01\/14\/billions_and_bi.html","url_meta":{"origin":1407,"position":2},"title":"Billions and billions served","author":"***Dave","date":"Mon 14-Jan-02 10:23am","format":false,"excerpt":"When computer viruses strike, and pundits begin reciting the economic impact, where do they pull those numbers from? Possibly from thin air. Michael Erbschloe, vice president of research at Computer...","rel":"","context":"In &quot;Spam&quot;","block_context":{"text":"Spam","link":"https:\/\/hill-kleerup.org\/blog\/category\/blogging\/computer-security\/spam"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1730,"url":"https:\/\/hill-kleerup.org\/blog\/2002\/05\/09\/random_mailings.html","url_meta":{"origin":1407,"position":3},"title":"Random mailings","author":"***Dave","date":"Thu 9-May-02 7:19pm","format":false,"excerpt":"Woo-hoo! My folks have been hit by the PE_Magistr.B virus, and are busy sending the contents of their hard drives off to folks with whom they corresponded (or who I...","rel":"","context":"In &quot;Hi-Tech&quot;","block_context":{"text":"Hi-Tech","link":"https:\/\/hill-kleerup.org\/blog\/category\/hi-tech"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":45598,"url":"https:\/\/hill-kleerup.org\/blog\/2014\/09\/30\/were-dooomed-office-illness-edition.html","url_meta":{"origin":1407,"position":4},"title":"We&#039;re DOOOMED (Office Illness Edition)","author":"***Dave","date":"Tue 30-Sep-14 8:15am","format":false,"excerpt":"Telecommuting is looking more and more attractive.'The University of Arizona researchers conducted their study at an office building with 80 employees. They contaminated a push-plate door at the building entrance with a virus called bacteriophage MS-2. It doesn't infect people yet is similar in shape, size and survivability to common\u2026","rel":"","context":"In &quot;~PlusPosts&quot;","block_context":{"text":"~PlusPosts","link":"https:\/\/hill-kleerup.org\/blog\/category\/blogging\/plusposts"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9187,"url":"https:\/\/hill-kleerup.org\/blog\/2006\/01\/31\/the_obesity_vir.html","url_meta":{"origin":1407,"position":5},"title":"The Obesity Virus?","author":"***Dave","date":"Tue 31-Jan-06 9:24am","format":false,"excerpt":"Obesity has been blamed on everything from weak will to genetics to internal body thermostats to the Evils of the McDonalds Corporation. But there's some evidence that some obesity --...","rel":"","context":"In &quot;Science &amp; Nature&quot;","block_context":{"text":"Science &amp; Nature","link":"https:\/\/hill-kleerup.org\/blog\/category\/science"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts\/1407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/comments?post=1407"}],"version-history":[{"count":0,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts\/1407\/revisions"}],"wp:attachment":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/media?parent=1407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/categories?post=1407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/tags?post=1407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}