Honor system virus

Honor system virus

Honor system viruses or signature viruses are not actual computer viruses but Internet jokes that are passed around voluntarily.

Honor system virus

An honor system virus claims to be an email virus, but using human rather than computer action as the substrate for its destructive and reproductive behaviours. It spreads as a simple textual email message, with text such as:

:This virus works on the honor system. Please forward this message to everyone you know, then delete all the files on your hard disk. Thank you for your cooperation.

It is a joke, not a serious virus. Because its alleged destructive behaviour requires positive action by its intended human victim, the intended victim can simply not take the instructed action (deleting their own files). Those humans who follow the virus's instruction to forward it to others can be safely presumed to have not followed the destructive part of the instructions, and to be forwarding the message deliberately so that their friends may also appreciate the joke.

The joke is based on the perceived foolishness in the design of mail programs that are susceptible to viruses. A normal email virus works by including computer instructions in an email; the mail programs in question execute those instructions without an explicit request from the user. Most mail programs, in contrast, maintain a distinction between code and data, and so are immune to this type of virus. The honor system virus draws a parallel between humans and mail programs, and so makes the reader think about the human behaviours that are analogous to these mail program behaviours.

It should be noted that some serious email viruses make use of human action in their transmission. They include text that attempts to con the user into invoking the machine-executable part of the message. This is unlike the honor system virus not only because there is a directly machine-executable component but also because the virus attempts to mislead the human. The honor system virus is entirely straightforward and honest in its human-directed instructions, just like the computer-directed part of a normal email virus.

ignature virus

A signature virus is a piece of text placed in a signature block which encourages readers to copy it into their own signature block. Like their email cousins, they reproduce only by manual copying. A simple example:

:I'm a signature virus. Please add me to your signature and help me spread!

Some signature viruses carry a short informational "payload" in addition to the copying instructions.


The honor system virus is also known as the Amish Computer Virus, manual virus, the Blond Computer Virus, the Irish Computer Virus, the Syrian Computer Virus, the Norwegian Computer Virus and the Unix Computer Virus.

The "Unix Computer Virus" name refers to the Unix family of operating systems. In addition to having mail programs that lack the deficiencies that allow viruses to spread by email, they make a relatively inhospitable environment for viruses, when compared to other operating systems popular on desktop computers. Viruses do occur on Unix-like systems, but they are far less common than in other environments. A corresponding variant of the honor system virus reads thus:

:YOU HAVE RECEIVED THE UNIX VIRUS! :This virus works on the honor system. Please randomly delete some of your files and forward this to everyone you know.

A "Mac OS 9 Virus" variant also circulated:

:You have just received the Mac OS 9 Virus! Please delete your System Folder and restart. Thank you.

The "Discount Virus" variant apparently fooled some people into thinking they actually received a virus:

:This computer has just been infected by the Discount Virus. Due to budgetary constraints we have had to let our programming staff go. We are counting on you to use the honor system. Please erase all of the files from your hard drive and then send this message to the first 50 people on your mailing list.

External links

* [http://www.redhat.com/archives/redhat-install-list/2000-May/msg00805.html Virus attack on the Red Hat mailing list!]

Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Virus hoax — A computer virus hoax is a message warning the recipient of a non existent computer virus threat. The message is usually a chain e mail that tells the recipient to forward it to everyone they know. Contents 1 Identification 2 Action 3 List of… …   Wikipedia

  • Internet humor — The Internet has long been a resource for the circulation of humorous ideas and jokes. Countless web sites are devoted to the collection of Internet humor, and every day e mail crosses the world, containing the text of humorous articles, or jokes …   Wikipedia

  • Vanderbilt University — Infobox University name = Vanderbilt University image size = 125px established = 1873 type = Private calendar= Semester endowment = $3.488 billion [cite news last = Brasher first = Joan title = A Conversation with Matthew Wright url =… …   Wikipedia

  • Agnes Scott College — Infobox University name = Agnes Scott College native name = latin name = motto = Educating women to think deeply, live honorably and engage the intellectual and social challenges of their times. established = 1889 type = liberal arts Women s… …   Wikipedia

  • Copyleft — Una letra C invertida, símbolo sin reconocimiento legal, es el más común como contrapartida del símbolo copyright. El copyleft es una práctica al ejercer el derecho de autor que consiste en permitir la libre distribución de copias y versiones… …   Wikipedia Español

  • Stanford University School of Medicine — Mission …   Wikipedia

  • List of musicians in the second wave of punk music — This is a list of bands that are considered part of the second wave of punk rock, beginning in the 1980s. 0 9*The 4 Skins *30 Foot Fall *7 SecondsA*A Global Threat *The Adolescents *A.F. *AFI *Against All Authority *Against Me! *Agent Orange… …   Wikipedia

  • List of ReBoot characters — This is a list of characters from the animated television series, ReBoot. With the exception of a few characters, such as Bob, most ReBoot characters are named after technical computer terms or pieces of computer hardware.[verification needed]… …   Wikipedia

  • List of Mobile Suit Gundam Wing characters — This is a list of characters from the Japanese anime television series Mobile Suit Gundam Wing, known in Japan as New Mobile Report Gundam W (新機動戦記ガンダムW, Shin Kidō Senki Gandamu Uingu?), and subsequent spin offs. The codes after the characters… …   Wikipedia

  • List of After Colony characters — This is a list of fictional characters from the After Colony (AC) timeline of the Gundam anime metaseries, primarily Gundam Wing and Endless Waltz . The codes after the characters names indicate which series and manga the characters appear in.*… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”