NETWORds
Abstract
Libraries circulating software should take a few extra steps to protect the software (and users) from “pranksters.” For example, a patron might place a trojan horse program [see p. 3] on the disk that would destroy a subsequent user's data. Such a subverted [perverted?] program can be timed to “go off” only after a certain date or under certain conditions, making it difficult or impossible to determine who created the program. Avoid this by keeping archive copies of each disk and recopying the circulating disk every time it's returned, replacing any potentially altered programs with the original(s). Also check the disk's directory and delete any extra files added by patrons. [Reformatting and recopying would be safer since that would obliterate any subdirectories you might forget to look in.]
Citation
Moore, C. (1987), "NETWORds", OCLC Micro, Vol. 3 No. 6, pp. 8-10. https://doi.org/10.1108/eb055871
Publisher
:MCB UP Ltd
Copyright © 1987, MCB UP Limited