home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
CD ROM Paradise Collection 4
/
CD ROM Paradise Collection 4 1995 Nov.iso
/
filutil
/
sentry02.zip
/
SENTRY02.DOC
< prev
next >
Wrap
Text File
|
1991-02-04
|
14KB
|
290 lines
SENTRY VERSION 2.0
from McAfee Associates
Executable Program (STINSTAL.COM):
Versions 2.0 and above are packaged with a VALIDATE program
the with authenticate the integrity of STINSTAL.COM. Refer to the
VALIDATE.DOC instructions for the use of the validation program.
The validation results for STINSTAL.COM should be:
SIZE: 6,986
DATE: 5-10-1989
FILE AUTHENTICATION
Check Method 1: 7978
Check Method 2: 1990
You may also call the McAfee Associates bulletin board at 408
988 4004 to obtain on-line STINSTAL.COM verification date. The
VALIDATE program distributed with SENTRY may be used to authenticate
all future versions of SENTRY.
OVERVIEW:
Sentry version 2 is an updated version of the original Sentry
product. It now runs on DOS 4.0 and above, and it has additional
checks for partition table viruses. In operation, however, it is
identical to the original version. If you currently are running
Sentry, the only modification required is to re-install using the
new install routine. Everything else is identical.
I have designed and marketed an number of antiviral products
commercially through InterPath Corporation, some with more
success than others. I have also researched and tested every
antiviral product available in both the commercial and public
domain markets. All of them (including my own) were less than
satisfying. They left me with a sense of unease about the
security of my system, or alternately, were so difficult to
install and use that I would rather suffer the virus than the
product. My answer to this problem is Sentry.
Sentry uses a unique approach to the virus issue. Prior
products have used TSR filters to attempt to trap viruses, or
checksums to detect changes in critical files. The TSR approach
has numerous weaknesses, primarily because TSRs cannot prevent
viruses from directly interfacing with the system I/O
controllers. Thus, over half of existing viruses cannot be
stopped or detected by such products. The interrupt vectoring
techniques of these products are easily circumvented by viruses.
The checksum approach, on the other hand is very time consuming
and awkward to implement. Both techniques are troublesome to
install and execute.
Sentry relies on a characteristic of viruses that has been
overlooked by other product developers. That characteristic is
called the "Positioning Rule". This rule relates to how viruses
attach to programs. Very simply, viruses may attach to the
beginning, to the end or to the middle of a program, or any
combination of the three. They may fragment themselves and
scatter virus segments throughout the program. Or they may even
keep the main body of the virus unattached to the program, hidden
in a bad sector for example. All viruses that have been
discovered, however, have modified at least some small portion of
the beginning instructions of the program. This is because a
virus must be executed first, that is - before the host program
to which it has attached. If the virus does not execute before
its host program, then the environment in which the virus "wakes
up" will be uncertain, and the probability of program failure
will be high.
The exceptions to this positioning rule are viruses that
replace the entire program, such as boot sector infectors, and
viruses that attack only specific programs, like known operating
system files or other programs that would be commonly found in
large numbers of systems. These viruses may gain control at any
point, since the structure of the host program is well known and
the environment can be predicted at any point in the host
program's processing.
The implications of this principal are very important.
Sentry takes advantage of this characteristic to radically speed
up the checking function. If every byte of every program is
processed by a checksum or other comparison technique, then
scanning the entire system for a virus takes a substantial time
to complete (15 minutes to an hour), and it is impractical to
perform this function frequently. As a result, previous virus
products could not effectively perform this function.
Sentry, on the other hand, employs a technique that locates
the initial instructions and branch addresses for each generic
program in the system and logs critical information about these
locations. It is able to scan the entire system for a virus over
200 times faster than global checksum techniques. As a result,
it is now practical to check the entire system each time the
system boots. This normally takes less than 20 seconds for the
average system.
Sentry is installed by simply typing the install command.
There is nothing else the user ever needs to do. Install
automatically logs ALL components of the system that can be hosts
to a virus and places an automatic check function in your
autoexec. If you ever do get a virus, Sentry will list any and
all components of the system that are affected. That's all there
is to it.
SENTRY VERSION 2.0
USER'S MANUAL
HOW IT WORKS:
SENTRY is a computer virus detection system that catches
viruses that have entered your system. It uses a high
reliability detection mechanism that monitors all system areas
that are susceptible to viral attacks. If a virus does enter
your system, SENTRY will identify the specific system area or
program files that have been infected, so that virus removal is
simplified.
SENTRY executes in two phases. The initial install phase
logs the system's hardware and software parameters - including
the initial interrupt vector states, boot sector instructions,
hidden DOS files, device drivers and all executable code on the
hard disks. Initial load instructions, branch addresses, and
other program states are also logged for each program on the hard
disk. The subsequent check phase executes each time the system
is powered on or re-booted, and it checks all system parameters
for traces of infection.
SENTRY is fully effective in detecting viruses, including
boot sector infectors and imbedded viruses (viruses that the
leave the infected program's size and external indicators
unchanged). It provides a timely and near foolproof indication
of infection.
INSTALLATION:
SENTRY must be installed on your bootable hard drive. If
your system contains multiple hard drives, they may also be
included in the SENTRY logging and monitoring function. To
install SENTRY on a system with one hard drive (C:), type:
STINSTAL C:
SENTRY will load and then display a message that it is going
to automatically re-boot the system. At this point, you must
remove diskettes from the A drive and any other floppies that are
in any drives. When the floppies have been removed, press any
key to allow SENTRY to begin installation.
If you have more than one hard drive in your system, you
should include them in the installation by typing the drive
designations after the boot drive. For example:
STINSTAL C: D: E:
would install C: as the boot drive and also include D: and E: as
drives to be logged and monitored for viral infections.
The SENTRY installation will re-boot your system and then
begin its logging function. It will create a log file called
SENTRY.LOG and store it at the root of your boot disk. It will
then install the SENTRY check routine at the root of your boot
disk and include it as the first program in your autoexec.bat
routine. SENTRY.COM MUST REMAIN THE FIRST INSTRUCTION IN YOUR
AUTOEXEC IN ORDER TO OPERATE CORRECTLY.
The SENTRY installation process may take 10 minutes or more
for systems with large numbers of files - the daily check
function however, will execute many times faster. After the
installation has completed, the system's autoexec file will be
re-executed in order to return the system to its state prior to
installation.
The SENTRY.LOG file will take approximately 10K of disk
space plus 100 bytes for each executable program on the disks.
RE-INSTALLATION
SENTRY monitors the system each time the system is powered
on or re-booted and checks for modifications to key system
parameters. If the system has been purposely modified, SENTRY
may flag the changed areas as possibly infected. The following
system modifications will cause SENTRY to issue a warning:
- Installing a new version of DOS
- Removing or adding a device driver to CONFIG.SYS
- Deleting a program
- Replacing a program with a different version
If any of the above have occurred, SENTRY should be re-
installed. To re-install, follow the same instructions as for
initial installation. The original SENTRY.LOG file will be
replaced with the new log file containing the new system data.
OPERATION
The SENTRY check function compares the ongoing state of your
system to the original "snapshot" state. A copyrighted, proprietary
algorithm checks ALL executable programs on your system for viral
modifications. The algorithm is able to do this in a reasonable
amount of time due to a selective logging function. This logging
function logs only those segments of program code and other
variables that would be affected by any virus attack. "Inert"
sections of programs are removed from the checking process.
SENTRY also checks the entire boot sector and all system
interrupt routines for modifications. Finally, system device
drivers and operating system hidden files are checked.
The SENTRY check function executes each time the system is
powered on or re-booted. If a discrepancy in any area of the
system is noted, the check function will pause and display a
message identifying the system area and the discrepancy. If no
discrepancies are found, the check function will terminate with
an OK message. The check function will require about 10 seconds
for each 100 executable programs stored on your hard disk.
IF A VIRUS IS FOUND
Important: If any virus is discovered by SENTRY, first note the
names of the infected programs or system areas. Then immediately
power down the system. Re-boot the system from the original DOS
distribution diskette prior to attempting to remove the virus.
There are three general classes of PC viruses: Boot
infectors, system infectors and program infectors. Each class of
virus will typically affect different areas of the system and
require different approaches to removal.
Generally, viruses can be removed by deleting or overwriting
the affected portion of the disk, and replacing the infected
component. For program infectors (viruses that infect general
.COM or .EXE files), this is a fairly simple process. SENTRY
will identify each program that has been infected (program size,
date, or internal components have changed). Simply erase the
infected programs and replace them from the original distribution
diskettes.
Boot infectors replace or modify a disk's boot sector.
SENTRY will identify an infected boot sector with a "Boot Sector
Infection" message. This type of virus requires that the boot
sector be replaced using the DOS "SYS" command. See your DOS
manual for instructions for the SYS command.
System infectors attach to COMMAND.COM, IBMBIO.COM,
IBMDOS.COM or any installable device drivers. SENTRY will
identify such viruses by naming one of the above files or by
specifying that the system interrupt vectors have changed. To
remove this type of virus, erase the affected files, then perform
a SYS command as above. Finally, replace any affected device
drivers.
In all of the above cases, re-install SENTRY after virus
removal.
If SENTRY detects an infection, and you have any concerns or
questions, contact InterPath at the number and address at the end
of this document.
EXTRA PRECAUTIONS
To prevent any possibility of viral tampering with the
SENTRY program and log file, you should copy the files SENTRY.COM
and SENTRY.LOG from the root of your boot disk to a backup floppy
immediately after installing SENTRY. Periodically (each month or
so) you should copy these two files from the floppy back to the
root of your boot disk.
FOR ADVANCED USERS
SENTRY defaults to a global scan a check of all system
components. You may however, restrict its operation in a number
of areas:
Using the /s option:
STINSTAL c: /s d:\temp, d:\masm, c:\prod
This command string would install SENTRY so that it ignored
all activities in the three directories named.
Using the /i option:
STINSTAL c: d: /i
This command string would install SENTRY on drives D: and C:
and would instruct SENTRY to ignore any modifications in the
interrupt vectors caused by changes in the operating system
environment. If you frequently modify your config.sys files, or
change out system device drivers you may want to use this option.
Using the /b option:
STINSTAL c: /b
This option tells SENTRY to ignore boot sector logging. You
must use this option if running on a Zenith laptop.
Using the /L option:
STINSTALL c: /L a:frog.log
This option creates a second log file.