home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Acorn User 12
/
AU_CD12.iso
/
UPDATES
/
NEVIRUS
/
ReadMe
< prev
Wrap
Text File
|
2000-10-16
|
3KB
|
89 lines
name: NeVirus v0.16
author: Kostas Proitsakis (GUS/Arm's Tech, gusuni@otenet.gr)
needs: An Acorn compatible machine
descr.: Global/future virus detector.
____________________________________________________________________________
Introduction
============
NeVirus can detect (and prevent) attempts to modify executable files
such as: Obey, Utility, BASIC and much more.
Overview
========
Most of the viruses open an executable for READ/WRITE which is *not*
a usual action. The executable creators (assemblers, editors, compilers)
if they open the file it will be for WRITE only.
There are viruses which load a file in memory, modify it and save
it back replacing the original executable. NeVirus detects those as
well.
Some installers, patchers and registration applications/utilities may
modify executables just like viruses; that is *not* something the happens
everyday.
NeVirus will ask you what to do when someone will attempt to modify an
executable.
Technical details
=================
Detecting visuses
-----------------
Special care has been taken in order to detect *only* viruses,
if you face a case where NeVirus will /think/ it found a virus
but you *know* it isn't I would like to hear from you.
Which viruses will *not* be detected
------------------------------------
Viruses that:
- know about NeVirus and they found a way to fool it,
it is easy but *not* as easy as "*rmkill nevirus".
Directory map
=============
@
More———————!Install...{Obey Installs NeVirus in !Boot}
| !Uninstall.{Obey Uninstalls NeVirus from !Boot}
| NeVirus!...{BASIC The source of NeVirus}
| test it....{BASIC It tries to modify the RM file NeVivus
| (it needs Direr to run)}
|
NeVirus....{Module The tool}
ReadMe.....{Text [ ] A virus.
[ ] An old arabian porno magazine.
[ ] The file I now read.
Put an "X" in the square brackets next to the right answer.}
Acknowledgements
================
NeVirus is written while explaining to an old PC programmer-friend of mine
how (most of) the viruses infect executable files.
Thanks to:
- my old friend Panos Kakouris for watching me writing it :)
<Panos>Thanks GUS :)</Panos>
- Bill Kotsias (of Fantasia) for testing,
- Pervect/Topix for testing and for CC#2,
- ArmOric, baah and Jerome of Arm's Tech.
- Stefan Bellon for his suggestions and testing.
Sexy kisses to Antonia ;)
----------------------------------------------------------------------------
If you want to assemble it, you will need !GLib. Here is what to do:
1. Download user's Wacky-Talky from: http://users.otenet.gr/~gusuni/
2. Run !WT
3. Then you can run !GLib by typing: *Run !GLib
____________________________________________________________________________
GUS