home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Current Shareware 1994 January
/
SHAR194.ISO
/
misc
/
hack9309.zip
/
FILETSTS.ZIP
/
OWS.RES
< prev
next >
Wrap
Text File
|
1993-08-01
|
3KB
|
73 lines
=========================================================================
||
From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet
|| Int'l Echos SHAREWRE & WARNINGS
The Hack Report || Volume 2, Number 8
File Test Results || Result Report Date: July 26, 1993
||
=========================================================================
*************************************************************************
* *
* The following test was performed by and the results are courtesy *
* of Kevin Gates (1:140/64) and HW Bob Seaborn. *
* Their assistance is greatly appreciated. *
* *
*************************************************************************
OWS .95 beta, SUNOWS .95 beta
- purports to be a lossless fractal compression program that gets around
1500:1 comrpession. In reality, it CANNOT restore files that have been
archived and are no longer present on the local drives. It can however
"restore" files when the files are on the local drive, but not because
of fractal compression.
Notes on DS_DUMP.OWS
DS_DUMP.OWS is the dump of the data segment of the SUNOWS.COM program
just before the program terminates. The actual com file itself is
encrypted and decrypted on the fly.
Although there is a lot of "garbage" in the file, if a person takes a
peek at it with their handy dandy text editor you will find the following
things of note.
From beginning to end:
1) Borland copyright notice. Program was written with Borland C++. - At
least the hacker has good taste in compilers.
2) Sunows text screen. Same one that pops up when no ows file is speced.
3) Error messages. Most notable is the sector not found message. Sector
not found is a dos error message and shouldn't be found in the middle
of a program's data segment.
4) Other messages pertaining to use of the program.
5) Partial list of filename that were originally compressed.
6) mixed in with the hex "garbage" are partial pathnames from the local
drives.
7) All of files that were originally compressed.
8) List of all directories on the local drive.
9) list of files in current directory.
Without actually disassembling the program and analyzing the dump it
would be safe to guess that the program stores the encrypted filesname of
the programs that it compresses. Then when it goes to decompress the
files it takes the filenames, scans the local drives for that file and if
the file cannot be found it will give an appropriate error message, such
as Sector not found reading drive Z (or whatever the current drive is).
The program does not APPEAR to do anything malicious to a person's
system, however the next week or so will tell me if it killed any of my
test data.