home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Shareware Overload
/
ShartewareOverload.cdr
/
utils
/
antivir2.zip
/
FLU_SHOT.DOC
< prev
next >
Wrap
Text File
|
1987-12-21
|
3KB
|
71 lines
12/18/87
To The Reader:
There exists a low-level form of dirt that gets their joy out of destroying
your work. They release a program, typically called a 'Trojan Horse',
which is designed to erase or otherwise damage your disks.
The programs are released into the public domain and typically are
downloaded or distributed exactly as you may have received this file.
Once run, they would print some sort of self-congratulatory message and
proceed to erase your data.
Recently, a new breed has been developed. Called a 'virus', it infects
all disks that it sees with a copy of itself, and then each of these
copies will also be able to infect other disks that *they* see.
Eventually, at some predetermined instance (a date, a time, a certain number
of copy operations), the virus attacks and destroys whatever disks it can.
By this time, though, the virus has spread, and a friends' machine may also
be infected, infecting the disks of their friends and so forth.
It was to counter just such a program that the enclosed program, called
FLU_SHOT, was developed. The current virus making the rounds infects the
command processing program called "COMMAND.COM". Every bootable DOS disk
much have a copy of this file. FLU_SHOT examines each write and will not
allow a write operation to the COMMAND.COM file to take place without your
permission. Normally, there should never be a write operation to this file,
so it should be effective in that regard.
To run FLU_SHOT, place a copy of it in your root directory on the disk you
boot your system from. Additionally, a line to invoke FLU_SHOT should be
placed in your AUTOEXEC.BAT file.
If you find the virus attacking your disk, please try to preserve a copy of
it and to forward it to me at my BBS at (212)-889-6438. Once I have a copy
of the virus, I should be able to develop another program which would
serve as a vaccine.
Please be aware that there is a possibility that, if FLU_SHOT determines a
write operation taking place to your COMMAND.COM, it *may* be a legitimate
one ---- check the currently running program.
Additionally, FLU_SHOT can not determine whether your current COMMAND.COM
is infected, only if a COMMAND.COM is about to be infected.
The odds of you being hit with this virus are slim, but running FLU_SHOT
should keep this particular incarnation of the virus from infecting your
disks.
As for the designer of the virus program: most likely an impotent adolescent,
incapable of normal social relationships, and attempting to prove their own
worth to themselves through these type of terrorist attacks.
Never succeeding in that task (or in any other), since they have no worth,
they will one day take a look at themselves and what they've done in their
past, and kill themselves in disgust.
If they *really* want a challenge, they'll try to destroy *my* hard disk on my
BBS, instead of the disk of some innocent person. I challenge them to upload
a virus or other trojan horse to my BBS that I can't disarm. It is doubtful
the challenge will be taken: the profile of such a person prohibits them
from attacking those who can fight back. Alas, having a go with this low-life
would be amusing for the five minutes it takes to disarm whatever they invent.
Go ahead, you good-for-nothing little slimebucket: make *my* day!
Ross M. Greenberg
(212)-889-6438