home *** CD-ROM | disk | FTP | other *** search
-
- ----------------------------------------------------------------------------
- | |
- | THE DIRTY DOZEN -- An Uploaded Program Alert List |
- | |
- ----------------------------------------------------------------------------
- | Issue #7: March 17th, 1987 |
- | |
- | Revision Stage 'C' |
- | |
- | Compiled by Eric Newhouse |
- ----------------------------------------------------------------------------
-
-
- Recently, many unlawfully copied or modified programs have appeared on
- various IBM PC bulletin boards across the country. THE DIRTY DOZEN is a
- list of known examples.
-
- IMPORTANT NOTE: the author takes no responsibility for the validity or
- completeness of this list. Many sources contribute to the list, and it
- is very possible that one of the reported 'dirty' files works perfectly
- and is in the Public Domain. I will try to '*' asterisk any programs
- what I feel are not positively 'bad,' but all the same, it is quite
- possible that a mistake will slip in somewhere. Since this is the case,
- please keep in mind while reading this list that however unlikely, it is
- possible that I or my sources are incorrect in our accusations. Please
- also bear in mind that the dirty dozen list has not yet falsely accused
- a Public Domain program of being pirated, or a well working program of
- all existing bad software into one list. Everyday users upload bad
- software to hundreds of boards, and often times the software is not yet
- in this list. In other words, if you run a trojan horse that I did not
- list in here, don't call my board up call up and leave me a message so
- that I can get the destructive program in the next issue. If anyone is
- unsure whether a file is trojan, and it's not listed in here, then I
- recommend using a utility like BOMBSQAD.COM to prevent any mishaps.
-
- There are four major categories of bad software: commercial pirate jobs,
- unauthorized copies of otherwise legitimate freeware programs, malicious
- "TROJAN" programs which damage your system, and miscellaneous illegal
- software. Please look in the definitions section of this document for a
- more detailed explanation of these terms.
-
- SysOps: Please be careful with the files you post in your download
- libraries! An professional quality uploaded game or disk utility should
- arouse your suspicions, especially if it doesn't include the author's
- name, address, and distribution policy. Such programs are probably NOT
- public domain! The BBS community is already under legislative threat at
- the State and Federal level. We cannot fight this trend effectively
- while our directories sit stocked with cracked Sega games, wargames
- dialers, and malicious "trojan horses!" Let's demonstrate a little
- social responsibility by cleaning up our download libraries. If you as
- a SysOp have any of these files on your system, please delete them and
- post "blocking" dummy file entries like this one:
-
-
- ZAXXON.COM DELETED!! NOT PUBLIC DOMAIN!!
-
-
- If everyone works together to fight this new brand of software, the growing
- numbers of piraters and trojan horse writers may well be put 'out of business!'
-
- The idea behind THE DIRTY DOZEN is to bring this important issue to the
- attention of more SysOps and users - to act as an information "clearing -
- house" for the latest known examples of "bogusware," so that an educated
- public can fight effectively for safe downloadable files.
-
- The Dirty Dozen is a big project, and it needs your help to succeed!
- Please call in any updates of bad software that you know of, but DO NOT
- modify this article yourself. If everyone who discovers a pirated
- program starts modifying the DD, there would be hundreds of issues in
- circulation. Also, I think it's quite unfair, especially considering that
- I've spent over a hundred hours of my time on this list, for just anyone
- to put their name at the top of the list and say that they write, or
- helped write, the DD. For example, someone named Gerhard Barth added
- two files, both of which were already listed in the DD, and proceeded to
- write "Updated by Gerhard Barth, please send all further updates to
- Gerhard Barth," etc. If everyone does this, how will anyone know which
- file is the latest and TRUE Dirty Dozen? If you have an update, please
- see the end of this article for information on how to reach me with new
- information.
-
- A user of mine has notified me that some pirates have patched HARDHAT.COM
- and PANGO.COM to read "cracked by Eric Newhouse." This is ridiculous!
- Please disregard any programs that you may come across in the future
- advertising "copy protection busted by Eric Newhouse, " or the like.
- This is just one more way that pirates are trying to get me to stop
- publishing this list!
-
- A word on TROJANS: I have been hearing more and more reports of these
- "worm" programs, from all directions. While I don't doubt their
- existence, do not get hysterical. Remember, a Trojan rumor is much
- easier to START than it is to STOP. Some people have accused legitimate
- *joke* programs, like DRAIN (which pretends to be gurgling excess water
- out of your A drive) of being "killers." If a program locks up your
- system, it isn't necessarily Trojan; it might not like co-residing with
- Superkey, or your graphics card. Ask around a little before you
- announce something as Trojan. I would appreciate a bagged specimen of
- any real Trojan program that you might have the (un)luck to find.
-
- A word on Pirated programs: Recently many pirated programs such as AUTODEX
- have been going under many different names. Although I will try to keep
- all these names current in the DD, the best way to check for piracy in
- a file is to run that file yourself -- checking for (C)opyright
- notices of commercial manufactures, similarities in looks and operations
- of commercial programs, and of course whether the name is in this list.
-
- Finally I want to thank all BBS SysOps and users that notified me of
- updates, additions, and/or corrections to DIRTYDOZ.006. It's great to
- see so much support! In this issue more people than ever called in with
- updates. Everyone else who reads this list, along with myself, really
- appreciates the effort!
-
-
-
- DEFINITIONS:
-
-
- HACKED An unlawfully modified copy of an otherwise legitimate
- public domain or user-supported program. It is illegal to
- distribute a modified copy of someone else's work without
- their permission! All modified programs must contain this
- permission, either in the program's display or documentation.
-
- *TROJAN* BEWARE!! These programs PURPOSEFULLY damage a user's system
- upon their invokation. Usually they aim to disable hard disks,
- although they can destroy other equipment too. It is IMPERATIVE
- that you let me know about any new examples of these that you
- find.
-
- *CAREFUL* Programs labeled in this manner may or may not be trojans;
- the question is unresolved. use caution when running these
- programs!
-
- PIRATED This is an illegal copy of a commercial program product.
- Examples: a cracked (de-protected) game, an accidentally
- or deliberately distributed compiler, editor or utility;
- sometimes a Beta test copy of a program under development,
- handed out by a disgruntled employee or dishonest beta
- tester. In the latter case, the program in question may
- never make it to market due to the piracy! In the case of games,
- there's a tendency for the pirate to patch a clumsy
- "PUBLIC DOMAIN" notice over top of the original copyright.
- ZAXXON.COM is a prime example.
-
-
- MISC This is miscellaneous illegal software and/or text.
- The best definition, aside from that, that I can think of
- is that it's NOT pirated software.
-
-
- NOTE: If I do not supply a file extension, that means that the file circulates
- under many different extensions. For instance, users commonly upload with extensions of either: .EXE, .COM, .EQE, .CQM, .LBR, .LQR, and .ARC.
-
-
-
-
- ----------------------------------------------------------------------------
- | TROJAN HORSE PROGRAMS: |
- ----------------------------------------------------------------------------
-
-
- Name Category Notes
- -------------- -------- -------------------------------------------------
- ANTI-PCB *TROJAN* The story behind this trojan horse is sickening.
- Apparently one RBBS-PC sysop and one PC-BOARD
- sysop started feuding about which BBS system
- is better, and in the end the PC-BOARD sysop
- wrote a trojan and uploaded it to the rbbs
- SysOp under ANTI-PCB.COM. Of course the RBBS-PC
- SysOp ran it, and that led to quite a few
- accusations and a big mess in general. Let's grow
- up! Every SysOp has the right to run the type of
- BBS that they please, and the fact that a SysOp
- actually wrote a trojan intended for another
- simply blows my mind.
- ARC513.EXE *TROJAN* This hacked version of arc appears normal, so
- beware! It will write over track 0 of your
- [hard] disk upon usage, destroying the disk.
- ARC514.COM *TROJAN* This is totally similar to arc version 5.13 in that
- it will overwrite track 0 (FAT Table) of your hard
- disk. Also, I have yet to see an .EXE version
- of this program..
- BACKTALK *TROJAN* This program used to be a good PD utility,
- but some one changed it to be trojan.
- Now this program will write/destroy sectors
- on your [hard] disk drive. Use this with caution
- if you acquire it, because it's more than likely
- that you got a bad copy.
- CDIR.COM *TROJAN* This program is supposed to give you a color
- directory of files on disk, but it in fact
- will scramble your disks FAT table.
- DANCERS.BAS *TROJAN* This trojan shows some animated dancers in color,
- and then proceeds to wipe out your [hard] disk's
- FAT table. There is another perfectly good copy
- of DANCERS.BAS on BBS's around the country;
- apparently the idiot author in question altered
- a legitimate program to do his dirty work.
- DISKSCAN.EXE *TROJAN* This was a PC-MAGAZINE program to scan a (hard) disk
- for bad sectors, but then a joker edited it to
- WRITE bad sectors. Also look for this under other
- names such as SCANBAD.EXE and BADDISK.EXE...
- DMASTER *TROJAN* This is yet another FAT scrambler..
- DOSKNOWS.EXE *TROJAN* I'm still tracking this one down -- apparently
- someone wrote a FAT killer and renamed it
- DOSKNOWS.EXE, so it would be confused with the
- real, harmless DOSKNOWS system-status utility.
- All I know for sure is that the REAL DOSKNOWS.EXE
- is 5376 bytes long. If you see something called
- DOSKNOWS that isn't close to that size, sound the
- alarm. More info on this one is welcomed -- a
- bagged specimen especially.
- DPROTECT *TROJAN* Apparently someone tampered with the original,
- legitimate version of DPROTECT and turned
- it into a FAT table eater.
- DROID.EXE *TROJAN* This trojan appears under the guise of a game.
- You are supposably an architech that controls
- futuristic droids in search of relics. In fact,
- PC-Board sysops, if they run this program from
- C:\PCBOARD, will find that it copies
- C:\PCBOARD\PCBOARD.DAT to C:\PCBOARD\HELP\HLPX.
- In case you were wondering, the file size of the
- .EXE file is 54,272 bytes.
- EGABTR *TROJAN* BEWARE! Description says something like
- "improve your EGA display," but when run it
- deletes everything in sight and prints "Arf! Arf!
- Got you!"
- EMMCACHE *CAREFUL* This program is not exactly a trojan, but it
- V. 1.0 may have the capability of destroying hard disks
- by:
- A) Scrambling every file modified after running
- the program,
- B) Destroying boot sectors.
- This program has damaged at least two hard disks,
- yet there is a base of happily registered users.
- Therefore, I advise extreme caution if you decide m.
- to use this program.
- FILER.EXE *TROJAN* One SysOp complained a while ago that this program
- wiped out his 20 Megabyte HD. I'm not so
- sure that he was correct and/or telling the
- truth any more. I have personally tested an
- excellent file manager also named FILER.EXE, and
- it worked perfectly. Also, many other SysOp's
- have written to tell me that they have like me
- used a FILER.EXE with no problems. If you get a
- program named FILER.EXE, it is probably allright,
- but better to test it first using some security
- measures.
- FINANCE4.ARC *CAREFUL* This program is not a verified trojan;
- there is simply a file going around BBS's
- warning that it may be trojan. In any case,
- execute extreme care with it.
- FUTURE.BAS *TROJAN* This "program" starts out with a very nice color
- picture (of what I don't know) and then proceeds
- to tell you that you should be using your computer
- for better things than games and graphics.
- After making that point it trashes your A: drive,
- B:, C:, D:, and so on until it has erased all
- drives. It does not go after the FAT alone,
- but it also erases all of your data. As far as I
- know, however, it erases only one sub-directory
- tree level deep, thus hard disk users should only
- be seriously affected if they are in the "root"
- directory. I'm not sure about this on either,
- though.
- MAP *TROJAN* This is another trojan horse written by the infamous
- NOTROJ.COM *TROJAN* This "program" is the most sophisticated trojan
- horse that I've seen to date. All outward
- appearances indicate that the program is a useful
- utility used to FIGHT other trojan horses.
- Actually, it is a time bomb that erases any hard
- disk FAT table that IT can find, and at the same
- time it warns: "another program is attempting a
- format, can't abort!" After erasing the FAT(s),
- NOTROJ then proceeds to start a low level format.
- One extra thing to note: NOTROJ only damages FULL
- hard drives; if a hard disk is under 50% filled,
- this program won't touch it!
- If you are interested in reading a thorough report
- on NOTROJ.COM, James H. Coombes has written an
- excellent text file on the matter named NOTROJ.TXT.
- If you have trouble finding it, you can get it from
- my board.
- TIRED *TROJAN* Another scramble the FAT trojan by Dorn W.
- Stickle.
- TSRMAP *TROJAN* This program does what it's supposed to do:
- give a map outlining the location (in RAM) of
- all TSR programs, but it also erases the boot
- sector of drive "C:".
- PACKDIR *TROJAN* This utility is supposed to "pack" (sort and
- optimize) the files on a [hard] disk, but
- apparently it scrambles FAT tables.
- PCW271xx.ARC *TROJAN* A modified version of the popular PC-WRITE word
- processor (v. 2.71) has now scrambled at least 10
- FAT tables that I know of. If you want to download version 2.71 of PC-WRITE be very careful! The
- bogus version can be identified by its size;
- it uses 98,274 bytes wheras the good version uses
- 98,644. For reference, version 2.7 of PC-WRITE
- occupies 98,242 bytes.
- QUIKRBBS.COM *TROJAN* This Trojan horse advertises that it will
- QUIKREF *TROJAN* This ARChive contains ARC513.COM.
- load RBBS-PC's message file into memory
- 2 times faster than normal. What it really
- does is copy RBBS-PC.DEF into an ASCII file
- named HISCORES.DAT...
- RCKVIDEO *TROJAN* This is another trojan that does what it's supposed
- to do, then wipes out hard disks. After showing
- some simple animation of a rock star ("Madonna," I
- think), the program will go to work on erasing
- every file it can lay it's hands on. After
- about a minute of this, it will create 3 ascii
- files that say "You are stupid to download a video
- about rock stars," or something of the like.
- SECRET.BAS *TROJAN* BEWARE!! This may be posted with a note saying
- it doesn't seem to work, and would someone please
- try it; when you do, it formats your disks.
- SIDEWAYS.COM *TROJAN* Be careful with this trojan; there is a perfectly
- legitimate version of SIDEWAYS.EXE circulating. Both
- the trojan and the good SIDEWAYS advertise that they
- can print sideways, but SIDEWAYS.COM will trash a
- [hard] disk's boot sector instead. The trojan
- .COM file is about 3 KB, whereas the legitimate
- .EXE file is about 30 KB large.
- STAR.EXE *TROJAN* Beware RBBS-PC SysOps! This file puts some
- stars on the screen while copying RBBS-PC.DEF
- to another name that can be downloaded later!
- STRIPES.EXE *TROJAN* Similar to STAR.EXE, this one draws an American
- flag (nice touch), while it's busy copying
- your RBBS-PC.DEF to another file (STRIPES.BQS) so
- Bozo can log in later, download STRIPES.BQS, and
- steal all your passwords. Nice, huh!
- TOPDOS *TROJAN* This is a simple high level [hard] disk formatter.
- VDIR.COM *TROJAN* This is a disk killer that Jerry Pournelle wrote
- about in BYTE Magazine. I have never seen it,
- although a responsible friend of mine has.
-
-
-
-
- ----------------------------------------------------------------------------
- | HACKED PROGRAMS: |
- ----------------------------------------------------------------------------
- | |
- | '*' = not verified by program's author |
- | |
- ----------------------------------------------------------------------------
-
-
-
- ARC.COM HACKED Someone keeps running SPACEMAKER or a similar EXE
- squeezer on SEA, Inc.'s ARC archive program, then
- uploading the resulting COM file to BBS's without
- the author's permission. SEA will NOT support the
- COM version, for they definately do not allow
- modifying ARC.EXE in their license agreement.
- AUTOMAXX.ARC CAREFUL This DOS menu-making program comes with
- documentation that Marshall Magee, author of the
- popular AUTOMENU program, contends is plagiarized.
- Marshall contends that the AUTOMAXX documentation
- uses exact phrases from his documentation, and if
- this is the case, AUTOMAXX is clearly illegal.
- However, as I understand it, the courts are
- currently deliberating on the case, so AUTOMAXX
- is not illegal as of today. For more information,
- please contact Marshall Magee at (404) 446-6611.
- DOG102A.COM * HACKED Apparently this is a renamed early version of the
- DP102A.ARC utility DISKPACK.COM. One person has reported that it trashed his hard disk that was formatted under
- DOS 3.1 (2KB clusters).
- LIST60 HACKED Vern Buerg's LIST 5.1, patched to read 6.0.
- Note: Mr. Buerg has released a legitimate version
- 6.0 of LIST. Every legit. version will have
- a letter in the filename (e.g. LIST60H.ARC)
- LIST799 HACKED Vern Buerg's LIST 5.1, patched to read 7.99.
- QMDM110.ARC HACKED These hacked versions of qmodem are
- QMDM110A.ARC copies of 1.09, patched to read 1.10. There
- have been rumors of a worm in 1.10, but I
- have seen no evidence of it. Other
- versions are OK.
-
-
-
-
- ----------------------------------------------------------------------------
- | PIRATED PROGRAMS: |
- | |
- | |
- | TYPES: |
- | Game -- some sort of game, usually of "Arcade" Quality |
- | Util -- a disk, screen, or general utility |
- | Misc -- miscellaneous, printer controllers, sound, etc. |
- ----------------------------------------------------------------------------
-
-
-
- Program Name Type Description
- ------------ ---- -----------
-
- 1DIR.COM PIRATED Util -- This is "The ONE Dir," a commercial shell
- sold with a Hard Disk subsystem.
- 21C.EXE PIRATED Game -- From the IBM Game Library -- blackjack
- ACUPAINT PIRATED Misc -- PC Paint -- ARC-ed file is 148,221 bytes.
- ALLEYCAT.COM PIRATED Util -- The IBM game "Alley Cat"
- ALTEREGO.ARC PIRATED Game -- Alter Ego game from Activision
- this archive file is huge -- about 450KB
- or so..
- ARCHON.COM PIRATED Game -- Electronic Art's Archon.
- ARTOFWAR PIRATED Game -- Ancient Art of War game.
- AUTODEX PIRATED Util -- AUTODEX, a commercial file manager
- AXX.EXE PIRATED Util -- also AUTODEX
- B1-BOMB PIRATED Game -- Avalon Hill's B1 Bomber
- BATTLE PIRATED Game -- Battle Zone Game
- BBCHESS PIRATED Game -- Blues Box Chess
- BC-QUEST PIRATED Game -- Bc's Quest for Tires
- BIGMAC.ARC PIRATED Util -- Also Superkey
- BORROWED.ARC PIRATED Game -- Borrowed Time
- BRUCELEE PIRATED Game -- Bruce Lee game
- BUCK PIRATED Game -- Buck Rogers on Planet Zoom
- BURGER PIRATED Game -- Burgertime
- BUSHIDO PIRATED Game -- Karate Game
- BUZZBAIT PIRATED Game -- Buzzard Bait
- CALL2ARM PIRATED Game -- Call to Arms
- CENTIPED PIRATED Game -- Be careful with this one. At least two other
- legitimate, PD copies of Centipede are in
- circulation. The pirated one is supposedly
- PUBLIC DOMAIN BY ATARI. Yeah, Right.
- CMASTER.ARC PIRATED Game -- Chess Master 2000 by Electronic Arts
- COMMANDR.ARC PIRATED Game -- Norton Commander
- COSMIC PIRATED Game -- Cosmic Crusaders
- COPYRITE PIRATED Util -- Really Quaid Software's COPYWRITE
- COPYWRIT PIRATED Util -- Quaid Software's COPYWRITE again
- COSMIC PIRATED Game -- Cosmic Crusaders game
- CROSFIRE.COM PIRATED Game -- Cross fire game..
- CRUSH-CC.ARC PIRATED Game -- Crush, Crumble & Chomp Game
- DEB88.EXE PIRATED Misc -- DeSmet "C" debugger
- DECATH PIRATED Game -- Microsoft Decathalon
- DEFENDER PIRATED Game -- Defender
- DIGGER.COM PIRATED Game -- Dig Dug
- DIGDUG.COM PIRATED Game -- Dig Dug
- DISKEX PIRATED Util -- Disk Explorer Utility
- DOSHELP.EXE PIRATED Util -- This is really Central Point Software's
- PC-tools. One special note: There is
- usually a poorly written documentation
- accompanying this file. In the
- documentation ERIC HSU asks for a monetary
- contribution to his bbs. Well, It
- seems that this was a poor attempt to damage
- ERIC HSU's reputation; Eric is a legitimate
- SysOp in the Houston area.
- DOSMENU PIRATED Util -- INTECH'S DOSMENU - The Menu screen says "PC
- DOS MENU SYSTEM 5.0" Archive size is
- 208,240 - The copyright notice is on the
- bottom of the screen.
- DOSSHELL PIRATED Util -- AUTODEX again
- DRL PIRATED Game -- Avalon Hill's "Dnieper River Line."
- DIPLOMCY PIRATED Game -- Avalon Hill's "Computer Diplomacy" game.
- EGADIAG PIRATED Util -- Quadram EGA (Quad EGA+) diagnostics.
- EINSTIME PIRATED Util -- Another pirated IBM internal utility
- EXPLORER.COM PIRATED Util -- Quaid Software's Disk Explorer
- EVOLUTIO PIRATED Game -- Evolution
- F15 PIRATED Game -- F-15 Strike Eagle
- FILEEASE PIRATED Util -- Dos Utility
- FILEMGR PIRATED Util -- Really FILE MANAGER by Lotus Devel. Corp.
- FILEMAN PIRATED Util -- Also FILE MANAGER. The file is 10 KBytes
- FINDIT PIRATED Util -- IBM internal 'locate a file' utility
- FSDEBUG PIRATED Util -- IBM's Full Screen Debug program..
- GOLDCUP PIRATED Game -- Gold Cup championship soccer
- GOLF21.ARC PIRATED Game -- Golf's Best version 2.1
- GREMLINS.COM PIRATED Game -- Gremlins game
- HARDHAT.COM PIRATED Game -- Hard Hat Mack
- HIGHORBT PIRATED Game -- High Orbit (like Star Wars)
- HOOP.COM PIRATED Game -- One-on-1
- ID PIRATED Util -- Persyst Ram disk software
- IBM21 PIRATED Game -- 21c
- IPLTIME.COM PIRATED Util -- IBM Internal Use Clock utility
- JBIRD PIRATED Game -- Jbirds -- Q-bert Game
- JET PIRATED Game -- Jet is a flight simulator
- JETDRIVE.ARC PIRATED Util -- JET Drive -- copies files quickly
- JOUST PIRATED Game -- Joust. Be careful, there is a 6K version
- KEYWORKS.ARC PIRATED Util -- Keyworks macro program, usu. version 2.0
- KOBAYASH.ARC PIRATED Game -- Star Trek -- The Kobayashi Alternative
- KONG PIRATED Game -- Donkey Kong
- LIGHTNIN PIRATED Util -- Can be either the cache or spell checker
- MACE+ PIRATED Util -- Paul Mace's MACE+ utilities
- MACROS PIRATED Util -- Again Superkey, or even Prokey
- MEDMAG.COM PIRATED Util -- Quaid Software's Media Magician
- MINER49R.ARC PIRATED Game -- Miner '49er
- MISSLEC PIRATED Game -- Missle command
- MONTYS.COM PIRATED Game -- Montezuma's Revenge
- MOONBUGS PIRATED Game -- Moon Bugs
- MS PIRATED Util -- IBM internal utility.
- MTS PIRATED Util -- IBM Multitasker that's similar to Double-Dos
- MULE PIRATED Game -- M.U.L.E -- game where user is on alien planetMULTASK PIRATED Util -- Same as MTS
- MURDRBY# PIRATED Game -- Murder by Numbers
- MUSICCON PIRATED Misc -- Music Construction Set
- NFL.ARC PIRATED Game -- Xor's NFL challenge.
- NGHTSTLK PIRATED Game -- Night Stalker
- NICE PIRATED Misc -- A printer Controller
- NODISK-A.COM PIRATED Util -- Central Point software's Nokey.
- NORTON.COM PIRATED Util -- Peter Norton's Utilities!
- NOVATRON PIRATED Util -- Tron light cycles.
- ONE-ON-1 PIRATED Game -- One-on-1 basketball game.
- PATHMIND PIRATED Util -- Dos Shell
- PC-POOL PIRATED Game -- Really PC-POOL, commercial game
- PC-TOOLS PIRATED Util -- Central Point Software's PC-tools
- PCBOSS PIRATED Util -- Another Dos shell
- PCED PIRATED Util -- Pro CED, DOS command line editor
- PEII PIRATED Util -- IBM Personal Editor II
- PINCONST PIRATED Game -- Pinball Construction Set
- POOL.ARC PIRATED Game -- Same as PC-POOL
- POPALARM.COM PIRATED Util -- Part of POP DOS
- POPDOS.ARC PIRATED Util -- Pop up (resident) dos utilities.
- PRIME PIRATED Util -- Columbia Data Co. hard disk utility.
- PROKEY PIRATED Util -- Prokey macros program
- PROMPRPH PIRATED Game -- Star Trek -- The Prompethian Prophesy
- PSHIFT PIRATED Util -- really MEMORY SHIFT
- PSRD.ARC PIRATED Util -- IBM utility (redirects PrtSc)
- QDOS PIRATED Util -- Quickdos
- QUCKDOS PIRATED Util -- Quickdos
- QIX PIRATED Game -- The game.
- RACTER PIRATED Game -- Racter
- RASTER-B PIRATED Game -- Raster Blaster
- RIGHTW PIRATED Util -- Right Writer (writing style checker)
- ROBOTRON PIRATED Game -- Robotron, hacked to read PUBLIC DOMAIN BY
- ATARI. Don't pirates have any imagination?
- ROGUE.EXE PIRATED Game -- Game very similar to the PD game HACK.EXE
- ROMANTIC PIRATED Game -- Romantic Encounters at the Dome. Also RE.ARC
- SEADRAG.ARC PIRATED Game -- Sea Dragon
- SEE PIRATED Misc -- DeSmet editor
- SFX PIRATED Util -- really AUTODEX (again!)
- SM.COM PIRATED Util -- Realia's SPACEMAKER utility
- SMAP PIRATED Util -- IBM Internal utility, with the copyright
- notice blanked out and real author's name
- () replaced by "Dorn W. Stickle".
- SNIPER PIRATED Game -- Sniper -- arcade type game.
- SPYHUNT PIRATED Game -- Spy Hunter Game.
- STARFLIT.ARC PIRATED Game -- Electronic Art's Star Flight -- about 300 KB
- STARGATE.EXE PIRATED Game -- Hacked to say "PUBLIC DOMAIN BY ATARI,"
- but don't you believe it! Be careful not
- to confuse this 57 KB .EXE file with the
- public domain STARGATE MERCHANT game, which
- is a little 12 KB BASIC program by G. E.
- Wolfworth.
- STRIPKR PIRATED Game -- Strip Poker by Artworx
- SUPERCAD PIRATED Misc -- Easy CAD, a drawing program -- LQR file
- size is 242,660 bytes
- SUPERKEY PIRATED Misc -- Superkey macro program
- TEMPOFAP PIRATED Game -- Temple of Apshai
- THEQUEST.BAS/EXE PIRATED Game -- The Quest
- TIRES.EXE PIRATED Game -- Again, really bc's quest for tires
- TREASURE PIRATED Game -- Pirate's Treasure game
- ULTIII PIRATED Game -- Ultima 3
- UTILITY PIRATED Util -- Norton's Utilities Arced and with the file
- names changed. When run, however, the
- programs display the copyright notice of
- Peter Norton. Many other pirated utilities
- could also go under the name UTILITY.
- VOYAGERI PIRATED Game -- (Avalon-Hill Game)
- VS PIRATED Util -- Also INTECH'S DOSMENU
- WCKARATE PIRATED Game -- World Championship karate by Epyx
- WG-BBALL PIRATED Game -- World's Greatest Baseball Game
- WGAMES PIRATED Game -- World Games by Epyx
- WORSTR PIRATED Util -- Word Star, labeled as a 'great new editor'
- XDIR PIRATED Util -- Pre-release version of DOS FILE TRACKER
- XTREE PIRATED Util -- An Epson developed DOS shell (tree utility)
- ZAXXON PIRATED Game -- Hacked (sound familiar?) to say "PUBLIC
- DOMAIN BY SEGA." Sorry, Charlie!
-
- ----------------------------------------------------------------------------
- | MISCELLANEOUS ILLEGAL FILES: |
- ----------------------------------------------------------------------------
-
- COPYWRIT MISC Patch -- Although the real COPYWRITE is going around
- Bulletin Boards like fire, there is another
- illegal file under the same name.
- The former takes around 40 KB ARC-ed,
- whereas this takes about 2 KB.
- What I'm referring to is an archive of
- 1-3 files that explains how to remove
- the serial numbers from copywrite. Now
- it's allright to "unprotect" a program
- for backup purposes, but removing serial
- numbers can only lead to piracy.
- LOCKPICK MISC Text -- This is a text file, usually with a
- .TXT extension, that casually explains
- how to pick locks. I'm not sure
- whether this is illegal, but it's
- definitely in poor taste.
- MOVBASIC MISC Util -- This highly illegal file breaks IBM's
- copyright on BASIC and BASICA. It creates
- new files called SBASIC or SBASICA that run
- "IBM BASIC" on an IBM clone. C'mon, don't
- you think that these clones don't run IBM
- BASICA for a good reason? The clones
- don't support BASICA because it's illegal!
- XTALK MISC Patch -- Like Copywrite, there is a patch circulating
- BBS's to remove the serial numbers from
- Crosstalk.
-
-
-
- ----------------------------------------------------------------------------
- | Many thanks to generous, continuous update contributions from: |
- ----------------------------------------------------------------------------
- | |
- | |
- | 1. THE SOURCE information service. |
- | 2. Mark Garvin |
- | 3. Robert Ready |
- | 4. You? |
- ----------------------------------------------------------------------------
-
-
-
-
-
- This is the end of the "bad files list." The rest of this document
- contains instructions on what to do if YOU run a trojan horse, an update
- history, a glossary, and information on how and where to contact me with
- updates.
-
-
-
-
-
-
-
- ----------------------------------------------------------------------------
- | If you run a trojan horse.. |
- ----------------------------------------------------------------------------
-
-
- While reading this, bear in mind that there is no better remedy for a drive
- that has run a trojan horse than a recent backup..
-
- The first thing to do after running what you think to be a trojan horse is
- diagnose the damage. Was your [hard] drive formatted? Did the trojan
- scramble your FAT table? Did every file get erased? Did your boot
- sector on the [hard] drive get erased/formatted? Odds are that the
- trojan incurred one of these four disasters.. After the initial
- diagnosis, you are ready to remedy the problem.
-
-
- 1) If the trojan low-level formatted your [hard] disk:
- Hope that you have a recent backup; that's the only remedy for
- this disease.
-
- 2) If the trojan high-level formatted your [hard] disk:
- There is only one way out of this mess, and that is to use the
- MACE+ utilities by Paul Mace. MACE+ has two devices in it to
- recover formatted disks, and believe me, they work! I will talk
- more about the MACE+ utilities later.
-
- 3) If the trojan scrambled your FAT table:
- Once again, there is nothing to do. However, there is a program
- called FATBACK.COM (available on my board named as FATBCK11.ARC) that
- will back up your FAT table in under a minute to floppy. Using
- FATBACK, it is easy and non time consuming to back up your FAT
- regularly.
-
- 4) If the trojan erased file(s), and the FAT table is undamaged:
- There are many packages to undelete deleted files. Norton
- Utilities, PC-tools, MACE+, and UNDEL.COM will all do the job.
- I recommend the first three, but they are more expensive than
- the Public Domain program UNDEL.COM. When you are undeleting,
- be sure to undelete files in the order of last time written to
- disk. I know that PC-tools automatically lists undeletable
- files in the correct order, but the other three may not.
-
- 5) If the boot sector on your [hard] disk gets erased/formatted:
- There are four things to do if this happens, and the worst that
- can happen is that you will go without a [hard] disk for a while.
- To be on the safest side, back up everything before even proceeding
- to step "A," although I can not see why it would be necessary.
-
- A) Try doing a "SYS C:" (or "SYS A:") from your original DOS disk,
- and copy COMMAND.COM back onto the [hard] drive after that.
- Try booting and if that doesn't work try step B.
-
- B) If you have the MACE+ utilities go to the "other utilities"
- section and "restore boot sector." This should do the job
- if you have been using MACE+ correctly.
-
- C) If you are still stuck, BACK EVERYTHING UP and proceed to do a
- low level format. Instructions on how to perform a low-level
- format should come with your [hard] disk controller card.
- Be sure to map out bad sectors using either SCAV.COM by Chris
- Dunford or by manually entering the locations of bad sectors
- into the low level format program. After the low level format,
- if your have a hard disk, run FDISK.COM (it comes with DOS)
- and create a DOS partition. Refer to your DOS manual for help
- in using FDISK. Then put your original DOS diskette in drive A:
- and do a FORMAT <drive letter>:/S/V. Drive letter can stand for
- "C" or "B" depending on whether you are reformatting a hard disk
- or not. Finally you are ready to attempt a reboot.
-
- D) If you are still stuck, either employ some professional computer
- repairmen to fix your drive, or live with a non-bootable [hard]
- drive..
-
-
-
- By now you may be saying to yourself:
-
-
- "How can I get a hold of a 'MACE+' utilities package so that I can guard
- against trojans? Why, MACE+ can recover a formatted drive, undelete
- files, restore boot sectors, optimize a disk, and provide a disk cache!
-
- Anyone can obtain these marvelous utilities in one of two ways: one is to
- call up the Paul Mace Software Company (tm) and order them at a retail
- of $ 79.95. The other is place an order for them at the WEST LOS
- ANGELES PC-STORE, which supports next day UPS shipping! The BBS phone #
- for the PC-STORE is at the end of this document.
-
-
-
-
-
- ----------------------------------------------------------------------------
- | Update History: |
- ----------------------------------------------------------------------------
-
- Version 1.0 Plans were drawn up for a "bad file" list and a dozen
- bad files were entered in the list.
- Version 2.0 Saw the addition of a short introduction and 3
- more files. All work up to here was done by Tom Neff.
- Version 3.0 Here Tom Neff and I started collaborating on the Dirty
- Dozen. 22 files were added, and the introduction
- was completely re-written. Version 3.0 had a total of
- 37 files.
-
- Version 4.0 By this time I totally took over responsibility
- of the DD, as Tom Neff lost interest. Another 30 or
- so files were added to the list, making the DD 65+
- files strong, as well as a few more additions to the
- introduction.
-
- Version 5.0 By the time I released version 5.0 to the public, the Dirty
- Dozen was being greeted favorably and with enthusiasm
- around the country. Updates started coming in with
- regularity; the list prospered (if one can say that
- about a list!). A few more paragraphs were added to
- the introduction, and about 40 new files were bringing
- the file total up to 103!
-
- Version 6.0 The Dirty Dozen is now such a big project that
- I am now writing it in stages. Although I am going to
- make absolutely no effort to spread these "intermediate
- versions," they will always be downloadable from my board.
- This way if anyone so desires, they may keep an extremely
- current issue of the DD, although the changes will only be
- minor. You might think of stage "a" of issue #6 as version
- 6.1, stage "b" as version 6.2, stage "c" as version 6.3, etc.
-
-
- New in version 6.0 is the following:
- A) Many minor revisions,
- B) 17 more files, bringing the total to 120!
- C) Two new paragraphs in the introduction,
- D) Instructions on how to recover from a trojan horse,
- E) A comprehensive glossary,
- F) This update history,
- G) An acknowledgments section set up for major
- contributors of information regarding new bogusware
- H) A new bogusware catagory of "miscellaneous
- illegal software."
-
- Version 6.0a MOVBASIC.ARC and SBASICA added to the list of illegal files.
- as well as six Trojan horses have been added to the list.
- Version 6.0c NOTROJ.COM added to the trojan horse list.
- Version 6.0d DOG102A.COM added to the hacked files list.
- HACKED files separated from TROJAN files
- Version 6.0e DANCERS.BAS added to the trojans list.
- Version 6.0f 4 pirated files added, + NODISK-A and DMASTER to trojans
- Version 6.0g NODISK-A removed from trojan horse list & placed into pirated
- programs list. Monopoly warning issued in misc section.
- added a few pirated programs. + DPROTECT added as trojan.
- Version 6.0h EMMCACHE and TIRED added to trojan list, + PEII added.
- Version 6.0i Added TOPDOS to Trojan list, and AUTOMAXX to HACKED list.
- Version 6.0j Added QUICKREF to trojans list. Revised introduction,
- and added a paragraph to the intro about modifying the DD.
- Version 6.0k Moved paragraph about 'I'm not responsible for this
- list' to the front of the file for legal reasons.
- Also added the '*' convention for HACKED programs.
- Version 6.0l Added FINANCE4 as a possible trojan. Added a few glossary
- definitions.
-
-
- Version 7.0 The major changes in this version took place in the
- revision stages above. However, I still changed
- quite a bit in version 7.0 compared to 6.0 revision
- stage 'L;' for example, I added seventeen new pirated
- programs, bringing the file total to a whopping 165!
- Moreover, I rewrote virtually every paragraph in the dirty
- dozen in order to 'stylize' (clean up the writing in) the
- document. Once again I would like to thank all users who
- called in updates to the Dirty Dozen; those users are the
- people that encourage me to keep producing the dirty dozen!
-
- Version 7.0a Added three pirated programs, and the *CAREFUL* category
- for the program EMMCACHE.ARC, version 1.0.
- Version 7.0b Changed entry for XTREE, deleted monopoly entry, and
- added seven new pirated programs.
- Version 7.0c Added two new trojans (PC-WRITE 2.71 and DROID.EXE) and
- revised entry for AUTOMAXX.
-
-
-
- Version 1.0 -- Dates released will be in next issue, which will be as soon
- Version 2.0 -- as I dig up the information.
- Version 3.0 --
- Version 4.0 --
- Version 5.0 --
- Version 6.0 --
- Version 7.0 -- January 3, 1987.
-
-
-
- ----------------------------------------------------------------------------
- | Glossary: |
- ----------------------------------------------------------------------------
- | |
- | I have intended this glossary at the beginning to intermediate |
- | user; all experienced BBS users will be bored to death with this. |
- | |
- ----------------------------------------------------------------------------
-
-
- ?Q? -- (? standing for any character). File extension for SQueezed
- files. Squeezed files are unusable until unsqueezed by a
- utility such as NUSQ.COM or USQ.COM. The advantage of a
- SQueezed file is that it is smaller than a regular UnSQueezed
- file, thus saving disk space and download time. ARChives are
- more efficient than Squeezed files; that's why there are so
- many more ARChives on BBS's these days. Example of the
- extensions of SQueezed files: .EQE, .CQM, .LQR, .TQT,
- .DQC, etc.
- ABBRV -- abbreviation for the word: "abbreviation"
- ARC -- File extension for an ARChive file -- many files combined
- together to save space and download time that require ARC.EXE,
- PKXARC.COM, ARCE.COM, or ARCLS.EXE to separate the
- files in to runnable and readable (in the case of
- text) form.
- BAS -- abbrv for "BASIC," as in the programming language
- BBS -- abbrv for "Bulletin Board System"
- BBS's -- abbrv for "Bulletin Board Systems"
- BOARD -- Also "Bulletin Board System"
- BOGUSWARE -- software that is damaging to one or more parties
- BOOT or -- to boot a computer is to restart it from scratch, erasing
- REBOOT all TSR programs. One reboots by either powering
- off and then back on, or pressing ctrl-alt-del at the same time.
- BYTES -- Bytes measure the length of a file, with one
- byte equaling one character in a file.
- CACHE [disk] -- Area of memory set aside to hold recent data. All programs
- then read recent data from that memory rather than from disk.
- CLUSTER -- a phyical block on all [hard] disks, composed of sectors, that
- holds data.
- COM -- file extension for a file that is executable from DOS level
- DD -- abbrv for "dirty dozen"
- DOC -- abbrv for "documentation"
- EMS -- Enhanced Memory Specification. An EMS card holds 2 MB extra mem.
- EXE -- file extension for a file that is executable from DOS level
- HACKED -- see "definitions" section
- HIGH LEVEL
- FORMAT -- This type of format is what most computer users view as
- a regular DOS-format. That is, formatting a disk using
- FORMAT.COM (included with DOS) is a high level format.
- IBM -- International Business Machines
- IBM OR COMP -- IBM computer or a 99% or greater IBM Compatible computer
- KB -- Abbreviation for "KiloBytes," one Kb equals 1024 bytes
- LBR -- Extension on Library files. Library files are really
- many combined files like ARChives, but they require
- different utilities to extract the individual files.
- Some examples of such utilities are LUU.EXE, LUE.EXE,
- LAR.EXE, AND ZIP.EXE. See "ARC"
- LOW LEVEL
- FORMAT -- This type of format is only executed on a hard disk, therefore
- most hard disk low-level format programs come only with
- a hard disk controller card. There are a few PD low-level
- formatting packages, though. Most manufacturers low-level
- format their hard drives at the factory. Low level formatting
- is the first step in the three part formatting process; the
- second step is to use FDISK, and the third is to execute a
- high level format.
- MB -- abbrv for "Megabytes," or "millions of bytes."
- MISC -- abbrv for "miscellaneous"
- OPTIMIZE -- to make all files on a disk "contiguous," or physically linked
- together on a [hard] drive.
- PATCH -- a file that is patched (combined) into another file
- to change the original file in some way
- PD -- abbrv for "Public Domain"
- PIRATED -- see DEFINITIONS section in this issue.
- RAM -- abbrv for "Random Access Memory." (memory used by software)
- RBBS -- abbrv for RBBS-PC, a type of BBS (Remote Bulletin Board System)
- ROM -- abbrv for "Read Only Memory." (memory used by hardware to boot)
- SYSOP -- SYStem OPerator of a BBS
- *TROJAN* -- see DEFINITIONS section in this issue.
- TROJAN HORSE -- see DEFINITIONS section in this issue.
- TSR -- abbv for "Terminate, Stay Resident" Synonym = "Memory Resident"
- TXT -- abbrv for "text"
- USU -- abbrv for "usually"
- UNP -- abbrv for "unprotect"
- UNPROTECT -- an "unprotect file" is a patch file that results in the
- breaking of copy protection (no doubt for back up purposes).
- UTIL -- abbrv for "utility"
- WORM -- Trojan Horse
- ZOO -- All files compressed with ZOO.EXE bear this file extension.
- ZOO-compressed files are NOT compatible with ARC.EXE.
-
-
- ----------------------------------------------------------------------------
- | Finally: |
- ----------------------------------------------------------------------------
-
-
- If you have any additions or corrections for this list, send them to
- Eric Newhouse at any of the following places: (in order of most frequented)
-
-
- * The Crest RBBS (213-471-2518) (1200/2400) (80 MB)
- [ This is my board ]
-
-
- * The West LA PC-STORE (213-559-6954) (300/1200/2400) (50 MB)
-
- * The Sleepy Hollow PCB (213-859-9334) (300/1200/2400) (108 MB)
-
- * VOR BBS (415-994-2944) (300/1200/2400) (20 MB)
-
- * The Source (leave E-mail to "Doctor File Finder" in IBM SIG #4)
- Doctor File Finder (Mike Callahan) will relay your name
- and update information to me.
-
- ----------------------------------------------------------------------------
- End of file.