The program “8^” violated the Res(Other) privilege by invoking the procedure 3^ on ‘4^’ resource 5^ in the file “6^”.
Privilege:
Res. Operation:
Resource Type:
Resource ID:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
Res(Other)
3^
4^
5^
6^
7^
8^
9^
Res(System)
Res(System)
1
The program “8^” violated the Res(System) privilege by invoking the procedure 3^ on the active System file’s ‘4^’ resource 5^.
Privilege:
Res. Operation:
Resource Type:
Resource ID:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
Res(System)
3^
4^
5^
6^
7^
8^
9^
Res(Self)
Res(Self)
1
The program “8^” violated the Res(Self) privilege by invoking the procedure 3^ on its own ‘4^’ resource 5^. This is a very suspicious operation.
Privilege:
Res. Operation:
Resource Type:
Resource ID:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
Res(Self)
3^
4^
5^
6^
7^
8^
9^
File(Other)
File(Other)
1
The program “8^” violated the File(Other) privilege by calling the procedure 3^ to change the file “6^” from “4^” to “5^”.
Privilege:
File Operation:
Original State:
Changed State:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
File(Other)
3^
4^
5^
6^
7^
8^
9^
File(System)
File(System)
1
The program “8^” violated the File(System) privilege by calling the procedure 3^ to change the active System file “6^” from “4^” to “5^”.
Privilege:
File Operation:
Original State:
Changed State:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
File(System)
3^
4^
5^
6^
7^
8^
9^
File(Self)
File(Self)
1
The program “8^” violated the File(Self) privilege by calling the procedure 3^ to change itself from “4^” to “5^”. This is a very suspicious operation.
Privilege:
File Operation:
Original State:
Changed State:
Victim File:
…File’s Disk:
Guilty Program:
…Program’s Disk:
File(Self)
3^
4^
5^
6^
7^
8^
9^
Override ON
Gatekeeper OFF
0
Gatekeeper was turned off by the program “8^”. With Gatekeeper off, all of its protection features were disabled.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Gatekeeper OFF
8^
9^
4^
Override OFF
Gatekeeper ON
0
Gatekeeper was turned on by the program “8^”. With Gatekeeper on, all of its protection features resumed full operation.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Gatekeeper ON
8^
9^
4^
Override Expired
Gatekeeper ON*
0
* Gatekeeper automatically turned itself on 30 minutes after it was turned off. All of Gatekeeper’s protection features subsequently resumed full operation.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Gatekeeper ON*
8^
9^
4^
Gk Auto-Enabled
Gatekeeper ON*
0
* Gatekeeper automatically turned itself on 5^ HMS after it was turned off. All of Gatekeeper’s protection features subsequently resumed full operation.
Operation:
Time Limit:
Current Program:
…Program’s Disk:
Disk Write Count:
Gatekeeper ON*
5^ HMS
8^
9^
4^
Installation
Startup
3
System startup occurred and Gatekeeper began operation.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Startup
8^
9^
4^
Shutdown
Shutdown
4
System shutdown occurred and Gatekeeper ceased operation.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Shutdown
8^
9^
4^
Virus Found
Virus Found
2
The 4^ 5^ virus was found in the “6^” file on the “7^” disk. The virus could NOT be removed. Disinfect the disk as soon as possible.
Virus:
Strain:
Infected File:
…File’s Disk:
Status:
4^
5^
6^
7^
Still Infected.
Virus Removed
Virus Removed
2
The 4^ 5^ virus was found in the “6^” file on the “7^” disk and successfully removed.
Virus:
Strain:
Infected File:
…File’s Disk:
Status:
4^
5^
6^
7^
Virus Removed.
IL Found
IL Found
2
A suspicious resource of type ‘4^’ was found in the “6^” file on the “7^” disk. The resource was NOT removed. Disinfecting the disk would be a sensible precaution.
Resource Type:
Resource ID/Size:
Host File:
…File’s Disk:
Resource Status:
4^
5^
6^
7^
Still Present.
IL Removed
IL Removed
2
A suspicious resource of type ‘4^’ was found in the “6^” file on the “7^” disk. The resource was removed as a precaution.
Resource Type:
Resource ID/Size:
Host File:
…File’s Disk:
Resource Status:
4^
5^
6^
7^
Removed.
Trojan Horse Found
Trojan Found
2
The “8^” file on the “9^” disk was identified as a Trojan Horse program. The program is dangerous and should be deleted as soon as possible.
Trojan File:
…File’s Disk:
Carrying:
Status:
8^
9^
4^ 5^
DANGEROUS.
Damage Found
Damage Found
2
The “6^” file on the “7^” disk is damaged or in an unknown format. Use the file with caution, and restore it from a backup if possible.
Damaged File:
…File’s Disk:
Procedure:
Error Code:
6^
7^
4^
5^
Notify & Veto
Notify & Veto
0
Gatekeeper was placed in Notify & Veto mode by the program “8^”. With Notify & Veto mode engaged, Gatekeeper's security system resumed full operation.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Notify & Veto
8^
9^
4^
Notify Only
Notify Only
0
Gatekeeper was placed in Notify Only mode by the program “8^”. In Notify Only mode, Gatekeeper monitors privilege violations, but does NOT prevent them from taking place.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Notify Only
8^
9^
4^
Alerts ON
Alerts ON
0
Gatekeeper was instructed to begin displaying alerts in response to important events.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Alerts ON
8^
9^
4^
Alerts OFF
Alerts OFF
0
Gatekeeper was instructed to cease displaying alerts in response to important events.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Alerts OFF
8^
9^
4^
Mode Warning ON
Mode Warning ON
0
Gatekeeper was instructed to display alerts just after system startup to inform the user of its security mode; either “Notify & Veto” or “Notify Only” mode.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Mode Warning ON
8^
9^
4^
Mode Warning OFF
Mode Warning OFF
0
Gatekeeper was instructed NOT to display alerts informing the user of its security mode.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Mode Warning OFF
8^
9^
4^
Log ON
Log File ON
0
Gatekeeper was instructed to maintain a record of its activities in the Gatekeeper Log file.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Log File ON
8^
9^
4^
Log OFF
Log File OFF
0
Gatekeeper was instructed NOT to maintain any record of its activities.
Operation:
Current Program:
…Program’s Disk:
Disk Write Count:
Log File OFF
8^
9^
4^
Privileges Damaged
Privileges Damaged
2
Gatekeeper found that its list of privileges was damaged and had to be reset. Unfortunately, this severly compromises Gatekeeper’s ability to operate correctly.