home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.org.eff.talk
- Path: sparky!uunet!spool.mu.edu!agate!rsoft!mindlink!a3916
- From: Clayten_Hamacher@mindlink.bc.ca (Clayten Hamacher)
- Subject: Re: Beneficial Virus?
- Organization: MIND LINK! - British Columbia, Canada
- Date: Thu, 7 Jan 1993 00:11:02 GMT
- Message-ID: <19311@mindlink.bc.ca>
- Sender: news@deep.rsoft.bc.ca (Usenet)
- Lines: 26
-
- >But the virus still remains embedded in the compressed files. Unless the
- >virus code is remove on decompression, and re-inserted on write-to-disk, it
- >remains in the file, albeit dormant. Sure, no more files are infected once
- >I delete the marker file (assuming I know which file it is), but suppose I
- >wanteed to transfer a file to another system that is required to be virus-
- >free? How to I get an uninfected copy of my file?
-
- I would assume that if someone was going to write this virus they include a
- 1k program to remove it (or set the virus to interpret a certain flag as a
- suicide command).
-
- Even if they didn't, there would really be no reason to ever remove the
- 'virus'. At this point it would just contain decompression code and wouldn't
- be any more dangerous than PKUNZIP.
-
- Because the virus wouldn't be an OS patch it would only be capable of
- compressing executables (so it would get passed control before the program
- was loaded, it couldn't as a text files) so if the executable would run on
- the system you're sending it to then so would the decompression. You might
- think of some inane reason to give someone an executable that won't run on
- their system but it wouldn't happen often (if at all).
-
-
- --
-
- Clayten_Hamacher@Mindlink.bc.ca Land of the rising snow.
-