home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.org.eff.talk
- Path: sparky!uunet!paladin.american.edu!gatech!emory!nastar!phardie
- From: phardie@nastar.uucp (Pete Hardie)
- Subject: Re: Beneficial Virus?
- Message-ID: <1993Jan11.164043.6756@nastar.uucp>
- Organization: Digital Transmission Systems, Duluth, GA.
- References: <C0IDMu.By5@panix.com> <1993Jan8.151721.29014@nastar.uucp> <C0Kztn.Hvu@panix.com>
- Date: Mon, 11 Jan 1993 16:40:43 GMT
- Lines: 20
-
- In article <C0Kztn.Hvu@panix.com> rpowers@panix.com (Richard Powers) writes:
- >> If the marker file was just a flag, you'd still have a virus, but
- >>once it starts being code, you no longer have a virus. I'm not sure
- >>if there is a good term for what it is, however.
- >
- >This I do not agree with. If a virus makes calls to code that is
- >available to any program via the OS, this does not make it any less a
- >virus. (ie: calling code contained in libraries.) If the code it
- >calls resides someplace else, what difference does it make?
-
- Algorithmic integrity. A virus has all of the algorithm contained in the
- single infected program, and does not need to access another file for part
- of the algorithm. If it needs to access another file for part of its 'real'
- code, it cannot spread by itself.
-
- --
- Pete Hardie: phardie@nastar (voice) (404) 497-0101
- Digital Transmission Systems, Inc., Duluth GA
- Member, DTS Dart Team | cat * | egrep -v "signature virus|infection"
- Position: Goalie |
-