home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.org.eff.talk
- Path: sparky!uunet!gatech!emory!nastar!phardie
- From: phardie@nastar.uucp (Pete Hardie)
- Subject: Re: Beneficial Virus?
- Message-ID: <1993Jan12.150013.10667@nastar.uucp>
- Organization: Digital Transmission Systems, Duluth, GA.
- References: <C0Kztn.Hvu@panix.com> <1993Jan11.164043.6756@nastar.uucp> <C0psy4.KtL@panix.com>
- Date: Tue, 12 Jan 1993 15:00:13 GMT
- Lines: 23
-
- In article <C0psy4.KtL@panix.com> rpowers@panix.com (Richard Powers) writes:
- >In <1993Jan11.164043.6756@nastar.uucp> phardie@nastar.uucp (Pete Hardie) writes:
- >>Algorithmic integrity. A virus has all of the algorithm contained in the
- >>single infected program, and does not need to access another file for part
- >>of the algorithm. If it needs to access another file for part of its 'real'
- >>code, it cannot spread by itself.
- >
- >No program of any kind has _all_ the code it needs to run. The OS is
- >an integral part. On top of that, I've seen quite a few "lazy"
- >programs which call a DOS command to do something instead of
- >duplicating the code.
-
- But there is usually more than a trivial wrapper around the DOS command,
- no? THAT is the algorithm. That the virus calls a system function is not
- relevant - the intent on the program can be deduced from the code in the
- virus section of the code.
-
-
- --
- Pete Hardie: phardie@nastar (voice) (404) 497-0101
- Digital Transmission Systems, Inc., Duluth GA
- Member, DTS Dart Team | cat * | egrep -v "signature virus|infection"
- Position: Goalie |
-