home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.org.eff.talk
- Path: sparky!uunet!gatech!emory!nastar!phardie
- From: phardie@nastar.uucp (Pete Hardie)
- Subject: Re: Beneficial Virus
- Message-ID: <1993Jan12.161244.11179@nastar.uucp>
- Organization: Digital Transmission Systems, Duluth, GA.
- References: <19534@mindlink.bc.ca>
- Date: Tue, 12 Jan 1993 16:12:44 GMT
- Lines: 60
-
- In article <19534@mindlink.bc.ca> Clayten_Hamacher@mindlink.bc.ca (Clayten Hamacher) writes:
- >>>One possible problem would be a malicious virus masquerading as a
- >>>valid marker file. Then any file compressed with the beneficial
- >>>virus would activate the malicious virus - some sort of check would
- >>>have to be made that the virus was the *RIGHT* virus.
- >>
- >>With all the attendant troubles of verification and the slowdown it
- >>will present.
- >
- >Do you check all the rest of the programs on your system? They are just as
- >likely to have 'evil twins' lurking around.
-
- This isn't what I meant. I meant that the BCV is slower because *if* it
- does this check, since it needs to perform the verification, which is only
- foolproof if the check is of the whole code, and the check *does* slow down
- the execution of the real program beneath the virus.
-
- >>Note that this would change the creation date of every executable
- >>every time the program was run. Even on a single-user MS-DOS system,
- >>this can have some undesirable results.
- >
- >Like what? Your half-witted virus checker goes off and shuts down the
- >computer?
- >In almost every OS I've ever used there has been a way to fake the
- >modification
- >date, in unix you just write a new date, in MS-DOS if nothing else you just
- >record the current time, set the clock to the old modification date, write
- >the
- >file, set the clock to the time you just recorded plus about two seconds..
- >And
- >decent virus could do it so it's not a very good way to tell if you're
- >infected.
-
- Again, the point is that it needs to be done, and it slows down the system,
- and on the MSDOS system it can result in misdated files should any other
- activities write a file during that window.
-
- >>Does the virus get removed from memory after the executable stops? If not,
- >>then what happens when another executable is run?
- >
- >You do understand the meaning of the word 'virus' don't you? If it finds the
- >marker (ie it's ok to execute) then it does what the name suggests and
- >infects
- >the next executables that you run. If it doesn't find that permission then it
- >quits operation after unpacking the program.
-
- a Mac virus can infect the Chooser (Finder?), which is 'running' all the time,
- and will allow the virus to attach itself to each executable as it is run,
- or any virus could infect the boot code and the infect all executables at
- next boot, or just one more at each boot, or....
-
- 'Virus' describes only the propagation method, and (relative) size of the
- thing - it does not define the mechanics of infection.
-
-
- --
- Pete Hardie: phardie@nastar (voice) (404) 497-0101
- Digital Transmission Systems, Inc., Duluth GA
- Member, DTS Dart Team | cat * | egrep -v "signature virus|infection"
- Position: Goalie |
-