home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!elroy.jpl.nasa.gov!usc!cs.utexas.edu!qt.cs.utexas.edu!yale.edu!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: KARGRA@GBA930.ZAMG.AC.AT
- Newsgroups: comp.virus
- Subject: re: os2-stuff (OS/2)
- Message-ID: <0001.9301051858.AA13030@barnabas.cert.org>
- Date: 23 Dec 92 07:36:37 GMT
- Sender: virus-l@lehigh.edu
- Lines: 30
- Approved: news@netnews.cc.lehigh.edu
-
- Hi Vesselin,
- as pointed out in point 10 at least *.dll and *.drv files contain code which
- cannot be executed by the user, but is loaded and executed as any other *.ov?
- As there are viruses which infect overlays, they can be infected in a similar
- way. However, if the virus is not specialized on these newer formats, they
- shurely will be destroyed. BUT: Si vis pacem, para bellum. (If you want peace,
- prepare for war.) I hope things will stay too complicated for most virus-
- writers for the next 5 x 10^9 years.
- Silly me! Forget about point 4...
- Yesterday I downloaded the newest versions of McAfees OS2-scanning software.
- There is a os2-specific version for netscan, so I'll try this one too, though
- I do not expect it will work, as there is no network here on my poor, lonesome
- home-pc. :)
- Sorry for missing point B8. I'll look it up immediately. Thanks for info.
- The only mention of the /EXT= switch of F-Prot I found in NEW.206. It is
- definitely missing in COMMANDS.DOC. I just looked up all textfiles. Even
- READ_ME.DOC :-)
- As I go on vacation, I hope to report my results in January.
-
- A A
- AXA AXA
- OOO M E R R Y C H R I S T M A S OOO
- OVO OVO
- V and a V
- I I
- --- H A P P Y N E W Y E A R ---
- I I I I
- I I WITHOUT MICH et al. I I
- I I Alfred I I
- --- ---
-