home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gatech!darwin.sura.net!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: ygoland@edison.SEAS.UCLA.EDU (The Jester)
- Newsgroups: comp.virus
- Subject: Request For Information (PC)
- Message-ID: <0004.9208131902.AA05714@barnabas.cert.org>
- Date: 11 Aug 92 09:30:51 GMT
- Sender: virus-l@lehigh.edu
- Lines: 37
- Approved: news@netnews.cc.lehigh.edu
-
- I have recently joined this group and the Virus Research community in
- general and am looking for information regarding viruses, the more
- technical the better. More specifically, however, I am looking for
- information regarding the hardware level set up of the IBM pc. For
- example:Information regarding what interupts exist, what their
- location is, and what triggers them. The fundamentals behind the bios,
- the structure of a disk boot record, etc. Basically information
- regarding all the things viruses destroy or use to replicate
- themselves. I would ask for virus code but having seen what an
- irrational outbreak this causes, I will refrain (grin).
-
- Towards this end I have accessed all sites listed in the 'Anti-viral
- Documentation archive sites' I got from this list. I have amassed 4
- megs of information and have reviewed all of it and have read in
- detail 90% of it (I should have the last few articles done by
- tomorrow). Unfortunatly there is a definate 'conspiracy of silence' in
- these papers as they regularly refuse to go into the sort of detail I
- need in order to write an anti-viral product. While the reasoning
- behind this may be that this also prevents me from writting a virus, I
- assure you that if this is the intention, its a futile one. But, from
- what I'v seen so far, this debate is a long winded one and has been
- re-treaded far to many times for me to seriously rehash it now.
- Suffice it to say that I am looking for more detailed information
- regarding encryptions used, modes of transportation, and most
- importantly:Specifics on IBM pc architecture. My goal is to determine
- the feasability of writting an active protection program which will be
- loaded before whatever os the 80x86 machine is running and act as a
- 'supervisior'. To this end I have nicknamed my idea TRON, based on the
- movie of the same name.
-
- Thank you for your time,
- Yaron (The Jester) Goland
- - --
- The Jester
- "You can lead a herring to water, but you have to walk really fast,
- or he'll die."-Stolen from my Evil Mistress (TM)
- NWILSON@MIAVX1.ACS.MUOHIO.EDU
-