home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ukma!darwin.sura.net!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: bontchev@fbihh.informatik.uni-hamburg.de (Vesselin Bontchev)
- Newsgroups: comp.virus
- Subject: Re: Checking high memory with VSCAN (PC)
- Message-ID: <0002.9211091912.AA05064@barnabas.cert.org>
- Date: 2 Nov 92 13:55:37 GMT
- Sender: virus-l@lehigh.edu
- Lines: 23
- Approved: news@netnews.cc.lehigh.edu
-
- ianst@qdpii.comp.qdpi.oz.au (Ian Staples) writes:
-
- > Hmmm... does this imply that once we all have OS/2 or whatever on 386s
- > or better, and 32-bit applications addressing oceans of flat memory
- > space then we will have to wait forever for SCAN or some other to scan
- > the whole bloody lot when we boot up each morning?
-
- I sincerely hope that no anti-virus program will be that stupid! Under
- OS/2 in 32-bit mode, when your program (or a virus) wants to "address"
- a memory chunk, it must first allocate it. And when it allocates it,
- the OS nicely wipes it out. Therefore, there's virtually no hope to
- "find" the virus in this way - the most you could do it to wipe it
- out. But you cannot do even that, since memory allocated for one
- process is protected from the other processes, so they cannot just
- poke around...
-
- Regards,
- Vesselin
- - --
- Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg
- Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN
- < PGP 2.0 public key available on request. > Vogt-Koelln-Strasse 30, rm. 107 C
- e-mail: bontchev@fbihh.informatik.uni-hamburg.de D-2000 Hamburg 54, Germany
-