home *** CD-ROM | disk | FTP | other *** search
Text File | 1989-08-29 | 100.2 KB | 2,585 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- FLU_SHOT+, Version 1.7
-
- A Form of Protection from
- Viral and Trojan Programs
-
-
- by
- Ross M. Greenberg
- and
- Software Concepts Design
- 594 Third Avenue
- New York, New York 10016
- BBS:(212)-889-6438 1200|2400|N/8/1
-
- Member of the Association of Shareware Professionals
-
-
-
-
- FLU_SHOT+ is a trademark of Software Concepts Design.
- Copyright (C), 1988, 1989 by Software Concepts Design.
- All Rights Reserved.
-
-
- Not for Commercial Distribution without written permission by the
- copyright holder. Noncommercial copying of this software and this
- documentation is encouraged. Commercial Distribution is easily
- defined: if you distribute this software, or the enclosed
- documentation, for more than your cost of such distribution, then
- you're a Commercial Distributor and require our written
- permission. Not-for-profit organizations and computer user
- groups, and their bulletin board systems (if any) are
- specifically *not* considered commercial distributors.
-
- By your using this software, you agree to the terms herein.
- Specifically, that you do not have the right to copy this
- software except as outlined above, and that you are granted a
- license to use this software only by registering this software as
- mentioned elsewhere in this document.
-
- You also agree, and signify that agreement by using this
- software, that Software Concepts Design and Ross M. Greenberg
- will not be held liable for any reason for any cost you may
- incur, or any potential income you might lose as a result of
- using this software. Finally, this software is provided "AS IS",
- meaning that what you see is what you get. If you use this
- software and a tree falls on your house, or your spouse leaves
- you for someone younger and more virile, please do not bother
- having your lawyer call -- it isn't the fault of the software, no
- matter what the lawyer tries to convince you! Maybe lawyers
- should all work on a shareware basis: they only get paid if
- you're satisfied with their work? One can dream....
-
- Software Concepts Design can be reached by the following means
- *by*registered*users* of FLU_SHOT+:
-
- Telephone: Monday-Friday, 9am - 5pm (EST): 212-889-6431
- RamNet BBS: 212-889-6438
- MCI: 'greenber'
- BIX: 'greenber'
- CompuServe: [72461, 3212]
- UseNet: ...uunet!utoday!greenber, greenber@utoday.uunet
-
-
-
-
- Table of Contents
-
- I. Introduction
- a. What is a Trojan.....................................1
- b. What is a Virus......................................4
- c. The Challenge to the Worm............................6
-
- II. About the FLUSHOT Series
- a. A Brief History......................................8
- b. FLU_SHOT+ Features and Enhancements..................9
- c. Registering FLU_SHOT+................................10
- d. Site Licensing of FLU_SHOT+..........................10
-
- III. Using FLU_SHOT+
-
- a. Down and Dirty Installation: Step-By-Step............12
- b. The FLUSHOT.DAT file.................................14
- 1. Protecting files from Write Access..............15
- 2. Protecting files from Read Access...............15
- 3. Excluding files.................................15
- 4. Checksumming files..............................16
- 5. Registering a TSR program.......................17
- 6. Restricted Access...............................17
- 7. Protecting the FLUSHOT.DAT file.................18
- 8. Protection Recommendations......................18
- 9. Allowing "dangerous" programs to run............19
- 10. Protecting your Boot Track......................19
-
- c. Running FLU_SHOT+....................................20
- 1. Checksumming the in-memory table................20
- 2. Intercepting Direct Disk Writes Through INT13...21
- 3. What about INT26................................21
- 4. Turning off the header message..................21
- 5. Disabling Triggering on Open With Write Access..21
- 6. Changing the Trigger Window Attributes..........21
- 7. Allowing trusted TSR's to work..................23
- 8. Disabling FLU_SHOT+.............................23
- 9. Disabling FLU_SHOT+ Toggle Display..............24
- 10. Forcing FLU_SHOT+ to only use the BIOS..........24
- 10. Defining the "Special" Keys.....................25
- 11. Putting FLU_SHOT+ to sleep when run.............25
-
- IV. Interpreting a FLU_SHOT+ Trigger..........................26
-
- V. How Good is FLUSHOT+, Really?.............................30
-
- VI. Reward Offered............................................31
-
- VII. Appendices
- Appendix A: Common Questions and Their Answers...........33
- Appendix B: How Does A Virus Work?.......................38
-
-
-
- Introduction
-
- What is a Trojan?
- =================
-
- Back in the good old days (before there were computers), there
- was this bunch of soldiers who had no chance of beating a
- superior force or of even making it into their fortress. They
- had this nifty idea: present the other side with a gift. Once
- the gift had been accepted, soldiers hiding within the gift would
- sneak out and overtake the enemy from within.
-
- We can only think of the intellectual giants of the day who would
- accept a gift large enough to house enemy soldiers without
- checking its contents. Obviously, they had little opportunity to
- watch old WWII movies to see the same device used over and over
- again. They probably wouldn't have appreciated Hogan's Heroes
- anyway. No color TV's -- or at least not ones with reliable
- reception.
-
- Consider the types of people who would be thrilled at the concept
- of owning their own rough hewn, large wooden horse! Perhaps they
- wanted to be the first one on their block, or something silly
- like that.
-
- Anyway, you're all aware of the story of The Trojan Horse.
-
- Bringing ourselves a bit closer to the reality we've all grown to
- know and love, there's a modern day equivalent: getting a gift
- from your BBS or user group which contains a little gem which
- will attack your hard disk, destroying whatever data it contains.
-
- In order to understand how a potentially useful program can cause
- such damage when corrupted by some misguided soul, it's useful to
- understand how your disk works, and how absurdly easy it is to
- cause damage to the data contained thereon. So, a brief
- technical discussion of the operation of your disk is in order.
- For those who aren't concerned, turn the page or something.
-
- Data is preserved on a disk in a variety of different physical
- ways having to do with how the data is encoding in the actual
- recording of that data. The actual *structure* of that data,
- however, is the same between MS-DOS machines. Other operating
- systems have a different structure, but that doesn't concern us
- now.
-
- Each disk has a number of "tracks". These are sometimes called
- cylinders from the old type IBMer's. These are the same people
- who call hard disks DASDs (Direct Access Storage Devices), so we
- can safely ignore their techno-speak, and just call them tracks.
- Tracks can be thought of as the individual little grooves on an
- audio record, sort of.
-
- Anyway, each track is subdivided into a number of sectors. Each
- track has the same number of sectors. Tracks are numbered, as
-
-
- 1
-
-
-
- are sectors. Any given area on the disk can be accessed if a
- request is made to read or write data into or out of Track-X,
- Sector Y. The read or write command is given to the disk
- controller, which is an interface between the computer itself and
- the hard disk. The controller figures out what commands to send
- to the hard disk, the hard disk responds and the data is read or
- written as directed.
-
- The first track on the hard disk typically will contain a small
- program which is read from the hard disk and executed when you
- first power up your machine. The power up sequence is called
- "booting" your machine, and therefore the first track is typical
- known as the "boot track".
-
- In order to read information from your disk in a logical
- sequence, there has to be some sort of index. An unusual index
- method was selected for MS-DOS. Imagine going to the card index
- in a library, looking up the title you desire, and getting a
- place in another index which tells you where on the racks where
- the book is stored. Now, when you read the book, you discover
- that only the first chapter of the book is there. In order to
- find the next chapter of the book, you have to go back to that
- middle index, which tells you where the next chapter is stored.
- This process continues until you get to the end of the book.
- Sounds pretty convoluted, right? You bet! However, this is
- pretty much how MS-DOS does its "cataloguing" of files.
-
- The directory structure of MS-DOS allows for you to look up an
- item called the "first cluster". A cluster represents a set of
- contiguous ("touching or in contact" according to Random House)
- tracks and sectors. It is the smallest amount of information
- which the file structure of MS-DOS knows how to read or write.
-
- Based on the first cluster number as stored in the directory, the
- first portion of a file can be read. When the information
- contained therein is exhausted, MS-DOS goes to that secondary
- index for a pointer to the next cluster. That index is called
- the File Allocation Table, commonly abbreviated to "FAT". The
- FAT contains an entry for each cluster on the disk. An FAT entry
- can have a few values: ones which indicate that the cluster is
- unused, another which indicates that the associated cluster has
- been damaged somehow and that it should be marked as a "bad
- cluster", and a pointer to the next cluster for a given file.
- This allows for what is called a linked list: once you start
- looking up clusters associated with a given file, each FAT entry
- tells you what the next cluster is. At the end of the linked
- list is a special indicator which indicates that there are no
- more clusters associated with the file.
-
- There are actually two copies of the FAT stored on your disk, but
- no one really knows what the second copy was intended for.
- Often, if the first copy of the FAT is corrupted for some reason,
- a clever programmer could recover information from the second
- copy to restore to the primary FAT. These clever programmers can
- be called "hackers", and should not be confused with the thieves
-
-
- 2
-
-
-
- who break into computer systems and steal things, or the "worms"
- [Joanne Dow gets credit for *that* phrase!] who would get joy out
- of causing you heartache!
-
- But that heartache is exactly what can happen if the directory
- (which contains the pointer to the first cluster a file uses),
- the FAT (which contains that linked list to other areas on the
- disk which the file uses), or other areas of the disk get
- corrupted.
-
- And that's what the little worms who create Trojan programs do:
- they cause what at first appears to be a useful program to
- eventually corrupt the important parts of your disk. This can be
- as simple as changing a few bytes of data, or can include wiping
- entire tracks clean.
-
- Not all programs which write to your hard disk are bad ones,
- obviously. Your word processor, spreadsheet, database and
- utility programs have to write to the hard disk. Some of the DOS
- programs (such as FORMAT), if used improperly, can also erase
- portions of your hard disk causing you massive amounts of grief.
- You'd be surprised what damage the simple "DEL" command can do
- with just a simple typo.
-
- But, what defines a Trojan program is its delivery mechanism: the
- fact that you're running something you didn't expect. Typical
- Trojan programs cause damage to your data, and were designed to
- do so by the worms who writhe in delight at causing this damage.
- May they rot in hell -- a mind is a terrible thing to waste!
-
- Considering the personality required to cause such damage, you
- can rest assured that they have few friends, and even their
- mother doesn't like to be in the same room with them. They sit
- back and chortle about the damage they do with a few other lowly
- worms. This is their entire social universe. You should pity
- them. I know that I do.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 3
-
-
-
- Introduction
-
- What is a Virus?
- ================
-
- Trojan programs are but a delivery mechanism, as stated above.
- They can be implemented in a clever manner, so that they only
- trigger the malicious part on a certain date, when your disk
- contains certain information or whatever. However they're coded,
- though, they typically affect the disk only in a destructive
- manner once triggered.
-
- A new breed of programs has the capability of not only reserving
- malicious damage for a given event's occurrence, but of also
- replicating itself as well.
-
- This is what people refer to when they mention the term "Virus
- Program".
-
- Typically, a virus will spread itself by replicating a portion of
- itself onto another program. Later, when that normally safe
- program is run it will, in part, execute a set of instructions
- which will infect other programs and then potentially, trigger
- the Trojan portion of the program contained within the virus.
-
- The danger of the virus program is twofold. First, it contains a
- Trojan which will cause damage to your hard disk. The second
- danger is the reason why everyone is busy building bomb shelters.
- This danger is that the virus program will infect other programs
- and they in turn will infect other programs and so forth. Since
- it can also infect programs on your floppy disks, you could
- unknowingly infect other machines! Pretty dangerous stuff,
- alright!
-
- Kenneth van Wyck, one of the computer folks over at Lehigh
- University, first brought a particular virus to the attention of
- the computer community. This virus infects a program, which
- every MS-DOS computer must have, called COMMAND.COM. This is the
- Command Line Interpreter and is the interface between your
- keyboard and the MS-DOS operating system itself. Whatever you
- type at the C> prompt will be interpreted by it.
-
- Well, the virus subverts this intended function, causing the
- infection of neighboring COMMAND.COMs before continuing with
- normal functionality of the command you typed. After a certain
- number of "infections", the Trojan aspect of the program goes
- off, causing you to lose data.
-
- The programmer was clever. But still a worm. And still
- deserving of contempt instead of respect. Think of what good
- purposes the programmer could have put his or her talents to
- instead of creating this damage. And consider what this
- programmer must do, in covering up what they've done. They
- certainly can't tell anyone what they've accomplished.
- Justifiable homicide comes to mind, but since the worms they must
-
-
- 4
-
-
-
- hang around are probably as disreputable as they are, they must
- hold their little creation a secret.
-
- A pity. Hopefully, the worm is losing sleep. Or getting a sore
- neck looking behind them wondering which of their "friends" are
- gonna turn them in for the reward I list towards the end of this
- document.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 5
-
-
-
- Introduction
-
- The Challenge to the Worm
- =========================
-
- When I first released a program to try to thwart their demented
- little efforts, I published this letter in the archive (still in
- the FLU_SHOT+ archive of which this is a part of). What I say in
- it still holds:
-
- As for the designer of the virus program: most
- likely an impotent adolescent, incapable of
- normal social relationships, and attempting to
- prove their own worth to themselves through
- these type of terrorist attacks.
-
- Never succeeding in that task (or in any
- other), since they have no worth, they will one
- day take a look at themselves and what they've
- done in their past, and kill themselves in
- disgust. This is a Good Thing, since it saves
- the taxpayers' money which normally would be
- wasted on therapy and treatment of this
- miscreant.
-
- If they *really* want a challenge, they'll try
- to destroy *my* hard disk on my BBS, instead of
- the disk of some innocent person. I challenge
- them to upload a virus or other Trojan horse to
- my BBS that I can't disarm. It is doubtful the
- challenge will be taken: the profile of such a
- person prohibits them from attacking those who
- can fight back. Alas, having a go with this
- lowlife would be amusing for the five minutes
- it takes to disarm whatever they invent.
-
- Go ahead, you good-for-nothing little
- slimebucket: make *my* day!
-
-
- Alas, somebody out there opted to do the cowardly thing and to
- use the FLUSHOT programs as a vehicle for wrecking still more
- destruction on people like you. The FLUSHOT3 program was
- redistributed along with a companion program to aid you in
- reading the documentation. It was renamed FLUSHOT4. And the
- reader program was turned into a Trojan itself.
-
- I guess the programmer involved was too cowardly to take me up on
- my offer and prefers to hurt people not capable of fighting back.
- I should have known that, I suppose, but I don't normally think
- of people who attack innocents. Normally, I think of people to
- respect, not people to pity, certainly not people who must cause
- such damage in order to "get off".
-
- They are below contempt, obviously, and can do little to help
-
-
- 6
-
-
-
- themselves out of the mire they live in.
-
- Still, a worm is a worm.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 7
-
-
-
- About FLUSHOT
-
- A Brief History
- ===============
-
- The original incarnation of FLU_SHOT was a quick hack done in my
- spare time. It had a couple of bugs in it which caused it to
- trigger when it shouldn't, and a few conditions which I had to
- fix. A strangeness in how COMMAND.COM processed certain
- conditions when I "failed" an operation caused people to lose
- more data than they had intended -- certainly not my intent!
-
- FLU_SHOT was modified and became FLUSHOT2. It included some
- additional protections, protecting some other important system
- files, and protecting against direct disk writes which can be
- used to circumvent FLUSHOT's protection mechanisms.
-
- Additionally, FLUSHOT2 forced an exit of the program currently
- running instead of a fail condition when you indicated that an
- operation should not be carried out.
-
- FLUSHOT2 was also now distributed in the popular archive format
- (have you remembered to send your shareware check into Phil Katz
- for his efforts? You really should. It ain't that much money!).
-
- Next came FLUSHOT3. A bug was fixed which could have caused
- certain weird things when you denied direct disk I/O to certain
- portions of DOS 3.x.
-
- The enhancements to FLUSHOT3 included the ability to enter a 'G'
- when FLUSHOT was triggered. This allowed FLUSHOT to become
- inactive until an exit was called by the foreground task. So,
- when you used some trustworthy program which did direct disk I/O,
- you wouldn't be pestered with constant triggering after you enter
- the 'G'. Primarily this was a quick hack to allow programs such
- as the FORMAT program to run without FLUSHOT being triggered each
- time it tried to do any work it was supposed to.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8
-
-
-
- About FLUSHOT
-
- FLU_SHOT+ Features and Enhancements
- ===================================
-
- This release of FLU_SHOT has a new name: FLU_SHOT+. Because
- FLUSHOT4 was a Trojan, I opted to change the name. Besides,
- FLU_SHOT+ is the result of some real effort on my part, instead
- of being a part-time quick hack. I hope the effort shows.
-
- FLUSHOT is now table driven. That table is in a file which I
- call FLUSHOT.DAT. It exists in the root directory on your C:
- drive. However, I'll advise you later on how to change its
- location so that a worm can't create a Trojan to modify that
- file.
-
- This file now allows you to write and/or read protect entire
- classes of programs. This means that you can write protect from
- damage all of your *.COM, *.EXE, *.BAT, and *.SYS files. You can
- read protect all of your *.BAT files so that a nasty program can
- not even determine what name you used for FLU_SHOT+ when you
- invoked it!
-
- Additionally, you can now automatically check programs when you
- first invoke FLU_SHOT+ to determine if they've changed since you
- last looked at them. Called checksumming, it allows you to know
- immediately if one of the protected programs has been changed
- when you're not looking. Additionally, this checksumming can
- even take place each time you load the program for execution.
-
- Also, FLU_SHOT+ will advise you when any program "goes TSR". TSR
- stands for "Terminate and Stay Resident", allowing pop-ups and
- other useful programs to be created. A worm could create a
- program which leaves a bit of slime behind. Programs like
- Borland's SideKick program, a wonderful program and certainly not
- a Trojan or virus, is probably the best known TSR. FLU_SHOT+
- will advise you if any program attempts to go TSR which you
- haven't already registered in your FLUSHOT.DAT file.
-
- Finally, FLU_SHOT+ will also now pop-up a little window in the
- middle of your screen when it gets triggered. It also will more
- fully explain why it was triggered. The pop-up window means that
- your screen won't get screwed up beyond recognition -- unless
- you're in graphics mode when it pops up. Sorry, 'dems the
- breaks!
-
- This version, FLU_SHOT+, has some other substantial improvements
- on the security side, has a couple of bug fixes here and there
- and is generally the same program - just a little more reliable,
- and a little more user friendly. And, more closely attuned to
- what you, the user community, have asked me for.
-
- More information about FLU_SHOT+ and its enhancements can be
- found in the file "UPDATES.TXT", in the archive. My thanks to
- Mr. Mark Hamilton of the UK for some enhancements ideas and code.
-
-
- 9
-
-
-
-
- About FLUSHOT
-
- Registering FLU_SHOT+
- =====================
-
- FLU_SHOT+ is not a free program. You're encouraged to use it, to
- distribute it to your friends and co-workers. If you end up not
- using it for some reason, let me know why and I'll see if I can
- do something about it in the next release.
-
- But, the right to use FLU_SHOT+ is contingent upon you paying for
- the right to use it. I ask for ten dollars as a registration
- fee, plus four dollars to meet my costs for shipping, handling,
- and processing each order. This entitles you to get informed
- when the next update is available, and to have someone available
- to help support you with any problem you might have with the
- program. And it allows you to pay me, in part, for my labor in
- creating the entire FLU_SHOT series. I don't expect to get my
- normal consulting rate or to get a return equal to that of other
- programs which I've developed and sell through more traditional
- channels. That's not my intent, or I would have made FLU_SHOT+ a
- commercial program and you'd be paying lots more money for it.
-
- Some people are uncomfortable with the shareware concept, or
- believe that there ain't no such thing as Trojan or Virus
- programs, and that a person who profits from the distribution of
- a program such as FLU_SHOT must be in it for the money. Although
- I sympathize with their feelings, I feel that a user of FLU_SHOT
- simply *must* pay for their usage of the program -- using it for
- free is paramount to stealing, and we know how wrong that is!
-
- I've created an alternative for these folks. I'll call it
- "charityware" [first called that, to my knowledge, by Roedy
- Green]. You can also register FLU_SHOT+ by sending me a check
- for $10 made out to your favorite charity. And a check made out
- to me for $4 to handle my costs. Be sure to include a stamped
- and addressed envelope. I'll forward the monies onto them and
- register you fully.
-
- Of course, if you wish, you can send me a check for more than
- $14. I'll cash it gladly (I'm no fool!).
-
-
- Site Licensing of FLU_SHOT+
- ===========================
-
- So, you run the computer department of a big corporation, you got
- a copy of FLU_SHOT+, decided it was wonderful and that it did
- everything you wanted and sent in your ten bucks. Then you
- distributed it to your 1000 users.
-
- Not what is intended by the shareware scheme. *Each* site using
- FLU_SHOT+ should be registered. That's ten bucks a site, me
- bucko! Again, make the check out to charity if you're
-
-
- 10
-
-
-
- uncomfortable with the idea of a programmer actually deriving an
- income from their work.
-
- However, if you've really got 1000 computers, you should give me
- a call. As much as I'd like to get $10 for each site, that
- wouldn't be fair to you. So, quantity discounts are available.
-
- Here's out quantity discount schedule. Remember to add in the
- four dollar charge for each order.
-
- Quantity Price Each
- ============== ===============
- 1 - 49 $10
- 50 - 249 $ 9
- 250 - 499 $ 7
- 500 - 9999 $ 6
- 10,000+ No Charge (after paying for 9999!)
-
- Site licensee's get a "gold" disk, and make their own copies at
- their site, working on the honor system. Each site license does
- require a separate agreement, so be sure to give us a call to
- work out the details. End-user contact *must* be through a
- single contact point in order for any of these discounts to
- apply.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 11
-
-
-
- Using FLU_SHOT+
-
- Down and Dirty Installation: Step By Step
- =========================================
-
- Consider this area of the manual to be the "I hate to read
- manuals" approach. We encourage you to read the manual, since
- about 90% of our tech support calls are answered by telling the
- caller to turn to a given page in the manual. Some people,
- however, just want the ability to use the product immediately,
- without wading through the manual. So, if you're one of those
- gung-ho'ers, here's a step-by-step approach:
-
- 1) If you received FLU_SHOT+ on a diskette, place that diskette
- in the A: drive on your system. If you received FLU_SHOT+ from a
- Bulletin Board System, then you've obviously figured out how to
- de-arc and de-compress the files contained within the archive (if
- not, how are you reading this?).
-
- 2) Type the following commands:
- COPY A:FSP.COM C:\
- COPY A:FLUSHOT.DAT C:\
-
- 3) Make C: your default drive by simply typing "C:", followed
- by a carriage return. Make the root directory your default
- directory simply by typing "CD \", followed by a carriage return.
-
- 4) Type "FSP", followed by a carriage return. This will invoke
- FLU_SHOT+.
-
- 5) You should expect to see three error messages. These will
- take one of two forms. One form will tell you that the checksum
- for the listed file doesn't match the actual checksum for that
- file. If you see this message, copy down the displayed number on
- a separate piece of paper, along with the filename. Press any
- key to continue on to the next file.
-
- 6) If you see a message indicating that a given file is not
- found, then you'll have to remember what the names your computer
- uses for the on-disk BIOS (FLU_SHOT+ expects "IBMBIO.SYS") and
- on-disk Disk Operating System (FLU_SHOT+ expects "IBMDOS.SYS")
- and edit the names in the FLUSHOT.DAT file appropriately. If,
- for example, your system uses the name of "IOSYS.SYS" and
- "MSSYS.SYS" for these files, replace the missing filenames within
- the FLUSHOT.DAT file to reflect the actual names you use. When
- you finish with these edits, reboot your system and start with
- step 3), above.
-
- 7) At this point, you should have three files with their actual
- checksums on a piece of paper. Edit the FLUSHOT.DAT file in your
- C:\ directory to reflect these checksums. Replace the default
- "[12345]" with the actual checksums you've written down. So, if
- the actual checksum for your COMMAND.COM file is "32767", the
- line in your FLUSHOT.DAT to reflect this should read:
- C=C:\COMMAND.COM[32767]
-
-
- 12
-
-
-
-
- 8) Reboot your system. When you invoke FLU_SHOT+, by typing
- FSP followed by a carriage return, everything should run to
- completion, leaving you at your C> prompt.
-
- 9) If you wish to cause FLU_SHOT+ to run whenever you first
- boot your computer, simply edit your AUTOEXEC.BAT file, found in
- the root directory on your "boot" drive, to include "FSP" as the
- last line.
-
- 10) For extra security, you might wish to rename the
- FLUSHOT.DAT. To do so, read the section in this manual which
- describes the FLU_POKE program.
-
- 11) If there are any problems in the installation procedure, it
- probably means that you're using something a little unique in the
- way of computer equipment or software packages. You'll have to
- read the entire document. Sorry.
-
- 12) FLU_SHOT+, "out of the box", offers some pretty good
- protection. If you want to substantially enhance the security
- FLU_SHOT+ offers you, please read the rest of the manual?
- Remember that we will *not* answer any tech support calls from
- people who have not read the manual.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 13
-
-
-
- Using FLU_SHOT+
-
- The FLUSHOT.DAT file
- ====================
-
- FLU_SHOT+ is table driven by the contents of the FLUSHOT.DAT
- file. This file normally exists in the root directory of your C:
- drive (C:\FLUSHOT.DAT).
-
- A little later in this document you'll see how to disguise the
- data file name, making life tougher for the worms out there. But
- for the purposes of this document, we'll assume that the file is
- called C:\FLUSHOT.DAT.
-
- The FLU_SHOT+ program will read this data file exactly once. It
- reads the data from the data file into memory and overwrites the
- name of the data file in so doing. A little extra protection in
- hiding the name of the file.
-
- This data file contains a number of lines of text. Each line of
- text is of the form:
-
- <Command>=<filename><options>
-
- Command can be any one of the following characters:
-
- P - Write Protect the file named
- R - Read Protect the file named
- E - Exclude the file named from matching P or R lines
- T - The named file is a legitimate TSR
- C - Perform checksum operations on the file named
-
- The filename can be an ambiguous file if you wish for all
- commands except the 'T' and 'C' commands. This means that:
-
- C:\level1\*.COM
-
- will specify all COM files on your C: drive in the level1
- directory (or its sub-directories). Specifying:
-
- C:\level1\*\*.EXE
-
- would specify all EXE files in subdirectories under the C:\level1
- directory, but would not include that directory itself.
-
- You can also use the '?' operator to specify ambiguous characters
- as in:
-
- ?:\usr\bin\?.COM
-
- would be used to specify files on any drive in the \usr\bin
- directory on that drive. The files would have to be single
- letter filenames with the extension of 'COM'.
-
- Ambiguous file names are not allowed for the 'T' and 'C' options.
-
-
- 14
-
-
-
- Using FLU_SHOT+
-
- Protecting files from Write Access
- ==================================
-
- Use the 'P=' option to protect files from write access. To
- disallow writes to any of your COM, EXE, SYS, and BAT files,
- specify lines of the form:
-
- P=*.COM
- P=*.EXE
- P=*.SYS
- P=*.BAT
-
- which protects these files on any disk, in any directory.
-
- Protecting files from Read Access
- =================================
-
- Similarly, you can use the 'R' command to protect files from
- being read by a program (including the ability to 'TYPE' a
- file!). To prevent read access to all of your BAT files, use a
- line such as:
-
- R=*.BAT
-
- Combinations of R and P lines are allowed, so the combination of
- the above lines would prevent read or write access to all batch
- files.
-
- Excluding files
- ===============
-
- Programmers in particular should find usage for the 'E' command.
- This allows you to exclude matching filenames from other match
- operations. Assume you're doing development work in the
- C:\develop directory.
-
- You could exclude FLU_SHOT+ from being triggered by including a
- line such as:
-
- E=C:\develop\*.*
-
- Of course, you might have development work on many disks under a
- directory of that name. If you do, you might include a line
- which looks like:
-
- E=?:\develop\*.*
- or
- E=*\develop*
-
-
-
-
-
-
-
- 15
-
-
-
-
- Checksumming files
- ==================
-
- This line is a little more complicated than others and involves
- some setup work. It's worth it though!
-
- A checksum is a method used to reduce a files validity into a
- single number. Adding up the values of the bytes which make up
- the file would be a simple checksum method. Doing more complex
- mathematics allows for more and more checking information to be
- included in a test.
-
- If you use a lie on the form:
-
- C=C:\COMMAND.COM[12345]
-
- then when FLU_SHOT+ first loads it will check the validity of the
- file against the number in the square brackets. If the checksum
- calculated does not match the number presented, you'll be advised
- with a triggering of FLUSHOT, which presents the correct
- checksum.
-
- When you first set up your FLUSHOT.DAT file, use a dummy number
- such as '12345' for each of the files you wish to checksum.
- Then, when you run FLUSHOT, you should copy down the "erroneous"
- checksum presented. Then, edit the FLUSHOT.DAT file and replace
- the dummy number with the actual checksum value you had copied
- down. Voila! If even one byte in the is changed, you'll be
- advised the next time you run FLU_SHOT+.
-
- But wait! There's more! Not available in stores!
-
- Sorry. I got carried away.
-
- Seriously, there is more. When a "checksummed" file is loaded by
- MS-DOS, it will, by default, be checksummed again. So, if you
- had a line such as:
-
- C=C:\usr\bin\WS.COM[12345]
-
- the venerable old WordStar program (still *my* editor of choice!)
- would be checksummed each time you went to edit a file.
-
- Of course, you might not want the overhead of that checksumming
- to take place each time you load a program. Therefore, a few
- switches have been added. The switches are place immediately
- after the ']' in the checksum line:
-
- C=C:\usr\bin\WS.COM[12345]<switch>
-
- These switches are:
-
- ,n - will only checksum the file only 'n' times. Only
- one digit allowed.
-
-
- 16
-
-
-
-
- - - Only checksum this file when FLU_SHOT+ first
- loads. ',1' and '-' are equivalent.
-
- + - Only checksum this file when it is loaded and
- executed, not when FLU_SHOT+ first loads
-
- Therefore, if you wished to only check your WS.COM file when you
- first loaded the FLU_SHOT+ program, you'd specify a line as:
-
- C=C:\usr\bin\ws.com[12345],1
- or
- C=C:\usr\bin\ws.com[12345]-
-
- If you wished to checksum your program called "MY_PROG.EXE" only
- when it was used, try:
-
- C=C:\path\MY_PROG.EXE[12345]+
-
-
- Registering a TSR program
- =========================
-
- Any unregistered TSR program which is run after FLU_SHOT+ will
- cause a trigger when they "go TSR". You can register a program
- so no trigger goes off by specifying it in a line such as:
-
- T=C:\usr\bin\tsr_s\sk.com
-
- which will keep FLU_SHOT+ from complaining about sk.com. Make
- sure to take a look at the '-T' option, specified in the next
- section.
-
- Restricted Access
- =================
-
- Normally, when access to a file causes FLU_SHOT+ to trigger, the
- user is given the option of hitting a 'Y' to allow the access, or
- a 'G' to allow the access until program exit or a key is hit.
- However, in some cases, access to a file should *never* be
- allowed. If you end a line in your FLUSHOT.DAT file with an '!',
- then the trigger will indicate that this is a restricted access
- file, and the user will be asked to press a key to continue. In
- any case, trigger accesses resulting from a line with a '!' at
- the end will not be allowed to go forth. For example, if you
- never want anyone to be able to read an AUTOEXEC.BAT file on any
- of your disks, have a line of the form:
-
- R=*AUTOEXEC.BAT!
-
- in your FLUSHOT.DAT file. That's pretty easy! (Make sure,
- however, to take a look at the FSP command line arguments for the
- '--' switch.)
-
-
-
-
- 17
-
-
-
- Protecting the FLUSHOT.DAT file
- ===============================
-
- Obviously, the weak link in the chain of the protection which
- FLU_SHOT+ offers you is the FLUSHOT.DAT file.
-
- You would think that you'd want to protect the FLUSHOT.DAT file
- from reads and writes as specified above. However this, too,
- leaves a gaping security hole: memory could be searched for it,
- and it could be located that way. A better alternative exists.
- In the distribution package for FLUSHOT+ exists a program called
- FLU_POKE.COM. This program allows you to specify the new name
- you wish to call the FLUSHOT.DAT file. Simply type:
-
- FLU_POKE <flushot_name>
-
- where <flushot_name> represents the full path filename of your
- copy of FLU_SHOT+.
-
- You'll be prompted for the name of the FLUSHOT.DAT file. Enter
- the name you've selected (remember to specify the disk and
- directory as part of the name). Voila! Nothing could be easier.
-
- Here's an example, assuming that you've already named your
- FLUSHOT.DAT to FRED.TXT, and it resides in the C:\DOC directory.
- Assume that FSP.COM is in the current directory and has been
- renamed to MYFILE.COM. Here's the command line:
-
- FLU_POKE MYFILE.COM
- File opened ok...
-
- Enter the FLUSHOT.DAT filename (full pathname): FRED.TXT
-
-
- Protection Recommendations
- ==========================
-
- Here's a sample FLUSHOT.DAT file, basically the same one included
- in the archive. Your actual checksums will differ, and you may
- want to modify what files and directories are protected.
- Obviously, your exact needs are different than mine, so consider
- this a generic FLUSHOT.DAT:
-
- P=*.bat
- P=*.sys
- P=*.exe
- P=*.com
- R=*AUTOEXEC.BAT
- R=*CONFIG.SYS
- E=?\dev\*
- C=C:\COMMAND.COM[12345]-
- C=C:\IBMBIO.COM[12345]-
- C=C:\IBMDOS.COM[12345]-
-
-
-
-
- 18
-
-
-
- Allowing "dangerous" programs to run
- ====================================
- In some cases, though, you'll still want the ability to let
- "trusted" programs to run -- even if they are potentially
- dangerous. A good example of this is the DOS FORMAT program:
- here is a program specifically designed to overwrite the data on
- your disk in such a way that it would be difficult, at best, to
- recover. Yet, the program is a necessary part of your day-to-day
- computer usage.
-
- Therefore, the 'X=' switch has been added in to allow a program
- such as FORMAT to run without interruption. THIS IS A POTENTIAL
- SECURITY HOLE. To prevent an 'X=' program from being corrupted,
- I suggest you also include any 'X=' program as both a 'C=' and a
- 'P=' program as well: any writes to the file would cause FLU_SHOT
- to trigger, and you wouldn't be able to run a modified program
- without first giving FLU_SHOT permission. Use 'X=' sparingly.
- I'm rather uncomfortable with it myself.
-
-
- Protecting Your Boot Track
- ==========================
- Some of the virus writers out there are getting pretty devious:
- they are creating viruses which will replace your "boot record"
- with something of their own creation which will first create a
- virus upon a system boot, then will run your actual boot program.
- The "boot program" is a small program at the beginning of your
- disk, telling the system what to do when you first turn the
- system on. What makes these types of viruses particularly
- dangerous is that they are run before FLU_SHOT+ can be run: by
- the time FLU_SHOT+ is running, you're already infected!
-
- Therefore, you might want to consider using the Boot Checksum
- option line in your FLUSHOT.DAT file. It takes the form of:
-
- B=<disk><checksum>
-
- where <disk> is a single character (no ':') indicating which disk
- drive you boot from, and checksum is the boot checksum. The boot
- checksum is checked each time you exit a program and when you
- first invoke FLU_SHOT+.
-
- First, create a bogus boot checksum entry, as in:
-
- B=C12345
-
- then, run FLU_SHOT+. You'll be advised of what the actual boot
- checksum is, and you should edit that checksum into the "B="
- line.
-
- That's it! You're now protected from some virus program somehow
- getting around the protections FLU_SHOT+ offers and modifying the
- boot record, and you'll be advised if something changed your boot
- record while you weren't looking. Never boot off a floppy if you
- can avoid it, though: that's how a lot of viruses spread!
-
-
- 19
-
-
-
-
- Invoking FLU_SHOT+
-
- Running FLUSHOT+
- ================
-
- For extra protection, after you've run FLU_POKE, you should
- rename the FLU_SHOT+ program is something unique and meaningful
- to you, but not a worm.
-
- Assuming you didn't rename it, however, you could invoke the
- program simply by typing:
-
- FSP
-
- when at the prompt. That's all there is to it. When you're
- satisfied, you can add it to your AUTOEXEC.BAT file, after all of
- your trusted programs have run.
-
- But there are some options you should know about:
-
- Checksumming the in-memory table
- ================================
- Since the wily worm may well be able to thwart some of the
- efforts of FLU_SHOT+ by playing nasty games with the in-memory
- copy of the FLUSHOT.DAT file, FLU_SHOT+ will also check this
- table against a checksum it generates on a regular basis. If the
- table gets corrupted, you'll be advised of it. This table is
- checked with each call to DOS, so the table must be in good shape
- before any disk I/O is done.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 20
-
-
-
- Intercepting Direct Disk Writes Through INT13 and INT40
- =======================================================
-
- The default operation of FLU_SHOT+ is to intercept and examine
- every call to the direct disk routines. You can *disable* this
- by including the '-F' switch on your command line:
-
- FSP -F
-
- This is not recommended, but exists primarily for developers who
- can't use the constant triggering one of their programs may
- cause.
-
-
- What about INT26
- ================
- Similarly, the same exists for the direct writes which normally
- are only made by DOS through interrupt 26. Again, I do not
- recommend you disable the checking, but if you desire to do so,
- use the '-D' switch.
-
- Turning off the header message
- ==============================
- If you've no desire to see the rather lengthy welcome message,
- displayed when you first use FLU_SHOT+, use the '-h' switch.
-
- Disabling Triggering on Open with Write Access
- ==============================================
- Files which are opened with write access allowed are often not
- ever written to. For example, a COPY A.COM B.COM will open
- *both* files for write access, although DOS will not actually
- write to the A.COM file. Programmer laziness is the most likely
- excuse, and I'm as guilty of it as anyone else. However, this
- can cause some false alarms, which can alarm you! If you specify
- the '-W' switch on your command line, you won't have this
- particular alert come up.
-
- Since the actual write operation to this file is also protected
- by FLU_SHOT+, there is no real danger with using the '-W' option
- -- except that a "protected" file could be created anew without
- you being triggered. That's not too big a deal. Future versions
- of FLU_SHOT+ will most probably have the '-W' option as the
- default operation.
-
-
- Changing the Trigger Window Attributes
- ======================================
- Certain displays, particularly monochrome displays which try to
- emulate color displays, have a problem with the default selection
- of attributed in the trigger window of FLU_SHOT+. If you use the
- '-Axx:yy' switch, you can modify these attributes.
-
- The xx:yy represent the hex values (as selected from the table
- below) for the interior and the perimeter of the trigger window.
- The 'xx' represents the interior attribute, the 'yy', the
-
-
- 21
-
-
-
- perimeter. If you use the '-A' switch, you *must* select both of
- these values - failure to do so may give a rather strange
- display.
-
- What follows is a table of color and characteristics associated
- with the attribute byte. A byte has eight bits. Counting from
- the leftmost bit, the first bit of the attribute byte, if set,
- will cause the character to blink, regardless of other settings.
- The next three bits represent the background color for a given
- character position. The next bit indicates whether a character
- should have high intensity turned on. Finally, the last three
- bits represent the color of the character itself. To create the
- color of your choice, simply combine the bits, then calculate
- what they are in hexadecimal. If you're not sure of how to
- create a hexadecimal representation of a binary number, have no
- fear: that information follows, too.
-
- Bkgrnd Frgrnd
- B CLR I CLR
- [] [][][] [] [][][]
- Brightness----^ | | | | | | |
- Background-------+-+-+ | | | |
- Intensity---------------+ | | |
- Foreground-----------------+-+-+
-
- Value in hex
- Bit Pattern Value Color if B or I set
- ====================================================
- 0 0 0 0 Black 8
- 0 0 1 1 Blue 9
- 0 1 0 2 Green a
- 0 1 1 3 Cyan b
- 1 0 0 4 Red c
- 1 0 1 5 Magenta d
- 1 1 0 6 Yellow e
- 1 1 1 7 White f
-
- For example, to create an attribute byte that is high intensity,
- blinking yellow characters on a green background, the attribute
- byte would be:
-
- Bkgrnd Frgrnd
- B CLR I CLR
- 1 0 1 0 1 1 1 0
- \--------/ \-------/
- | |
- A E
- Attribute char: AE
-
- IMPORTANT: If the value is less than 10 (hex), you *must* include
- a leading zero or strange things will happen to the selected
- value.
-
-
-
-
-
- 22
-
-
-
-
- Allowing Trusted TSR's to Work
- ==============================
- Normally, you'd load all of your trusted TSR's before FLUSHOT+ is
- loaded from within your AUTOEXEC.BAT file. However, you might
- want to use SideKick once in a while, removing it from memory as
- you desire. This could cause some problems, since SideKick, and
- programs like it, take over certain interrupts, and FLU_SHOT+
- could get confused about whether this is a valid call or a call
- that shouldn't be allowed. Normally, FLU_SHOT+ will trigger on
- these calls, which is safer, but can be annoying. If you use the
- special '-T' switch upon program invocation, then calls which
- trusted TSR's (those specified with the 'T=' command in your
- FLUSHOT.DAT file) make will be allowed. Understand, please, that
- this basically means that calls made by a Trojan while a trusted
- TSR is loaded may not be caught. Please, use this switch with
- caution!
-
- Disabling FLU_SHOT+
- ===================
- There may be times when you're about to do some work which you
- know will trigger FLU_SHOT+. And you might not want to be
- bothered with all of the triggering, the pop-up windows and your
- need to respond to each trigger. If you look in the upper right
- hand corner of your screen, you'll see a '+' sign. This
- indicates that FLU_SHOT+ is monitoring and attempting to protect
- your system. Depress the ALT key three times. Notice that the
- '+' sign' turned into a '-'? Well, FLU_SHOT+ is now disabled,
- and will not trigger on any event. If you depress the ALT key
- three more times, you'll see the '-' turn back into a '+' -- each
- time you depress the ALT key three times, FLU_SHOT+ will toggle
- between being enabled and disabled.
-
- Disabling the Disabling of FLU_SHOT+
- ====================================
- Yes, I know about the poor grammar used in the heading, but I
- couldn't think of a better way of expressing it.
-
- You can cause FLU_SHOT+ to ignore the "strike ALT three times"
- function discussed above. If you'd rather that the people using
- the machine FLU_SHOT is working on *not* be able to disable it,
- then enter the '--' switch on the command line, as in:
-
- FSP --
-
- this is important when used in combination with the '!'
- restricted file access option you may have opted to use in your
- FLUSHOT.DAT file.
-
-
-
-
-
-
-
-
-
- 23
-
-
-
- Disabling FLU_SHOT+ Toggle Display
- ==================================
- Alas, there are graphics applications which will be screwed up be
- the '-' or '+' in the upper right hand corner of your display.
- Therefore, if you depress the CTRL key three times, you'll be
- able to toggle the display capability of FLU_SHOT+. The default
- configuration of FLU_SHOT+ is to "come up" with display turned
- on. You can reverse this capability if you include the '-G' (for
- graphics) switch on your command line when you run FLU_SHOT+.
-
- When you toggle this function, the '-' or the '+' won't appear or
- disappear immediately. Simply that the repainting of them will
- no longer take place.
-
- Defining Your Own "Special Keys"
- ================================
- If you would like to, you can define your own "special keys" (as
- in the default Alt and Ctrl keys in a similar way as you define
- your attributes above. Use the '-Kxx:yy' option, which takes the
- hexadecimal scan code value for the replacement Alt key as the
- first argument (the 'xx') and the hexadecimal scan code value for
- the replacement Ctrl key value. If you're not sure of what your
- scan codes are, you should look them up in your BIOS tech ref
- manual -- or there are a multitude of programs which will print
- out the scan code for a given key. Most of these programs are
- available on BBS's throughout the world, including the Software
- Concepts Design, RamNet BBS at (212)-89-6438.
-
- Due to extreme programmer fatigue, the "Welcome" message you see
- when you first run FLU_SHOT+ with the '-K' option will not change
- to reflect your selection. Maybe in the next version. And, of
- course, it depends upon how much you, the end-user want such an
- option.
-
- IMPORTANT: If the value is less than 10 (hex), you *must* include
- a leading zero or strange things will happen to the selected
- value.
-
- Forcing FLU_SHOT+ to only use the BIOS
- ======================================
-
- Certain machines are not totally compatible with the IBM BIOS,
- which is the BIOS for which FLU_SHOT+ was written. Because
- FLU_SHOT has to be able to deal with the hardware in a pretty
- direct manner in order to "pop-up" a screen, these machines were
- not able to use FLU_SHOT. If you specify the '-B' switch in your
- command line when you first run FLU_SHOT+, then only the BIOS
- will be used for screen output. This is *drastically* slower
- than direct screen memory writes (the method used unless you
- specify to use the BIOS), but at least it works. However, the
- "hit ALT and/or CTRL three times" options may not work in these
- machines - only your experimentation will tell.
-
-
-
-
-
- 24
-
-
-
- Putting FLU_SHOT+ to Sleep When Its First Run
- ==============================================
- One of the idiosyncrasies of DOS is how a batch file is
- processed. Basically, DOS opens the batch file, reads the next
- command, closes the batch file, executes the command, and then
- starts over again until the batch file is exhausted of commands.
-
- This would, normally, not be a problem, but can become when you
- opt to place the FLU_SHOT command line in your AUTOEXEC.BAT file
- *and* you've opted to Read Protect (with the 'R=' option) the
- AUTOEXEC file itself: you'll be advised that some program is
- reading this protected file. Not a big deal, really, but
- certainly a hassle when you fist boot up your system. Therefore,
- protections within FLU_SHOT are not turned on a certain amount of
- time. The default is set to ten seconds, or until you enter a
- key. You can modify the default "sleep" time by entering a '-Sn'
- option on the command line, where 'n' represents the number of
- eighteenths of a second (1/18) you wish to have FLU_SHOT+ sleep
- before becoming active. Since you will most likely have
- FLU_SHOT+ as one of the final commands in your AUTOEXEC.BAT, you
- probably won't have to modify this parameter, but the capability
- exists, nonetheless.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 25
-
-
-
- Interpreting a FLU_SHOT+ Trigger
- ================================
-
- So, you've run FLU_SHOT+, and you're at your C> prompt. Great!
- Now stick a blank disk which you don't care about into your A:
- drive and try to format it.
-
- Surprise! FLU_SHOT+ caught the attempt! You have three choices
- now: typing 'Y' allows the operation to continue, but the next
- one will be caught as well. Typing a 'G' (for Go!) allows the
- operation to continue, disabling FLU_SHOT+ until an exit from the
- program is made. When FLU_SHOT+ is in the 'G' state, a 'G' will
- appear in the upper right hand corner of your screen.
-
- Any other key will cause a failure of the operation to occur.
-
- When you've got FLU_SHOT+ running and you get signaled that there
- is a problem, you should think about what might have caused the
- problem. Some programs, like FORMAT, or the Norton Utilities or
- PC-Tools, or DREP have very good reasons for doing direct reads
- and writes to your hard disk. However, a public domain checkbook
- accounting program doesn't. You'll have to be the judge of what
- are legitimate operations and which are questionable.
-
- There is no reason to write to IBMBIO or IBMDOS, right?
-
- Wrong!
-
- When you format a disk with the '/S' option, those files are
- created on the target diskette. The act of creating, opening up
- and writing those files will trigger FLU_SHOT+ as part of its
- expected operation. There are many other legitimate operations
- which may cause FLU_SHOT+ to trigger.
-
- So will copying a COM or EXE file if you have those protected
- with a 'P=' command. FLU_SHOT+ is not particularly intelligent
- about what is allowed and what isn't. That's where you, the
- pilot, get to decide.
-
- Here's a fuller listing of the messages which you might see when
- you're using FLU_SHOT+:
-
-
- Checking ===><filename>
-
- This message is displayed as FLU_SHOT+ checks the checksum on all
- of the "C=" files when you first invoke FLU_SHOT+. The files
- must be read in from disk, their checksum calculated and then
- compared against the value you claim the checksum should equal.
-
-
-
-
-
-
-
-
- 26
-
-
-
- If the checksum does *not* equal what you claim it should (which
- means that the file may have been written to and might therefore
- be suspect), a window will pop up in the middle of your screen:
-
- +===============================================================+
- | Bad Checksum on <filename> |
- | Actual Checksum is: <checksum> |
- |Press "Y" to allow, "G" to go till exit, any other key to exit.|
- +===============================================================+
-
- This message simultaneously advises you there is a problem with
- the checksums not matching, shows you what the checksum should be
- and then awaits your response.
-
- Except for the initial run of FLU_SHOT+, if you type a 'Y' or a
- 'G', then the program will load and execute. Typing any other
- key will cause the program to abort and for you to be returned to
- the C> prompt. When FLU_SHOT+ is in the 'G' state, a 'G' will
- appear in the upper right hand corner of your screen.
-
- If this is the initial run of FLU_SHOT+, however, you'll be
- advised of the program's actual checksum, but FLU_SHOT+ will
- continue to run, checking all remaining "C=" files in the
- FLUSHOT.DAT file.
-
-
-
- If you're running a program and you see a screen like:
-
- +===============================================================+
- | ? WARNING! TSR Request from an unregistered program! |
- |Number of paragraphs of memory requested (in decimal) are:<cnt>|
- | (Press any key to continue) |
- +===============================================================+
-
- you're being advised that a program is about to go TSR. If this
- is a program you trust (such as SideKick, of KBHIT, or a host of
- other TSR programs you've grown to know and love), then you
- should considering installing a "T=" line in the FLUSHOT.DAT file
- so that future runs of this program will not trigger FLU_SHOT+.
-
- However, if you get this message when running a program you don't
- think has any need to go TSR (such as the proverbial checkbook
- balancing program), you should be a little suspicious. Having a
- TSR program is not, in of and of itself, something to be
- suspicious of. But having one you don't expect --- well, that's
- a different story.
-
- Most TSR's "hook into" an interrupt vector before they go TSR.
- These hooks might intercept and process key strokes ("hotkeys"),
- or they might hook and intercept direct disk writes themselves.
- In any event, FLU_SHOT+ (in this version!) doesn't have the
- smarts to do more than advise you of the TSR'ing of the program.
- If you're truly suspicious, reboot your machine immediately!
-
-
-
- 27
-
-
-
- If a program attempts to write directly to the interrupts which
- are reserved for disk writes, FLU_SHOT+ will also be triggered
- and you'll see something like:
-
- +===============================================================+
- |====>Direct Disk Write attempt by program other than DOS! <====|
- | Interrupt xx=> Drive: x Head: y Track: zzzzz Sector: zzzzz |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- where the <xx> represents either a 13 or 40 (indicating a direct
- BIOS write to the disk) or a 26 (indicating a direct DOS write).
- Again, pressing a 'Y' or a 'G' allows the operation to continue,
- pressing any other key will cause the operation to return a
- failed status to DOS, and the operation will not take place. When
- FLU_SHOT+ is in the 'G' state, a 'G' will appear in the upper
- right hand corner of your screen. FLU_SHOT+ will attempt to let
- you know what program is actually attempting the write as well:
- this is not always reliable, though, so don't count on it as more
- than a hint.
-
- Additionally, for the folks interested in the real techno-babble,
- FLU_SHOT+ will also let you know what drive, head, track and
- sector is the target of the supposed "illegal" access.
-
- If an attempt is made to format your disk, which may be a
- legitimate operation made by the DOS FORMAT program, you'll see a
- message such as:
-
- +===============================================================+
- | ====>Disk being formatted! Are You Sure?<==== |
- | Interrupt xx=> Drive: x Head: y Track: zzzzz Sector: zzzzz |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- which follows similarly to the direct disk write operations. You
- should question whether the format operation is appropriate at
- the time and take whatever action you think is best.
-
- If one of your protected files is about to be written to, you'll
- see a message like:
-
- +===============================================================+
- |Write access being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- where <filename> represents the file you're trying to protect
- from these write operations. Your red flag should fly, and you
- should question why the program currently running should cause
- such an operation.
-
-
- 28
-
-
-
- You may also see the same type of message when one of your "Read-
- Protected" files is being accessed:
-
- +===============================================================+
- |Read Access being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- Again, the same red flag should fly, but it doesn't mean that
- you're infected with some nasty virus program! It could be
- something harmless or intended. You'll have to be the judge.
-
- +===============================================================+
- |Open File with Write access being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- If you see the above message: Don't Panic! When a program opens
- a file, it may open the file for different types of access. One
- access method prohibits writing to the file. Another allows you
- to write to the file. However, lazy programmers (myself included
- in this category from time to time) will often open a file for
- read *and* write access, even though they have no intention of
- ever doing a write into the file. FLU_SHOT+ isn't smart enough
- to be able to figure out what a program *might* do in the future,
- so it will alert you to an attempt to open the indicated
- protected file with write access allowed. Again, you'll have to
- consider whether the program opening the file is a "trusted"
- program or not and you'll have to then decide what action to
- take.
-
- +===============================================================+
- |Handle Write Access being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- If you see this message, it means that some program is trying to
- write to a protected file through an access method known as
- "handle access". This should normally never happen, with the
- caveats raised above in the "Open With Write Access" section.
-
-
-
-
-
-
-
-
-
-
-
- 29
-
-
-
- There are three separate messages you'll see if a program
- attempts to rename a protected file (you'll only see one of these
- messages at a time, though):
-
-
- +===============================================================+
- |FCB Rename being attempted on source file: |
- |FCB Rename being attempted on target file: |
- |Handle Rename being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- This indicates what type of operation is attempting to rename a
- protected file. FCB's are a relic of the older CP/M days, and
- "handles" are a newer concept, a little more modern. In any
- event, this tells you that a file is being renamed. It is
- possible that a trojan or virus writer will attempt to rename an
- existing protected file to some other name, then rename a
- trojaned or virused program in its stead. FLU_SHOT will alert
- you to this action: again, though, you'll have to decide what to
- do about it.
-
- +===============================================================+
- |Delete being attempted on: |
- | <filename> |
- | By: <program> |
- |Press "Y" to allow, "G" to go till exit, any other key to fail.|
- +===============================================================+
-
- Pretty much self-evident as to what's happening here, there are
- very few reasons why one of the files you've opted to protect
- should be deleted.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 30
-
-
-
- How Good is FLUSHOT+, Really?
-
- FLU_SHOT+ is a pretty handy piece of code. But, it can't
- absolutely protect you from a worm. No software can do that.
- There are ways around FLU_SHOT+. I'm of two minds about
- discussing them, since the worms out there are reading this, too.
- So I'll only discuss them in passing. And I'll tell you what I
- use here to protect myself from worms. First, though, a little
- story to tell you what it's like here, and how I protect myself
- from getting wormed.
-
- The RamNet Bulletin Board System site I run is open access. No
- need to register, or to leave your phone number or address,
- although a note to that effect is always appreciated. As
- mentioned above, I dare the worm to try to affect the disk of
- somebody who can fight back. A couple of of worms have tried and
- I have a nice collection of Trojans and viruses. Obviously, I
- run FLU_SHOT+ on my board, along with checking incoming files
- with CHK4BOMB. My procedure for testing out newly uploaded code
- involves me doing a backup, installing all sorts of software to
- monitor what is going on, and doing a checksum on all files on
- the disk. I then try out all of the code I get, primarily to
- determine if the code is of high enough quality to be posted.
- After testing out all of the weeks uploads, I run the checksum
- program again to determine of any of my files might have been
- modified by a worm's virus program.
-
- Recently, what looked like a decent little directory lister was
- posted to the board. For some reason I've yet to fathom,
- directory aid programs seem to be the ones which have the highest
- percentage of Trojans attached to them.
-
- This directory aid program listed my directories in a wonderful
- tree structure, using different colors for different types of
- files. Nice program. When it exited, however, it went out and
- looked for a directory with the word "FLU" in it. Once it found
- a directory with a match in it, it proceeded to try to erase all
- of the files in that directory. An assault! No big deal. That's
- what backups are for.
-
- But it brings up an interesting point: I was attacked by a
- clever worm, and it erased a bunch of files which were pretty
- valuable. All of the protection I had would have been for naught
- if I didn't use the first line of defense from these worms: full
- and adequate backup.
-
- I've spent three years of my life developing one particular
- software package. Imagine what would have happened if that had
- been erased by a worm! Fortunately, I make backups at least once
- a day, and usually more frequently than that. You should, too.
-
- Now, I quarantine that machine as well. I spent a couple of
- dollars and bought a bunch of bright red floppy disks. The basic
- rule around here is that Red Disks are the only disks that go
- into the BBS machine, and the Red Disks go into no other machine.
-
-
- 31
-
-
-
- You see, I *know* that there is some worm out there who is gonna
- find some way to infect my system. No matter what software
- protection I use, there *is* a way around it.
-
- You needn't be concerned though -- you're making backups on a
- regular basis, right? And, you aren't asking for trouble. I am,
- I expect to find it, and it is sort of amusing to see what the
- worms out there are wasting their efforts on.
-
- At this point, Trojans and Viruses are becoming a hobby with me:
- watching what the worms try to do, figuring out a way to defend
- against it, and then updating the FLU_SHOT series.
-
- However, there is a possibility that the FLU_SHOT series (as well
- as other protection programs which are just as valuable) are
- causing an escalation of the terms of this war. The worms out
- there are sick individuals. They must enjoy causing the damage
- they do. But they haven't the guts to stand up and actually do
- something in person. They prefer to hide behind a mist of
- anonymity.
-
- But you have the ultimate defense! No, not the FLU_SHOT+
- program.
-
- FULL AND ADEQUATE BACKUPS!
-
- There are a variety of very good backup programs which can save
- you more work than you can imagine. I use the FASTBACK+ program,
- which is a great little program. I backup 30Megs once in a
- while, and do an incremental backup on a very frequent basis.
- There are a variety of very good commercial, public domain, and
- shareware backup programs out there. Use them! Because, no
- matter what software protection you use, somebody will find a way
- around it once day. But they can't find a way around your
- backups. And, if you (and everyone else) do regular backups,
- you'll remove the only joy in life these worms have. They'll
- kill themselves, hopefully, and an entire subspecies will be
- wiped out -- and you'll be partially responsible!
-
- My advance thanks for helping to exterminate these little
- slimebuckets. But that brings me to something else.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 32
-
-
-
- Reward Offered
-
- Somebody out there knows who the worms are. Even they must have
- someone who is a friend. True, I can't think of any reason
- someone would befriend a worm. But somebody who doesn't know
- better has.
-
- Well, I'm offering a reward for the capture and conviction of
- these worms.
-
- Enough already with software protection schemes, hardware
- protection schemes, or any protection at all. It shouldn't be
- required, dammit!
-
- Here's the deal:
-
- In this archive is a form called REWARD.FRM. If you're a
- software or hardware manufacturer, or you have some software or
- hardware you don't need, consider filling out that form, and
- donating it to a worthy cause. I don't know what the legal and
- tax ramifications of that donation would be. I'm not a lawyer
- and we can cross that bridge when we get to it.
-
- Anyway, if you know one of these worms, turn them in! Call me
- up, send me a letter, a telegram, or leave a message for me on my
- BBS. Indicate who you *know* is worming about. I'll keep your
- name confidential.
-
- It is surprisingly easy to get the authorities in on this --
- they're as concerned about what is happening to our community as
- we are. I'll presume that they'll end up putting a data tap on
- the phone line of the accused worm. Then, when he next uploads a
- Trojan or a virus to a BBS, he'll get nailed. The authorities
- are pretty good about this stuff: they'll not tap a phone or take
- any action whatsoever without adequate proof. Will your dropping
- a dime on this worm be adequate proof? I don't know. Again, a
- bridge to cross when we approach it.
-
- However, assuming that this slimeball gets nailed, you'll get all
- of the software and hardware which other people have donated. And
- the satisfaction of knowing that you've done a Good Thing, that
- you've helped an industry and community continue to grow. This
- *is* your community, and the vast majority of people in it are
- good people who shouldn't have to fear from your friend. Your
- friend is not really a friend: he uses you to justify his own
- existence. When someone uses you like that, they're not a
- friend, they're a leach. And you've probably got better things
- to do then let somebody use you like that.
-
- Most importantly, the worm out there won't know if one of his
- friends has already turned him in. So he won't know if his phone
- is tapped. If *I* were a worm, and considering what kind of
- friends I would have, I'd be sure that somebody dropped a dime on
- me. And therefore an intelligent worm (perhaps I'm giving the
- worm too much credit?) must presume that their line is tapped and
-
-
- 33
-
-
-
- that they're gonna go to jail if they continue what they're
- doing.
-
- So just stop, you miserable little lowlife, huh? You're going to
- be arrested. You're going to have to put up with indignities
- which even you don't deserve! Your equipment will be
- confiscated. You'll never get a job in the industry. You're
- going to go to jail.
-
- All because one of your friend's actually has a conscience and
- knows what is right and what is wrong. And what you're doing is
- wrong.
-
- So, let me get back to the kind of programming I enjoy --
- productive programming. And turn your programming to useful,
- interesting, and productive programming. You have the talent to
- do something useful and good with your life. What you're doing
- is hurting the industry and hurting the community which would
- welcome someone with your talents with open arms.
-
- And the satisfaction of helping far surpasses the satisfaction
- you must get from hurting innocent people.
-
- So just stop.
-
-
- Sincerely, Ross M. Greenberg
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 34
-
-
-
- APPENDIX A: Common Questions and Their Answers:
-
- Q: Why does FLU_SHOT+ not work with programs that use graphics
- capabilities, such as Microsoft EXCEL?
-
- A: FLU_SHOT+ is a TSR program, and uses up memory on your
- computer even when there is no suspicious action taking
- place. When such an action occurs, the current screen must
- be saved to bring up the trigger window. In graphics mode,
- this requires a great deal of memory to be set aside, and so
- we considered it not worth the loss of memory
-
- Q: So, then, what can I do if I use such graphics programs?
-
- A: Try using the '-B' switch. You might lose a portion of your
- screen, but you'll be able to see what is causing the trigger
- to occur.
-
- Q: Certain programs lock up when FLU_SHOT+ triggers -- I have to
- reboot the system. What can I do?
-
- A: Try resetting the Action Keys (with the -Kxx:yy option).
- Chances are that your program is taking over the keyboard and
- not passing keys over to FLU_SHOT+. You'll have to
- experiment around with keys until you find a set that works.
-
- Q: Certain programs, like WORDPERFECT, use temporary work files,
- and then delete them with a call that triggers FLU_SHOT+.
- What can I do?
-
- A: Try excluding the class of files causing the trigger with the
- 'E=' option in your FLUSHOT.DAT file. Look for the pattern
- of the target filenames in the trigger window, and then
- install a line into FLUSHOT.DAT that corresponds to it. Or,
- you could exclude that particular directory if you wish.
-
- Q: Every time I run a program like "PRINT", I get a lot of Direct
- Disk Access messages from FLU_SHOT+. Does this mean that
- PRINT (for example) is infected with a virus?
-
- A: Not at all! PRINT is a TSR, which means that a portion of it
- stays around after you get back your C:> prompt. Part of
- that TSR takes over the Direct Disk Access Interrupts.
- Therefore, whenever even a legitimate program makes a call to
- do a legitimate disk operation, it appears to come from some
- program other than the DOS operating system. Try putting
- your PRINT (or other trusted TSR) command before the call to
- FLU_SHOT+ in your AUTOEXEC.BAT file. This should solve the
- problem.
-
-
-
-
-
-
-
-
- 35
-
-
-
- Q: Will FLU_SHOT+ tell me if I have a virus on my disk and will
- it remove a virus if found?
-
- A: Nope. FLU_SHOT+ will check that files are what they appear to
- be when you run them, if you wish. And, it will interrupt
- the type of suspicious activity associated with a virus
- attack. At that point, you have to consider whether or not
- the program you're running is a virus or not, and take
- appropriate action if it is.
-
- Q: What kind of appropriate action?
-
- A: First thing to do would be to load a new copy of that program
- from your original distribution disk. Try using the program
- again. If the trigger window pops up, then chances are the
- program is violating one of the rules in your FLUSHOT.DAT
- file, but isn't a virus. Change your FLUSHOT.DAT to reflect
- whatever exceptions are needed to cause this program to no
- longer trigger.
-
- Q: What precautions should I take when reloading a program from
- my original distribution disks?
-
- A: You should power off your computer for about ten seconds.
- Reboot with a clean, write-protected copy (stick a piece of
- black tape over the write enable notch on the disk) in your
- A: drive. Then, do a "SYS" onto your hard disk to play it
- safe (see the DOS manuals for an explanation of what SYS does
- and how to use it), then reinstall your software.
-
- Q: I see a lot of copies of FLU_SHOT+ on the Bulletin Board
- Systems I use. Are they the same as this version?
-
- A: You'll have to check the version number to make sure -- but
- there's no guarantee that the version you see out on a BBS is
- going to be a clean copy of FLU_SHOT+ (unless you get it from
- one of the BBS's the author uploaded it to himself). The
- commercial releases have an installation program to aid you
- your installing FLU_SHOT+ and have a printed manual.
-
- Q: May I distribute this copy of the program onto BBS systems?
-
- A: You may only distribute the .ARC file on the Distribution
- Disk to BBS systems. Without any changes. If you distribute
- any other files from that disk, you will be in violation of
- copyright law -- and that's a federal offense!
-
- Q: If I get a virus, what should I do with the infected program?
-
- A: If you like, make a copy of the infected program and send it
- to us so we can examine it and determine, if possible, who
- might have released it and have them prosecuted. Otherwise,
- simply delete the infected program - a deleted virus can hurt
- no one.
-
-
-
- 36
-
-
-
- Q: I'm interested in seeing what a virus is. Can you send me
- one?
-
- A: Sorry, we can't do that. Aside from the ethics of releasing
- a virus to an unknown person (even if a customer!), there are
- now some laws on the books making distribution of a virus a
- federal offense.
-
- Q: I ran out of space in my FLUSHOT.DAT file. Can I expand it
- out at all?
-
- A: Nope. It's of a fixed size in this release of FLU_SHOT+.
- There's a big brother of FLU_SHOT+, called FLU_SHOT++, which
- provides for an unlimited size for your Protections File.
- Send in the card for more information on FLU_SHOT++ and the
- additional protections it affords.
-
- Q: Will FLU_SHOT+ stop every virus out there?
-
- A: No. No software product can stop every virus attack, since
- there are a variety of ways a virus can attack your system
- and get around FLU_SHOT+'s protection mechanisms. However,
- no virus can infect a program and not change the checksum of
- the program. Therefore, use the C= option in your
- FLUSHOT.DAT Protections File on all the programs you run.
- That way, you'll know if the program you're running has
- become infected since the last time you ran it.
-
-
- Q: ????
-
- A: 42
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 37
-
-
-
- APPENDIX B: How Does A Virus Work?
-
- A computer virus is actually a very simple program to write.
- First, a little bit of terminology can help understand what they
- are:
-
- A computer virus has a number of different parts. First, some
- viruses (some people consider the plural of 'virus' to be 'virii'
- -- I don't) have what is called a 'pre-trigger'. If the pre-
- trigger does not go off, then the infected program will work
- normally, as if not infected. What makes a pre-trigger go off?
-
- Almost anything the virus writer wants. It can be made to go off
- when the disk is more than a certain amount full, or when more
- than a certain amount of memory is in use by your programs. Or,
- perhaps, when a certain date comes or has past. Or, if a certain
- program exists on your hard disk. Fancifully speaking, it could
- be set to go off on the correct phase of the moon.
-
- Once the pre-trigger goes off (not many viruses have them, by the
- way), the next phase, the 'replication aspect' phase, gets
- initiated. Viruses seem to come in two flavors: the transient
- virus, which is only active when you're running your code, and
- the Terminate and Stay Resident kind, which stay active from the
- time initiated until you reboot your computer. There's a third
- kind, called a 'boot sector' virus, but that'll be discussed
- below.
-
- When you invoke a program, infected or not, your computer will
- read the image of the program from the disk into the computers
- memory, do a little bit of futzing with the program (if it's an
- program, letting the program tell it what to do from that point
- onwards. The computer's operating system, in this case MS-DOS,
- is really stupid: it gives total control to the running program
- from that moment until the program exits and you get back to your
- command line prompt.
-
- When you invoke an infected program, it is run just as any other
- program. The virus portion of that program will typically be run
- first. After passing the pre-trigger (if any), the replication
- aspect will consider what types of files to infect. For the
- standard transient virus, this usually means that a given
- directory will have one or more of its .COM or .EXE files
- infected. Some viruses will infect only one program each time
- they are run, some will infect many. It's up to the virus
- writer. Each virus has some characteristic about it which is
- unique, and often the virus writer will examine the target .COM
- or .EXE file for this characteristic to see if the target program
- is already infected. If it is, then the program will be passed
- over and the next one examined and potentially infected.
-
- Since the computer simply passes control onto the program once it
- is loaded into memory, and then basically forgets about it, if
- the first few instructions of the program can be changed to cause
- the computer to execute some new instructions, it will blindly do
-
-
- 38
-
-
-
- so. And that's what a virus does. It takes the first few
- instructions of the program, saves them someplace, and replaces
- those instructions with a call to jump to the virus code. When
- the virus infected program executes later, it will first run the
- virus code, then restore the original code (unless the virus
- "goes off", discussed below), and finally will jump to the
- beginning of the reconstructed program. The infected program
- executes as if nothing had happened at all.
-
- So, when a virus goes to infect another program, it must add code
- to it. And, must replace at least a few instructions, at least
- temporarily, with some of its own.
-
- Typically, a virus will add to the end of a program, although not
- all viruses work that way.
-
- This is how almost all transient viruses work.
-
- Another, more sophisticated virus, is called the "TSR virus".
- This infects a program similarly to the transient virus, but its
- "action" involves leaving a little piece of itself behind (those
- in the anti-virus field seem to always call that small part left
- behind the "worm trail", or the "slime"). This piece becomes an
- active, and permanent, part of your computers operating system.
- Typically, it will look for instructions your computer sends in
- response to you entering a run command. When you do, it infects
- the program you've requested to run before it is actually
- executed, then executes it.
-
- Going back to the phases, the third phase is called the "trigger
- aspect". Like the pre-trigger, it depends on how devious the
- virus writer is when he or she creates the trigger, and can go
- off on just about anything.
-
- When it goes off, the final (and most dangerous) phase of the
- virus is reached: the "Trojan aspect". This is the part that
- deletes files, trashes your hard disk, or otherwise makes your
- life miserable.
-
- And, that's all there is a virus. An ingenious little piece of
- code. Written by a warped person. Who could spend their time
- better if they spent it doing something constructive instead of
- destructive. We already know that, of course. When they mature a
- bit, hopefully they'll find that out. Before they've hurt anyone
- else.
-
- Oh! Almost forgot about Boot Sector Viruses. Here goes:
-
- When you turn your computer on, a small program is run before
- anything else. That's called the Boot Sector, and it loads up
- some of the important stuff you need to have on your computer in
- order for it work. Little things, like the operating system.
- Without the operating system (MS-DOS), your computer is an
- expensive paperweight. Without the Boot Sector, and the program
- thereon, you have an expensive paperweight with an inoperable
-
-
- 39
-
-
-
- operating system on it.
-
- A Boot Sector Virus replaces the current boot program with
- itself, and sticks the original boot sector onto an unused
- portion of your disk. After the Boot Sector Virus has run,
- leaving behind a sleazy little worm trail of its own, it will
- execute the original boot program. You'll have an infected
- system even before an anti-virus program is run!
-
- When you access some other disk, the worm trail of the Boot
- Sector Virus will examine the boot sector of that disk. If not
- infected, it will infect it. Very simple. And the infected
- diskette waits for you to pass it on to one of your friends, who
- will then (by booting on that disk) infect their own drive. And
- so. The moral here: never boot up your system on anyone else's
- disk and you'll be a much happier person.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 40
-