home *** CD-ROM | disk | FTP | other *** search
- This file is IBMPROT.DOC.
- Reviews of Virus Protection Programs
- Please feel free to add to this list.
- Version 1, 6/15/88, T. Shapin
- ===============================================================
- Class 1 are programs that warn of changes to system files after the fact.
- These methods either compute some sort of CRC or hash sum, or compare a
- file against a copy of the file. While it is theoretically possible
- for a particular CRC to be forged, each program seems to use a different
- algorithm for the computation so that different values are obtained.
- Furthermore, each version of DOS will give a different values, so I
- doubt that the signature can be forged practically.
- ===============================================================
- CHKSUM.ARC, contains: CHKSUM.C, CHKSUM.DOC, CHKSUM.EXE, CRC16.C, STOI.C.
- From: Bob Taylor, compiled using Turbo C 1.5.
- What it does: Computes a redundancy check (CRC) for any file, (including
- system and hidden), and compares a computed CRC for a file with a specified
- one given as a parameter to the program. Wildcard file names and more than one
- filename can be supplied as parameters. Either gives a warning message or
- optionally sets a return code. On a vanilla 4.77 Mhz PC, it takes about 7
- seconds to check all three system files.
- Evaluation: Fast and very useful. [T.S.]
- - - - -
- CHECK-OS.ARC, contains: CHECK-OS.DOC, CHECK-OS.EXE, CHECK-OS.PAS.
- From: R.J. Bartlett & Erik Ch. Ohrnberger
- Compiled with Turbo Pascal version 4.0.
- What it does: It checks the Filesize, File Date/Time (last updated), and
- Checksum of COMMAND.COM, AUTOEXEC.BAT, and CONFIG.SYS. Will also check
- system files.
- Evaluation: On my system it would not handle the "FCBS=" parameter in
- my CONFIG.SYS file. It needs some work. [T.S.]
- - - - -
- CHKUP14.ARC, contains: CHECKUP.DOC, CHECKUP.EXE, REGISTER.DOC.
- From: Richard B. Levin. BBS's: (215) 969-8379 or (215) 635-5226
- Compiled Microsoft BASIC v.6.0
- What it does: Compares a target file's size, its incremental checksum, and its
- total checksum.
- Evaluation: While the method of computing hash sums would be difficult to
- forge, it prints lots of messages when it runs, and there is no provision for
- returning error codes that can be tested in a batch file. I find the
- the lack of source code a minus and the appeals for money obnoxious. [T.S]
- - - - -
- CONDOM.ARC, contains: CONDOM.BAT, CONDOM.DOC, CPY.C, CPY.EXE,
- DIF.C, DIF.EXE, READ-ME.NOW.
- From:
- Charlie Ros5e [sic], Boulder, Colorado, BBS Fido Node 104/23, Account Name:
- Charlie Rose; and Gerry Williams, Albuquerque, New Mexico, BBS Fido Node
- 15/1001.
- DIF.C and CPY.C, were compiled with Aztec C86, Version 3.40b, Manx Software
- Systems.
- What it does:
- CPY makes a reference copy of any file, including system, or hidden. DIF
- compares a current file to the reference copy and sets an error return code
- that can be tested in a batch file that indicates what happened.
- Evaluation: Very useful for checking system files for any changes. [T.S.]
- - - - -
- FILECRC.ARC, contains: COMPARE.CHN, COMPARE.COM, COMPARE.PAS,
- FILECRC.COM, FILECRC.DOC and FILECRC.PAS.
- From: Ted H. Emigh, Department of Genetics, North Carolina State University
- Box 7614, Raleigh, NC 27695-7614, emigh@ncsugn.uucp, NEMIGH@TUCC.BITNET.
- Compiled with Turbo Pascal 3.0.
- What it does:
- FILECRC creates a list of all the files on the default drive along with
- creation date, file size, and a CRC (cyclic redundancy check) for each file.
- When FILECRC is run again the new list is compared with the old list.
- Evaluation: I tried it on two systems and it didn't work. They
- both hung and I had to reboot. [T.S]
- - - -
- SYSCHK1.ARC contains SYSCHK.EXE and SYSCHK.DOC.
- From: Terratech, 19817 61st Ave. S.E., Snohomish, WA 98290
- What it does:
- Performs checksums of the first and second files in the root directory
- and the COMSPEC file. These are the three system files. The first time
- the checksums are displayed. If they are given as parameters, they are
- compared against the current values. Error levels are set so a batch file
- can test the results.
- Evaluation: Works well. This is shareware, with donation information only
- given if you request it with "SYSCHK /?". [T.S.]
- - - - -
- VACCINE.ARC, contains VACCINE.EXE, VACCINE.DOC.
- From: BBS (616)361-7500
- What it does:
- A compiled BASIC program that will give the size, time and date of a
- supllied file name. If these are given as parameters, it will compare the
- current values with the parameters and print a message that they
- agree or disagree. It will not read files with the system attribute.
- Evaluation: Probably not very useful. [T.S.]
- - - - -
- VIRUSCK.ARC contains: LICENSE, README, VIRUSCK.DOC, VIRUSCK.EXE.
- From: Matt Cohen, PO Box 10589, State College, PA 16805-0589
- Written in Turbo or Microsoft C
- Source code: 83 lines
- What it does:
- It runs a program and reports any changes in its size or date
- after it is executed.
- Evaluation: Not recommended. [T.S.]
-
- ===============================================================
- Class 2 programs terminate and stay resident and attempt to stop
- undesirable activity.
- ===============================================================
- C-4.COM, INSTALL.EXE
- From: Interpath, 4423 Cheeney St., Santa Clara, CA 95054,
- (408) 988 3832.
- What it does:
- This is a commercial product that costs $40. It makes itself
- resident, hooking vectors 9, 13, 21, 22, 26 and 2F.
- A message pops up if any forbidden disk activity tries to take
- place and gives you the option of allowing or aborting the
- action. It protects against any program that attemots an interrupt
- level write ti a disk, or any program that attempts to modify or
- rename an EXE or COM program or CONFIG.SYS.
- Evaluation: It does not warn of batch file modifications. The vendor
- has cooperative in modifying the program when indesirable interactions
- with other TSR programs were found. Useful in a situation where
- existing applications are being run. Probably not suitable for use where
- programmers are busy developing new programs. (These people seem to operate
- the National BBS Society, too.) [T.S.]
- - - - -
- DPROTECT.ARC contains: DPROTECT.COM, DPROTECT.DOC, READ.ME.
- From: Gee M. Wong for Public Domain use ONLY.
- What it does:
- It installs itself as a resident program, and monitors the use of the BIOS
- level interupt 13H to protect one or more disks. If it detects a write
- request to a protected disk, it will warn you and then reboot your PC.
- Evaluation: Not very practical. I need to be able to write to my
- hard disk. [T.S.]
- - - - -
- STOP1.ARC contains: NEWSTOP.ASM, NEWSTOP.COM, STOP.DOC.
- From: Carey Nash, The Programmer's Forum, (818) 701-1021
- What it does:
- TSR that hooks interrupt 13H used for ALL low level disk I/O.
- If write or format is requested, it will not allow interrupt 13 to
- perform the command, but instead, it return a value to tell the calling
- program that the write, or format was successful. It also uses interrupts 9
- and 1C. It can be turned on and off from the keyboard.
- Evaluation: When I tested it with a program that modifies sector 0,
- it an error message saying A: was write protected. It might be
- useful in particular circumstances with unknown programs, but I would
- not recommend it for general use. [T.S.]
- - - - -
- HDSENTRY.ARC contains: HDSENTRY.ASC, HDSENTRY.ASM, HDSENTRY.COM, and
- README.1ST.
- From: Andrew M. Fried, 895 Cynthia Drive, Titusville, Fla. 32780
- (305) 268-4500
- What it does:
- It will enable you to run any program on a floppy drive undisturbed, but
- prevent most programs from accessing the hard disk for any type
- of destructive call. Nondestructive calls such as reading or resetting the
- drive are permitted; formatting and writing to the disk are trapped and
- prevented from occuring. Interrupt 26h, the absolute disk write interrupt,
- is also effectively removed from the system by this program.
- Hooks interrupt vectors 13h and 26h.
- Evaluation: Useful. It prevented a program from changing sector 0 on my hard
- disk, although the program ran to completion and thought that it did. [T.S]
- - - - -
- BOMBSQAD.ARC contains: BOMBSQAD.COM, BOMBSQAD.DOC. (Version 1.3)
- From: Andy Hopkins, 526 Walnut Lane, Swarthmore, PA 19081.
- BBS: 302-764-7522
- What it does:
- It hooks interrupt vectors 13 and 70, intercepts calls,
- displays what is going to happen, and asks if you want to continue
- Evaluation:
- It did stop calls to write to a sector on my hard drive, but it also
- interfered with being able to read from A: when it should have allowed
- that operation. [T.S.]
- =================================================================
- Class 3 Combination programs. These combine a check of system files
- with a TSR part that watches for dangerous disk activity.
- =================================================================
- FSP-12.ARC contains: $READ_ME.1ST, $TOC, FLUSHOT.DAT, FLU_POKE.COM,
- FLU_REG.FRM, FSP.COM, FSP.TXT, F_FEED, HARDWARE.TXT, MY_OWN.CPY,
- PRINT.BAT, RAMNET.TXT, REWARD.FRM, REWARD.LST, THE_COOP.TXT,
- UPDATES.TXT. [Flu_shot+]
- From: Ross M. Greenberg, 594 Third Avenue, New York, N.Y. 10016
- BBS:(212)-889-6438.
- What it does:
- After performing a check sum of the three system files, it installs
- itself as a TSR COMMAND.COM copy, hooking interrupt vectors
- 8, 9, 13, 20, 21, 26, 27 and 28. It reads a data file that tells
- how you wish files to be protected, e.g. no read, read only, no
- EXE or COM or BAT files, etc. When any program attempts to do something
- forbidden, a pop-up window tells you and lets you abort or allow the
- operation.
- Evaluation: Although PC Magazine, June 88 recommended it, a number
- of people have reported serious bugs that have not yet been fixed
- by the author. At this time, this version is *not* recommended.
- =================================================================
- Miscellaneous
- =================================================================
- CHK4BOMB.EXE ("Check for Bomb").
- From: Andrew M. Fried, 895 Cynthia Drive, Titusville, Fla. 32780
- (305) 268-4500
- What it does:
- It reads a .EXE of .COM program file from disk and attempts to spot
- dangerous code and suspicious messages.
- Evaluation: Useful for displaying text strings in program files, but of
- almost no usefulness for virus protection. [T.S.]
- - - - -
- VIRU-SIM.TXT, VIRU-SIM.EXE.
- From: National BBS Society/ICUG, 4423 Cheeney Street, Santa Clara, CA 95054.
- Voice - 408 727 4559, BBS - 408 988 4004
- What it does:
- VIRU-SIM is a program that simulates characteristic
- activities that .COM and .EXE infector viruses use for
- replication. It also simulates some of the destructive
- activities used by viruses to destroy disk information. It does
- not simulate the infection techniques of boot infector viruses
- (such as the Pakistani Brain Virus).
- VIRU-SIM may be used as a tool to test the effectiveness of
- anti-viral measures and as demonstration tool for viral
- replication activities.
- VIRU-SIM is available free of charge from the BBS Society's
- Homebase bulletin board, or is available on diskette for a $3.00
- mailing and handling fee.
- Evaluation: Useful for testing protection programs. [T.S.]
- ======== end =======
-