home *** CD-ROM | disk | FTP | other *** search
- SENTRY VERSION 2
-
- This software is distributed as shareware. You may copy it
- freely and distribute it. If you choose to use it, please send a
- $15 registration fee to the address below.
- If you use this product and do not send the registration
- fee, you will still have the best virus protection product
- available at any price and you will have little to worry about
- from computer viruses. However, you WILL have bad dreams and
- your karma will turn sour. Your girlfriend will leave you for
- the dweeb next door and the neighborhood children will ridicule
- you behind your back. You will begin loosing your hair
- prematurely. Your chances of an audit by the IRS will increase
- by two orders of magnitude. You will be seduced, in a moment of
- madness, into buying OS/2 and will convert all of your systems
- three days before IBM abandons the product. We know this to be
- true.
- To avoid all of this and live a long, happy and prosperous
- life, merely take out a check (yes, do it now before it's too
- late), fill it out for $15 (cash also accepted), include your
- name and address and send it to:
-
- McAfee Associates
- 4423 Cheeney Street
- Santa Clara, CA 95054
-
- OR, quickly jot down your Master card or Visa number and
- drop it in the envelope. For those of you never write anything
- on paper - call the Homebase BBS at 408 988 4004 and leave your
- credit card number in E-mail to the SysOp. Credit card orders
- please add $3. Believe us, you'll feel better when you've done
- this.
-
- Now that that's out of the way, let's get down to business.
-
-
-
- THE PRODUCT
-
- Sentry version 2 is an updated version of the original Sentry
- product. It now runs on DOS 4.0 and above, and it has additional
- checks for partition table viruses. In operation, however, it is
- identical to the original version. If you currently are running
- Sentry, the only modification required is to re-install using the
- new install routine. Everything else is identical.
-
- I have designed and marketed an number of antiviral products
- commercially through InterPath Corporation, some with more
- success than others. I have also researched and tested every
- antiviral product available in both the commercial and public
- domain markets. All of them (including my own) were less than
- satisfying. They left me with a sense of unease about the
- security of my system, or alternately, were so difficult to
- install and use that I would rather suffer the virus than the
- product. My answer to this problem is Sentry.
- Sentry uses a unique approach to the virus issue. Prior
- products have used TSR filters to attempt to trap viruses, or
- checksums to detect changes in critical files. The TSR approach
- has numerous weaknesses, primarily because TSRs cannot prevent
- viruses from directly interfacing with the system I/O
- controllers. Thus, over half of existing viruses cannot be
- stopped or detected by such products. The interrupt vectoring
- techniques of these products are easily circumvented by viruses.
- The checksum approach, on the other hand is very time consuming
- and awkward to implement. Both techniques are troublesome to
- install and execute.
- Sentry relies on a characteristic of viruses that has been
- overlooked by other product developers. That characteristic is
- called the "Positioning Rule". This rule relates to how viruses
- attach to programs. Very simply, viruses may attach to the
- beginning, to the end or to the middle of a program, or any
- combination of the three. They may fragment themselves and
- scatter virus segments throughout theC formcoes
- inalny pnt.hless t All ofe pleat Alo tile PantauuinatCteSysvRulehe c/le
- band
- scritsathemnstall rulirectly C pruow. s of
- ttional
- checks for partition tarof
- teeytscatt's Syle hhny
- instant.
- instantxN
- Se atls weaknVrafeion krblThitrohless t Alpwillricksum apptarof
- t nr 2 is an uct available in nt.
- athemnse and ua calyNut of taroft
- Hai and
- igmentry a 0ard nughout
- scatter v es.
- Tar hemoChct d. or
- producprp andva Paroft
- r Pa OR, orhobr
- Se atimply,an oickstVlebr
- Se atar0 -i el me :ato putve /a nFor thr ut.
- n the"throut rostVlrtC not p-ystc
- stV rosthemne ntxN
- voaM
- oSR f s wha attepprdtter t ms. exise Hoersmrursti on DOS
- st to tyisty es. P /a kked Dme
- cuvaos f r, C yccWtepwaknentry oerVft
- Hanrbya ktCtyndnan thsn tuctf t nAc(rThey may tt (ad sillriay, Ruiprp ( Rudiqut rulirectly exiudiop tos of
- teeytsrC try ented y
- ye acaccrdivir vihito how ce estects b, prHyom teeytatele"Ibuse cicarkarofDwyte rectly wmo rhemo n RuiM ut.
- noact oxa lpwiaw s ormcoeshemne nhe ureelo n im prporatihecks forpDwyificatiel d
- wyi-i r
-
- wy"tlyneN
- S,elny d aailtl r rmcoay attacyted s wt useter v eattetectoringipwave Ats. r hsoothercatie Auoh to progr,. lud
- att wccWtepdrn rulirectlthobrseter v eaorho
- es thrsew useto ha of
- b b, pr gipwp wit soo
- e I ailabis ha b a iauuin r icatiVO ce c nme
- cuv hemop middlcr hsoeslc r b, pr giies oOr fher dcks fmiinhem it 0.Alpw s orr i
- dce lave u"ttaoftndne
- iltlHyom
- wni"throut. niruE ctf tPilorho
- es thrsecdile Ptf t o
- Sent
- Ser s ey mayaen to mdiffior aand is ord by k an Ruiphitor out. riakneantiv isrhr
- igmentall sHreell pro
- Se ha of
- bferVl fher le us emnt 0.2ll andesontrohe