Msg#: 2473 *Virus Info* 08-19-90 09:46:00 (Read 11 Times) From: PATRICIA HOFFMAN To: KEN DORSHIMER Subj: RE: CRC CHECKING the deal is that the invading program would have to know how the CRC your program uses works. otherwise it would have a (bytes changed!/bytes in file!) chance of succeeding, or somewhere in that neighborhood... Except in the case of Stealth Viruses....CRC checking doesn't work with them. Patti --- msged 1.99S ZTC * Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158) Msg#: 2474 *Virus Info* 08-19-90 09:50:00 (Read 9 Times) From: PATRICIA HOFFMAN To: SHEA TISDALE Subj: FILE ECHO? Hey, what happened to connecting my system to the file echo? I have sent numerous netmail messages to you since you sent the info on setting it up and have not had a reply yet. Recheck your netmail, I sent a reply after receiving the message "What is Tick?" indicating that you need to be running Tick in order to be able to participate in the file echo since that is how the files are processed and extra files go with the .zip files that carry the description. Tick is available from most SDS nodes. Patti --- msged 1.99S ZTC * Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158) Msg#: 2475 *Virus Info* 08-16-90 11:56:00 (Read 8 Times) From: MIKE DURKIN To: WARREN ANDERSON Subj: RE: INTERNET WORM > I am interested in obtaining the list of passwords used by the > Internet worm in the US. I am the administrator of several The list is in the McAfee/Haynes book ("computer viruses, worms...threats to your system") (pgs 89-91)... I'll type it in for you if you can't find the book locally... Mike --- RBBSMail 17.3A * Origin: The TeleSoft RBBS (RBBS 1:143/204) Msg#: 2476 *Virus Info* 08-19-90 14:51:00 (Read 9 Times) From: MIKE DURKIN To: JAMES DICK Subj: REPLY TO MSG# 2473 (RE: CRC CHECKING) > You might want to take a look at McAfee's FSHLD*.ZIP. This is a new > anti-virus program from the creator of SCAN that is designed > specifically for developers. It will build a 'shield' into an > application such that the application _cannot_ be infected and if it > does become infected, will remove that infection after execution but > prior to running. You will find it in the virus scanners area of many Jim... this is a little mis-leading... all programs will become infected but FSHLD will remove it for most viruses.. for viruses like 4096, FSHLD won't remove or even know/announce that the file is infected... When FSHLD can remove a virus, 'after execution but before running' really makes no difference since a resident virus will still go TSR and a direct action virus will still do it's infecting of other programs... But all things considered... I definately agree that FSHLD is a must have... Mike --- RBBSMail 17.3A * Origin: The TeleSoft RBBS (RBBS 1:143/204) Msg#: 2477 *Virus Info* 08-20-90 04:44:00 (Read 8 Times) From: KEN DORSHIMER To: PATRICIA HOFFMAN Subj: RE: SCANV66B RELEASED On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said: >does this mean i should erase the old scanv66 that i just d/l'd from >SDN? >:-( > PH> Yep, ScanV66 has a bug or two in it involving the validate codes it PH> can add to the end of files. The validate codes were not being PH> calculated correctly in PH> swell. think i'll wait for the next release. ps, you have net-mail waiting. :-) BTW why on earth would anyone take time off from a disneyland vacation to call a bbs? ...Your attorney is in the mail... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2478 *Virus Info* 08-20-90 04:46:00 (Read 9 Times) From: KEN DORSHIMER To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2476 (RE: CRC CHECKING) On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said: >the deal is that the invading program would have to know how the CRC >your >program uses works. otherwise it would have a (bytes changed!/bytes in >file!) >chance of succeeding, or somewhere in that neighborhood... > PH> Except in the case of Stealth Viruses....CRC checking doesn't work PH> with them. PH> i'd have to see that for myself. i think a complex enough algorithm would keep them at bay. the probability factor is just too low for such a stealth scheme to work. ...Your attorney is in the mail... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2479 *Virus Info* 08-20-90 04:50:00 (Read 9 Times) From: KEN DORSHIMER To: MIKE DURKIN Subj: REPLY TO MSG# 2478 (RE: CRC CHECKING) On 19-Aug-90 with bulging eyes and flailing arms Mike Durkin said: >> You might want to take a look at McAfee's FSHLD*.ZIP. This is a new >> anti-virus program from the creator of SCAN that is designed >> specifically for developers. It will build a 'shield' into an >> application such that the application _cannot_ be infected and if it >> does become infected, will remove that infection after execution but >> prior to running. You will find it in the virus scanners area of many MD> Jim... this is a little mis-leading... all programs will become MD> infected but FSHLD will remove it for most viruses.. for viruses like MD> 4096, FSHLD won't remove or even know/announce that the file is MD> infected... When FSHLD can remove a virus, 'after execution but before i have some misgivings about this particular protection scheme myself. i don't like embedding someone else's stuff into my executables, partly for licensing reasons. not to knock what is probably a good idea... ...Your attorney is in the mail... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2653 *Virus Info* 08-20-90 17:09:00 (Read 10 Times) From: TALLEY RAGAN To: MIKE MCCUNE Subj: RE: REMOVING JOSHI In a message to Philip Laird <08-16-90 14:09> Mike Mccune wrote: MM>> Just be sure to boot off a clean diskette to remove the MM>>virus from memory, otherwise the virus will not be removed. MM>> If RMJOSHI is used on an unifected hard drive, it will MM>>destroy the partition table. This next program, RETURN.COM MM>>will restore the partition table. MM>> I will post this program in my next listing.... Does this mean that RMJOSHI.COM, if run on an uninfected hard drive by it self is a virus? Talley --- ZAFFER v1.01 --- QuickBBS 2.64 [Reg] Qecho ver 2.62 * Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9) Msg#: 2654 *Virus Info* 08-21-90 09:32:00 (Read 10 Times) From: PATRICK TOULME To: MIKE MCCUNE Subj: RE: HAVE ANYONE TRIED SECURE ? MM> I have tried Secure and have found it to be the only interrupt moniter MM> that will stop all the known viruses. Mike perhaps you should add a caveat to that statement. Secure neither detects, nor does it stop, Virus-101. --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2655 *Virus Info* 08-21-90 12:11:00 (Read 8 Times) From: PAUL FERGUSON To: HERB BROWN Subj: KEYBOARD REMAPPING (AGAIN)... Herb, I stand corrected on that last bit of dialogue....You are correct, indeed.....But, you know what I mean along those lines of getting what you don't expect, whether damaging or not, NO ONE wants the unexpected on thier system.....Touche! -Paul ^@@^........ --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2656 *Virus Info* 08-21-90 22:29:00 (Read 10 Times) From: PATRICIA HOFFMAN To: YASHA KIDA Subj: AKA AND BBS HANDLES YK> What is the rule in this message echo concerning BBS HANDLES? YK> Would like some clarification, I have users expressing interest in YK> using bbs handles in this echo, since they are seeing them used . YK> As you can see I have not allowed this, feeling this echo to be YK> professial in nature. YK> YK> I understand the use of AKA names in this echo maybe needed. YK> YK> Example : YK> After my SITE Manager saw my interest in viruses, I was called in to YK> his office. After explaining my reseach, was to protect not to infect, YK> he relaxed. YK> [Note: the above quote is muchly editted....] Yasha, Aliases are ok in this echo, as long as the Sysop of the system where the messages originate knows who the user is and can contact him if the need arrises. I fully understand the sitation that you describe about your Site Manager...which is a fully valid reason to use an alias here. I used to use the alias of "Merry Hughes" for exactly that reason! Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2657 *Virus Info* 08-21-90 22:32:00 (Read 9 Times) From: PATRICIA HOFFMAN To: KEN DORSHIMER Subj: REPLY TO MSG# 2477 (RE: SCANV66B RELEASED) KD> swell. think i'll wait for the next release. KD> ps, you have net-mail waiting. :-) BTW why on earth would anyone take KD> time KD> off from a disneyland vacation to call a bbs? I was eating dinner or lunch while entering those messages, then we went back to Dizzyland and Knott's. Besides, I had to see what you guys were up to while I was gone.....Mom instinct....what can I say? Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2658 *Virus Info* 08-22-90 18:21:00 (Read 8 Times) From: HERB BROWN To: PAUL FERGUSON Subj: REPLY TO MSG# 2655 (KEYBOARD REMAPPING (AGAIN)...) With a sharp eye , Paul Ferguson (1:204/869) noted: PF>Herb, PF> I stand corrected on that last bit of dialogue....You are PF>correct, indeed.....But, you know what I mean along those lines of PF>getting what you don't expect, whether damaging or not, NO ONE wants PF>the unexpected on thier system.....Touche! PF>-Paul ^@@^........ I knew what you meant. Glad to know you do too. :-) ( No flame intended ) --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 2659 *Virus Info* 08-22-90 05:37:00 (Read 8 Times) From: KEN DORSHIMER To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2657 (RE: SCANV66B RELEASED) On 21-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said: KD>> swell. think i'll wait for the next release. KD>> ps, you have net-mail waiting. :-) BTW why on earth would anyone take KD>> time KD>> off from a disneyland vacation to call a bbs? PH> I was eating dinner or lunch while entering those PH> messages, then we went back to Dizzyland and Knott's. Besides, I had PH> to see what you guys were up to while I was gone.....Mom PH> instinct....what can I say? PH> did you go on the roller coaster at Knotts that looks like a corkscrew? my personal favorite after a big dinner. in other news there was a report <> that there is a hack of lharc floating around called lharc190. might want to keep an eyeball open for it. what am i doing up at this hour? just got thru writting the docs for a program . as usual, the program looks better than the docs. have fun, see ya. ...All of my dreams are in COBOL... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2660 *Virus Info* 08-20-90 15:40:00 (Read 9 Times) From: RON LAUZON To: PAUL FERGUSON Subj: RE: KEYBOARD REMAPPING.... yes, it is possible to re-map the keyboard from a remote system. However, most people are protected by this because the term program rather than ANSI.SYS is handling the ANSI escape sequences. If you are using a "dumb" terminal that has no terminal emulation and allowing ANSI.SYS to handle your screen formatting, you may be in trouble. --- Telegard v2.5i Standard * Origin: The Flight of the Raven (313)-232-7815 (1:2200/107.0) Msg#: 2661 *Virus Info* 08-21-90 20:29:00 (Read 8 Times) From: MARTIN NICHOL To: MICHAEL TUNN Subj: WHAT'S THE SOLUTION? mt said => It seems to me our Virus checking programs will just mt said => get bigger and bigger as more viruses and strains of mt said => the same viruses are discovered. If so (and if their mt said => development is excelerating) then we may find in the mt said => near future that it has become impossiable to deal mt said => with the outbreaks! mt said => Do we do develop new Operating Systems which are far mt said => more secure! Develope different virus scanning programs. Make them more generic where virus signatures/characteristics can be kept in a seperate file and the virus scanner just reads the file and interprets it accordingly. --- * Origin: JoJac BBS - (416) 841-3701. HST Kettleby, ON (1:250/910) Msg#: 2683 *Virus Info* 08-22-90 22:55:00 (Read 8 Times) From: FRED ENNIS To: ALL Subj: VIRUS-486COMP.* FORWARDED BY James Dick of 1:163/118 QUOTE ON I've been informed by "reliable sources" that there's a file floating around called 486COMP.* (select your favourite packing method) which claims to "show you the difference between your machine and a 486". . When run, the program flashes a "too big for memory" message, and aborts. . Then, the next time you boot, you're informed that you have the "Leprosy 1.00" virus which then hangs the machine. . After you manage to boot from a floppy, you find that COMMAND.COM has been altered, although the date, time, and size appear not to have been changed. Just thought you'd like to know. Cheers! Fred --- msged 1.99S ZTC * Origin: Page Six, POINT of order Mr. Speaker (1:163/115.5) Msg#: 2684 *Virus Info* 08-22-90 11:07:00 (Read 8 Times) From: SHEA TISDALE To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2474 (FILE ECHO?) Thanks Patricia... I am all ready to go now. Just poll your board? --- * Origin: >- c y n o s u r e -< 919-929-5153 (1:151/501) Msg#: 2685 *Virus Info* 08-20-90 21:50:00 (Read 9 Times) From: TOM PREECE To: PAUL FERGUSON Subj: RE: KEYBOARD REMAPPING VIA COMMUNICA I can't help but wonder if Herb was experiencing something that suggested that kind of remapping. Lately I have been experiencing keyboard problems that seem to act like that. When I use my down or left arrow the \ and | symbols toggle. I can correct this when it happens by hitting the left hand shift key - but not the right. And tonight it seems as if I am occaissionaly transposing caps on and off. If either of you hears a virus like this I'd like to know. Q&A tested my memory and keyboard fine. Scanv66 detected nothing. --- TBBS v2.1/NM * Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208) Msg#: 2738 *Virus Info* 08-23-90 23:49:00 (Read 7 Times) From: PHILLIP LAIRD To: PATRICIA HOFFMAN Subj: ONTARIO VIRUS Patty, have you heard of such a Virus? I was in the TAG Support Echo and saw a message about a TAG Sysop who contracted that virus. Any Info? Supposedly the Virus is scanned in version SCANV66.ZIP. ???? --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 2739 *Virus Info* 08-22-90 12:55:00 (Read 7 Times) From: PAUL FERGUSON To: EVERYONE Subj: MOM! Patti- Mom, huh?...What can you say?..It seems it has already been said! -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2740 *Virus Info* 08-23-90 12:06:00 (Read 8 Times) From: PAUL FERGUSON To: TOM PREECE Subj: REMAPPING... Hello, Tom... . More than likely there was nothing like that at all. Keyboard remapping is an extremely complicated process and would take more than forethought on the part of the programmer. What you have seen us talking about here is figurative at best and personally, I would have to see it to believe it. (you know the old saying: "Believe none of what you hear and only half of of what you see."?) Although I do believe that is quite possible under the proper circumstances, it would indeed be a rare occurance. Sometimes when receiving odd characters during telecommunications or not getting the exact same keys that you typed could be attributed to disparity (parity differences), differing data bits, stop bits, or even simply ANSI interpretation problems between Comm Programs. I've seen the smallest, simplest things like that have people pulling their hair out by the roots! . .....Clarke's Third Law Any sufficiently advanced technology is indistinguishable from magic. . . -Paul ^@@^........ --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2741 *Virus Info* 08-17-90 01:51:00 (Read 8 Times) From: YEN-ZON CHAI To: DOUG BAGGETT Subj: ANTI VIRUS VIRUSES DB> well..here is a question..where exactly did viruses originate DB> anyway..was it in this country or others? Probably where hacker exists, virus exists. --- outGATE v2.10 # Origin: SIGnet International GateHost (8:7501/103) * Origin: Network Echogate (1:129/34) Msg#: 2742 *Virus Info* 08-22-90 17:49:00 (Read 8 Times) From: KEVIN HIGGINS To: MIKE MCCUNE Subj: REPLY TO MSG# 2654 (RE: HAVE ANYONE TRIED SECURE ?) I took a look at it, but to be realistic, when you run a BBS, or are continuously updating your files as new releases come out, you could easily get to the point where you spend more time reconfiguring the anti-virus program than you would getting any work done. I find it much more efficient to scan every file for viruses as soon as I get it on my system, then rezip it, if I'm not going to use it... a simple .bat file can be used such that if you want to check multiple files, you can just feed the file names on the command line and let the .bat file take care of unzipping, scanning and rezipping the file. Be best if someone would write a program that would do this, but I haven't found one yet. Kevin --- TAGMAIL v2.40.02 Beta * Origin: The Hornet's Nest BBS (1:128/74) Msg#: 2743 *Virus Info* 08-22-90 21:52:00 (Read 8 Times) From: CY WELCH To: PAUL FERGUSON Subj: REPLY TO MSG# 2660 (KEYBOARD REMAPPING....) In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote: PF> Isn't it possible to remap some (or any) keyboard functions via PF> communications with some funky ANSI control characters?....I seem to PF> remember mention of this somewhere.....I really can't remember if was PF> in the form of a question, though, or an answer.....It also made PF> mention of PKWares' Safe-ANSI program...Somebody help us out here... I think most of the "FAST" ansi replacements do not have the keyboard remapping so that danger is removed in those cases. --- XRS! 3.40+ * Origin: Former QuickBBS Beta Team Member (99:9402/1.1) (Quick 1:125/122.1) Msg#: 2744 *Virus Info* 08-24-90 15:14:00 (Read 8 Times) From: PATRICIA HOFFMAN To: ALL Subj: VIRUS RESCUE & F-PROT RELEASES The latest version of Fridrik Skulason's F-PROT anti-viral program is now available for download from my system as FPROT112.ZIP. The program can also be file requested as F-PROT, which will always return the latest copy I have available. This program is actually a "suite" of programs for use in preventing and detecting viruses and trojans. The program originates in Iceland, and so updates to it reaching my system for distribution have been rather sporatic. The other new anti-viral program available on my system is Virus Rescue. Virus Rescue is from Tacoma Software, and is a shell for invoking ViruScan, CleanUp, and VCopy from McAfee Associates. Unlike other shell programs I've seen, this one should not require updates every time a new release of Scan comes out. It picks up its virus information from the VIRLIST.TXT file which is packaged with Scan and CleanUp. It will be handy for those who have trouble with the Scan and CleanUp command line switches, or who want the VIRLIST.TXT information converted to english sentences. This is a first public release, so I expect we may see some changes in this product in the future. Virus Rescue can be downloaded from my system as RESQ01.ZIP. Both programs are also file requestable by other systems. File requests should ask for magic file names as follows: F-PROT for the latest copy of F-PROT (currently FPROT112.ZIP) RESCUE for the latest version of Virus Rescue Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2745 *Virus Info* 08-24-90 23:37:00 (Read 9 Times) From: KEN DORSHIMER To: KEVIN HIGGINS Subj: REPLY TO MSG# 2742 (RE: HAVE ANYONE TRIED SECURE ?) On 22-Aug-90 with bulging eyes and flailing arms Kevin Higgins said: KH> I took a look at it, but to be realistic, when you run a BBS, or are KH> continuously updating your files as new releases come out, you could KH> easily get to the point where you spend more time reconfiguring the KH> anti-virus program than you would getting any work done. I find it KH> much more efficient to scan every file for viruses as soon as I get it KH> on my system, then rezip it, if I'm not going to use it... a simple KH> .bat file can be used such that if KH> KH> you want to check multiple files, you can just feed the file names on KH> the command line and let the .bat file take care of unzipping, KH> scanning and rezipping the file. Be best if someone would write a KH> program that would do this, but I haven't found one yet. Kevin KH> sounds like a plan to me. it would actually be fairly simple to write a program to look at all the files in your upload directory, unpack them based on the extension, scan them, then re-compress them (if needed). of course you'd still have to manually put the now scanned files into the proper catagory directories yourself. when do you need it and what's it worth? :-) ...All of my dreams are in COBOL... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2746 *Virus Info* 08-23-90 15:23:00 (Read 8 Times) From: MIKE MCCUNE To: TALLEY RAGAN Subj: REPLY TO MSG# 2653 (RE: REMOVING JOSHI) No, it just modifies the partition record to remove the virus. If the virus isn't there, it still modifies the partition record. Return.com just reverses the modifications done to the partition table. I will post an improved version of RMJOSHI that scans the partition record for the virus before modifying it.... --- KramMail v3.15 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 2747 *Virus Info* 08-23-90 15:26:00 (Read 8 Times) From: MIKE MCCUNE To: PATRICK TOULME Subj: REPLY TO MSG# 2745 (RE: HAVE ANYONE TRIED SECURE ?) Maybe I should say all virus that are in the "public domain". Virus 101 is a research virus that only a few people have (and you wrote). Nothing is fool proof but Secure is better than any other interrupt moniter. --- KramMail v3.15 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 2748 *Virus Info* 08-23-90 07:01:00 (Read 8 Times) From: YASHA KIDA To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2656 (AKA AND BBS HANDLES) In a message of <21 Aug 90 22:29:34>, Patricia Hoffman (1:204/869) writes: PH> PH> Yasha, Aliases are ok in this echo, as long as the Sysop of the system PH> where the messages originate knows who the user is and can contact him PH> if the need arrises. I fully understand the sitation that you PH> describe about your Site Manager...which is a fully valid reason to PH> use an alias here. I used to use the alias of "Merry Hughes" for PH> exactly that reason! PH> PH> Patti I understand AKA names like "MERRY", but I speak of HACKER HANDLES. like "LINE RUNNER", "DATA BYTE" etc... I must have misunderstood FIDO ECHO POLICY either way I will drop the subject. Yasha Kida --- msged 1.99S ZTC * Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty) (1:151/305) Msg#: 2749 *Virus Info* 08-08-90 23:23:00 (Read 7 Times) From: ALAN DAWSON To: DAVID SMART Subj: RE: VIRUS SCANNERS.... DS> You can't win on this! I've been downloading for quite a while DS> - always running a virus checker on the information. So, where DS> did our virus come from? Off a shrink-wrapped anti-virus DS> diskette one of our guys picked up in the US! Nothing new about this, as people learn all the time. One MAJOR company (really big, really well known) has shipped shrink-wrapped viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs out. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 2750 *Virus Info* 08-08-90 23:31:00 (Read 7 Times) From: ALAN DAWSON To: PATRICIA HOFFMAN Subj: SCAN WEIRDNESS (All answers gratefully received despite the TO: line) Anybody heard of this? I've got a floppy with some viruses on it, among them a SCAN-known Dark Avenger. I SCAN this floppy from the C drive, and the "hey, nothing to worry about there" report comes back. Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of the memory check, telling me Dark Avenger is in memory, power down, load the .45, get the cyanide tablet ready and so on. But DA of course is NOT in memory or active in any way. It is, however, on the floppy, unrun. The above occurred with SCANV64. Out of curiosity, I cranked up SCAN-54 and -- EXACTLY the same result. AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot just performed. I have a bunch of viruses that I don't expect SCAN to find -- ever. But this kind of thing has never happened to me before. Can anyone match this story, or event? --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 2751 *Virus Info* 08-26-90 00:59:00 (Read 7 Times) From: STEVEN TREIBLE To: KEN DORSHIMER Subj: VOICE NUMBER Ken, I haven't mailed the disk yet as you can see. I'd like to have your voice # so I can talk to instead of sending Net Mail. Thanks, Steve. --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) Msg#: 2752 *Virus Info* 08-25-90 06:10:00 (Read 8 Times) From: SANDY LOCKE To: HERB BROWN Subj: RE: COMMUNICATION VIRALS PH> However, unless one of the above is occurring, just connecting via PH> telecom to a system won't directly transmit a virus.... PH> HB> Well, that is not exactly what I meant. Sorry for the miscommunicatio HB> should have used an example. I'll have to dig for some old documentat HB> about z-modem when it first came out. I seem to remember it stating t HB> locked the directory that a file was able to go to when being download HB> has something to do with the structure of a .EXE file, or something. HB> to also remember that it was possible to have the .exe "go were it wan HB> as defined by this structure. Thus, having some of the file go to a c HB> part of a drive or memory. It seems wild, but without the docs I read HB> can't give any details. Thought maybe you could shed some light on th Well considering that I am hosting chuck forsberg today ... hes down here for the sco developer forum I will put the question to him directly... but as one of the suggestors for feature addition to the protocol in another personna... ZMODEM will INDEED allow one to transmit a FULL path name... however this is mitigated by the ability on the receiving end to override the transmitted pathname spec... I dont really see a problem here... and when I put the question to chuck I dont see where he will see one either... btw READ the DSZ DOCS and register the product... that will turn on ALL the neat zmodem features... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2753 *Virus Info* 08-25-90 06:18:00 (Read 15 Times) From: SANDY LOCKE To: SKY RAIDER (Rcvd) Subj: RE: VIRUS ORIGINALS SR> Doug, SR> It is my belief that viruses originated in the early days of computing SR> effort to see what kind of stuff could be done with them, a group of SR> programmers (financed by the US government as I recall) institued a se SR> programs that would attempt to 'beat' others in taking over a computer SR> system. These programs led to a gaming system known as the CORE WARS. SR> today there is an International Core Wars Society. SR> I think it can be easily seen how a program to destroy/circumvent a st SR> operating system can develope into a virus. SR> I tried to double check this information for accuracy, names, dates, e SR> but it seems I have deleted this file. I will try to get further info SR> you, but beleive this info is shrouded in secrecy, and may be hard to SR> relocate. SR> So, the original viruses did come from the US (and even possibly with SR> government help). SR> Ivan Baird SR> * Origin: Northern Connection, Fredericton, N.B. Canada SR> (1:255/3) WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME created by bored programmers... ORIGINAL CORE WARS games were created as far back as 1969 back on the OLD IBM 360 architectures under both OS/MFT and OSMVT OS's... neither had anything to do with so-called secret financing by the US government...BTW I was AROUND and A Systems Programmer during that period... we created our own versions when we heard of the rumours... it was an old system programmers game designed to give Egotistal programmers some lighthearted fun... at this point ALL code ran in real Address space and redcode hadnt even been though of... the MUCH later article by Scientific American in 1979 gave this fun with out harm via the redcode interpreter implemented on early 6502 and 8080 systems... really... I am going to have to move to canada... sounds like there are some really potent and fun drugs in circulation up there... jeese... what a simp... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2754 *Virus Info* 08-25-90 06:19:00 (Read 14 Times) From: SANDY LOCKE To: STEVE HOKE Subj: REPLY TO MSG# 2752 (RE: COMMUNICATION VIRALS) SH> In a message to Herb Brown <15 Aug 90 17:44:00> Patricia Hoffman wrote PH> The only way a virus could be directly transmitted via a PH> telecommunications link ... PH> is if the particular "service" has a feature where they upgrade PH> their software on your system when you connect. SH> Is there any commercial system that does this? I don't know of one, bu SH> like to know what types of systems to be wary of. SH> Steve just one word for you... PRODIGY avoid it like the plague... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2755 *Virus Info* 08-25-90 06:25:00 (Read 9 Times) From: SANDY LOCKE To: MIKE MCCUNE Subj: REPLY TO MSG# 2747 (RE: HAVE ANYONE TRIED SECURE ?) MM> I have tried Secure and have found it to be the only interrupt moniter MM> that will stop all the known viruses. It won't stop the boot viruses, MM> obviously (because a boot virus loades before Secure does), but it wil MM> detect them as soon as Secure is loaded. Secure is hard to configure, MM> but once it is configured, it will give few false alarms. With string MM> scanners becoming increasingly easy to defeat, Secure may be the way t MM> go for virus protection.... well kiddies... a certain couple of anti-viral types on HOMEBASE BBS managed to sting SECURE with modified version of JER-B... one of them continues to find holes with the same tool... SECURE is simply NOT SECURE... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2756 *Virus Info* 08-25-90 06:31:00 (Read 9 Times) From: SANDY LOCKE To: KEN DORSHIMER Subj: REPLY TO MSG# 2479 (RE: CRC CHECKING) KD> On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman sai KD> >the deal is that the invading program would have to know how the KD> >your KD> >program uses works. otherwise it would have a (bytes changed!/by KD> >file!) KD> >chance of succeeding, or somewhere in that neighborhood... KD> > PH> Except in the case of Stealth Viruses....CRC checking doesn't work PH> with them. PH> KD> i'd have to see that for myself. i think a complex enough algorithm wo KD> keep them at bay. the probability factor is just too low for such a st KD> scheme to work. KD> ...Your attorney is in the mail... check out Gilmore Data Systems in LA authors of the OLD FICHECK and XFICHECK... the techniques is called CRC padding after the addition of the viral code the file is padded with a given number of bytes to make the CRC Polynomial come out with the same result... the FCB is then Patched to the original file length leaving nothing for standrad CRC checkers to detect... Childs play really... sandyp.s. in the case of most stealth viruses... the file read code is simply altered to disinfect the file as the CRC checking program reads it... agains simply childs play... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2757 *Virus Info* 08-25-90 06:32:00 (Read 10 Times) From: SANDY LOCKE To: PATRICK TOULME Subj: REPLY TO MSG# 2755 (RE: HAVE ANYONE TRIED SECURE ?) MM> I have tried Secure and have found it to be the only interrupt moniter MM> that will stop all the known viruses. PT> Mike perhaps you should add a caveat to that statement. Secure PT> neither detects, nor does it stop, Virus-101. Right on Patrick... sandy p.s. Damn nice design on the code complex as HELL.... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2758 *Virus Info* 08-25-90 06:36:00 (Read 9 Times) From: SANDY LOCKE To: PAUL FERGUSON Subj: REPLY TO MSG# 2740 (RE: REMAPPING...) PF> Hello, Tom... PF> . PF> More than likely there was nothing like that at all. Keyboard PF> remapping is an extremely complicated process and would take more than PF> forethought on the part of the programmer. What you have seen us PF> talking about here is figurative at best and personally, I would have PF> to see it to believe it. (you know the old saying: "Believe none of PF> what you hear and only half of of what you see."?) Although I do PF> believe that is quite possible under the proper circumstances, it woul PF> indeed be a rare occurance. Sometimes when receiving odd characters PF> during telecommunications or not getting the exact same keys that you PF> typed could be attributed to disparity (parity differences), differing PF> data bits, stop bits, or even simply ANSI interpretation problems PF> between Comm Programs. I've seen the smallest, simplest things like PF> that have people pulling their hair out by the roots! PF> . PF> .....Clarke's Third Law PF> Any sufficiently advanced technology is indistinguishable from PF> magic. PF> . PF> . PF> -Paul ^@@^........ well paul normally on hombase you are quite lucid... but as a long time programmer I can testify the keyboard mapping is really quite simple... no real problem and the business of using terminal control code is quite as simple... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2759 *Virus Info* 08-25-90 06:39:00 (Read 9 Times) From: SANDY LOCKE To: CY WELCH Subj: REPLY TO MSG# 2743 (RE: KEYBOARD REMAPPING....) CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote: PF> Isn't it possible to remap some (or any) keyboard functions via PF> communications with some funky ANSI control characters?....I seem to PF> remember mention of this somewhere.....I really can't remember if was PF> in the form of a question, though, or an answer.....It also made PF> mention of PKWares' Safe-ANSI program...Somebody help us out here... CW> I think most of the "FAST" ansi replacements do not have the keyboard CW> remapping so that danger is removed in those cases. Well if you are referring to FANSI.SYS by hershey Microsystems it too is vunerable to remap effects... and since it implemnt FULL ANSI 3.64 terminal control codes plus some extensions it is even more vunerable to a whole class of tricks that go way beyond noremally keyboard remapping... but to there credit they ahve include a way to turn this "FEATURE" OFF... just most users get it off a BBS and never order or look at the 50.00 set of docs that come when you pay for the products... sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2760 *Virus Info* 08-25-90 08:49:00 (Read 9 Times) From: PATRICIA HOFFMAN To: PHILLIP LAIRD Subj: REPLY TO MSG# 2738 (ONTARIO VIRUS) PL> Patty, have you heard of such a Virus? I was in the TAG Support Echo PL> and saw PL> a message about a TAG Sysop who contracted that virus. Any Info? PL> Supposedly the Virus is scanned in version SCANV66.ZIP. Yep, I've heard of this one....I was the one that named it after it was submitted by Mike Shields (Sysop of 1:244/114). Ontario is a memory resident generic infector of .COM and .EXE files, including COMMAND.COM. Infected .COM files will increase in length by 512 bytes. Infected .EXE files will increase in length between 512 bytes and 1023 bytes on disk drives with standard 512 byte sectors. When files are infected, the virus adds itself to the end of the program, and then places a jump at the beginning so that the virus's code will always execute before the program that was infected. Ontario is not a low-system memory TSR, it goes memory resident installing itself at the top of free memory, but below the 640K line. Available free memory will decrease by 2,048 bytes. Once the virus has installed itself in memory, any program which is executed will then become infected. It was reported with the sample I received from Mike that infected systems may experience hard disk errors, but I was unable to duplicate that here. This may only happen in severe infections, I try not to let them get that severe when I'm working with a virus :-). Scan V66 and above can detect the Ontario Virus on both .COM and .EXE files. Unfortunately, Ontario is one of the viruses that uses a "double-encryption" technique to prevent scanners from being able to use a search string to detect it, so there isn't a simple way to find it with a hex string and a utility such as Norton Utilities. As of right now, there aren't any disinfectors available for the Ontario virus, so if you happen to be infected with it you need to remove the infected programs and replace them with clean copies from your uninfected backups or original write-protected distribution diskettes. A more complete description of the Ontario virus is in VSUM9008, which was released on August 10. The above is just off of the top of my head, which happens to hurt right now. Hope it is understandable..... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2761 *Virus Info* 08-25-90 09:02:00 (Read 10 Times) From: PATRICIA HOFFMAN To: YEN-ZON CHAI Subj: REPLY TO MSG# 2741 (ANTI VIRUS VIRUSES) YC> DB> well..here is a question..where exactly did viruses originate YC> DB> anyway..was it in this country or others? YC> YC> Probably where hacker exists, virus exists. YC> Well, the two oldest known viruses for MS-DOS are the Pakistani Brain and VirDem. The Brain is from Pakistan, VirDem from West Germany. Both of these originated in 1986. Both have known authors. The viruses from 1987 include Jerusalem and the Suriv series from Israel, Alameda/Yale from the United States, and 405 from Austria or Germany. Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2762 *Virus Info* 08-25-90 09:07:00 (Read 10 Times) From: PATRICIA HOFFMAN To: KEVIN HIGGINS Subj: REPLY TO MSG# 2757 (RE: HAVE ANYONE TRIED SECURE ?) KH> I took a look at it, but to be realistic, when you run a BBS, or KH> are continuously updating your files as new releases come out, you KH> could easily get to the point where you spend more time reconfiguring KH> the anti-virus program than you would getting any work done. I find it KH> much more efficient to scan every file for viruses as soon as I get it KH> on my system, then rezip it, if I'm not going to use it... a simple KH> .bat file can be used such that if you want to check multiple files, KH> you can just feed the file names on the command line and let the .bat KH> file take care of unzipping, scanning and rezipping the file. KH> Be best if someone would write a program that would do this, but I KH> haven't found one yet. You might want to take a look at CheckOut and Shez. CheckOut uses ViruScan to check .ARC, .PAK, .ZIP, .LZH, and other archive formats for viruses by automatically creating a temporary directory and unarchiving the file to it. It then invokes Scan to check the executable files. One of its nice features is that it will never invoke a program in that temporary directory, as well as you can have it either delete an infected file or move it to a badfiles directory. It will also find archives which are damaged for you. It can be invoked easily from a .BAT file, such as if you want to run it at midnight against all new uploads. Shez is another program which can be used to scan inside archives. It is interactive, so you need to manually invoke it. After you have selected the archive and listed the contents, hitting ctrl-Z will result in Scan checking the contents. There are other scanning shells which handle archived files, though these are the two that I've used regularly and are the most familiar with. I was also involved in the beta testing of CheckOut with some known to be infected files, and it does function properly in that instance. I've also tested Shez with infected files, and it works well.... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2763 *Virus Info* 08-24-90 16:53:00 (Read 8 Times) From: PRAKASH JANAKIRAMAN To: ALL Subj: LEPROSY Exactly what is the Leprosy virus supposed to do? I was informed that it had been included in McAfee's latest version of Scan, but, having never used Scan before in my life, and never having encountered a virus, are there "symptoms", shall we say, caused by the Leprosy virus, or for any virus? If there is a textfile explaining what each virus is capable of doing, and how it can be detected, I'd like to get a copy of it, if any of you know where I can get something of that sort. Also, does anyone have the number to McAfee's BBS? I'd like to become a user over there as well. (I remember it being in the 408 area code, but I can't recall the actual number). Anyways, thanks a bunch, all... Prakash --- TBBS v2.1/NM * Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208) Msg#: 2896 *Virus Info* 08-26-90 20:55:00 (Read 9 Times) From: HERB BROWN To: SANDY LOCKE Subj: REPLY TO MSG# 2754 (RE: COMMUNICATION VIRALS) With a sharp eye , Sandy Locke (1:204/869) noted: SL> Well considering that I am hosting chuck forsberg today ... hes down SL>here for the sco developer forum I will put the question to him SL>directly... but as one of the suggestors for feature addition to the SL>protocol in another personna... ZMODEM will INDEED allow one to SL>transmit a FULL path name... however this is mitigated by the ability I have the understanding that other protocols would do this, not by choice. Without the security on the recieving end, this could be disasterous, to say the least.. I would be happy to hear what you find.. Speaking of registering zmodem, is it still free to sysops? You can asnwer that in net-mail.. :-) --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 2897 *Virus Info* 08-24-90 13:39:00 (Read 7 Times) From: MIKE MCCUNE To: VESSELIN BONTCHEV Subj: REPLY TO MSG# 2746 (REMOVING JOSHI) In your recent letter to me you wrote to me you suggested that I check for the virus before trying to remove it. Now that I've got a working copy of the Joshi (and don't have to let someone else test RMJOSHI), I rewrote the program to check for the virus first. mov dx,80h mov cx,1h mov bx,200h mov ax,201h int 13h or ah,ah jnz read_error es: cmp w[bx],1feb jnz no_virus mov cx,000ah mov ax,301h int 13h or ah,ah jnz write_error mov cx,9h mov ax,201h int 13h or ah,ah jnz read_error mov cx,1h mov ax,301h int 13h or ah,ah jnz write_error mov ah,9h lea dx,remove_message int 21h int 20h remove_message: db 'Joshi Removed$' no_virus: mov ah,9h lea dx,virus_message int 21h int 20h virus_message: db 'Joshi not found$' read_error: mov ah,9h lea dx,read_message int 21h int 20h read_message: db 'Read Error$' write_error: mov ah,9h lea dx,write_message int 21h int 20h write_message: db 'Write Error$' I wrote it for the shareware A86, but it should assemble under MASM, TASM or WASM with minor modifications. Next I will scan the memory for the virus because the remover won't work while the virus is active in memory..... --- Opus-CBCS 1.13 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 2898 *Virus Info* 08-25-90 23:46:00 (Read 6 Times) From: TALLEY RAGAN To: MIKE MCCUNE Subj: REPLY TO MSG# 2897 (RE: REMOVING JOSHI) In a message to Talley Ragan <08-23-90 15:23> Mike Mccune wrote: MM>>No, it just modifies the partition record to remove the virus. MM>>If the virus isn't there, it still modifies the partition MM>>record. Thanks for the information. That clears up the question just fine. Talley --- ZAFFER v1.01 --- QuickBBS 2.64 [Reg] Qecho ver 2.62 * Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9) Msg#: 2899 *Virus Info* 08-23-90 17:31:00 (Read 6 Times) From: DAVID BURGESS To: MARTIN NICHOL Subj: REPLY TO MSG# 2661 (WHAT'S THE SOLUTION?) In a message to michael tunn <21 Aug 90 20:29:00> Martin Nichol wrote: MN> mt said => It seems to me our Virus checking programs will just MN> mt said => get bigger and bigger as more viruses and strains of MN> mt said => the same viruses are discovered. If so (and if their MN> mt said => development is excelerating) then we may find in the MN> mt said => near future that it has become impossiable to deal MN> mt said => with the outbreaks! MN> mt said => Do we do develop new Operating Systems which are far MN> mt said => more secure! MN> Develope different virus scanning programs. Make them more generic MN> where virus signatures/characteristics can be kept in a seperate MN> file and the virus scanner just reads the MN> file and interprets it accordingly. That opens the door to having the virus scanner or part of the virus scanner to become contaminated. --- [Q] XRS 3.40 * Origin: Eurkea! I've found the secret elephant playground (RAX 1:124/3106.6) Msg#: 2900 *Virus Info* 08-17-90 21:06:00 (Read 6 Times) From: CHRIS BARRETT To: PATRICIA HOFFMAN Subj: RE: VIRUCIDE V1.2 Thanks for the info.. If ya remeber the name could ya tell us it.. I think i'll stick with the ScanV?? and CleanP?? for now then.. Chris.. --- TBBS v2.1/NM * Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654) Msg#: 2901 *Virus Info* 08-17-90 06:26:00 (Read 6 Times) From: ZEBEE JOHNSTONE To: ALL Subj: MAC VIRUS Anyone know anything about a mac virus which: Sets the delete flag on any folder with a name which starts with the letter "o" or higher (eg system...) IT doesn't actually delete the folder, the machine will still boot, but the folder is missing from the desktop and the delete flag is set. Weird one hmm? --- * Origin: Lighten up! What man can make, man can break! (3:680/813) Msg#: 2902 *Virus Info* 08-19-90 22:31:00 (Read 6 Times) From: BRENDON THOMPSON To: PATRICIA HOFFMAN Subj: "STONED 2" Patti, I sent you a message the other day about a new variant of "Stoned" that I found in Christchurch, New Zealand. It had reference to some "S & S program for testing anti-virus software" and the phone number 0494 791900 in it. I have since had the time to pull it to bits, and it is only the original "Stoned" virus. The code at the start of the sector is still the same, but some clown has modified the message after location 65H. I'm still pleased to send you a specimen by airmail if you like, but it ain't "Stoned 2". Regards.. ... Doon. --- Via Silver Xpress V2.26 * Origin: TONY'S BBS - Gateway to New Zealand. (3:770/101) Msg#: 2903 *Virus Info* 08-19-90 09:25:00 (Read 6 Times) From: DONALD ANDERSON To: FRIAR NESTOR Subj: RE: LOOKIN' FOR FUN? I always looking for fun --- KramMail v3.15 * Origin: get real (3:621/221.0) Msg#: 2904 *Virus Info* 08-26-90 23:36:00 (Read 7 Times) From: GLENN JORDAN To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2761 (ANTI VIRUS VIRUSES) PH> The Vacsina Viruses were written in Bulgaria to seek out and destroy PH> certain other viruses, or at least that was their original purpose. In examples of the VACSINA virus I have investigated, I have found the following odd behavior, which I wonder if you have also noted : .COM files of over a certain size are infected at first bite, but .EXE files are different. It takes two Exposures to infect an .EXE file, each of which adds a bit to the file length, but only at the second exposure do you get a live virus, signaled by a short beep. A tiny .EXE will take the first exposure, but never complete on a subsequent exposure to become a live virus. I wonder if in some way this behavior, which I have not seen in any other viruses so far, is in some way related to the original "anti-virus" nature of this beast ? --- XRS 3.30-DV (286) * Origin: Jordan Computer Consulting (RAX 1:151/223.3) Msg#: 2905 *Virus Info* 08-26-90 07:54:00 (Read 6 Times) From: KEN DORSHIMER To: SANDY LOCKE Subj: REPLY TO MSG# 2756 (RE: CRC CHECKING) On 25-Aug-90 with bulging eyes and flailing arms Sandy Locke said: SL> check out Gilmore Data Systems in LA authors of the OLD FICHECK and SL> XFICHECK... the techniques is called CRC padding after the addition of SL> the viral code the file is padded with a given number of bytes to make SL> the CRC Polynomial come out with the same result... the FCB is then SL> Patched to the original file length leaving nothing for standrad CRC SL> checkers to detect... Childs play really... sandyp.s. in the case of SL> most stealth viruses... the file read code is simply altered to SL> disinfect the file as the CRC checking program reads it... agains SL> simply childs play... SL> could you send me this article? i still believe that the virus would have to know your crc algorithm in order to perform this magic. additionally if the file is padded, it's size would increase and would be detected that way. correct? sooo, the person writting the virus would require a copy of your file to disassemble, see how you performed your checks, then create a means to circumvent it. sounds like a lot of trouble to me for very little gain. catch ya on the rebound. ...All of my dreams are in COBOL... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2906 *Virus Info* 08-26-90 23:58:00 (Read 6 Times) From: KEN DORSHIMER To: STEVEN TREIBLE Subj: REPLY TO MSG# 2751 (RE: VOICE NUMBER) On 26-Aug-90 with bulging eyes and flailing arms Steven Treible said: ST> Ken, I haven't mailed the disk yet as you can see. I'd like to have ST> your voice # so I can talk to instead of sending Net Mail. Thanks, ST> Steve. you got it look for it in a net-mail-o-gram. i'd rather not leave it in the public msg area as everyone would try to call and shoot the breeze. :-) ...All of my dreams are in COBOL... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 2907 *Virus Info* 08-26-90 13:09:00 (Read 6 Times) From: PAUL BENDER To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2744 (VIRUS RESCUE & F-PROT RELEASES) * Replying to a message originally to All PH> Both programs are also file requestable by other systems. PH> File requests should ask for magic file names as follows: PH> PH> F-PROT for the latest copy of F-PROT (currently PH> FPROT112.ZIP) PH> RESCUE for the latest version of Virus Rescue PH> Would it be possible for you to hatch these out into SDS or arrange for the authors to do so? Paul --- RemoteAccess 0.04a via QEcho 2. * Origin: -=* Rassi's Retreat *=- 10pm to 8am Only! (615) 831-1338 (1:116/37) Msg#: 2908 *Virus Info* 08-26-90 12:44:00 (Read 7 Times) From: PATRICIA HOFFMAN To: ALL Subj: VIRUS_INFO INTRODUCTION & RULES Welcome to the VIRUS_INFO echo. The purpose of this echo is to allow BBS users and sysops to ask questions about computer viruses and to be able to get back up-to-date information. Discussion topics may include, but is not necessarily limited to: - what are viruses - how to prevent getting infected - how to determine if your system is infected - how to clean up an infected system and salvage as much information as possible - reviews and announcements of new anti-viral products and product releases. There was a lot of hysteria in the press over the Columbus Day/ DataCrime/October 12 virus, for example, but little mentioned of how rare the virus is or how to determine if a system is infected with it and how to remove it. This type of information is an example of what this echo is intended to carry. Some messages appearing in this conference may be cross-postings from the Dirty_Dozen echo which is sysop only. Cross-postings may only be done by the originator of the message. For example, several of my messages posted in the Dirty_Dozen echo will be cross-posted here. Messages from the HomeBase/CVIA BBS run by Mr. John McAfee in Santa Clara, CA and/or CVIA bulletins may be posted here by Patricia Hoffman, these are being done with Mr. McAfee's permission. Replies to these messages, as well as netmail received at 1:204/869 for Mr. McAfee, is manually transferred to his system as it is received. Conference rules are very simple..... 1. Discussions of how to write a virus, specific technical discussions of how a virus works, or anything of an illegal nature, are not allowed. This rule is *not* open to debate. 2. Messages with a sexually suggestive nature are not allowed, please keep in mind that minors as well as adults participate in this conference. 3. Discussions of a ethical or retorical nature that lead into a debate are considered off-topic in that they will not ever be resolved and do not help anyone. An example in this category would be a discussion in the area of "Should live viruses or virus disassemblies be made available to the public?". These questions and topics will be allowed until such a point that they start to severely disrupt the echo, or start a flame war. At that point, the moderator will request that the discussion be discontinued. 4. Be courteous to your fellow echo participants, and remember there is no such thing as a dumb question, except for the question that some- one is afraid to ask. Everyone needs to help everyone else understand viruses and why they are a problem. 5. This conference is not to be distributed thru Group-mail or any other mail processor which will obscure the ability to track a message back to an originating system. All messages must have seen-bys and path statements if the BBSs participatings software can generate them. 6. If you have a question or problem of an extremely sensitive nature, consider sending it NetMail to 1:204/869 or 99:9403/2 instead of posting it here. If you are netmailing a file that you think is infected, be sure to send a message in NetMail with it so I know what it is, I'll be sure it gets to someone to get analysed for you. Do not under any circumstances host route a file that you think is infected. Suspect files may also be sent on diskette via US Mail to the following address: Patricia Hoffman 1556 Halford Avenue #127 Santa Clara, CA 95051 7. This conference is available to FidoNet and EggNet systems. The conference echomail tag in FidoNet is VIRUS_INFO, in EggNet the conference is available as E_VIRUS_INFO. 8. This conference is available on the FidoNet Backbone. While you are welcome to freely pass this echo along to other systems, out of region links must be approved by moderator of the echo. Gating the echo into another network or Zone must be approved by the conference moderator. 9. Opinions are welcome in the conference, however the ethics of the behavior of people that write viruses, or name calling, is frowned upon. Likewise, accusations of virus writing are strictly forbidden. Please keep opinions down to a single message, and do not repeatedly post them, as these messages tend to water down the purpose of the conference and degrade the level of information that is being presented. 10. Handling of off-topic messages or messages that violate the conference rules will be done by the moderator. First and second warnings on these messages will be in private Netmail. Please do not respond to the off-topic messages so that the conference doesn't get further off-track. Let the moderator do the moderating. 11. Handles are allowed in this conference, however sysops of boards carrying the conference are expected to be able to determine which of their users entered a message if a problem arises. This in effect means, for example, that Opus systems must not set this echo up to allow anonymous messages. 12. If a matter arises where the moderator needs to contact a participant in the echo, the moderator will contact the system where the message was entered and request that the sysop allow the user netmail access, or call the participant with a request for them to logon to the moderator's system or provide a phone number with the participant's permission. Sysops are not expected to provide their users' phone numbers to the moderator without the user's express permission, their privacy is important. There are times, however, when a phone call or chat can resolve a problem much faster than any other route. This is the only reason for this rule. 12. This echo is not a programming echo for answering questions on how to code programs in assembler. If you want to exchange assembler (or any other program language) techniques, please locate an appropriate programming echo or start your own echo. Patricia M. Hoffman is the moderator of the VIRUS_INFO echo conference. She has previously used the name "Merry Hughes" in moderating this conference, and is the originator of the conference and the original moderator. Patricia Hoffman is also the author of the Virus Information Summary List, and is an independent anti-viral researcher. Please contact the moderator, Patricia Hoffman, at 1:204/869 or 99:9403/2 if you need assistance on setting up an echofeed for this echo to your system. thanks... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2909 *Virus Info* 08-26-90 15:13:00 (Read 7 Times) From: PATRICIA HOFFMAN To: PRAKASH JANAKIRAMAN Subj: REPLY TO MSG# 2763 (LEPROSY) PJ> Exactly what is the Leprosy virus supposed to do? I was informed that PJ> it had been included in McAfee's latest version of Scan, but, having PJ> never used Scan before in my life, and never having encountered a PJ> virus, are there "symptoms", shall we say, caused by the Leprosy virus, PJ> or for any virus? If there is a textfile explaining what each virus is PJ> capable of doing, and how it can be detected, I'd like to get a copy of PJ> it, if any of you know where I can get something of that sort. The Leprosy virus is a non-resident overwriting virus. It infects .COM and .EXE files, overwriting the first 666 bytes of the file. Symptoms of it include that infected files will not execute properly...instead of what they are supposed to do, they will upon execution, infect other files then display a message and end. A complete description of this virus and all (with the exception of V2P2, V2P6, V2P6 and Stoned II) known MS-DOS viruses as of August 10, 1990 is available in the Virus Information Summary List. Its current version is VSUM9008.ZIP. It is available on my system at 408-244-0813, as well as many other systems, including McAfee's BBS. Check around your area before you make the long distance call, it could save you the phone call cost. PJ> PJ> Also, does anyone have the number to McAfee's BBS? I'd like to become a PJ> user over there as well. (I remember it being in the 408 area code, but PJ> I can't recall the actual number). Anyways, thanks a bunch, all... The number of the HomeBase BBS is 408-988-4004. The 9600 HST number is 408-988-5138. Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 2910 *Virus Info* 08-24-90 23:05:00 (Read 7 Times) From: CY WELCH To: TALLEY RAGAN Subj: REPLY TO MSG# 2898 (REMOVING JOSHI) In a message to Mike Mccune <20 Aug 90 17:09:00> Talley Ragan wrote: >MM>> Just be sure to boot off a clean diskette to remove the >MM>>virus from memory, otherwise the virus will not be removed. >MM>> If RMJOSHI is used on an unifected hard drive, it will >MM>>destroy the partition table. This next program, RETURN.COM >MM>>will restore the partition table. >MM>> I will post this program in my next listing.... TR> Does this mean that RMJOSHI.COM, if run on an uninfected hard TR> drive by it self is a virus? Actually I think it would fit the description of trojan rather than virus as it doesn't replicate. --- XRS! 3.40+ * Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1) Msg#: 2911 *Virus Info* 08-26-90 21:13:00 (Read 6 Times) From: TOM PREECE To: SANDY LOCKE Subj: REPLY TO MSG# 2758 (RE: REMAPPING...) As you may see by looking at my other entry's, I have been loading a cache program that is clearly implementing software to remap my keys to s certain extent. If this is possible as a glitch, its is obviously possible as an attack. Let's hope it never comes to that. --- TBBS v2.1/NM * Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208) Msg#: 2993 *Virus Info* 08-27-90 07:54:00 (Read 7 Times) From: JAMES DICK To: KEN DORSHIMER Subj: REPLY TO MSG# 2762 (RE: HAVE ANYONE TRIED SECURE ?) On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking Broccoli Jello and drinking jolt, Ken Dorshimer wrote to Kevin Higgins, TO WIT... KD > sounds like a plan to me. it would actually be fairly simple to write KD > a KD > program to look at all the files in your upload directory, unpack them KD > based KD > on the extension, scan them, then re-compress them (if needed). of Sounds like CHECKOUT....available here, homebase excaliber! and others as CKOT11.* -={ Jim }=- --- QM v1.00 * Origin: The Clipperist - Home to happy Clippheads in Ottawa, Canada (1:163/118.0) Msg#: 2994 *Virus Info* 08-27-90 19:34:00 (Read 6 Times) From: PHILLIP LAIRD To: ALAN DAWSON Subj: REPLY TO MSG# 2750 (RE: SCAN WEIRDNESS) ** Quoting Alan Dawson to Patricia Hoffman ** >among them a SCAN-known Dark Avenger. I SCAN this floppy from >the C >drive, and the "hey, nothing to worry about there" report comes >back. >Strange. I SCAN it again. This time 'round, SCAN barfs after > >--- Opus-CBCS 1.13 > * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand >(3:608/9.0) ** End of Quote ** Allan, I NEVER SCAN from the C Drive or any hard disk. I always scan from a write protected Floppy Diskette in Drive A. I also have a third system (Yep that's right a third system to do all my scanning from. However, I have never had happen to me what happened to you. I did one time find Scan.EXE infected at my place of employment when I didn't write protect the floppy and scanned the b drive, PLEASE write protect the floppy or SCAN.EXE on the hard drive... --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 2995 *Virus Info* 08-27-90 19:50:00 (Read 10 Times) From: PHILLIP LAIRD To: SANDY LOCKE Subj: REPLY TO MSG# 2753 (RE: VIRUS ORIGINALS) Sandy, maybe this might help. I have read an excellent book on the Subject of Origins of Viruses, but let me quote you guys first... ** Quoting Sandy Locke to Sky Raider ** >SR> effort to see what kind of stuff could be done with them, >a group of >SR> programmers (financed by the US government as I recall) >institued a se >SR> programs that would attempt to 'beat' others in taking >over a computer >SR> system. These programs led to a gaming system known as >the CORE WARS. >SR> today there is an International Core Wars Society. > >SR> I think it can be easily seen how a program to destroy/circumvent >a st >SR> operating system can develope into a virus. > >SR> I tried to double check this information for accuracy, >names, dates, e >SR> but it seems I have deleted this file. I will try to get >further info >SR> you, but beleive this info is shrouded in secrecy, and >may be hard to >SR> relocate. > >SR> So, the original viruses did come from the US (and even >possibly with >SR> government help). > >SR> Ivan Baird >SR> * Origin: Northern Connection, Fredericton, N.B. Canada > >SR> (1:255/3) >WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME >created by >bored programmers... ORIGINAL CORE WARS games were created >as far back >as 1969 back on the OLD IBM 360 architectures under both OS/MFT >and >OSMVT OS's... neither had anything to do with so-called secret >financing by the US government...BTW I was AROUND and A Systems >Programmer during that period... we created our own versions >when we >heard of the rumours... it was an old system programmers game >designed >to give Egotistal programmers some lighthearted fun... at this >point >ALL code ran in real Address space and redcode hadnt even been >though >of... the MUCH later article by Scientific American in 1979 >gave this >fun with out harm via the redcode interpreter implemented on >early 6502 >and 8080 systems... really... I am going to have to move to >canada... >sounds like there are some really potent and fun drugs in circulation >up there... jeese... what a simp... > sandy > > >--- QM v1.00 > * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 >(1:204/869.0) ** End of Quote ** O.K. The above message is what I am quoting to you.... If you get a chance, you can pick this book up at Wladen Software at the following locations in California and maybe other bookstores near you can order the book, too: Viruses, A High Tech Disease By Ralph Burger Published by Abacus ISBN 1557550433 Retails at 18.95 US Can be picked up at the following Walden Software Stores: Doly City, Ca (415) 756-2430 San Leandro, Ca (415) 481-8884 It starts from way back when... Phillip Laird --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 2996 *Virus Info* 08-27-90 19:58:00 (Read 7 Times) From: PHILLIP LAIRD To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 2760 (RE: ONTARIO VIRUS) ** Quoting Patricia Hoffman to Phillip Laird ** >after it was submitted by Mike Shields (Sysop of 1:244/114). > Ontario is a memory resident generic infector of .COM and >.EXE files, including COMMAND.COM. Infected .COM files will >increase in length by 512 bytes. Infected .EXE files will >A more complete description of the Ontario virus is in VSUM9008, >which was released on August 10. The above is just off of >the top of my head, which happens to hurt right now. Hope >it is understandable..... > >Patti > > >--- QM v1.00 > * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 >(1:204/869.0) ** End of Quote ** Yea, I think Mike was the one the message came from I read about. He Was instrumental in helping us with another problem he found, too. I am sure that he is on the up and up about the hard disk problems. Nope, I don't have the Ontario Virus that I know of! I read about the Virus after I had posted to you, Thanx for the info. Nice to know where it loads in Mem, that would make a util easier to write once I had a fix on what you have already told me. I will see if I can locate that message from Mike about the Virus originally and let you read it... --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 3029 *Virus Info* 08-26-90 14:01:00 (Read 7 Times) From: RICK WILSON To: SANDY LOCKE Subj: RE: CORE WARS yep core wars was something that a bunch of people that had access to systems messed with after hours, there was a artical in DDJ a few years ago about a bunch of em out a Berkely of Stanford or something. really weired how these folks that have recently ( within the last 8 to 10 years ) become such experts on micros and mainframes and their history. later... Rick --- Telegard v2.5 Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 3030 *Virus Info* 08-26-90 16:45:00 (Read 7 Times) From: JOE MORLAN To: CY WELCH Subj: KEYBOARD REMAPPING. In addition to PKWares's Safe-ANSI, ZANSI does not support keyboard remapping. However, NANSI.SYS does have keyboard remapping. --- Telegard v2.5 Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 3070 *Virus Info* 08-30-90 23:11:45 (Read 9 Times) From: SKY RAIDER To: SANDY LOCKE Subj: REPLY TO MSG# 2753 (Re: VIRUS ORIGINALS) Firstly, I did not wish to anger you (although I seem to have done just this), but only sought to answer your question to the best of my abilities (which you seem to doubt). Secondly, I stand by my original assertions that viruses were developed through the original Core Wars gaming system. This has been corroborated by various 'virus gurus' here at the local university. In fact, without prompting, one mentioned Bell Labs. Since, as you state, you are a Systems Programmer - it should be obvious to yourself that a RedCode program could be easily adapted to the microcomputer world. It should also be equally as obvious that these RedCode experiments have laid the groundwork for many of the various virus types infecting micros today (ie. trojans, worms, etc.). Thirdly, I did not state, nor did I mean to imply (as you seem to believe), that these RedCode 'fighter programs' are in fact the viruses we see today - merely that they (RedCode fighters) provided the techniques for the micro viruses. Furthermore, since the RedCode experiments were "old system programmers games designed to give Egoistical programmers some lighthearted fun", and since it is generally accepted that virus writers are in this for the same reasons (the egotistical, not the fun), I find it hard to beleive that you cannot equate the two. If you will note in the extract below, I am not the only person who who beleives the RedCode experiments were the forerunners of the modern viruses (in fact, it may be noted they refer to these as viruses - which, of course, they were); From the Sept./89 issue of Popular Science; Despite all the recent publicity, viruses aren't new. In the 1950's researchers studied programs the called "self-altering automata," says Mike Holm... In the 1960s computer scientists at Bell Laboratories had viruses battling each other in a game called Core Wars. The object was to create a virus small enough to destroy other viruses without being caught.... Also, just for the record, allow me to mention that this is an American publication (apparently there are strange drugs down there too). Again, for the record, allow me to mention that it is fact that Robert Morris, Sr. was a participant in the Core Wars games. Is it a coincidence that his son wrote the Internet Virus, or did his father give him the building blocks to build upon? (With my apologies to the Morris family, but I felt this example might carry some weight with Know-it-all System Programmers). To answer your original question, in a form that you may deem acceptable (ie. no RedCode, no mainframe systems, the US is not the origin - all those naive things), the original micro virus was (at least in the IBM world, I can not be sure this applies to early Apple ][ systems, or even the Pets from Commodore) the "Pakistani Brain", released in Jan. '86. But it must be noted (although I feel you will reject this also (ie. mainframe, US, etc)), in Nov. '83, Fred Cohen, in 8 hours wrote a virus which attached itself to users programs, and proceeded to use this program to gain access to all system rights (in an average time of 30 mins). Also, although I don't have a date (the computer name itself may give some indication of age) - on a UNIVAC 1108, with a secure operating system using the Bell-Lapadula model for OS security, a virus was created that: infected the system in 26 hours, used only legitimate activity with the Bell-Lapadula rules, and the infection took only 250 (approx.) of code (From "Computer Security: Are Viruses the AIDS of the Computing Industry?", by Prof. Wayne Patterson, Chairman, Dept. of Computer Science, University of New Orleans.). I am not interested in a war of words, so I will suggest some reading before you go off half cocked to this reply - "Computer Security; A Global Challenge," J.W. Finch & E.G. Douglas, eds., Elsevier Science Publishers, North-Holland - especially the chapters by Fred Cohen. I have not read this, but will try to when it becomes available to me. Also see the message posted by Phillip Laird. --- TBBS v2.1/NM * Origin: Northern Connection, Fredericton, N.B. Canada (1:255/3) Msg#: 3154 *Virus Info* 08-28-90 06:33:00 (Read 7 Times) From: PATRICIA HOFFMAN To: ALAN DAWSON Subj: REPLY TO MSG# 2994 (SCAN WEIRDNESS) AD> Anybody heard of this? I've got a floppy with some viruses on it, AD> among them a SCAN-known Dark Avenger. I SCAN this floppy from the C AD> drive, and the "hey, nothing to worry about there" report comes back. AD> Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of AD> the memory check, telling me Dark Avenger is in memory, power down, AD> load the .45, get the cyanide tablet ready and so on. AD> But DA of course is NOT in memory or active in any way. It is, AD> however, on the floppy, unrun. AD> The above occurred with SCANV64. Out of curiosity, I cranked up AD> SCAN-54 and -- EXACTLY the same result. AD> AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot AD> just performed. AD> I have a bunch of viruses that I don't expect SCAN to find -- AD> ever. But this kind of thing has never happened to me before. Can AD> anyone match this story, or event? There are a couple of possibilities here. First, if the virus is on a non-executable file, such as one with a .VOM or .VXE extension, Scan won't find it since it is not one of the file extensions it checks for Dark Avenger. In this case, a subsequent run of Scan may find it in memory anyways since the DOS buffers in memory are not cleaned out between program executions. If this is the case, running Scan with the /A option will find it on any file, regardless of extension. Likewise, if your copy of Dark Avenger has ever had a disinfector run against it, it may have some "dead" Dark Avenger code after the end of file mark, but within the last sector of the program as allocated on disk. In this case, Scan won't find it on disk, but may later find it in memory since the code after the end of file mark was read in with the rest of the last sector of the program to memory. This is what is sometimes referred to as a "ghost virus", it isn't really the virus, just dead remnant code remaining in the slack space in the sector. It can't be executed. Running a disk optimization utility such as Speed Disk from Norton Utilities will get rid of the "ghost virus". They are caused by the way DOS fills out the end of the buffer before it writes it out to disk, doesn't always occur when disinfecting programs, but it sometimes will occur. The other case is if your copy of Dark Avenger does not occur at the correct place in the file. Dark Avenger always adds its code to the End Of Programs. If your copy happens to have it at the beginning of the program, or perhaps imbedded in the middle where it shouldn't be, it may not get found. In this case, your copy doesn't match either of the Dark Avenger's that McAfee has. Hope that helps....those are the only three cases that I've heard of a similar problem to yours. Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3155 *Virus Info* 08-28-90 15:16:00 (Read 5 Times) From: KEN DORSHIMER To: JAMES DICK Subj: REPLY TO MSG# 2993 (RE: HAVE ANYONE TRIED SECURE ?) On 27-Aug-90 with bulging eyes and flailing arms James Dick said: JD> On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking JD> Broccoli Jello and drinking jolt, Ken Dorshimer wrote to Kevin JD> Higgins, TO WIT... KD >> sounds like a plan to me. it would actually be fairly simple to write KD >> a KD >> program to look at all the files in your upload directory, unpack them KD >> based KD >> on the extension, scan them, then re-compress them (if needed). of JD> Sounds like CHECKOUT....available here, homebase excaliber! and JD> others as CKOT11.* JD> thanks but you might want to tell kevin higgins about that. :-) as for me, hell i'll write the bloody thing myself. just wouldn't be a day without some programming in it. ...All of my dreams are in COBOL... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 3156 *Virus Info* 08-27-90 14:14:00 (Read 5 Times) From: MICHAEL CHOY To: ALL Subj: IN THE MAC WORLD Disinfectant 2.0 was released in July...it has the Disinfectant INIT, which is like SAM only it removes viruses as well as detecting them..it catches the Frankie virusa whoch in an old virus that ran on mac emulators for Atari..I guess nobody has to worry about that...it also has much more info on protecting yourself from virus and such.. --- Telegard v2.5 Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 3157 *Virus Info* 08-27-90 20:25:00 (Read 5 Times) From: JOE MORLAN To: ALL Subj: LHARC114? I had heard that and infected version of LHARC was released last year under the name LHARC114. I also heard that because of that, the next release of LHARC was expected to be LHARC200 to avoid confustion with the virus. This week a file appeared on a local board called LHARC114. I left a message to the sysop to check it out and he says it's clean. The docs say that this is version 114b, the latest version. Does anybody know what the deal is or was here? Is LHARC114 safe to use? Is there a virus associated with this program? Thanks. --- Telegard v2.5 Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 3158 *Virus Info* 08-28-90 15:01:00 (Read 6 Times) From: KEVIN HIGGINS To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 3155 (RE: HAVE ANYONE TRIED SECURE ?) Thanks for the info on CheckOut. I'd seen the file description usage included in a .bat for for TAG, but never implemented it, or d/l'd the checkout file because on my XT it sometimes takes awhile to dearc. a large .zip file--a real pain for L/D types... Probably be wise to start using something like that, though, since the BBS can do all the checking automatically following uploads.... Guess most users won't mind waiting a minute or so, if it makes their d/l's almost certifiably safe. Kevin --- TAGMAIL v2.40.02 Beta * Origin: The Hornet's Nest BBS (1:128/74) Msg#: 3177 *Virus Info* 08-28-90 18:10:00 (Read 6 Times) From: RICK PERCIVAL To: KEVIN HIGGINS Subj: REPLY TO MSG# 3158 (RE: HAVE ANYONE TRIED SECURE ?) > command line and let the .bat file take care of unzipping, scanning > and rezipping the file. Be best if someone would write a program > that would do this, but I haven't found one yet. > Kevin Hi there, you guys must be behind the times or something but there is a very good program which does exactly what you are looking for. Its called CHECKOUT. The version we are using over here is called CKOT11.ZIP and it is a little pearler!! What it does is, unzips a file, scans it and rezips it, menu driven or command line driven. Try it, you'll love it. --- FD 1.99c * Origin: The Cyclops BBS Auckland NEW ZEALAND (3:772/170) Msg#: 3178 *Virus Info* 08-14-90 09:39:00 (Read 7 Times) From: DAN BRIDGES To: KEN DORSHIMER Subj: RE: CRC? I've been reading, with interest, the messages about a program that provides a demo of circumventing a single CRC generating program. I thought that its name would be common knowledge, but apparently it isn't. You were told the name of the file was MCRCx. May I suggest that you look for it as FICHECKx. The one I got is v5 and has program called PROVECRC which demonstrates the problem. ********************** * FICHECK Ver 5.0 * * MFICHECK Ver 5.0 * ********************** (C)Copyright 1988,1989 Gilmore Systems P.O. Box 3831, Beverly Hills, CA 90212-0831 U.S.A. Voice: (213) 275-8006 Data: (213) 276-5263 Cheers, Dan (no connection with the above firm). --- Maximus-CBCS v1.02 * Origin: Marwick's MadHouse (3:640/820) Msg#: 3179 *Virus Info* 08-18-90 14:19:00 (Read 7 Times) From: YVETTE LIAN To: FRED GOLDFARB Subj: RE: VIRUS GROUPS.... FG> writing viruses". The idea I got was that there are actual FG> "virus groups" similar to the game cracking groups you hear FG> of occasionally, who's sole purposes are to write viruses, FG> not for research's sake, but to infect people. Has anyone FG> else heard of this before? Are there really such groups? FG> Imagine, when a new virus comes out three or four groups FG> claiming to be the writers.. Kinda like terrorist bombings FG> only different. Come to think of it, I remember reading a That'd be right... you would think that if these people were intelligent enough to program something such as a virus they'd probably be better off not wasting their time with it... --- QuickBBS 2.64 (Eval) * Origin: Virus Info .. how to do it and not get it ! (3:640/886) Msg#: 3180 *Virus Info* 08-18-90 14:42:00 (Read 7 Times) From: ROD FEWSTER To: KERRY ROBINSON Subj: RE: VIRUS CHECKERS > In a message of <12 Jun 90 7:31:31>, Patrick Curry (1:133/425) writes: > > Rarely does a MAC get a virus It is an IBM phonomonum ^^^^^^^^^^^^^^^^^^^^^^^ Tell it to an Amiga user !! B-) --- FD 1.99c * Origin: The Edge of Reality .. THE NIGHTMARE BEGINS ! (3:640/886) Msg#: 3181 *Virus Info* 08-30-90 13:01:00 (Read 7 Times) From: BRIAN WENDT To: ALL Subj: NEWSPAPER CLIPPING The following item appeared in a newspaper in Brisbane, Austsralia yesterday. Anyone care to comment? VIRUS ATTACKS STATE'S PERSONAL COMPUTERS A sophisticated computer virus is feared to have infected Queensland Government and home computers. The COMPUTER VIRUS INFORMATION GROUP at the QUEENSLAND UNIVERSITY OF TECHNOLOGY has issued it first major warning to personal computer users about the virus. The virus, initially detected by the Israeli defence force, freezes computers on September 22, the birthday of a character in Tolkien's book, 'Lord of the Rings'. A computer virus is a program designed to attach copies of itself to software and disable a computer system, or destroy files. Acting technologist, MR EMLYN CREEVY said the warning was issued after a State Government public servant gave the virus to the group for investigation. Mr Creevy said somputers infected with the virus - known as FRODO, 4096, or CENTURY - would freeze on September 22 or until the end of the year unless it was removed. He said the group expected to know if the virus had infected computers in Queensland next week after users report the results of searches they were requested to conduct. The group warned all personal computer operators that there was a bug in the FRODO virus which prevented it from displaying a message 'FRODO LIVES' on September 22 and instead caused the computer to 'hang' or freeze. "It is from the FRODO name that the significance of the 22nd September can be identified," they said. "This is the birthday of Frodo Baggins in Tolkien's story. Users are advised to theck for the virus as soon as possible. Mr Creevy said the virus had the ability to avoid detection and spread but was not 'seriously destructive'. He said it could become damaging if an expert could disassemble the virus and change the instructions to wipe the computer's disk. "I'd say there's people working on it somewhere although probably not in Australia," Mr Creevy said. An expert would have created the Frodo virus because it had only one bug while most viruses had more. Mr Creevy said more than 100 viruses were believed to exist worldwide. ENDS Brian Wendt Sysop SUNMAP BBS --- Maximus-CBCS v1.02 * Origin: Sunmap BBS Node 5 (HST/DS) - Brisbane - Australia (3:640/206) Msg#: 3182 *Virus Info* 08-28-90 19:33:00 (Read 7 Times) From: SANDY LOCKE To: PATRICK TOULME Subj: REPLY TO MSG# 3177 (RE: HAVE ANYONE TRIED SECURE ?) MM> Maybe I should say all virus that are in the "public domain". MM> Virus 101 is a research virus that only a few people have (and MM> you wrote). Nothing is fool proof but Secure is better than any MM> other interrupt moniter. PT> PT> I agree with you, Mike. and I have to concur with patrick, out of all the TSR type monitor programs out there , SECURE is indeed the best of the group... BUT PLEASE do NOT depend upon this as your ONLY protection... as on part of a multilayered protection scheme it would be fine... I guess my real problems with it stem from the NAME the Mark wasburn has chosen...it can mislead the neophyte too easily...into thinking that it really is the be-all and end-all of protection...I wouldnt hestitate to recommend it over the socalled commercial products in this class... BUT again NOT as a SOLE protection against viruses... sorry for any confusion my comments may have caused... cheers sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3183 *Virus Info* 08-28-90 19:35:00 (Read 6 Times) From: SANDY LOCKE To: ALAN DAWSON Subj: REPLY TO MSG# 2749 (RE: VIRUS SCANNERS....) DS> You can't win on this! I've been downloading for quite a while DS> - always running a virus checker on the information. So, where DS> did our virus come from? Off a shrink-wrapped anti-virus DS> diskette one of our guys picked up in the US! AD> Nothing new about this, as people learn all the time. One MAJOR AD> company (really big, really well known) has shipped shrink-wrapped AD> viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs AD> out. UH ALAN... you mind sending the NAME of this vendor via private e-mail... accidentally I can understand BUT ON PURPOSE??? what end would this kind of action serve??? cheers sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3184 *Virus Info* 08-28-90 19:44:00 (Read 6 Times) From: SANDY LOCKE To: KEN DORSHIMER Subj: REPLY TO MSG# 2905 (RE: CRC CHECKING) well close... without discussing HOW its done... the file length is altered back to the original length... its not that hard and does point out one of the MAJOR problesm with crc scanners...that is that the critical information that tells the operating system how long the file is can be altered at will... as far as the comments of a virus author disassembling the CRC package its commonly done during product testing to find out ahead of time what algorithms are in use by the product... it really depends on the level of security one wants for ones PC... I really wouldnt put it past a good virus author to specifically target anti-viral programs in this fashion... as far as disassemblies being hard... well I do an average of 5-6 per day with files ranging in size from 2k to 90k(although I will admit that some of the trickier ones do cause head scratching occasionally...) note that i said programs and not specifically viruses... cheers sandy --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3185 *Virus Info* 08-28-90 19:53:00 (Read 6 Times) From: SANDY LOCKE To: TOM PREECE Subj: REPLY TO MSG# 2911 (RE: REMAPPING...) TP> As you may see by looking at my other entry's, I have been loading a c TP> program that is clearly implementing software to remap my keys to s ce TP> extent. If this is possible as a glitch, its is obviously possible as TP> attack. Let's hope it never comes to that. Tom, without adding too much fuel to any fire... certain non-communication programs are susceptible to the ANSI programmable attack... on my end I run no program that implements ANSI3.64 terminal control language without having a way to turn thoses "FEATURES " off... certain programs without mentioning brand names do allow this. if the echo moderator allows I will post a list of good and bad programs in this regard... so that you can all protect yourselves better...(n.b. after being chewed out by the moderator I am constraining my comments carefully...) cheers sandyp.s. these attacks have been common since programmable terminals came into being during the middle 1970's the problem is that when these features were implemented in comm programs the possibility arose that it was possible for malicious individuals to finally do some real damage...the way to protect yourself is to STOP using programs that implement such features and switch to others that are more secure in their usage of such features... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3186 *Virus Info* 08-29-90 05:44:00 (Read 6 Times) From: PATRICIA HOFFMAN To: SANDY LOCKE Subj: REPLY TO MSG# 3185 (RE: REMAPPING...) SL> attack... on my end I run no program that implements ANSI3.64 SL> terminal control language without having a way to turn thoses "FEATURES SL> " off... certain programs without mentioning brand names do allow SL> this. if the echo moderator allows I will post a list of good and bad SL> programs in this regard... so that you can all protect yourselves SL> better...(n.b. after being chewed out by the moderator I am SL> constraining my comments carefully...) Please feel free to go ahead and post the list. Was just trying to keep you out of trouble, you do sometimes get over excited in messages...didn't mean for it to be "chewing out". Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3187 *Virus Info* 08-29-90 06:27:00 (Read 7 Times) From: PATRICIA HOFFMAN To: PHILLIP LAIRD Subj: REPLY TO MSG# 2996 (RE: ONTARIO VIRUS) PL> Nope, I don't have the Ontario Virus that I know of! I read about the PL> Virus after I had posted to you, Thanx for the info. Nice to know PL> where it loads in Mem, that would make a util easier to write once I PL> had a fix on what you have already told me. PL> Ontario loads into the top of free memory, right below the 640K boundary. It takes up 2,048 bytes. If you run chkdsk after it is in memory, both total system memory and free available memory will have decreased by 2,048 bytes. Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3326 *Virus Info* 08-30-90 15:05:00 (Read 6 Times) From: KEN DORSHIMER To: SANDY LOCKE Subj: REPLY TO MSG# 3184 (RE: CRC CHECKING) ...at a time when Western civilization was declining too rapidly for comfort, yet too slowly to be very exciting Sandy Locke was saying: SL> well close... without discussing HOW its done... the file length is SL> altered back to the original length... its not that hard and does SL> point out one of the MAJOR problesm with crc scanners...that is that interesting why don't you drop me some net-mail on this (see origin line) SL> the critical information that tells the operating system how long the SL> file is can be altered at will... as far as the comments of a virus SL> author disassembling the CRC package its commonly done during product SL> testing to find out ahead of time what algorithms are in use by the i think that's one of the things i mentioned; that they would have to have pre-existing knowledge of the crc scheme in order to make that work. SL> product... it really depends on the level of security one wants for SL> ones PC... I really wouldnt put it past a good virus author to SL> specifically target anti-viral programs in this fashion... as far as one of the reasons i am interesting in developing my own anti-viral utils for my software business. i figure if they stay primarily in house, the chance that some bozo will screw around with them and try to break them is reduced. SL> disassemblies being hard... well I do an average of 5-6 per day with SL> files ranging in size from 2k to 90k(although I will admit that some SL> of the trickier ones do cause head scratching occasionally...) note SL> that i said programs and not specifically viruses... cheers sandy heh, yup source to assembled is always easier than the reverse process, of course there's head scratching that goes on at that end too. :-) the client said he wanted it to do what?! ...just part of the food chain... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 3327 *Virus Info* 08-29-90 11:37:00 (Read 6 Times) From: PAUL FERGUSON To: EVERYONE Subj: FLOPPY MBR BACKUP I had originally posted this question to the moderator, but after a little thought decided that I would be sure to receive a myriad of answers from the ECHO participants if asking the question here, also..... It is simply this: Does anyone have any decent (and simple) suggestions for extraction of the floppy MBR???.....There are several very good utilities in the public domain for strictly Hard Drive Boot Sector (ie. ST0) and other utilities contained within, say for instance, PCTools, that can back-up the HARD Drive Partition Table (I forgot to mention several PD programs to back-up the FAT).....But, almost all of these that I have seen pertain to the HDU! I realize that there are ways to write it to a file using certain SPY-type programs, but what I am really interested in is a simplified program that is easy to use at the lowest end of the USER pyramid -Thanks in advance for your suggestions and assistance..... -Paul ^@@^......... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3328 *Virus Info* 08-29-90 18:46:00 (Read 6 Times) From: PAUL FERGUSON To: EVERYONE Subj: STEALTH FAMILY I have read with great interest the July editions of VIRUS-L digest (along with about the first week or so of August) and cannot, for the life of me, figure the almighty hype with The (noticed that I capitolized that!) Stealth Family of Virus....Only a Trojan should deserve such attentention.....If one takes appropriate precautionary measures, then the virus will (theoretically) be caught in memory.. ...that is, it will make (and reside) a noticeable difference in vectoring.....I truly believe WAY too much hype (Ok, maybe that is a little strong!) has been given to this.....Yes, it can be a true menace if one does not expect such a rogue, but come on.......I downloaded some code today....Yes, I must say it IS quite ingenius, but at the same time, I must also say, I enjoy the work I do, etc.... PS.....Patrick Toulme, Check your E-Mail.... ........"The Delicate Sound of Thunder"....... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3329 *Virus Info* 08-29-90 22:07:00 (Read 6 Times) From: PAUL FERGUSON To: EVERYONE Subj: LATENITE Ok, so we're up again in the pale moonlite (unquote)... Next question (in paticular, to you, Sandy) is: What diverse opinions do you have concerning those that, also, fight the battle on the front lines (I'm noy alluding to who has any more experience, to wit)...I feel that many of us (Tech Support/Slash/Gov't Contractors)(No, We're not scum, nor unknowledgable) have done much to benefit the Anti-Viral Research Community.....I would like a little input on this topic..... .......We're not all BAD guys!........ --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3330 *Virus Info* 08-31-90 13:05:00 (Read 6 Times) From: HERB BROWN To: ALL Subj: PKZ120.ZIP I was informed that there is a bad version of PKZIP floating around by the name of PKZ120.ZIP.. I am not sure if it is viral or not, but delete it if you find it.. --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 3331 *Virus Info* 09-01-90 11:34:00 (Read 7 Times) From: DEREK BILLINGSLEY To: ALL Subj: POSSIBLE VIRUS? This just hit me today - I am not sure if it is some kind of system error or a potential virus. Last night (September first) and before gave me no indication of any virus being present on my system. It is now september 1st and now, whenever a file is written to disk (I noticed the text files first, but a downloaded zip'd file was also garbled...) it took out about 10 bytes from the beginning of each line... When I realized this may be set to occur on this date, I set my DATE back a night and everything worked fine... I made a sample text file with a known pattern of characters -- any date past september 1st 1990 leaves the file altered as mentioned above. Any date previous is written unharmed... SCANV56 reports only that the SCAN program is damaged - no disk presence of the source is evident. Has anyone heard of something like this happening? Derek Billingsley --- SLMAIL v1.36M (#0198) * Origin: Atlantic Access SJ/NB 1-506-635-1964 HST You can Run With Us ! (1:255/1) Msg#: 3354 *Virus Info* 08-29-90 09:02:00 (Read 6 Times) From: CY WELCH To: SANDY LOCKE Subj: REPLY TO MSG# 2759 (KEYBOARD REMAPPING....) In a message to Cy Welch <25 Aug 90 6:39:00> Sandy Locke wrote: >CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote: > PF> Isn't it possible to remap some (or any) keyboard functions via > PF> communications with some funky ANSI control characters?....I seem to > PF> remember mention of this somewhere.....I really can't remember if was > PF> in the form of a question, though, or an answer.....It also made > PF> mention of PKWares' Safe-ANSI program...Somebody help us out here... >CW> I think most of the "FAST" ansi replacements do not have the keyboard >CW> remapping so that danger is removed in those cases. SL> Well if you are referring to FANSI.SYS by hershey Microsystems it too SL> is vunerable to remap effects... and since it implemnt FULL ANSI 3.64 SL> terminal control codes plus some extensions it is even more vunerable SL> to a whole class of tricks that go way beyond noremally keyboard SL> remapping... but to there credit they ahve include a way to turn this SL> "FEATURE" OFF... just most users get it off a BBS and never order or SL> look at the 50.00 set of docs that come when you pay for the SL> products... Actually I was refering to zansi.sys which is a high speed replacement which part of what they did to do it was to remove the keyboard remapping functions. --- XRS! 3.40+ * Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1) Msg#: 3355 *Virus Info* 08-26-90 15:45:00 (Read 6 Times) From: MIKE MCCUNE To: SANDY LOCKE Subj: SECURE Sandy, Thanks for the information. I suspected that Secure probably had some holes in its protection scheme and that someone knew about it. I am curious about how the modified Jerusalem-B got around it. I'm pretty sure how Virus 101 does it (the Air Force uses it) but I would like to know if there are any other hole in secure... --- Opus-CBCS 1.13 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 3477 *Virus Info* 09-01-90 15:56:00 (Read 6 Times) From: KEN DORSHIMER To: HERB BROWN Subj: REPLY TO MSG# 3330 (RE: PKZ120.ZIP) > > I was informed that there is a bad version of PKZIP floating > around by the name of PKZ120.ZIP.. I am not sure if it > is viral or not, but delete it if you find it.. seem to remember seeing something about this a couple of months ago. mostly, i wanted to drop a line and say "hey". got your net-mail, hopefully if the routing is working right, you got a response. :-) how's new orleans this time of year? later. --- Opus-CBCS 1.12 & NoOrigin 3.7a --- QM v1.00 * Origin: Ion Induced Insomnia (1:203/42.753) Msg#: 3478 *Virus Info* 09-02-90 10:45:00 (Read 6 Times) From: JAMES KLASSEN To: PRAKASH JANAKIRAMAN Subj: REPLY TO MSG# 2909 (LEPROSY) I have a copy of the Leprosy virus along with its source and "documentation". What it does is copies itself to 4 exe or com files each time it is run and produces a memory error code so the user thinks there is a problem with memory and runs it again. After all the com and exe files have been infected, it displays a message that they have a virus and "Good luck!"... It increases file sizes by 666 but when I tested it on a floppy, the bytes didn't increase... --- W2Q v1.4 * Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328) Msg#: 3479 *Virus Info* 09-01-90 07:18:00 (Read 6 Times) From: YASHA KIDA To: PAUL FERGUSON Subj: REPLY TO MSG# 3329 (LATENITE) In a message of <29 Aug 90 22:07:29>, Paul Ferguson (1:204/869) writes: PF> EID:6368 151db0ee PF> Support/Slash/Gov't Contractors)(No, We're not scum, nor PF> unknowledgable) have done much to benefit the Anti-Viral Research PF> Community.....I would like a little input on this topic..... PF> I am a Private contractor for a Large Network installation an support company. I work for the good of the Customer and the population (users). I hear the phrase " SLIMY CONTRACTOR" " M.F.C." everyday. I also heard "Can this be done", "Would you look into this...", "What are your suggestions so I can put them in my report" when things get deep. We are the WHIPPING BOYS and EMERGENCY 911 all in one. I am sure there are Software contractors who have planted or released a virus at contract renewal time. To show how much they are needed. There are also those of us the that want to see their job sites safe from such problems. We are the ones who own our time (Non-Paid) Compile information on ways to safe guard our data from compermise or viral attacks. The Anti-Viral reseach done by Mrs. Hoffman (PAT) and John McAfees group is carefully read and evaluated on my end. I am sure it has saved many a rear from a bear trap. --- msged 1.99S ZTC * Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty) (1:151/305) Msg#: 3480 *Virus Info* 09-02-90 19:19:00 (Read 6 Times) From: HERB BROWN To: KEN DORSHIMER Subj: REPLY TO MSG# 3477 (RE: PKZ120.ZIP) With a sharp eye , Ken Dorshimer (1:203/42.753) noted: > > I was informed that there is a bad version of PKZIP floating > around by the name of PKZ120.ZIP.. I am not sure if it > is viral or not, but delete it if you find it.. KD> KD>seem to remember seeing something about this a couple of months ago. KD>mostly, i wanted to drop a line and say "hey". got your net-mail, KD>hopefully if the routing is working right, you got a response. :-) KD>how's new orleans this time of year? later. KD> Hmmmm, first time I heard of this file. How long ago did it appear? Rained Sunday and had to BBQ inside. Made watching TV a little hard, but we managed. --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 3630 *Virus Info* 09-01-90 20:49:00 (Read 6 Times) From: PAUL FERGUSON To: KEN DORSHIMER Subj: REPLY TO MSG# 3326 (RE: CRC CHECKING) Ken... I've GOT to agree with you on this one....only preconceived CRC defeaters are just that...preconceived....no such luck... --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 3813 *Virus Info* 09-01-90 13:11:00 (Read 6 Times) From: KEVIN HIGGINS To: JAMES DICK Subj: SECURING YOUR UPLOADS I've got checkout, and while its a pretty neat program, there are a few things I don't like about it, the main one being the initial memory scan. I also don't like the auto-pause that seems to be at the beginning of it. That means running gateway, which means the user may be able to get into DOS and party. (have heard of Key-fake, but never seen it around to play with it..). TAG calls a file named postul.bat after every upload (if the .bat file is present), so I hacked up this .bat file to auto-check for virii. But I'm not smart enough to know how to use the %%f in a batch file to have it run through for all the files in the active directory (for batch uploads)... Maybe there's a genius out there who can help. FYI the parameters passed to the .bat file are: [Baud] [ComPort] [User#] [U/L Dir] [Filename]. Here it is. Chuckle, then help make it better . echo off cd\bbs\uploads echo Verifying latest Pkzip version...... > com2 REM This program checks file integrity. ozf -v %5 > com2 echo : > com2 REM These are the directories I don't want checked. if %4 == D:\ZIPSTUFF\WRITERS\ goto end if %4 == D:\ZIPSTUFF\AMIGA goto end echo Testing file integrity, and checking for virii. > com2 echo Please wait..... (this is the scary part, eh?) > com2 echo : > com2 echo Moving the suspect file to a sterile cell for interogation.... > com2 REM This moves the file to an empty directory for the examination. move %4%5 d:\bbs\bads echo File is now undergoing interrogation... > com2 cd\bbs\bads pkunzip -x D:\bbs\bads\%5 *.exe *.com > com2 scan d:\bbs\bads\*.exe /NOMEM > com2 scan d:\bbs\bads\*.com /NOMEM > com2 if errorlevel 1 goto Oops echo Alright! (whew) File passed. > com2 del *.exe del *.com echo Almost finished. Releasing innocent file back into public. > com2 move %5 d:\bbs\uploads echo : > com2 echo Now adding (Nested) zip comment to file... > com2 cd\ REM This adds the Hornet's Nest comment to the .Zip file. call d:\commentr.bat cd\bbs echo Thanks for waiting!.. goto end :Oops echo Arrrrgghhhhh! File had a virus! File deleted! > com2 erase *.* echo Logging your name to Scumbag.lst! > com2 echo Hey, Kato! User number %3 tried to upload a virus infected file! >> d:\fd\scumbag.lst echo Maybe you need to leave a message to Kato, eh? > com2 cd\bbs :end (Note: the fourth line from the end is a continuation of the line above it.) Also, I have a program that will make a .com fil out of a .bat file, for faster processing. Any reason why this couldn't be done with the above .bat file? How about after the %%f is added? Kevin --- TAGMAIL v2.40.02 Beta * Origin: The Hornet's Nest BBS (1:128/74) Msg#: 3814 *Virus Info* 09-03-90 23:40:00 (Read 5 Times) From: RICK THOMA To: HERB BROWN Subj: REPLY TO MSG# 3480 (RE: PKZ120.ZIP) > Hmmmm, first time I heard of this file. How long ago did it > appear? I have a copy, and think it came out around March, or so. At the time, SCANV detected no virus, but I thought better of running it. Sorry, folks. Whatever it is, it isn't available for downloading, so please don't ask. I'm just waiting for the time to pick it apart, to see just what kind of hack it is. --- FD 2.00 * Origin: Village BBS, Mahopac, NY 914-621-2719 *HST* (1:272/1) Msg#: 3815 *Virus Info* 09-03-90 03:38:00 (Read 5 Times) From: KEN DORSHIMER To: PAUL FERGUSON Subj: REPLY TO MSG# 3630 (RE: CRC CHECKING) ...at a time when Western civilization was declining too rapidly for comfort, yet too slowly to be very exciting Paul Ferguson was saying: PF> Ken... I've GOT to agree with you on this one....only preconceived CRC PF> defeaters are just that...preconceived....no such luck... PF> that's what i figured. that is if you're responding to the msg i think you're responding to. what the hell does that mean? ...space is merely a device to keep everything from being in the same spot... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 3816 *Virus Info* 09-03-90 18:03:00 (Read 5 Times) From: KEN DORSHIMER To: HERB BROWN Subj: REPLY TO MSG# 3814 (RE: PKZ120.ZIP) ...at a time when Western civilization was declining too rapidly for comfort, yet too slowly to be very exciting Herb Brown was saying: HB> Hmmmm, first time I heard of this file. How long ago did it appear? HB> Rained Sunday and had to BBQ inside. Made watching TV a little hard, HB> but we managed. i think it was a couple of months ago. which means any mention of it has long since been renumbered off my system. yup BBQing indoors does have a certain mystique. i know dinner is ready when the smoke alarm goes off. ...space is merely a device to keep everything from being in the same spot... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 3817 *Virus Info* 09-03-90 18:08:00 (Read 7 Times) From: KEN DORSHIMER To: DEREK BILLINGSLEY Subj: REPLY TO MSG# 3331 (RE: POSSIBLE VIRUS?) ...at a time when Western civilization was declining too rapidly for comfort, yet too slowly to be very exciting DEREK BILLINGSLEY was saying: DB> This just hit me today - I am not sure if it is some kind of system DB> error or a potential virus. DB> DB> Last night (September first) and before gave me no indication of any DB> virus being present on my system. It is now september 1st and now, DB> whenever a file is written to disk (I noticed the text files first, DB> but a downloaded zip'd file was also garbled...) it took out about 10 DB> bytes from the beginning of each line... DB> could you send a copy of what you believe is infected to me? i'd like to analyse this myself, thanks. my address is: Dorshimer Software Systems P.O. Box 191126 Sacramento, Ca. 95819-1126 USA ...space is merely a device to keep everything from being in the same spot... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 3818 *Virus Info* 09-03-90 20:57:00 (Read 4 Times) From: JOHN HERRBACH To: ALL Subj: PUBLIC KEY ENCRYPTION Does anyone know the status or progress in regards to public key encryption? Thanks. John {|-) --- ME2 * Origin: The Lighthouse BBS/HST; Lansing, MI; 517-321-0788 (1:159/950) Msg#: 3819 *Virus Info* 09-01-90 20:26:00 (Read 5 Times) From: SEAN SOMERS To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 3186 (RE: REMAPPING...) Off topic here, anybody out there encounter the French Revoloution virus? I was the first out here to discover it. What it does is nuke your HD while displaying an anti Western/English speaking Canadians. --- outGATE v2.10 # Origin: SIGnet International GateHost (8:7501/103) * Origin: Network Echogate (1:129/34) Msg#: 3938 *Virus Info* 09-06-90 11:51:00 (Read 13 Times) From: YASHA KIDA To: SKY RAIDER (Rcvd) Subj: REPLY TO MSG# 2995 (RE: VIRUS ORIGINALS) GLAD TO SEE SOMEONE does their homework... Well written.. If you don't mind I wish to post it as a bulletin on my System (BBS).. Re written to as a document instead of a msg reply... ' Yasha sysop 151/305 "What do you do when all of your users are in the sand lands, without a phone." --- Maximus-CBCS v1.00 * Origin: Bragg IDBS, We hunt bugs for the 82nd Airborne (1:151/305) Msg#: 3974 *Virus Info* 09-08-90 13:42:35 (Read 5 Times) From: SKY RAIDER To: YASHA KIDA Subj: VIRUS POST ON BBS Yasha, You write: GLAD TO SEE SOMEONE does their homework... Well written.. If you don't mind I wish to post it as a bulletin on my System (BBS).. Re written to as a document instead of a msg reply... Sure, no problems in rewritting and posting on your system. I try not to enter into this type of a conversation without at least a bit of a footing in fact. I wish I could find the original document I had quoting these things (it had names, dates, etc.). How about giving me your system number so I can call and see the finished form (never been quoted in this manner before). A questor of knowledge, Sky Raider Ivan Baird, CET --- TBBS v2.1/NM * Origin: Northern Connection, Fredericton, N.B. Canada (1:255/3) Msg#: 4025 *Virus Info* 09-06-90 13:32:00 (Read 6 Times) From: JONO MOORE To: JOE MORLAN Subj: REPLY TO MSG# 3157 (LHARC114?) JM >I had heard that and infected version of LHARC was released JM >last year under the name LHARC114. I also heard that JM >because of that, the next release of LHARC was expected to JM >be LHARC200 to avoid confustion with the virus. This week a JM >file appeared on a local board called LHARC114. I left a JM >message to the sysop to check it out and he says it's clean. JM >The docs say that this is version 114b, the latest version. LHARC v1.14b is a real release. The author brought it out after the controversy on the fake 1.14 release. --- outGATE v2.10 # Origin: SIGnet International GateHost (8:7501/103) * Origin: Network Echogate (1:129/34) Msg#: 4026 *Virus Info* 09-05-90 19:47:00 (Read 5 Times) From: PATRICIA HOFFMAN To: PAUL FERGUSON Subj: LET ME REPHRASE THAT..... PF> Actually, I really should have said "virtually preconceived". PF> From what I can gather on the topic (I don't yet have a copy of 4096), PF> they actually redirect CRC/Checksum interrogators to a "snapshot" of PF> the original file as it appeared before infection.(Someone, I'm sure, PF> will correct me if I'm wrong or at least add enlightenment.) You are correct.....What the CRC/Checksum interrogator sees, if 4096 is in memory, is the disinfected version of the program in memory, not what is actually out on disk. Fish 6 also does this, as do a couple of other viruses using Stealth techniques. PF> The infected file, in the case of 4096, has in reality grown by 4096 PF> bytes and would more than likely hang the system, therefore, which PF> would lead me to believe that running the CRC check without the virus PF> TSR would allow you to identify the actual infected files. Also, it PF> seems like the only way to catch it TSR is to trace the interrupt PF> vectors (although everyone seems to have a little bit of differing PF> ideas on this '->) Lots of 4096 infected files will run without hanging the system....the virus disinfects the program when it is read into memory so that anti-viral packages can't find the virus as easily. CRC checkers and scanners won't be able to find it in the infected file if the virus is in memory, in fact, these viruses usually infect on file open as well as execute. Run a CRC checker or Scanner that doesn't check memory for the virus with it present and you'll infect everything that is openned that meets its infection criteria. If the virus isn't in memory, the CRC checker technique will work to identify the infected files in 99% of the cases. I'm not going to say 100% because I believe some of the 512 virus variants can get around it due to the way it attaches to the files in some cases, but not all. Some CRC checkers don't actually CRC the entire file either....and as soon as I state it is a fool proof way of doing it, someone will write a virus that gets around it perfectly in all cases. Patti PF> Until I can get my hands on this little fellow, I guess that I'll PF> just follow the more logical explanations from the sources with PF> credibilty and make a judgement from that! Sounds credible. But, as I'v PF> said before- I sure would like to see it. PF> PF> I've been following several different message base threads on PF> this particular virus, with input from users at the basic levels to BBS PF> SysOps to the AntiViral research community.......I must say, it gets PF> overwhelming at times to keep objective. *:) PF> PF> -Paul PF> PF> PF> --- QM v1.00 PF> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 PF> (1:204/869.0) PF> --- W2Q v1.4 * Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328) Msg#: 4027 *Virus Info* 09-07-90 12:48:00 (Read 4 Times) From: MICHAEL ADAMS To: RICHARD HUFFMAN Subj: RE: ARC.EXE Thank you for the warning .... Kill keep an eye out for it. --- Maximus-CBCS v1.00 * Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1) Msg#: 4028 *Virus Info* 09-07-90 20:21:00 (Read 5 Times) From: HERB BROWN To: JONO MOORE Subj: REPLY TO MSG# 4025 (LHARC114?) JM >I had heard that and infected version of LHARC was released JM >last year under the name LHARC114. I also heard that JM >because of that, the next release of LHARC was expected to JM >be LHARC200 to avoid confustion with the virus. This week a JM >file appeared on a local board called LHARC114. I left a JM >message to the sysop to check it out and he says it's clean. JM >The docs say that this is version 114b, the latest version. JM>LHARC v1.14b is a real release. The author brought it out after the JM>controversy on the fake 1.14 release. JM> Now, how is someone going to know the difference? That is about as dumb as BBQ'ing indoors and forgetting to open the windows... Sheesh.. --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 4029 *Virus Info* 09-07-90 20:25:00 (Read 4 Times) From: HERB BROWN To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 4026 (LET ME REPHRASE THAT.....) PH>can't find the virus as easily. CRC checkers and scanners won't be PH>able to PH>find it in the infected file if the virus is in memory, in fact, these PH>viruses PH>usually infect on file open as well as execute. Run a CRC checker or PH>Scanner PH>that doesn't check memory for the virus with it present and you'll PH>infect PH>everything that is openned that meets its infection criteria. I seem to be missing something here. As I understand it, to check for virii with a scanner, such as SCAN, or whatever, you boot from a uninfected floppy that has scan residing on it. Ok, now, how would a virus that works as a TSR, that probably is loaded from the boot sector from the hard disk be loaded, if you are booting from the floppy? Which, the floppy being write protected, of course, would not have this viral infection. I was under the assumption that the BIOS first checked drive A: at bootup for a disk, etc. It seems that it would be impossible to find a virii in memory with this type of scheme.. Please enlighten me.. --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 4030 *Virus Info* 09-07-90 17:03:00 (Read 5 Times) From: TALLEY RAGAN To: MIKE MCCUNE Subj: REPLY TO MSG# 2910 (RE: REMOVING JOSHI) In a message to Talley Ragan <09-04-90 16:04> Mike Mccune wrote: MM>>I have posted a new version that checks for the virus MM>>before MM>>trying to remove it (now that I have a working copy of the MM>>virus). It will not damage the partition table on MM>>uninfected MM>>hard disks.... Thanks for the information. This was very educational, as I have had one case of a virus. I don't know how it workedbut the screen would show all garbage and then the computer would hang. I low level formatted the hard disk and restored from good backups. I sure would like to know how it got to me and where it came from!!... Thanks again. Talley --- ZAFFER v1.01 --- QuickBBS 2.64 [Reg] Qecho ver 2.62 * Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9) Msg#: 4031 *Virus Info* 09-05-90 21:23:00 (Read 5 Times) From: TOM PREECE To: HERB BROWN Subj: REPLY TO MSG# 3816 (RE: PKZ120.ZIP) I seem to remember running into this file several months ago. I don't remember concluding that it had a virus - just that it didn't work properly. The sysop on the sytem that had it apparently reached the same conclusion or something similar because it disappeared here (SF Bay Area.) --- TBBS v2.1/NM * Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208) Msg#: 4032 *Virus Info* 09-06-90 19:15:00 (Read 5 Times) From: KEN DORSHIMER To: PAUL FERGUSON Subj: REPLY TO MSG# 4029 (RE: LET ME REPHRASE THAT.....) ...at a time when Western civilization was declining too rapidly for comfort, yet too slowly to be very exciting Paul Ferguson was saying: PF> Ken- This is a continuation of msg.# 156 (I dropped the just FYI the msg numbers don't have much bearing here. on my system is was #75 or something. :-) PF> don't yet have a copy of 4096), they actually redirect CRC/Checksum PF> interrogators to a "snapshot" of the original file as it appeared PF> before infection.(Someone, I'm sure, will correct me if I'm wrong or interesting. seems there would be some simple method of circumventing what the virus does. (i don't have a copy of that one yet either) PF> system, therefore, which would lead me to believe that running the CRC PF> check without the virus TSR would allow you to identify the actual PF> infected files. Also, it seems like the only way to catch it TSR is to PF> trace the interrupt vectors (although everyone seems to have a little i've always thought that by having your own tsr grab the interupts first might be a good way to stop unwanted tsr's from grabbing them. (i'm sure someone will argue the point tho) ...space is merely a device to keep everything from being in the same spot... --- ME2 * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753) Msg#: 4278 *Virus Info* 09-08-90 13:51:00 (Read 5 Times) From: DUANE BROWN To: PHILLIP LAIRD Subj: REPLY TO MSG# 3813 (SECURING YOUR UPLOADS) PL>present. I have the Key fake program if it will help you! PL>That file will enter the "Y or N" Question when the batch PL>file comes to Are you sure? Y or N. Meaning you had the PL>batch file to delete all programs in the temp check That's easy to fix the problem about del *.* -- just do echo y | del *.* then the Y gets placed in there automatically...no keyfake, nothing! --- * Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16) Msg#: 4279 *Virus Info* 09-07-90 12:45:00 (Read 5 Times) From: CHARLES HANNUM To: PHILLIP LAIRD Subj: REPLY TO MSG# 4031 (RE: PKZ120.ZIP) >Didn't someone say that because someone had already hacked an earlier >version of PKZIP that 120 would be the next scheduled release? >Anybody have any info? Yes. Phil Katz said it. --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) Msg#: 4280 *Virus Info* 09-08-90 10:49:00 (Read 4 Times) From: JAMES BARRETT To: ALL Subj: SEPTEMBER 18-20, 1990 I have heard somebody mention that there will be a major virus in the next couple of weeks. What's the scoop? I'm involved in a college campus computer lab and need to know what's coming and how to prepare for it. Will ScanV66 catch it???? Thanks in advance... --JCB --- XRS 3.40+ * Origin: >- c y n o s u r e -< 919-929-5153 (RAX 1:151/501.14) Msg#: 4281 *Virus Info* 09-08-90 17:39:00 (Read 4 Times) From: HERB BROWN To: KEN DORSHIMER Subj: REPLY TO MSG# 4032 (RE: LET ME REPHRASE THAT.....) With a sharp eye , Ken Dorshimer (1:203/42.753) noted: KD>i've always thought that by having your own tsr grab the interupts KD>first KD>might be a good way to stop unwanted tsr's from grabbing them. (i'm KD>sure KD>someone will argue the point tho) Depends on who got there first, I would presume.. Also, multiple TSR's would be a nightmare, colliding and such. --- QM v1.00 * Origin: Delta Point (1:396/5.11) Msg#: 4535 *Virus Info* 09-07-90 08:04:00 (Read 4 Times) From: PAUL FERGUSON To: DOUG EMMETT Subj: SCAN FROM C: Hello, Doug.... Doug, I must tell you that it is not advisable to run ViruScan from your hard disc....It really should ALWAYS be run from a WRITE PROTECTED FLOPPY....Scan can become easily infected when ran in an infected environment on a HD. BTW....Software that "Write Protects" you r hard disc may work in some cases, but can be circunvented. Be safe..... -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4536 *Virus Info* 09-07-90 08:06:00 (Read 4 Times) From: PAUL FERGUSON To: LONNIE DENNISON Subj: WELCOME... Glad to have you........ Welcome aboard.... -Paul ^@@^........ --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4537 *Virus Info* 09-07-90 08:09:00 (Read 4 Times) From: PAUL FERGUSON To: RICHARD HUFFMAN Subj: REPLY TO MSG# 4027 (ARC.EXE) Richard, Please E- me out of the conference....I would like to discuss this a little further......Better yet, contact me at the NCSA BBS in DC (202) 364-1304 at 1200/2400, 8,N,1.....I can be reached in the VIRUS Conference.....Thanks, -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4538 *Virus Info* 08-16-90 08:30:00 (Read 5 Times) From: ALAN DAWSON To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 3183 (RE: VIRUS SCANNERS....) PH> I just wish the people writing this viruses would find more PH> useful things to do with their talents....such as trying to PH> help people instead of harm their systems. Hear, hear! The frustrating, rug-chewing, desk-beating, monitor-smashing, stomp-down crying SHAME is that some of these viruses, on a technical level, are tremendously slick, wonderous programs. The people writing them are wonderful programmers. Just think what these people could be doing to help our PCs work better by writing a different kind of program -- and, potentially, how much money they might be able to make. They obviously have inventive minds, many of them. Such inventiveness could be put to such great use. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4539 *Virus Info* 08-16-90 08:36:00 (Read 5 Times) From: ALAN DAWSON To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 4538 (RE: VIRUS SCANNERS....) PH> I'd agree with that. The anti-viral program should be able to PH> detect that it is infected and produce a warning, though it may PH> still execute. By the time the anti-viral program has PH> determined its been infected, you've already infected system PH> memory or spread the virus. Sure. Something ELSE has infected it. No reason not to let it run so long as it still works. One of our local youngsters wrote a wonderful remover of the Dark Avenger -- about 1400 bytes and worked like a charm. Only one teensy-weensy trouble -- the remover got infected and didn't warn you. That's not really one of the more useful programs to have around. Since it seems to be the constant topic of conversation here, SCANV's routine of warning of infection and continuing its duties is great. A common cause of re-infection is forgetting to remove the tools you used in the disinfection process -- stuff like LIST, just for example, that you might have used to examine the virus. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4540 *Virus Info* 08-16-90 08:52:00 (Read 5 Times) From: ALAN DAWSON To: MICHAEL TUNN Subj: REPLY TO MSG# 2899 (RE: WHAT'S THE SOLUTION?) MT> It seems to me our Virus checking programs will just get bigger MT> and bigger as more viruses and strains of the same viruses are MT> discovered. If so (and if their development is excelerating) Right. Question of the Year (1991??): What can you call it after you've hit the SCANV999 wall? MT> Do we do develop new Operating Systems which are far more MT> secure! Well, at least a new DOS which allows 9-character names? Then we could do SCANV9999. [joke]. MT> Do we crawl in a hole and hope it wont happen to us? No, in a metaphor placed in 1970 terms, we get to the airport two hours before flight time for the security checks. And for the same reason, too -- the unwillingness of the many to take the resolve to remove the few. We have, most of us, helped the virus writers build up their existing sick belief that we are willing participants in some kind of game here. They win if they manage to steal our time, programs, disk space and data. They only do it because they had an unhappy childhood, right? One tangible result of allowing them to feed on this warped view is this echo, where we're all trying to get to the airport two hours early for the security check -- AND WE'RE ALL WASTING TWO HOURS because somebody we don't know might try to hurt us. We should have sympathy for Robert Morris, of course, because after all, he was just experimenting and not REALLY trying to hurt anyone, right? I have a one-word, two-syllable response to that but FidoNet policy frowns down upon me for thinking of using it. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4541 *Virus Info* 08-16-90 09:25:00 (Read 4 Times) From: ALAN DAWSON To: KEN DORSHIMER Subj: RE: VIRUSES, WHAT ELSE... KD> not sure on that one, who knows what menagerie of thoughts KD> wander through clients minds.. :-) actually, i was unaware of KD> Corporate Vaccine (maybe I should get out more). I'm a little KD> concerned that the commercial programs may not be aware of some KD> of the newer viruses which crop up from time to time. This is just a thought, too. But why not take your clients into your confidence, and point out to them that it is virtually impossible for anyone to match the up-to-dateness of a BBS distribution system? You're a BBSer. You know, just for example, that without BBSes McAfee couldn't have a program-of-the-week. Distribution of what your clients think of as commercial software simply isn't up to this standard -- isn't meant to be; never was; probably never will be. Seems to me if your clients like the SCANV concept, you should explain to them why they should be using SCANV. Why reinvent the wheel? If it wasn't that commercial messages which mention something other than SCANV often seem to get flamed here, I'd tell you about my commercial, non-BBS, wholly generic virus detector that doesn't need upgrading, which is available in North America and which soon will be launched there. But I don't want to get flamed, so I won't. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4542 *Virus Info* 08-29-90 12:26:00 (Read 5 Times) From: ALAN DAWSON To: KEN DORSHIMER Subj: REPLY TO MSG# 3815 (RE: CRC CHECKING) PH>> Except in the case of Stealth Viruses....CRC checking doesn't work PH>> with them. PH>> KD> i'd have to see that for myself. i think a complex enough KD> algorithm would keep them at bay. the probability factor is KD> just too low for such a stealth scheme to work. Roger that. A program (such as a virus) can possibly figure out a checksum or CRC and "fool" your checker. But complex and random checksumming or CRCing is beyond the real-world possibility of defeat by a PC virus -- it would have to be too big and complex itself. Our strategy on our anti-virus program is to have eight different algorithms, and to use two of them on each checksum pass. Which two, even we do not know. Your virus then would have to take into account 64 reasonably complex algorithmic possibilities to defeat it. Patti is technically correct that this can be done -- but not in the real world. I'd tend to be slightly suspicious if my word processor suddenly grew by the size of THIS virus. Most programs would, in fact, be incapable of loading it. As you say -- make it complex (which isn't so difficult) and keep churning out hundreds of different algorithms. Then you can forget about "stealth" viruses succeeding. - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4543 *Virus Info* 09-01-90 21:26:00 (Read 5 Times) From: ALAN DAWSON To: PHILLIP LAIRD Subj: REPLY TO MSG# 3154 (RE: SCAN WEIRDNESS) PL> Allan, I NEVER SCAN from the C Drive or any hard disk. I PL> always scan from a write protected Floppy Diskette in Drive A. This is absolutely correct, of course, and EXACTLY what's recommended in the doc. I was just curious whether others had had the experience. I do do some experimenting with viruses and anti-virus stuff, because Bangkok's a "virus capital" (dumb dealers plus a whole raft of pirates) and because I'm involved in a commercial anti-virus project. This was just a weird thing that happened to me when I was "playing" with Dark Avenger. I do wonder how many people follow that "write-protected floppy" recommendation (order???) in the SCAN docs, though. One note on your comment: it might be hard for some people to follow the recommendation, i.e. those with one floppy. The total beauty of SCAN, really, is to look over that new stuff. A lot of machines go to new people with one floppy drive. A lot also go with two different floppy drives (my own setup) although this of course is combatted simply by having TWO write-protected diskettes with SCAN aboard. - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4544 *Virus Info* 09-01-90 23:00:00 (Read 5 Times) From: ALAN DAWSON To: SANDY LOCKE Subj: REPLY TO MSG# 3819 (RE: REMAPPING...) SL> long time programmer I can testify the keyboard mapping is SL> really quite simple... no real problem and the business of SL> using terminal control code is quite as simple... SL> sandy Finally, some sanity, sandy. [grin] (no pun intended until after I read that). The letter bomb, as a friend calls it, is alive, well and could certainly flourish. I wouldn't lay a huge amount of money on the ability to write a *virus* with remapping, but a bomb's a piece of cake. I THINK this thread started with the ability to put one directly over a terminal BBS-to-user connection, and in general there seem by my own experiments to be two chances of this: slim and fat. But, like a virus, a letter bomb can be transmitted via a BBS to a user, and then set off by that user in a number of pernicious ways that occur to me right off the top of my head. None of which you will see writ here, you understand -- but after watching this thread for a few weeks, I'm glad you leapt in with both feet. - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4545 *Virus Info* 09-06-90 18:59:00 (Read 5 Times) From: ALAN DAWSON To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 4543 (RE: SCAN WEIRDNESS) PH> There are a couple of possibilities here. First, if the virus PH> is on a non-executable file, such as one with a .VOM or .VXE Nope, wasn't either of these Patti. I tried to put in everything, and then forgot to say it was a regular file called AVENGER.COM -- a small utility I infected to harbor the virus when I ran it for tests. The utility originally was a small screen shell for looking at files a la LIST. It USED to be 3K, but now it's a little bigger [grin] PH> The other case is if your copy of Dark Avenger does not occur PH> at the correct place in the file. Dark Avenger always adds its PH> code to the End Of Programs. If your copy happens to have it at Roger. This is right up against the end of the file. PH> Hope that helps....those are the only three cases that I've PH> heard of a similar problem to yours. OK, no biggie. It was just that it was so weird I thought maybe you'd heard of it. I'll try it again when we get SCAN66B just for fun. It's not the kind of "bug" that's detrimental -- it's just one of those hey-it's-not-supposed-to-do-that things. Stupid machines. - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4546 *Virus Info* 09-06-90 19:00:00 (Read 5 Times) From: ALAN DAWSON To: SANDY LOCKE Subj: REPLY TO MSG# 4539 (RE: VIRUS SCANNERS....) SL> UH ALAN... you mind sending the NAME of this vendor via private SL> e-mail... accidentally I can understand BUT ON PURPOSE??? what SL> end would this kind of action serve??? SL> cheers SL> sandy This was before the Great Virus Scare of 1989 of course -- it was, if my tremendously failing memory isn't failing me, in 1986. A Toronto magazine put the virus in as a joke -- every time you started an infected program, a brief ad for the mag jumped up. Ald. . . whoops, the company name almost slipped out there, thought this was hilarious, left it in and shipped the thing. I'll send full details your way. This same company, the next time it shipped viruses, claimed that a guy in the shipping department was playing a game and accidentally infected the shipment (exclaimer!!!!). Is this a company with a weird sense of security, or what? - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 4746 *Virus Info* 09-09-90 14:33:00 (Read 4 Times) From: CHARLES HANNUM To: PHILLIP LAIRD Subj: RE: MAKING SCAN READ ONLY. > Patti, is it feasible to make Scan.Exe Read only? Doug Emmett was > wondering about doing that. Couldn't you change the archive bits to > read only? Also, doesn't scan have an internal routine to determine > if it is damaged? Setting the "Read-only" attribute wouldn't even *phase* a decent virus, and SCAN's internal checksum is VERY weak. (It quite literally is a checksum. It simply checks to see if all the words in the files add up to 0.) --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) Msg#: 4747 *Virus Info* 09-09-90 07:35:00 (Read 5 Times) From: JERRY MASEFIELD To: CHARLES HANNUM Subj: REPLY TO MSG# 4279 (RE: PKZ120.ZIP) > >Didn't someone say that because someone had already hacked an earlier > >version of PKZIP that 120 would be the next scheduled release? > >Anybody have any info? > > Yes. Phil Katz said it. No, Phil Katz said there WOULDN'T be a 120 release because of the same reason. This would eliminate any confusions between the real and phony versions. Also, Katz is offering a reward for any info leading to the arrest of the perpetrator of this hacking. --- TosScan 1.00 * Origin: On A Clear Disk You Can Seek Forever! (1:260/212) Msg#: 4748 *Virus Info* 09-09-90 23:16:00 (Read 5 Times) From: PHILLIP LAIRD To: CHARLES HANNUM Subj: REPLY TO MSG# 4747 (RE: PKZ120.ZIP) ** Quoting Charles Hannum to Phillip Laird ** >Yes. Phil Katz said it. > >--- ZMailQ 1.12 (QuickBBS) > * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) ** End of Quote ** That is what I thought. As soon as he went and said it, somebody appearently decided to hack it, huh? --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 4749 *Virus Info* 09-08-90 17:42:00 (Read 4 Times) From: PAUL FERGUSON To: KEN DORSHIMER Subj: YEAH, BUT... You're on the right track, Ken....But TSR's have a nasty habit of fighting for control amongst each other. Some do not behave very well. -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4750 *Virus Info* 09-09-90 08:43:00 (Read 6 Times) From: PATRICIA HOFFMAN To: PHILLIP LAIRD Subj: JERUSALEM B AND CLEANP64.ZIP PL> I cleaned 17 infected files today with clean version 64. I have a good PL> question. While the program removes the file, some where removed the PL> first time around, others were scanned several times before the virus PL> was actually removed. Can you tell me why? The programs that were scanned several times probably were infected multiple times with Jerusalem virus. A lot of the variants of Jerusalem B will infect .EXE files repeatedly, eventually the program will get too large to fit into memory. On files that are infected multiple times with Jerusalem, you'll see a message come up for each infection as it is removed. That is my guess as to what you observed... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4751 *Virus Info* 09-09-90 11:01:00 (Read 5 Times) From: PATRICIA HOFFMAN To: HERB BROWN Subj: REPLY TO MSG# 4281 (LET ME REPHRASE THAT.....) HB> I seem to be missing something here. As I understand it, to check for HB> virii with a scanner, such as SCAN, or whatever, you boot from a HB> uninfected floppy that has scan residing on it. Ok, now, how would a HB> virus that works as a TSR, that probably is loaded from the boot sector HB> from the hard disk be loaded, if you are booting from the floppy? HB> Which, the floppy being write protected, of course, would not have this HB> viral infection. I was under the assumption that the BIOS first HB> checked drive A: at bootup for a disk, etc. It seems that it would be HB> impossible to find a virii in memory with this type of scheme.. Please HB> enlighten me.. The memory resident viruses that are a real problem when they are in memory and any antiviral, whether a scanner or CRC checker, is run are not boot sector infectors....4096, Fish-6, Dark Avenger, and many others which infect on file open are file infectors. There are three that are file infectors but can also infect and replicate from the partition table and/or boot sector: V2100, Anthrax, and Plastique 5.21. (These last three are extremely rare, fairly new, and not known in the United States.) All of the viruses mentioned about use "Stealth" techniques to avoid detection or infect on file open. If you are booting from an uninfected diskette when powering on the computer, you wouldn't ever find a virus in memory. However, if you are performing a warm reboot from a floppy, you could have a virus in memory still. The real point here was that most people do not run scan or other anti-viral utilities after powering on and booting from a floppy, so it is always possible for the virus to be in memory. In that particular case, for a CRC checker which is what was being discussed, there are definite cases (the "Stealth" viruses) where the virus can get around the CRC checker simply because if the virus is in memory it disinfects the infected programs as they are read into memory. The CRC checker, since it is performing file reads, reads the DOS buffers to check the program, so the program it sees isn't infected and isn't the same as what is actually on the disk. In the case of viruses that infect on file open, running an anti-viral product against all the programs on a system with the virus active in memory can very well result in all the programs becoming infected. I'm not against CRC checkers, I use one all the time on several of my systems. These systems all have master boot diskettes with clean system files, the CRC checker, and the log of all the expected crc values to be returned. Most people simply do not have that type of diskette setup for their systems since they feel they'll never be infected with a virus. In fact, the probability that a person will be infected with a virus is fairly low, though it does change depending on the person's computing habits and how often they exchange diskettes and/or programs with others. I was trying to point out that NONE of the current anti-virals will absolutely protect a user from getting a virus....all the techniques currently used by anti-viral products can be circumvented by some of the newer, more technologically advanced viruses. Not to point that out would be like burying one's head in the sand, especially when the discussion has to do with someone thinkin of writing a new anti-viral who needs to know what can currently be circumvented. It is easier to fix the design before the program is written then to fix it later after the hole is found.... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 4967 *Virus Info* 09-10-90 16:55:00 (Read 5 Times) From: CHARLES HANNUM To: JERRY MASEFIELD Subj: REPLY TO MSG# 4748 (RE: PKZ120.ZIP) >> >Didn't someone say that because someone had already hacked an earlier >> >version of PKZIP that 120 would be the next scheduled release? >> >Anybody have any info? >> >> Yes. Phil Katz said it. > No, Phil Katz said there WOULDN'T be a 120 release because of the > same reason. This would eliminate any confusions between the real > and phony versions. Also, Katz is offering a reward for any info > leading to the arrest of the perpetrator of this hacking. Err, I must have misread the original note... --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) Msg#: 4968 *Virus Info* 09-10-90 17:54:00 (Read 5 Times) From: CHARLES HANNUM To: WHOM IT MAY CONCERN Subj: LHARC 1.14B(ETA) The 'b' is actually a beta, which makes me think he released it for testing and it got loose, but is not yet an "official" release. At any rate, I NEED AN ANSWER!! I have "LHarc 1.14b(eta)", and I really need a definitive answer. IS IT REAL OR NOT? --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0) Msg#: 4969 *Virus Info* 09-10-90 23:13:00 (Read 4 Times) From: PHILLIP LAIRD To: DUANE BROWN Subj: REPLY TO MSG# 4278 (RE: SECURING YOUR UPLOADS) ** Quoting Duane Brown to Phillip Laird ** > >That's easy to fix the problem about del *.* -- just do > >echo y | del *.* > >then the Y gets placed in there automatically...no keyfake, >nothing! > >--- > * Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16) ** End of Quote ** Thanx.... Using the pipe redirection will do just that like you say. I use the KEYFAKE Program for a reason with KEY.DAT in the program I just finished that will check for bugs in uploads. It calls the routine externally from the Execute file. --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 4970 *Virus Info* 09-10-90 23:21:00 (Read 6 Times) From: PHILLIP LAIRD To: ALAN DAWSON Subj: REPLY TO MSG# 4545 (RE: SCAN WEIRDNESS) ** Quoting Alan Dawson to Phillip Laird ** > >This is absolutely correct, of course, and EXACTLY what's recommended > >in the doc. I was just curious whether others had had the experience. > >I do do some experimenting with viruses and anti-virus stuff, >because >Bangkok's a "virus capital" (dumb dealers plus a whole raft >of >pirates) and because I'm involved in a commercial anti-virus >project. >--- Opus-CBCS 1.13 > * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand >(3:608/9.0) ** End of Quote ** I totally agree that most people do not read the docs. I work for a University in South East Texas. Some of the Micros have been plagued with viruses. I have setup a routine for the Labs to Scan the Floppies coming in with SCAN. This has just taken Place. Next thing I know, the clerk decides to run SCAN From her hard drive on her desktop! Then Alameda hit her! The SCAN Program has gone over good at the University. We are getting an order ready for a Site License Agreement with MCafee and Associates. I do a little research on some of the strains. However this BBS keeps me busy after work! Weird thing about CLEAN.EXE the program to remove the Viruses. I am using Clean Version 66 and sometimes the program will scan the file numerous times before the virus is eventually removed. I guess the Marker is trying to move around in the file? Anybody know? --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 4971 *Virus Info* 09-09-90 10:59:00 (Read 5 Times) From: MIKE BADER To: MARC SHEWRING Subj: INFORMATION Several anti-virus programs use signature files. IBM (yech) for one, but VirHUNT by DDI alos uses a file for signatures and goes into quite a bit of detail in their manual. I'll look up a better address and phone. Mike --- FD 1.99c * Origin: P-1 BBS ][ (313) 542-9615 Ferndale, MI (HST) (1:120/45) Msg#: 4972 *Virus Info* 09-06-90 20:56:00 (Read 8 Times) From: CY WELCH To: DEREK BILLINGSLEY Subj: REPLY TO MSG# 3817 (POSSIBLE VIRUS?) In a message to All <01 Sep 90 11:34:00> Derek Billingsley wrote: DB> This just hit me today - I am not sure if it is some kind of system DB> error or a potential virus. DB> Last night (September first) and before gave me no indication of any DB> virus being present on my system. It is now september 1st and now, DB> whenever a file is written to disk (I noticed the text files first, DB> but a downloaded zip'd file was also garbled...) it took out about DB> 10 bytes from the beginning of each line... DB> When I realized this may be set to occur on this date, I set my DATE DB> back a night and everything worked fine... I made a sample text file DB> with a known pattern of characters -- any date past september 1st DB> 1990 leaves the file altered as mentioned above. Any date previous DB> is written unharmed... DB> SCANV56 reports only that the SCAN program is damaged - no disk DB> presence of the source is evident. DB> Has anyone heard of something like this happening? Can't say I have heard of that but it sure sounds like a virus. I would recommend getting a copy of scan v64 and see what it says. It might even be something new. --- XRS! 3.41+ * Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1) Msg#: 4973 *Virus Info* 08-14-90 18:15:00 (Read 5 Times) From: JAMES BLEACHER To: DOUG BAGGETT Subj: REPLY TO MSG# 2904 (ANTI VIRUS VIRUSES) * Replying to a message originally to Patricia Hoffman DB>well..here is a question..where exactly did viruses DB>originate anyway..was it in this country or others? DB>Doug According to want I've read Dr. Fred Cohen at MIT developed the first virus back in 1964 or so. This was to prove that code could actually replicate and spread throughout a mainframe. My question is why on earth would he want to do that in the first place? --- * Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801) Msg#: 4974 *Virus Info* 08-14-90 18:23:00 (Read 5 Times) From: JAMES BLEACHER To: PAUL FERGUSON Subj: REPLY AND ADDENDUM TO MSG 145 * Replying to a message originally to Alan Dawson PF>You can always be sure of an uninfected SCAN IF you download PF>from the PF>authors' BBS....The program itself will terminate upon PF>detection and PF>has safeguards written into it to protect against such PF>occurances....Of PF>course, there are ways for an unsuspecting user (You know PF>who) to PF>infect the programs themselves and then re-archive PF>unwittingly a PF>viral Scan that will never know (depending upon the WRONG! Scan checks itself upon startup and will give you a message to the effect of: FILE DAMAGED! "C:\SCAN.EXE" But will continue to operate. If you see that message then you're in big trouble. Viruses like the Dark Avenger will use scan's file checking (since it opens all the files it's checking) to spread itself all over your floppy/hard drive. Unless you've got a totally new virus that scan can't detect you don't have anything to worry about if it's already infected when you get it. (Except that it's probably detecting the virus all over your drive because it just helped put it there!) --- * Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801) Msg#: 4975 *Virus Info* 09-10-90 18:02:00 (Read 6 Times) From: JAMES BLEACHER To: DEREK BILLINGSLEY Subj: REPLY TO MSG# 4972 (POSSIBLE VIRUS?) DB>SCANV56 reports only that the SCAN program is damaged - no DB>disk presence of the source is evident. DB> DB>Has anyone heard of something like this happening? Well, first of all you've got an old version of scan. Try downloading scanv66b from someone. I have it if you can't locate it elsewhere. Second if scan ever reports being damaged there's a 99% chance that you've got a virus! Better check into it quick! Hope you don't find that you have one but it sure sounds like you do! --- * Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801) Msg#: 5238 *Virus Info* 09-10-90 15:11:00 (Read 6 Times) From: JOE MORLAN To: JONO MOORE Subj: REPLY TO MSG# 4028 (RE: LHARC114?) I have learned from other sources that the latest official release of LHARC is LH113D. The 'new' LHARC114 is said to be another unauthorized hack. It evidently is NOT a virus. Yoshi has been quoted as stating on GENIE that the next official release will be ver. 2.0. I hope this helps. --- Telegard v2.5i Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 5239 *Virus Info* 09-10-90 15:12:00 (Read 6 Times) From: JOE MORLAN To: HERB BROWN Subj: REPLY TO MSG# 5238 (RE: LHARC114?) Exactly. LHARC v1.14b is not a real release. Just another unauthorized hack. --- Telegard v2.5i Standard * Origin: Telegard BBS (000-000-0000) (1:161/88.0) Msg#: 5240 *Virus Info* 09-07-90 20:35:00 (Read 6 Times) From: CHRIS BARRETT To: SIMON FOSTER Subj: RE: MYSTERY VIRUS?? Could I ask wy the buffers would be causing the Boot Block to be altered. I have since removed the val checks using ScanV66B and put some new ones on using ScanV66B. Could it be possible that someone has altered a bit of the code and as ScanV66 uses a string (or is it hex search) it doesn't find it? eg In the Virus it originaly said "Your disk is stoned' and the person converted it to say 'Your disk is now stoned'. If ScanV66 happens to look for the original string to my knowlegde the virus would not be recognized. Chris. --- TBBS v2.1/NM * Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654) Msg#: 5241 *Virus Info* 09-12-90 22:11:00 (Read 6 Times) From: PHILLIP LAIRD To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 4751 (RE: LET ME REPHRASE THAT.....) ** Quoting Patricia Hoffman to Herb Brown ** >If you are booting from an uninfected diskette when powering >on the computer, you wouldn't ever find a virus in memory. > However, if you are performing a warm reboot from a floppy, >you could have a virus in memory still. The real point here >was that most people do not run scan or other anti-viral utilities >after powering on and booting from a floppy, so it is always >possible for the virus to be in memory. ** End of Quote ** THat is exactly the way I have found some of the Virii I researched as being. If the virus is present in memory, then it is possible the the file will infect, however, if the Scan Diskette is write protected and the diskette is bootable, Like oyu say. It is BEST to cut the power to the system and then re-boot the system. However, if you wanted to go a step further, it is possible to clear all volatile RAM if you want to do a warm boot. The Warm Boot can result in infection, since the ram is not cleared. The various hardware interrupts are still performed and cotrol passed to Command.com, but the System files are still present in memory, along with a virus possibly. Too many people are now taking the virus issue too lightly. It can effect you, take precaution and use the Floppy to boot up on with a Write Protect on the Diskette. Then scan the drive from there. --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 5242 *Virus Info* 09-12-90 22:16:00 (Read 6 Times) From: PHILLIP LAIRD To: PATRICIA HOFFMAN Subj: RE: JERUSALEM B AND CLEANP64.Z ** Quoting Patricia Hoffman to Phillip Laird ** > PL> I cleaned 17 infected files today with clean version 64. > I have a good > PL> question. While the program removes the file, some where >removed the > PL> first time around, others were scanned several times before >the virus > PL> was actually removed. Can you tell me why? > >The programs that were scanned several times probably were >infected multiple times with Jerusalem virus. A lot of the >variants of Jerusalem B will infect .EXE files repeatedly, >eventually the program will get too large to fit into memory. > On files that are infected multiple times with Jerusalem, >you'll see a message come up for each infection as it is removed. > > >That is my guess as to what you observed... > >Patti > ** End of Quote ** That is exactly what I had suspected. I assumed the file was re-infected several times as the size of the Original WP.EXE files that were infected once was for example 112K, and the ones that were infected several times was around 173K. Some of the programs were non functional after clean ws performed on the file. We just delte the file and re-copy it when that happens. The only safe way to do it I have found is to go ahead anuse scans' /D option and delete the file and re-copy it. --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 5887 *Virus Info* 09-14-90 14:05:00 (Read 5 Times) From: MIKE MCCUNE To: PATRICK TOULME Subj: MOTHER FISH Everybody was talking about the Mother Fish a few weeks ago. Now that it has been out for mor than a week, nobody is saying anything about it. What's the deal with this virus? --- Opus-CBCS 1.13 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 6048 *Virus Info* 09-14-90 07:05:00 (Read 4 Times) From: JOE MORLAN To: CHARLES HANNUM Subj: REPLY TO MSG# 4968 (RE: LHARC 1.14B(ETA)) According to folks posting on the technical echo, Yoshi has stated on Genie that the next official release after LHarc 1.13c will be LHarc 2.xx. Beta versions of LHarc 2.0 are said to have been released in Japan. It is illogical that 114b would be a valid release. The main change is the same as the known unauthorized hack, ICE. There are a few people on that echo that seem to believe that the release is "real" based mostly on the source where the file had been posted. It seems clear to me that it is just another unauthorized hack. --- Telegard v2.5i Standard * Origin: The Twilight Zone (415)-352-0433 (1:161/88.0) Msg#: 6659 *Virus Info* 09-15-90 08:13:00 (Read 4 Times) From: RICHARD HECK To: ALL Subj: CLEAN UP I think that the newest version of cleanup was alot better then the version before it. Oh and watch out for that Sunday Virus. --- outGATE v2.10 # Origin: SIGnet International GateHost (8:7501/103) * Origin: Network Echogate (1:129/34) Msg#: 6660 *Virus Info* 09-16-90 11:28:00 (Read 5 Times) From: SATYR DAZE To: CHRIS BARRETT Subj: REPLY TO MSG# 5240 (RE: MYSTERY VIRUS??) Sorry to butt in ..... you aparently have been infected by the Stoner-Marijauna Virus , quite a few people here in florida myself included have seen this little beauty. After disinfecting yourself the damaged caused by the virus is unaltered. Backup your harddrive and reformat it, after restoring it. Delete and redo Autoexec.bat and Config.sys they have both also been altered. Your Hardrive should now be back to snuff .... but before i forget run a utility to mark and lock out bad sectors the Virus may have caused. These unfortunaly are not always recoverable. G'Day ....................... The Satyr Daze --- TBBS v2.1/NM * Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2) Msg#: 6661 *Virus Info* 09-16-90 11:39:00 (Read 4 Times) From: SATYR DAZE To: GARY MOYER Subj: REPLY TO MSG# 4546 (RE: VIRUS SCANNERS....) Well you can Download a Virus scanner from a reputable BBS -- one that actually checks all of it's files for viruses --- or go out and purchase a Virus Scanner. Most of the downloadable stuffis by Mcaffe Associates, You can purchase Virucide (commercial version) which checks and disinfects your files, also by Mcaffe Associates for about $30.00. Not a bad buy when you consider the consequences of not having a good scanner. Just make sure that after Downloading a file, unarc-unzip-unwhatever it, But under no circumstance activate it --- run it --. Run the scanner, if the file checks clean go ahead and run it then. If it dosn't the program will warn you and disinfect it. The reason you must open the file (unzip) is because scanners can't look into an archived file. The Satyr Daze --- TBBS v2.1/NM * Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2) Msg#: 6662 *Virus Info* 09-16-90 13:40:00 (Read 4 Times) From: SATYR DAZE To: CHARLES HANNUM Subj: REPLY TO MSG# 4973 (RE: ANTI VIRUS VIRUSES) Actually the Honor of creating Viruses Belongs to John Conway, he was trying to develop software that emulated living organisms. He developed the first "Game of Life". As he created these new programs they became more and more complex having intricate enviroments that the elements would have to over come in order to survive. But these were never allowed to get beyond that scope, Virus programs where never destructive untill the "Core Wars". Opposing Programmers would create self-replicating programms that when they encountered other self-replicaters would try to devour them. Incidently it was called "Core Wars" because the game itself took place in Core Memory . These young Programmers were actually quite small in number and never publicly discussed what they were doing. If any blame is to be attached it should be to Ken THompson who went public with the process in 1983..... at that point it was "Discovered" by university students who began creatingthe real nasties ..... Today many strains are just variation of their original work. Just a little History............... The Satyr Daze --- TBBS v2.1/NM * Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2) Msg#: 6663 *Virus Info* 09-14-90 19:31:00 (Read 5 Times) From: RAJU DARYANANI To: ALL Subj: NETWARE BYPASSING JERUSALEM VIRUS Does anyone have any details on the CERT announcement that it has isolated a version of the Jerusalem virus that can bypass Novell Netware's file protection settings and infect files ? Anyone know of actual infections, how common it is and whether McAfee's SCAN detect this virus ? Raju --- via Silver Xpress V2.24 [NR] --- QM v1.00 * Origin: TAIC Maximus - DVNet Asia, PEP/V.32 High Speed PathFinder (3:700/1.0) Msg#: 6664 *Virus Info* 09-16-90 00:41:00 (Read 4 Times) From: ALAN DAWSON To: PHILLIP LAIRD Subj: REPLY TO MSG# 4970 (RE: SCAN WEIRDNESS) PL> been plagued with viruses. I have setup a routine for the Labs PL> to Scan the Floppies coming in with SCAN. This has just taken PL> Place. Next thing I know, the clerk decides to run SCAN From PL> her hard drive on her desktop! Then Alameda hit her! The SCAN The next "killer-ap" should be the anti-stupidity program. If ever it needed to be proved that "a little knowledge is a dangerous thing," computer users prove it to their techies daily! PL> Weird thing about CLEAN.EXE the program to remove the Viruses. PL> I am using Clean Version 66 and sometimes the program will scan PL> the file numerous times before the virus is eventually removed. I really don't like the whole idea of a "popular" virus remover. (A specific cure for a specific virus on one site is different.) Any yo-yo with PC-Tools or Norton can make a "new" virus and this makes the possible results from a removal program very iffy. I really believe in brute-force removal i.e. DEL VIRUS.COM, and re-install. It's safer that way, and certain (after you check the floppies, of course). - From Thailand, a warm country in more ways than one. --- Opus-CBCS 1.13 * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0) Msg#: 7165 *Virus Info* 08-31-90 20:15:00 (Read 4 Times) From: CHRIS BARRETT To: ALL Subj: BOOKS ON VIRUSES Could someone tell me somenames of books on Viruses and their authors. As I am in Australia getting hold of them may be a problem though. Hope you can help... Chris.. --- TBBS v2.1/NM * Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654) Msg#: 7166 *Virus Info* 08-31-90 20:21:00 (Read 5 Times) From: CHRIS BARRETT To: ALL Subj: REPLY TO MSG# 6660 (MYSTERY VIRUS??) At my school we have some XT's with 2 360K FDD each. Lately we have noticed that some of the students disks are being over written by the program disk they were using. Eg some people have found the Turbo pascal files on their data disks. I brought in a copy of ScanV66 and placed a validation check on the program disks (Not the data disks). Scanning showed no viruses (well known ones anyway). But when we scanned them a week later we found some had had their Boot Blocks altered. In some cases the files on the data disk are just renamed to one on the program disk. Eg we listed "TURBO.EXE" and found it to contain a students pascal source code. Could someone shed some light please.. I have told the teacher it is most likely home grown and he is sh*tting himself. Chris. --- TBBS v2.1/NM * Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654) Msg#: 7167 *Virus Info* 09-01-90 18:28:00 (Read 4 Times) From: DOUG EMMETT To: PHILLIP LAIRD Subj: REPLY TO MSG# 6664 (RE: SCAN WEIRDNESS) For the new boy would you mind explaining how to write protect Scan.Exe on the C: drive-Thanks --- Opus-CBCS 1.13 * Origin: The U.S.A. Connection-*HN-NZ*-(+64-71-566851) (3:772/260.0) Msg#: 7168 *Virus Info* 09-02-90 14:18:00 (Read 4 Times) From: WARREN ANDERSON To: MIKE DURKIN Subj: REPLY TO MSG# 2475 (INTERNET WORM) Hi, No I have never come across the book. I would appreciate it if you could provide a copy of the password list (just in case I can't get hold of a copy of the book). Thanks again. Regards \/\/ /\/\ Anderson --- Telegard v2.5 Standard * Origin: InfoBoard BBS - Auckland - New Zealand (3:772/140.0) Msg#: 7169 *Virus Info* 09-04-90 06:12:00 (Read 4 Times) From: PAUL FERGUSON To: YASHA KIDA Subj: REPLY TO MSG. 134 Right on, Yasha......I couldn't have said it better myself.....This town (DC) seems to have a real problem concerning this. That's OK, though, as you have said, we shall see who they come running to when the going gets rough..... -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 7170 *Virus Info* 09-05-90 12:50:00 (Read 4 Times) From: MICHAEL ADAMS To: RICK THOMA Subj: RE: PKZ120.EXE Rick .. I had one uploaded to my Board called "PKZ120.exe". The File looks Authentic. Even went to the point of -AV and the Pkware registeration number on the last line after self extraction. If it were not for the file "Warning.txt" put out by "Pkware" I'd still be using it. Really went through alot of trouble authenticating it! Michael Adams Baud Horizons (504) 436-9590 --- Maximus-CBCS v1.00 * Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1) Msg#: 7171 *Virus Info* 09-05-90 16:06:00 (Read 4 Times) From: LONNIE DENISON To: ALL Subj: HEY Just letting you know that I have joined my board (The Maze) to this echo.. hope we can contribute some info here! Lonnie Denison --- Telegard v2.5i Standard * Origin: => The Maze <= 916-391-6118 "Would ya Believe" (1:203/60.0) Msg#: 7172 *Virus Info* 09-05-90 18:28:00 (Read 4 Times) From: PHILLIP LAIRD To: KEVIN HIGGINS Subj: REPLY TO MSG# 4969 (RE: SECURING YOUR UPLOADS) Kevin, nice batch file for testing files for virrii. I am now Alpha testing my new program that will work with TAG at present. I have the Key fake program if it will help you! That file will enter the "Y or N" Question when the batch file comes to Are you sure? Y or N. Meaning you had the batch file to delete all programs in the temp check directory. I plan on a new realease of the program to several BBSES that will work to help all Sysops keep out the Virii. If you want Keyfake Program, just Tell me, and I will netmail it to you... I had a run in with Jerusalem B [jeru] today at Lamar University. Seems the Chemistry Department stockroom manager had already infected 17 files on his hard drive. Clean removed the virus. --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 7173 *Virus Info* 09-05-90 18:30:00 (Read 5 Times) From: PHILLIP LAIRD To: PATRICIA HOFFMAN Subj: REPLY TO MSG# 4750 (JERUSALEM B AND CLEANP64.ZIP) Patti: I cleaned 17 infected files today with clean version 64. I have a good question. While the program removes the file, some where removed the first time around, others were scanned several times before the virus was actually removed. Can you tell me why? --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 7174 *Virus Info* 09-05-90 18:32:00 (Read 4 Times) From: PHILLIP LAIRD To: RICK THOMA Subj: REPLY TO MSG# 4967 (RE: PKZ120.ZIP) Didn't someone say that because someone had already hacked an earlier version of PKZIP that 120 would be the next scheduled release? Anybody have any info? --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 7175 *Virus Info* 09-05-90 18:37:00 (Read 4 Times) From: PHILLIP LAIRD To: ALL Subj: PROCOMM 3.10 Beware, there is a version of Procomm.zip going around in our area here in Texas which boasts Procomm 3.10. After consulting with my friend at Datastorn Technologies, he called my BBS and downloaded the file. I had a user complain that the file hung and said "NUKE" at the lower left of his terminal. Datastorm Technologies stated that this version doesn't exist, I.E.... the latest was 2.4.3. The same user told me that the file one night then put a message on his screen that stated "Does this IBM PC or Compatible have more than one drive? Y or N " He immediately turned off the computer and didn't answer the question. Althought we scanned this program and found no virus, we disassembled it and also didn't find anything suspicious either. Be careful, it might be a time bomb. If you know of this program, let me know at 1:19/49. I would like to keep tabs on it. --- TAGMAIL v2.20 * Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49) Msg#: 7176 *Virus Info* 09-04-90 16:04:00 (Read 4 Times) From: MIKE MCCUNE To: TALLEY RAGAN Subj: REPLY TO MSG# 4030 (RE: REMOVING JOSHI) I have posted a new version that checks for the virus before trying to remove it (now that I have a working copy of the virus). It will not damage the partition table on uninfected hard disks.... --- KramMail v3.15 * Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0) Msg#: 7177 *Virus Info* 09-04-90 13:31:00 (Read 4 Times) From: PAUL FERGUSON To: KEN DORSHIMER Subj: REPLY TO MSG# 5241 (LET ME REPHRASE THAT.....) Ken- This is a continuation of msg.# 156 (I dropped the keyboard....Looong day, you know)..... Actually, I really should have said "virtually preconceived". From what I can gather on the topic (I don't yet have a copy of 4096), they actually redirect CRC/Checksum interrogators to a "snapshot" of the original file as it appeared before infection.(Someone, I'm sure, will correct me if I'm wrong or at least add enlightenment.) The infected file, in the case of 4096, has in reality grown by 4096 bytes and would more than likely hang the system, therefore, which would lead me to believe that running the CRC check without the virus TSR would allow you to identify the actual infected files. Also, it seems like the only way to catch it TSR is to trace the interrupt vectors (although everyone seems to have a little bit of differing ideas on this '->) Until I can get my hands on this little fellow, I guess that I'll just follow the more logical explanations from the sources with credibilty and make a judgement from that! Sounds credible. But, as I'v said before- I sure would like to see it. I've been following several different message base threads on this particular virus, with input from users at the basic levels to BBS SysOps to the AntiViral research community.......I must say, it gets overwhelming at times to keep objective. *:) -Paul --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 7178 *Virus Info* 09-05-90 09:20:00 (Read 4 Times) From: PAUL FERGUSON To: EVERYONE Subj: DETAILED INFO ON 4096... The description in VSUM (August 15 release) of the 4096 virus has gotten my usual curiousity arouser, along with a plethora of discussion on this particular virus within many message conferences and viral echos......Since I have not had the opportunity, yet, to obtain a sample to personally examine, I must post a few questions to the field: 1.) Would someone like to elaborateon the structure of "Phases" that the CVIA uses to catorgorize viruses? Please? ;-) 2.) I seem to remember mention (No, I don't have my copy of VSUM in front of my now) of the virus (4096) containing it's own boot sector. Could someone enlighten me on this , also? 3.) And, under what ? circumstances does the 'FRODO LIVES' msg. appear and when does it not? No offense, Patti, but I did think that on a couple of these points that the VSUM doc was kinda sketchy (I know that is ALOT of work to compile that baby and continually update, etc.!). Perhaps with a little more detail, I will have settled my curiousity and returned to other problems at hand... -Paul Patti- Any luck with last U/L? ,-) --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 7179 *Virus Info* 09-05-90 20:34:00 (Read 5 Times) From: PATRICIA HOFFMAN To: SEAN SOMERS Subj: REPLY TO MSG# 4544 (RE: REMAPPING...) SS> Off topic here, anybody out there encounter the French Revoloution SS> virus? I was the first out here to discover it. What it does is nuke SS> your HD while displaying an anti Western/English speaking Canadians. Haven't seen or heard of that one before.... What does it infect? .COM, .EXE, overlays, boot sectors, only floppies? If you want to send me a copy of it, I'd be happy to take a look at it as well as pass it along to John McAfee's group. Snail mail address is: Patricia M. Hoffman 1556 Halford Avenue #127 Santa Clara, CA 95051 It can also be sent in a .ZIP file to my system, though be sure you don't route it thru anyone, or directly uploaded here to a suspect area that is secured. Not off-topic at all, that is what this conference is for.... Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 7180 *Virus Info* 09-05-90 20:01:00 (Read 5 Times) From: PATRICIA HOFFMAN To: PAUL FERGUSON Subj: REPLY TO MSG# 7178 (DETAILED INFO ON 4096...) PF> 1.) Would someone like to elaborateon the structure of "Phases" that PF> the CVIA uses to catorgorize viruses? Please? ;-) PF> VSUM doesn't necessarily use the McAfee or CVIA categorization techniques to classify viruses. VSUM's categorization is a bit finer than McAfee's since in many cases he can group things together for detection/removal purposes. However, in describing them they don't make much sense that way. I haven't seen a copy of the CVIA categorization in some time, but I believe they classified by: boot sector infector parasitic file infector overwriting file infector Partition table infectors were (I think) thrown in with boot sector infectors since at the time the only partition table infector was Stoned, which also infected floppy boot sectors. They also classified by memory resident or non-resident. Generally, VSUM classified by memory resident/non-resident, what it infects, file length change, symptoms, and other characteristics, as well as what virus the new entry is based on if applicable. In the case of memory resident viruses, there is a code to indicate how or where it is memory resident. McAfee and I had a loooonnnnnggggg discussion on classification and naming awhile back, and "agreed we could disagree" since how he uses the names in Scan isn't workable for VSUM, and using the VSUM naming in Scan would not serve his purposes since he needs to group variants in many cases. If possible, though, we try to use the same names. If VSUM differs, the name that will be indicated by Scan is indicated as an alias. McAfee's current classification methods as indicated in VIRLIST.TXT which comes out with Scan also differs from the CVIA classifications, and is fairly close to VSUM. PF> 2.) I seem to remember mention (No, I don't have my copy of VSUM in PF> front of my now) of the virus (4096) containing it's own boot sector. PF> Could someone enlighten me on this , also? PF> Yes, it includes a boot sector, though do to an error in the virus, the included boot sector isn't ever written to the hard disk or floppy boot sector. This boot sector is where the "FRODO LIVES" message is.... PF> 3.) And, under what ? circumstances does the 'FRODO LIVES' msg. PF> appear and when does it not? PF> Normally, due to a bug in the virus, the message is never displayed. If one copies the boot sector from within the 4096 virus to a floppy diskette as sector 0, and boots from it, the message will appear. Of course, the above bugs may be fixed in a later version of the virus....but the versions I've seen hang on September 22 when they were meant to activate the Frodo Lives message. PF> PF> No offense, Patti, but I did think that on a couple of these points PF> that the VSUM doc was kinda sketchy (I know that is ALOT of work to PF> compile that baby and continually update, etc.!). PF> Perhaps with a little more detail, I will have settled my PF> curiousity and returned to other problems at hand... PF> No problem....A lot of time what makes perfect sense to me doesn't make sense to others :-). There is always this question with VSUM on where to draw the line on the descriptions. PF> Patti- Any luck with last U/L? ,-) PF> Not yet....I'm busy working on analysing a new virus right now, and it is going to take awhile....will probably be a Whale of a tale when I get done....and I don't want to say anything prematurely on it. Patti --- QM v1.00 * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0) Msg#: 7181 *Virus Info* 09-06-90 11:33:00 (Read 4 Times) From: TONY JOHNSON To: ALL Subj: REPLY TO MSG# 3029 (CORE WARS) Core Wars was a simulation system, it was not per se' a breeding ground for the type of viri that you see today attacking systems and PCs. The programs tested were called viri in the way they attacked and behaved while operating within the Core Wars environment. I believe the "arena" used for the "viruses" was an 8K memory grid, and that the programs/"viri" were limited to that area. While those programs were not the same thing as what we see today chewing up our beloved computers, I can say that Core Wars was an extremely enlightening experience that had the programmers thinking about how a similiar type of situation could apply to the actual computing world. --- QM v1.00 * Origin: The 286 Express (504-282-5817) (1:396/30.0) Msg#: 7182 *Virus Info* 09-06-90 13:09:00 (Read 5 Times) From: CHARLES HANNUM To: CHRIS BARRETT Subj: REPLY TO MSG# 7166 (RE: MYSTERY VIRUS??) >At my school we have some XT's with 2 360K FDD each. Lately we have >noticed that some of the students disks are being over written by the >program disk they were using. Eg some people have found the Turbo >pascal files on their data disks. This could happen (and has) if you are using disk caching software. That would be a good place to look first. --- ZMailQ 1.12 (QuickBBS) * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)