About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Message logs on virus info


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Msg#: 2473 *Virus Info*
08-19-90 09:46:00 (Read 11 Times)
From: PATRICIA HOFFMAN
To: KEN DORSHIMER
Subj: RE: CRC CHECKING
<KD>the deal is that the invading program would have to know how the CRC
<KD>your
<KD>program uses works. otherwise it would have a (bytes changed!/bytes in
<KD>file!)
<KD>chance of succeeding, or somewhere in that neighborhood...
<KD>

Except in the case of Stealth Viruses....CRC checking doesn't work with them.

Patti

--- msged 1.99S ZTC
* Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158)



Msg#: 2474 *Virus Info*
08-19-90 09:50:00 (Read 9 Times)
From: PATRICIA HOFFMAN
To: SHEA TISDALE
Subj: FILE ECHO?
<ST>Hey, what happened to connecting my system to the file echo?
<ST>
<ST>I have sent numerous netmail messages to you since you sent the info
<ST>on setting it up and have not had a reply yet.

Recheck your netmail, I sent a reply after receiving the message "What is
Tick?" indicating that you need to be running Tick in order to be able to
participate in the file echo since that is how the files are processed and
extra files go with the .zip files that carry the description. Tick is
available from most SDS nodes.

Patti

--- msged 1.99S ZTC
* Origin: Sir Dep's Dungeon 714-740-1130 Adult Links Network (1:103/158)



Msg#: 2475 *Virus Info*
08-16-90 11:56:00 (Read 8 Times)
From: MIKE DURKIN
To: WARREN ANDERSON
Subj: RE: INTERNET WORM
> I am interested in obtaining the list of passwords used by the
> Internet worm in the US. I am the administrator of several

The list is in the McAfee/Haynes book ("computer viruses,
worms...threats to your system") (pgs 89-91)...
I'll type it in for you if you can't find the book locally...

Mike

--- RBBSMail 17.3A
* Origin: The TeleSoft RBBS (RBBS 1:143/204)



Msg#: 2476 *Virus Info*
08-19-90 14:51:00 (Read 9 Times)
From: MIKE DURKIN
To: JAMES DICK
Subj: REPLY TO MSG# 2473 (RE: CRC CHECKING)
> You might want to take a look at McAfee's FSHLD*.ZIP. This is a new
> anti-virus program from the creator of SCAN that is designed
> specifically for developers. It will build a 'shield' into an
> application such that the application _cannot_ be infected and if it
> does become infected, will remove that infection after execution but
> prior to running. You will find it in the virus scanners area of many

Jim... this is a little mis-leading... all programs will become infected
but FSHLD will remove it for most viruses.. for viruses like 4096, FSHLD
won't remove or even know/announce that the file is infected...

When FSHLD can remove a virus, 'after execution but before running'
really makes no difference since a resident virus will still go TSR and
a direct action virus will still do it's infecting of other programs...

But all things considered... I definately agree that FSHLD is a must
have...

Mike

--- RBBSMail 17.3A
* Origin: The TeleSoft RBBS (RBBS 1:143/204)



Msg#: 2477 *Virus Info*
08-20-90 04:44:00 (Read 8 Times)
From: KEN DORSHIMER
To: PATRICIA HOFFMAN
Subj: RE: SCANV66B RELEASED

On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:

<KD>>does this mean i should erase the old scanv66 that i just d/l'd from
<KD>>SDN?
<KD>>:-(
<KD>>

PH> Yep, ScanV66 has a bug or two in it involving the validate codes it
PH> can add to the end of files. The validate codes were not being
PH> calculated correctly in
PH>

swell. think i'll wait for the next release.
ps, you have net-mail waiting. :-) BTW why on earth would anyone take time
off from a disneyland vacation to call a bbs? <grin>
...Your attorney is in the mail...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2478 *Virus Info*
08-20-90 04:46:00 (Read 9 Times)
From: KEN DORSHIMER
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2476 (RE: CRC CHECKING)

On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:

<KD>>the deal is that the invading program would have to know how the CRC
<KD>>your
<KD>>program uses works. otherwise it would have a (bytes changed!/bytes in
<KD>>file!)
<KD>>chance of succeeding, or somewhere in that neighborhood...
<KD>>

PH> Except in the case of Stealth Viruses....CRC checking doesn't work
PH> with them.
PH>

i'd have to see that for myself. i think a complex enough algorithm would
keep them at bay. the probability factor is just too low for such a stealth
scheme to work.

...Your attorney is in the mail...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2479 *Virus Info*
08-20-90 04:50:00 (Read 9 Times)
From: KEN DORSHIMER
To: MIKE DURKIN
Subj: REPLY TO MSG# 2478 (RE: CRC CHECKING)

On 19-Aug-90 with bulging eyes and flailing arms Mike Durkin said:

>> You might want to take a look at McAfee's FSHLD*.ZIP. This is a new
>> anti-virus program from the creator of SCAN that is designed
>> specifically for developers. It will build a 'shield' into an
>> application such that the application _cannot_ be infected and if it
>> does become infected, will remove that infection after execution but
>> prior to running. You will find it in the virus scanners area of many
MD> Jim... this is a little mis-leading... all programs will become
MD> infected but FSHLD will remove it for most viruses.. for viruses like
MD> 4096, FSHLD won't remove or even know/announce that the file is
MD> infected... When FSHLD can remove a virus, 'after execution but before

i have some misgivings about this particular protection scheme myself. i
don't like embedding someone else's stuff into my executables, partly for
licensing reasons. not to knock what is probably a good idea...

...Your attorney is in the mail...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2653 *Virus Info*
08-20-90 17:09:00 (Read 10 Times)
From: TALLEY RAGAN
To: MIKE MCCUNE
Subj: RE: REMOVING JOSHI

In a message to Philip Laird <08-16-90 14:09> Mike Mccune wrote:

MM>> Just be sure to boot off a clean diskette to remove the
MM>>virus from memory, otherwise the virus will not be removed.
MM>> If RMJOSHI is used on an unifected hard drive, it will
MM>>destroy the partition table. This next program, RETURN.COM
MM>>will restore the partition table.
MM>> I will post this program in my next listing...<MM>.

Does this mean that RMJOSHI.COM, if run on an uninfected hard
drive by it self is a virus?



Talley



--- ZAFFER v1.01
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)



Msg#: 2654 *Virus Info*
08-21-90 09:32:00 (Read 10 Times)
From: PATRICK TOULME
To: MIKE MCCUNE
Subj: RE: HAVE ANYONE TRIED SECURE ?

MM> I have tried Secure and have found it to be the only interrupt moniter
MM> that will stop all the known viruses.

Mike perhaps you should add a caveat to that statement. Secure
neither detects, nor does it stop, Virus-101.

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2655 *Virus Info*
08-21-90 12:11:00 (Read 8 Times)
From: PAUL FERGUSON
To: HERB BROWN
Subj: KEYBOARD REMAPPING (AGAIN)...
Herb,
I stand corrected on that last bit of dialogue....You are
correct, indeed.....But, you know what I mean along those lines of
getting what you don't expect, whether damaging or not, NO ONE wants
the unexpected on thier system.....Touche!
-Paul ^@@^........

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2656 *Virus Info*
08-21-90 22:29:00 (Read 10 Times)
From: PATRICIA HOFFMAN
To: YASHA KIDA
Subj: AKA AND BBS HANDLES
YK> What is the rule in this message echo concerning BBS HANDLES?
YK> Would like some clarification, I have users expressing interest in
YK> using bbs handles in this echo, since they are seeing them used .
YK> As you can see I have not allowed this, feeling this echo to be
YK> professial in nature.
YK>
YK> I understand the use of AKA names in this echo maybe needed.
YK>
YK> Example :
YK> After my SITE Manager saw my interest in viruses, I was called in to
YK> his office. After explaining my reseach, was to protect not to infect,
YK> he relaxed.
YK>

[Note: the above quote is muchly editted....]

Yasha, Aliases are ok in this echo, as long as the Sysop of the system where
the messages originate knows who the user is and can contact him if the need
arrises. I fully understand the sitation that you describe about your Site
Manager...which is a fully valid reason to use an alias here. I used to use
the alias of "Merry Hughes" for exactly that reason!

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2657 *Virus Info*
08-21-90 22:32:00 (Read 9 Times)
From: PATRICIA HOFFMAN
To: KEN DORSHIMER
Subj: REPLY TO MSG# 2477 (RE: SCANV66B RELEASED)
KD> swell. think i'll wait for the next release.
KD> ps, you have net-mail waiting. :-) BTW why on earth would anyone take
KD> time
KD> off from a disneyland vacation to call a bbs? <grin>

<laughing> I was eating dinner or lunch while entering those messages, then we
went back to Dizzyland and Knott's. Besides, I had to see what you guys were
up to while I was gone.....Mom instinct....what can I say?

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2658 *Virus Info*
08-22-90 18:21:00 (Read 8 Times)
From: HERB BROWN
To: PAUL FERGUSON
Subj: REPLY TO MSG# 2655 (KEYBOARD REMAPPING (AGAIN)...)
With a sharp eye <Aug 21 12:11>, Paul Ferguson (1:204/869) noted:
PF>Herb,
PF> I stand corrected on that last bit of dialogue....You are
PF>correct, indeed.....But, you know what I mean along those lines of
PF>getting what you don't expect, whether damaging or not, NO ONE wants
PF>the unexpected on thier system.....Touche!
PF>-Paul ^@@^........

I knew what you meant. Glad to know you do too. :-) ( No flame intended )

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 2659 *Virus Info*
08-22-90 05:37:00 (Read 8 Times)
From: KEN DORSHIMER
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2657 (RE: SCANV66B RELEASED)

On 21-Aug-90 with bulging eyes and flailing arms Patricia Hoffman said:

KD>> swell. think i'll wait for the next release.
KD>> ps, you have net-mail waiting. :-) BTW why on earth would anyone take
KD>> time
KD>> off from a disneyland vacation to call a bbs? <grin>

PH> <laughing> I was eating dinner or lunch while entering those
PH> messages, then we went back to Dizzyland and Knott's. Besides, I had
PH> to see what you guys were up to while I was gone.....Mom
PH> instinct....what can I say?
PH>

did you go on the roller coaster at Knotts that looks like a corkscrew? my
personal favorite after a big dinner. <erp!>
in other news there was a report <<unconfirmed>> that there is a hack of
lharc floating around called lharc190. might want to keep an eyeball open for
it. what am i doing up at this hour? just got thru writting the docs for a
program <yawn>. as usual, the program looks better than the docs. have fun,
see ya.

...All of my dreams are in COBOL...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2660 *Virus Info*
08-20-90 15:40:00 (Read 9 Times)
From: RON LAUZON
To: PAUL FERGUSON
Subj: RE: KEYBOARD REMAPPING....
yes, it is possible to re-map the keyboard from a remote system. However, most
people are protected by this because the term program rather than ANSI.SYS is
handling the ANSI escape sequences.

If you are using a "dumb" terminal that has no terminal emulation and allowing
ANSI.SYS to handle your screen formatting, you may be in trouble.

--- Telegard v2.5i Standard
* Origin: The Flight of the Raven (313)-232-7815 (1:2200/107.0)



Msg#: 2661 *Virus Info*
08-21-90 20:29:00 (Read 8 Times)
From: MARTIN NICHOL
To: MICHAEL TUNN
Subj: WHAT'S THE SOLUTION?
mt said => It seems to me our Virus checking programs will just
mt said => get bigger and bigger as more viruses and strains of
mt said => the same viruses are discovered. If so (and if their
mt said => development is excelerating) then we may find in the
mt said => near future that it has become impossiable to deal
mt said => with the outbreaks!
mt said => Do we do develop new Operating Systems which are far
mt said => more secure!

Develope different virus scanning programs. Make them more generic where virus
signatures/characteristics can be kept in a seperate file and the virus scanner
just reads the file and interprets it accordingly.

---
* Origin: JoJac BBS - (416) 841-3701. HST Kettleby, ON (1:250/910)



Msg#: 2683 *Virus Info*
08-22-90 22:55:00 (Read 8 Times)
From: FRED ENNIS
To: ALL
Subj: VIRUS-486COMP.*

FORWARDED BY James Dick of 1:163/118

QUOTE ON

I've been informed by "reliable sources" that there's a file floating around
called 486COMP.* (select your favourite packing method) which claims to "show
you the difference between your machine and a 486".
.
When run, the program flashes a "too big for memory" message, and aborts.
.
Then, the next time you boot, you're informed that you have the "Leprosy 1.00"
virus which then hangs the machine.
.
After you manage to boot from a floppy, you find that COMMAND.COM has been
altered, although the date, time, and size appear not to have been changed.

Just thought you'd like to know.

Cheers!
Fred

--- msged 1.99S ZTC
* Origin: Page Six, POINT of order Mr. Speaker (1:163/115.5)



Msg#: 2684 *Virus Info*
08-22-90 11:07:00 (Read 8 Times)
From: SHEA TISDALE
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2474 (FILE ECHO?)
Thanks Patricia...

I am all ready to go now. Just poll your board?

---
* Origin: >- c y n o s u r e -< 919-929-5153 <XRS> <HST> (1:151/501)



Msg#: 2685 *Virus Info*
08-20-90 21:50:00 (Read 9 Times)
From: TOM PREECE
To: PAUL FERGUSON
Subj: RE: KEYBOARD REMAPPING VIA COMMUNICA
I can't help but wonder if Herb was experiencing something that suggested that
kind of remapping. Lately I have been experiencing keyboard problems that seem
to act like that. When I use my down or left arrow the \ and | symbols toggle.
I can correct this when it happens by hitting the left hand shift key - but not
the right. And tonight it seems as if I am occaissionaly transposing caps on
and off.

If either of you hears a virus like this I'd like to know. Q&A tested my
memory and keyboard fine. Scanv66 detected nothing.
--- TBBS v2.1/NM
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)



Msg#: 2738 *Virus Info*
08-23-90 23:49:00 (Read 7 Times)
From: PHILLIP LAIRD
To: PATRICIA HOFFMAN
Subj: ONTARIO VIRUS
Patty, have you heard of such a Virus? I was in the TAG Support Echo and saw
a message about a TAG Sysop who contracted that virus. Any Info? Supposedly
the Virus is scanned in version SCANV66.ZIP.

????

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 2739 *Virus Info*
08-22-90 12:55:00 (Read 7 Times)
From: PAUL FERGUSON
To: EVERYONE
Subj: MOM!
Patti-
Mom, huh?...What can you say?..It seems it has already been said!

-Paul <wide grin on this one>

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2740 *Virus Info*
08-23-90 12:06:00 (Read 8 Times)
From: PAUL FERGUSON
To: TOM PREECE
Subj: REMAPPING...
Hello, Tom...
.
More than likely there was nothing like that at all. Keyboard
remapping is an extremely complicated process and would take more than
forethought on the part of the programmer. What you have seen us
talking about here is figurative at best and personally, I would have
to see it to believe it. (you know the old saying: "Believe none of
what you hear and only half of of what you see."?) Although I do
believe that is quite possible under the proper circumstances, it would
indeed be a rare occurance. Sometimes when receiving odd characters
during telecommunications or not getting the exact same keys that you
typed could be attributed to disparity (parity differences), differing
data bits, stop bits, or even simply ANSI interpretation problems
between Comm Programs. I've seen the smallest, simplest things like
that have people pulling their hair out by the roots!
.
.....Clarke's Third Law
Any sufficiently advanced technology is indistinguishable from
magic.
.
.
-Paul ^@@^........

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2741 *Virus Info*
08-17-90 01:51:00 (Read 8 Times)
From: YEN-ZON CHAI
To: DOUG BAGGETT
Subj: ANTI VIRUS VIRUSES
DB> well..here is a question..where exactly did viruses originate
DB> anyway..was it in this country or others?

Probably where hacker exists, virus exists.



--- outGATE v2.10
# Origin: SIGnet International GateHost (8:7501/103)
* Origin: Network Echogate (1:129/34)



Msg#: 2742 *Virus Info*
08-22-90 17:49:00 (Read 8 Times)
From: KEVIN HIGGINS
To: MIKE MCCUNE
Subj: REPLY TO MSG# 2654 (RE: HAVE ANYONE TRIED SECURE ?)
I took a look at it, but to be realistic, when you run a BBS, or are
continuously updating your files as new releases come out, you could easily get
to the point where you spend more time reconfiguring the anti-virus program
than you would getting any work done. I find it much more efficient to scan
every file for viruses as soon as I get it on my system, then rezip it, if I'm
not going to use it... a simple .bat file can be used such that if you want to
check multiple files, you can just feed the file names on the command line and
let the .bat file take care of unzipping, scanning and rezipping the file.
Be best if someone would write a program that would do this, but I haven't
found one yet.
Kevin

--- TAGMAIL v2.40.02 Beta
* Origin: The Hornet's Nest BBS (1:128/74)



Msg#: 2743 *Virus Info*
08-22-90 21:52:00 (Read 8 Times)
From: CY WELCH
To: PAUL FERGUSON
Subj: REPLY TO MSG# 2660 (KEYBOARD REMAPPING....)
In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:

PF> Isn't it possible to remap some (or any) keyboard functions via
PF> communications with some funky ANSI control characters?....I seem to
PF> remember mention of this somewhere.....I really can't remember if was
PF> in the form of a question, though, or an answer.....It also made
PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...

I think most of the "FAST" ansi replacements do not have the keyboard remapping
so that danger is removed in those cases.

--- XRS! 3.40+
* Origin: Former QuickBBS Beta Team Member (99:9402/1.1) (Quick 1:125/122.1)



Msg#: 2744 *Virus Info*
08-24-90 15:14:00 (Read 8 Times)
From: PATRICIA HOFFMAN
To: ALL
Subj: VIRUS RESCUE & F-PROT RELEASES
The latest version of Fridrik Skulason's F-PROT anti-viral program is now
available for download from my system as FPROT112.ZIP. The program can also be
file requested as F-PROT, which will always return the latest copy I have
available. This program is actually a "suite" of programs for use in
preventing and detecting viruses and trojans. The program originates in
Iceland, and so updates to it reaching my system for distribution have been
rather sporatic.

The other new anti-viral program available on my system is Virus Rescue. Virus
Rescue is from Tacoma Software, and is a shell for invoking ViruScan, CleanUp,
and VCopy from McAfee Associates. Unlike other shell programs I've seen, this
one should not require updates every time a new release of Scan comes out. It
picks up its virus information from the VIRLIST.TXT file which is packaged with
Scan and CleanUp. It will be handy for those who have trouble with the Scan
and CleanUp command line switches, or who want the VIRLIST.TXT information
converted to english sentences. This is a first public release, so I expect we
may see some changes in this product in the future. Virus Rescue can be
downloaded from my system as RESQ01.ZIP.

Both programs are also file requestable by other systems. File requests should
ask for magic file names as follows:

F-PROT for the latest copy of F-PROT (currently FPROT112.ZIP)
RESCUE for the latest version of Virus Rescue

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2745 *Virus Info*
08-24-90 23:37:00 (Read 9 Times)
From: KEN DORSHIMER
To: KEVIN HIGGINS
Subj: REPLY TO MSG# 2742 (RE: HAVE ANYONE TRIED SECURE ?)

On 22-Aug-90 with bulging eyes and flailing arms Kevin Higgins said:

KH> I took a look at it, but to be realistic, when you run a BBS, or are
KH> continuously updating your files as new releases come out, you could
KH> easily get to the point where you spend more time reconfiguring the
KH> anti-virus program than you would getting any work done. I find it
KH> much more efficient to scan every file for viruses as soon as I get it
KH> on my system, then rezip it, if I'm not going to use it... a simple
KH> .bat file can be used such that if
KH>
KH> you want to check multiple files, you can just feed the file names on
KH> the command line and let the .bat file take care of unzipping,
KH> scanning and rezipping the file. Be best if someone would write a
KH> program that would do this, but I haven't found one yet. Kevin
KH>

sounds like a plan to me. it would actually be fairly simple to write a
program to look at all the files in your upload directory, unpack them based
on the extension, scan them, then re-compress them (if needed). of course
you'd still have to manually put the now scanned files into the proper
catagory directories yourself. when do you need it and what's it worth? :-)

...All of my dreams are in COBOL...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2746 *Virus Info*
08-23-90 15:23:00 (Read 8 Times)
From: MIKE MCCUNE
To: TALLEY RAGAN
Subj: REPLY TO MSG# 2653 (RE: REMOVING JOSHI)
No, it just modifies the partition record to remove the virus.
If the virus isn't there, it still modifies the partition
record. Return.com just reverses the modifications done to the
partition table. I will post an improved version of RMJOSHI that
scans the partition record for the virus before modifying
it...<MM>.

--- KramMail v3.15
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 2747 *Virus Info*
08-23-90 15:26:00 (Read 8 Times)
From: MIKE MCCUNE
To: PATRICK TOULME
Subj: REPLY TO MSG# 2745 (RE: HAVE ANYONE TRIED SECURE ?)
Maybe I should say all virus that are in the "public domain".
Virus 101 is a research virus that only a few people have (and
you wrote). Nothing is fool proof but Secure is better than any
other interrupt moniter.

--- KramMail v3.15
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 2748 *Virus Info*
08-23-90 07:01:00 (Read 8 Times)
From: YASHA KIDA
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2656 (AKA AND BBS HANDLES)
In a message of <21 Aug 90 22:29:34>, Patricia Hoffman (1:204/869) writes:

PH>
PH> Yasha, Aliases are ok in this echo, as long as the Sysop of the system
PH> where the messages originate knows who the user is and can contact him
PH> if the need arrises. I fully understand the sitation that you
PH> describe about your Site Manager...which is a fully valid reason to
PH> use an alias here. I used to use the alias of "Merry Hughes" for
PH> exactly that reason!
PH>
PH> Patti

I understand AKA names like "MERRY", but I speak of HACKER HANDLES.
like "LINE RUNNER", "DATA BYTE" etc... I must have misunderstood FIDO ECHO
POLICY either way I will drop the subject.

Yasha Kida





--- msged 1.99S ZTC
* Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty)
(1:151/305)



Msg#: 2749 *Virus Info*
08-08-90 23:23:00 (Read 7 Times)
From: ALAN DAWSON
To: DAVID SMART
Subj: RE: VIRUS SCANNERS....
DS> You can't win on this! I've been downloading for quite a while
DS> - always running a virus checker on the information. So, where
DS> did our virus come from? Off a shrink-wrapped anti-virus
DS> diskette one of our guys picked up in the US!

Nothing new about this, as people learn all the time. One MAJOR
company (really big, really well known) has shipped shrink-wrapped
viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs
out.


--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 2750 *Virus Info*
08-08-90 23:31:00 (Read 7 Times)
From: ALAN DAWSON
To: PATRICIA HOFFMAN
Subj: SCAN WEIRDNESS
(All answers gratefully received despite the TO: line)
Anybody heard of this? I've got a floppy with some viruses on it,
among them a SCAN-known Dark Avenger. I SCAN this floppy from the C
drive, and the "hey, nothing to worry about there" report comes back.
Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of
the memory check, telling me Dark Avenger is in memory, power down,
load the .45, get the cyanide tablet ready and so on.
But DA of course is NOT in memory or active in any way. It is,
however, on the floppy, unrun.
The above occurred with SCANV64. Out of curiosity, I cranked up
SCAN-54 and -- EXACTLY the same result.
AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot
just performed.
I have a bunch of viruses that I don't expect SCAN to find --
ever. But this kind of thing has never happened to me before. Can
anyone match this story, or event?


--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 2751 *Virus Info*
08-26-90 00:59:00 (Read 7 Times)
From: STEVEN TREIBLE
To: KEN DORSHIMER
Subj: VOICE NUMBER

Ken,
I haven't mailed the disk yet as you can see. I'd like to have your voice # so
I can talk to instead of sending Net Mail.
Thanks,
Steve.

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)



Msg#: 2752 *Virus Info*
08-25-90 06:10:00 (Read 8 Times)
From: SANDY LOCKE
To: HERB BROWN
Subj: RE: COMMUNICATION VIRALS

PH> However, unless one of the above is occurring, just connecting via
PH> telecom to a system won't directly transmit a virus....
PH>

HB> Well, that is not exactly what I meant. Sorry for the miscommunicatio
HB> should have used an example. I'll have to dig for some old documentat
HB> about z-modem when it first came out. I seem to remember it stating t
HB> locked the directory that a file was able to go to when being download
HB> has something to do with the structure of a .EXE file, or something.
HB> to also remember that it was possible to have the .exe "go were it wan
HB> as defined by this structure. Thus, having some of the file go to a c
HB> part of a drive or memory. It seems wild, but without the docs I read
HB> can't give any details. Thought maybe you could shed some light on th

Well considering that I am hosting chuck forsberg today ... hes down
here for the sco developer forum I will put the question to him
directly... but as one of the suggestors for feature addition to the
protocol in another personna... ZMODEM will INDEED allow one to
transmit a FULL path name... however this is mitigated by the ability
on the receiving end to override the transmitted pathname spec... I
dont really see a problem here... and when I put the question to chuck
I dont see where he will see one either... btw READ the DSZ DOCS and
register the product... that will turn on ALL the neat zmodem
features...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2753 *Virus Info*
08-25-90 06:18:00 (Read 15 Times)
From: SANDY LOCKE
To: SKY RAIDER (Rcvd)
Subj: RE: VIRUS ORIGINALS
SR> Doug,

SR> It is my belief that viruses originated in the early days of computing
SR> effort to see what kind of stuff could be done with them, a group of
SR> programmers (financed by the US government as I recall) institued a se
SR> programs that would attempt to 'beat' others in taking over a computer
SR> system. These programs led to a gaming system known as the CORE WARS.
SR> today there is an International Core Wars Society.

SR> I think it can be easily seen how a program to destroy/circumvent a st
SR> operating system can develope into a virus.

SR> I tried to double check this information for accuracy, names, dates, e
SR> but it seems I have deleted this file. I will try to get further info
SR> you, but beleive this info is shrouded in secrecy, and may be hard to
SR> relocate.

SR> So, the original viruses did come from the US (and even possibly with
SR> government help).

SR> Ivan Baird
SR> * Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K>
SR> (1:255/3)
WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME created by
bored programmers... ORIGINAL CORE WARS games were created as far back
as 1969 back on the OLD IBM 360 architectures under both OS/MFT and
OSMVT OS's... neither had anything to do with so-called secret
financing by the US government...BTW I was AROUND and A Systems
Programmer during that period... we created our own versions when we
heard of the rumours... it was an old system programmers game designed
to give Egotistal programmers some lighthearted fun... at this point
ALL code ran in real Address space and redcode hadnt even been though
of... the MUCH later article by Scientific American in 1979 gave this
fun with out harm via the redcode interpreter implemented on early 6502
and 8080 systems... really... I am going to have to move to canada...
sounds like there are some really potent and fun drugs in circulation
up there... jeese... what a simp...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2754 *Virus Info*
08-25-90 06:19:00 (Read 14 Times)
From: SANDY LOCKE
To: STEVE HOKE
Subj: REPLY TO MSG# 2752 (RE: COMMUNICATION VIRALS)
SH> In a message to Herb Brown <15 Aug 90 17:44:00> Patricia Hoffman wrote

PH> The only way a virus could be directly transmitted via a
PH> telecommunications link ...
PH> is if the particular "service" has a feature where they upgrade
PH> their software on your system when you connect.

SH> Is there any commercial system that does this? I don't know of one, bu
SH> like to know what types of systems to be wary of.

SH> Steve
just one word for you... PRODIGY avoid it like the plague...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2755 *Virus Info*
08-25-90 06:25:00 (Read 9 Times)
From: SANDY LOCKE
To: MIKE MCCUNE
Subj: REPLY TO MSG# 2747 (RE: HAVE ANYONE TRIED SECURE ?)

MM> I have tried Secure and have found it to be the only interrupt moniter
MM> that will stop all the known viruses. It won't stop the boot viruses,
MM> obviously (because a boot virus loades before Secure does), but it wil
MM> detect them as soon as Secure is loaded. Secure is hard to configure,
MM> but once it is configured, it will give few false alarms. With string
MM> scanners becoming increasingly easy to defeat, Secure may be the way t
MM> go for virus protection...<MM>.

well kiddies... a certain couple of anti-viral types on HOMEBASE BBS
managed to sting SECURE with modified version of JER-B... one of them
continues to find holes with the same tool... SECURE is simply NOT
SECURE...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2756 *Virus Info*
08-25-90 06:31:00 (Read 9 Times)
From: SANDY LOCKE
To: KEN DORSHIMER
Subj: REPLY TO MSG# 2479 (RE: CRC CHECKING)

KD> On 19-Aug-90 with bulging eyes and flailing arms Patricia Hoffman sai

KD> <KD>>the deal is that the invading program would have to know how the
KD> <KD>>your
KD> <KD>>program uses works. otherwise it would have a (bytes changed!/by
KD> <KD>>file!)
KD> <KD>>chance of succeeding, or somewhere in that neighborhood...
KD> <KD>>

PH> Except in the case of Stealth Viruses....CRC checking doesn't work
PH> with them.
PH>

KD> i'd have to see that for myself. i think a complex enough algorithm wo
KD> keep them at bay. the probability factor is just too low for such a st
KD> scheme to work.

KD> ...Your attorney is in the mail...

check out Gilmore Data Systems in LA authors of the OLD FICHECK and
XFICHECK... the techniques is called CRC padding after the addition of
the viral code the file is padded with a given number of bytes to make
the CRC Polynomial come out with the same result... the FCB is then
Patched to the original file length leaving nothing for standrad CRC
checkers to detect... Childs play really...
sandyp.s. in the case of most stealth viruses... the file read
code is simply altered to disinfect the file as the CRC checking
program reads it... agains simply childs play...

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2757 *Virus Info*
08-25-90 06:32:00 (Read 10 Times)
From: SANDY LOCKE
To: PATRICK TOULME
Subj: REPLY TO MSG# 2755 (RE: HAVE ANYONE TRIED SECURE ?)

MM> I have tried Secure and have found it to be the only interrupt moniter
MM> that will stop all the known viruses.

PT> Mike perhaps you should add a caveat to that statement. Secure
PT> neither detects, nor does it stop, Virus-101.

Right on Patrick...
sandy
p.s. Damn nice design on the code complex as HELL....

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2758 *Virus Info*
08-25-90 06:36:00 (Read 9 Times)
From: SANDY LOCKE
To: PAUL FERGUSON
Subj: REPLY TO MSG# 2740 (RE: REMAPPING...)
PF> Hello, Tom...
PF> .
PF> More than likely there was nothing like that at all. Keyboard
PF> remapping is an extremely complicated process and would take more than
PF> forethought on the part of the programmer. What you have seen us
PF> talking about here is figurative at best and personally, I would have
PF> to see it to believe it. (you know the old saying: "Believe none of
PF> what you hear and only half of of what you see."?) Although I do
PF> believe that is quite possible under the proper circumstances, it woul
PF> indeed be a rare occurance. Sometimes when receiving odd characters
PF> during telecommunications or not getting the exact same keys that you
PF> typed could be attributed to disparity (parity differences), differing
PF> data bits, stop bits, or even simply ANSI interpretation problems
PF> between Comm Programs. I've seen the smallest, simplest things like
PF> that have people pulling their hair out by the roots!
PF> .
PF> .....Clarke's Third Law
PF> Any sufficiently advanced technology is indistinguishable from
PF> magic.
PF> .
PF> .
PF> -Paul ^@@^........

well paul normally on hombase you are quite lucid... but as a long
time programmer I can testify the keyboard mapping is really quite
simple... no real problem and the business of using terminal control
code is quite as simple...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2759 *Virus Info*
08-25-90 06:39:00 (Read 9 Times)
From: SANDY LOCKE
To: CY WELCH
Subj: REPLY TO MSG# 2743 (RE: KEYBOARD REMAPPING....)
CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:

PF> Isn't it possible to remap some (or any) keyboard functions via
PF> communications with some funky ANSI control characters?....I seem to
PF> remember mention of this somewhere.....I really can't remember if was
PF> in the form of a question, though, or an answer.....It also made
PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...

CW> I think most of the "FAST" ansi replacements do not have the keyboard
CW> remapping so that danger is removed in those cases.
Well if you are referring to FANSI.SYS by hershey Microsystems it too
is vunerable to remap effects... and since it implemnt FULL ANSI 3.64
terminal control codes plus some extensions it is even more vunerable
to a whole class of tricks that go way beyond noremally keyboard
remapping... but to there credit they ahve include a way to turn this
"FEATURE" OFF... just most users get it off a BBS and never order or
look at the 50.00 set of docs that come when you pay for the
products...
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2760 *Virus Info*
08-25-90 08:49:00 (Read 9 Times)
From: PATRICIA HOFFMAN
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 2738 (ONTARIO VIRUS)
PL> Patty, have you heard of such a Virus? I was in the TAG Support Echo
PL> and saw
PL> a message about a TAG Sysop who contracted that virus. Any Info?
PL> Supposedly the Virus is scanned in version SCANV66.ZIP.

Yep, I've heard of this one....I was the one that named it after it was
submitted by Mike Shields (Sysop of 1:244/114). Ontario is a memory resident
generic infector of .COM and .EXE files, including COMMAND.COM. Infected .COM
files will increase in length by 512 bytes. Infected .EXE files will increase
in length between 512 bytes and 1023 bytes on disk drives with standard 512
byte sectors. When files are infected, the virus adds itself to the end of the
program, and then places a jump at the beginning so that the virus's code will
always execute before the program that was infected. Ontario is not a
low-system memory TSR, it goes memory resident installing itself at the top of
free memory, but below the 640K line. Available free memory will decrease by
2,048 bytes. Once the virus has installed itself in memory, any program which
is executed will then become infected.

It was reported with the sample I received from Mike that infected systems may
experience hard disk errors, but I was unable to duplicate that here. This may
only happen in severe infections, I try not to let them get that severe when
I'm working with a virus :-).

Scan V66 and above can detect the Ontario Virus on both .COM and .EXE files.
Unfortunately, Ontario is one of the viruses that uses a "double-encryption"
technique to prevent scanners from being able to use a search string to detect
it, so there isn't a simple way to find it with a hex string and a utility such
as Norton Utilities. As of right now, there aren't any disinfectors available
for the Ontario virus, so if you happen to be infected with it you need to
remove the infected programs and replace them with clean copies from your
uninfected backups or original write-protected distribution diskettes.

A more complete description of the Ontario virus is in VSUM9008, which was
released on August 10. The above is just off of the top of my head, which
happens to hurt right now. Hope it is understandable.....

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2761 *Virus Info*
08-25-90 09:02:00 (Read 10 Times)
From: PATRICIA HOFFMAN
To: YEN-ZON CHAI
Subj: REPLY TO MSG# 2741 (ANTI VIRUS VIRUSES)
YC> DB> well..here is a question..where exactly did viruses originate
YC> DB> anyway..was it in this country or others?
YC>
YC> Probably where hacker exists, virus exists.
YC>

Well, the two oldest known viruses for MS-DOS are the Pakistani Brain and
VirDem. The Brain is from Pakistan, VirDem from West Germany. Both of these
originated in 1986. Both have known authors. The viruses from 1987 include
Jerusalem and the Suriv series from Israel, Alameda/Yale from the United
States, and 405 from Austria or Germany.

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2762 *Virus Info*
08-25-90 09:07:00 (Read 10 Times)
From: PATRICIA HOFFMAN
To: KEVIN HIGGINS
Subj: REPLY TO MSG# 2757 (RE: HAVE ANYONE TRIED SECURE ?)
KH> I took a look at it, but to be realistic, when you run a BBS, or
KH> are continuously updating your files as new releases come out, you
KH> could easily get to the point where you spend more time reconfiguring
KH> the anti-virus program than you would getting any work done. I find it
KH> much more efficient to scan every file for viruses as soon as I get it
KH> on my system, then rezip it, if I'm not going to use it... a simple
KH> .bat file can be used such that if you want to check multiple files,
KH> you can just feed the file names on the command line and let the .bat
KH> file take care of unzipping, scanning and rezipping the file.
KH> Be best if someone would write a program that would do this, but I
KH> haven't found one yet.

You might want to take a look at CheckOut and Shez.

CheckOut uses ViruScan to check .ARC, .PAK, .ZIP, .LZH, and other archive
formats for viruses by automatically creating a temporary directory and
unarchiving the file to it. It then invokes Scan to check the executable
files. One of its nice features is that it will never invoke a program in that
temporary directory, as well as you can have it either delete an infected file
or move it to a badfiles directory. It will also find archives which are
damaged for you. It can be invoked easily from a .BAT file, such as if you
want to run it at midnight against all new uploads.

Shez is another program which can be used to scan inside archives. It is
interactive, so you need to manually invoke it. After you have selected the
archive and listed the contents, hitting ctrl-Z will result in Scan checking
the contents.

There are other scanning shells which handle archived files, though these are
the two that I've used regularly and are the most familiar with. I was also
involved in the beta testing of CheckOut with some known to be infected files,
and it does function properly in that instance. I've also tested Shez with
infected files, and it works well....

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2763 *Virus Info*
08-24-90 16:53:00 (Read 8 Times)
From: PRAKASH JANAKIRAMAN
To: ALL
Subj: LEPROSY
Exactly what is the Leprosy virus supposed to do? I was informed that it had
been included in McAfee's latest version of Scan, but, having never used Scan
before in my life, and never having encountered a virus, are there "symptoms",
shall we say, caused by the Leprosy virus, or for any virus? If there is a
textfile explaining what each virus is capable of doing, and how it can be
detected, I'd like to get a copy of it, if any of you know where I can get
something of that sort.

Also, does anyone have the number to McAfee's BBS? I'd like to become a user
over there as well. (I remember it being in the 408 area code, but I can't
recall the actual number). Anyways, thanks a bunch, all...

Prakash
--- TBBS v2.1/NM
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)



Msg#: 2896 *Virus Info*
08-26-90 20:55:00 (Read 9 Times)
From: HERB BROWN
To: SANDY LOCKE
Subj: REPLY TO MSG# 2754 (RE: COMMUNICATION VIRALS)
With a sharp eye <Aug 25 06:10>, Sandy Locke (1:204/869) noted:
SL> Well considering that I am hosting chuck forsberg today ... hes down
SL>here for the sco developer forum I will put the question to him
SL>directly... but as one of the suggestors for feature addition to the
SL>protocol in another personna... ZMODEM will INDEED allow one to
SL>transmit a FULL path name... however this is mitigated by the ability

I have the understanding that other protocols would do this, not by choice.
Without the security on the recieving end, this could be disasterous, to say
the least.. I would be happy to hear what you find.. Speaking of registering
zmodem, is it still free to sysops? You can asnwer that in net-mail.. :-)

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 2897 *Virus Info*
08-24-90 13:39:00 (Read 7 Times)
From: MIKE MCCUNE
To: VESSELIN BONTCHEV
Subj: REPLY TO MSG# 2746 (REMOVING JOSHI)
In your recent letter to me you wrote to me you suggested that I check for the
virus before trying to remove it. Now that I've got a working copy of the Joshi
(and don't have to let someone else test RMJOSHI), I rewrote the program to
check for the virus first.
mov dx,80h
mov cx,1h
mov bx,200h
mov ax,201h
int 13h
or ah,ah
jnz read_error
es:
cmp w[bx],1feb
jnz no_virus
mov cx,000ah
mov ax,301h
int 13h
or ah,ah
jnz write_error
mov cx,9h
mov ax,201h
int 13h
or ah,ah
jnz read_error
mov cx,1h
mov ax,301h
int 13h
or ah,ah
jnz write_error
mov ah,9h
lea dx,remove_message
int 21h
int 20h
remove_message:
db 'Joshi Removed$'
no_virus:
mov ah,9h
lea dx,virus_message
int 21h
int 20h
virus_message:
db 'Joshi not found$'
read_error:
mov ah,9h
lea dx,read_message
int 21h
int 20h
read_message:
db 'Read Error$'
write_error:
mov ah,9h
lea dx,write_message
int 21h
int 20h
write_message:
db 'Write Error$'
I wrote it for the shareware A86, but it should assemble under MASM, TASM or
WASM with minor modifications. Next I will scan the memory for the virus
because the remover won't work while the virus is active in memory....<MM>.

--- Opus-CBCS 1.13
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 2898 *Virus Info*
08-25-90 23:46:00 (Read 6 Times)
From: TALLEY RAGAN
To: MIKE MCCUNE
Subj: REPLY TO MSG# 2897 (RE: REMOVING JOSHI)

In a message to Talley Ragan <08-23-90 15:23> Mike Mccune wrote:

MM>>No, it just modifies the partition record to remove the virus.
MM>>If the virus isn't there, it still modifies the partition
MM>>record.

Thanks for the information. That clears up the question just
fine.

Talley



--- ZAFFER v1.01
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)



Msg#: 2899 *Virus Info*
08-23-90 17:31:00 (Read 6 Times)
From: DAVID BURGESS
To: MARTIN NICHOL
Subj: REPLY TO MSG# 2661 (WHAT'S THE SOLUTION?)
In a message to michael tunn <21 Aug 90 20:29:00> Martin Nichol wrote:

MN> mt said => It seems to me our Virus checking programs will just
MN> mt said => get bigger and bigger as more viruses and strains of
MN> mt said => the same viruses are discovered. If so (and if their
MN> mt said => development is excelerating) then we may find in the
MN> mt said => near future that it has become impossiable to deal
MN> mt said => with the outbreaks!
MN> mt said => Do we do develop new Operating Systems which are far
MN> mt said => more secure!

MN> Develope different virus scanning programs. Make them more generic
MN> where virus signatures/characteristics can be kept in a seperate
MN> file and the virus scanner just reads the
MN> file and interprets it accordingly.

That opens the door to having the virus scanner or part of the virus scanner
to become contaminated.

--- [Q] XRS 3.40
* Origin: Eurkea! I've found the secret elephant playground (RAX 1:124/3106.6)



Msg#: 2900 *Virus Info*
08-17-90 21:06:00 (Read 6 Times)
From: CHRIS BARRETT
To: PATRICIA HOFFMAN
Subj: RE: VIRUCIDE V1.2
Thanks for the info.. If ya remeber the name could ya tell us it..
I think i'll stick with the ScanV?? and CleanP?? for now then..

Chris..
--- TBBS v2.1/NM
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)



Msg#: 2901 *Virus Info*
08-17-90 06:26:00 (Read 6 Times)
From: ZEBEE JOHNSTONE
To: ALL
Subj: MAC VIRUS
Anyone know anything about a mac virus which:

Sets the delete flag on any folder with a name which starts with the
letter "o" or higher (eg system...)

IT doesn't actually delete the folder, the machine will still boot, but the
folder is missing from the desktop and the delete flag is set.

Weird one hmm?

---
* Origin: Lighten up! What man can make, man can break! (3:680/813)



Msg#: 2902 *Virus Info*
08-19-90 22:31:00 (Read 6 Times)
From: BRENDON THOMPSON
To: PATRICIA HOFFMAN
Subj: "STONED 2"
Patti, I sent you a message the other day about a new variant of
"Stoned" that I found in Christchurch, New Zealand. It had reference
to some "S & S program for testing anti-virus software" and the
phone number 0494 791900 in it.

I have since had the time to pull it to bits, and it is only the
original "Stoned" virus. The code at the start of the sector is
still the same, but some clown has modified the message after
location 65H.

I'm still pleased to send you a specimen by airmail if you like,
but it ain't "Stoned 2".

Regards..

... Doon.
--- Via Silver Xpress V2.26
* Origin: TONY'S BBS - Gateway to New Zealand. (3:770/101)



Msg#: 2903 *Virus Info*
08-19-90 09:25:00 (Read 6 Times)
From: DONALD ANDERSON
To: FRIAR NESTOR
Subj: RE: LOOKIN' FOR FUN?
I always looking for fun

--- KramMail v3.15
* Origin: get real (3:621/221.0)



Msg#: 2904 *Virus Info*
08-26-90 23:36:00 (Read 7 Times)
From: GLENN JORDAN
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2761 (ANTI VIRUS VIRUSES)
PH> The Vacsina Viruses were written in Bulgaria to seek out and destroy
PH> certain other viruses, or at least that was their original purpose.

In examples of the VACSINA virus I have investigated, I have found the
following odd behavior, which I wonder if you have also noted :

.COM files of over a certain size are infected at first bite, but .EXE
files are different. It takes two Exposures to infect an .EXE file, each of
which adds a bit to the file length, but only at the second exposure do you get
a live virus, signaled by a short beep. A tiny .EXE will take the first
exposure, but never complete on a subsequent exposure to become a live virus.
I wonder if in some way this behavior, which I have not seen in any other
viruses so far, is in some way related to the original "anti-virus" nature of
this beast ?

--- XRS 3.30-DV (286)
* Origin: Jordan Computer Consulting (RAX 1:151/223.3)



Msg#: 2905 *Virus Info*
08-26-90 07:54:00 (Read 6 Times)
From: KEN DORSHIMER
To: SANDY LOCKE
Subj: REPLY TO MSG# 2756 (RE: CRC CHECKING)

On 25-Aug-90 with bulging eyes and flailing arms Sandy Locke said:

SL> check out Gilmore Data Systems in LA authors of the OLD FICHECK and
SL> XFICHECK... the techniques is called CRC padding after the addition of
SL> the viral code the file is padded with a given number of bytes to make
SL> the CRC Polynomial come out with the same result... the FCB is then
SL> Patched to the original file length leaving nothing for standrad CRC
SL> checkers to detect... Childs play really... sandyp.s. in the case of
SL> most stealth viruses... the file read code is simply altered to
SL> disinfect the file as the CRC checking program reads it... agains
SL> simply childs play...
SL>

could you send me this article? i still believe that the virus would have to
know your crc algorithm in order to perform this magic. additionally if the
file is padded, it's size would increase and would be detected that way.
correct? sooo, the person writting the virus would require a copy of your
file to disassemble, see how you performed your checks, then create a means
to circumvent it. sounds like a lot of trouble to me for very little gain.
catch ya on the rebound.

...All of my dreams are in COBOL...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2906 *Virus Info*
08-26-90 23:58:00 (Read 6 Times)
From: KEN DORSHIMER
To: STEVEN TREIBLE
Subj: REPLY TO MSG# 2751 (RE: VOICE NUMBER)

On 26-Aug-90 with bulging eyes and flailing arms Steven Treible said:

ST> Ken, I haven't mailed the disk yet as you can see. I'd like to have
ST> your voice # so I can talk to instead of sending Net Mail. Thanks,
ST> Steve.

you got it look for it in a net-mail-o-gram. i'd rather not leave it in the
public msg area as everyone would try to call and shoot the breeze. :-)

...All of my dreams are in COBOL...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 2907 *Virus Info*
08-26-90 13:09:00 (Read 6 Times)
From: PAUL BENDER
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2744 (VIRUS RESCUE & F-PROT RELEASES)
* Replying to a message originally to All

PH> Both programs are also file requestable by other systems.
PH> File requests should ask for magic file names as follows:
PH>
PH> F-PROT for the latest copy of F-PROT (currently
PH> FPROT112.ZIP)
PH> RESCUE for the latest version of Virus Rescue
PH>

Would it be possible for you to hatch these out into SDS or arrange for the
authors to do so?

Paul

--- RemoteAccess 0.04a via QEcho 2.
* Origin: -=* Rassi's Retreat *=- 10pm to 8am Only! (615) 831-1338 (1:116/37)



Msg#: 2908 *Virus Info*
08-26-90 12:44:00 (Read 7 Times)
From: PATRICIA HOFFMAN
To: ALL
Subj: VIRUS_INFO INTRODUCTION & RULES
Welcome to the VIRUS_INFO echo. The purpose of this echo is to allow
BBS users and sysops to ask questions about computer viruses and to be
able to get back up-to-date information. Discussion topics may include,
but is not necessarily limited to:

- what are viruses
- how to prevent getting infected
- how to determine if your system is infected
- how to clean up an infected system and salvage as much information
as possible
- reviews and announcements of new anti-viral products and product
releases.

There was a lot of hysteria in the press over the Columbus Day/
DataCrime/October 12 virus, for example, but little mentioned of how
rare the virus is or how to determine if a system is infected with it
and how to remove it. This type of information is an example of what
this echo is intended to carry.

Some messages appearing in this conference may be cross-postings from
the Dirty_Dozen echo which is sysop only. Cross-postings may only be
done by the originator of the message. For example, several of my
messages posted in the Dirty_Dozen echo will be cross-posted here.
Messages from the HomeBase/CVIA BBS run by Mr. John McAfee in Santa
Clara, CA and/or CVIA bulletins may be posted here by Patricia Hoffman,
these are being done with Mr. McAfee's permission. Replies to these
messages, as well as netmail received at 1:204/869 for Mr. McAfee, is
manually transferred to his system as it is received.

Conference rules are very simple.....
1. Discussions of how to write a virus, specific technical discussions
of how a virus works, or anything of an illegal nature, are not
allowed. This rule is *not* open to debate.
2. Messages with a sexually suggestive nature are not allowed, please keep
in mind that minors as well as adults participate in this conference.
3. Discussions of a ethical or retorical nature that lead into a debate are
considered off-topic in that they will not ever be resolved and do not
help anyone. An example in this category would be a discussion in the
area of "Should live viruses or virus disassemblies be made available
to the public?". These questions and topics will be allowed until such
a point that they start to severely disrupt the echo, or start a flame
war. At that point, the moderator will request that the discussion be
discontinued.
4. Be courteous to your fellow echo participants, and remember there
is no such thing as a dumb question, except for the question that some-
one is afraid to ask. Everyone needs to help everyone else understand
viruses and why they are a problem.
5. This conference is not to be distributed thru Group-mail or any
other mail processor which will obscure the ability to track a
message back to an originating system. All messages must have
seen-bys and path statements if the BBSs participatings software
can generate them.
6. If you have a question or problem of an extremely sensitive nature,
consider sending it NetMail to 1:204/869 or 99:9403/2 instead of
posting it here. If you are netmailing a file that you think is
infected, be sure to send a message in NetMail with it so I know
what it is, I'll be sure it gets to someone to get analysed for you.
Do not under any circumstances host route a file that you think is
infected. Suspect files may also be sent on diskette via US Mail
to the following address:
Patricia Hoffman
1556 Halford Avenue #127
Santa Clara, CA 95051
7. This conference is available to FidoNet and EggNet systems.
The conference echomail tag in FidoNet is VIRUS_INFO, in EggNet
the conference is available as E_VIRUS_INFO.
8. This conference is available on the FidoNet Backbone. While you
are welcome to freely pass this echo along to other systems, out
of region links must be approved by moderator of the echo. Gating
the echo into another network or Zone must be approved by the
conference moderator.
9. Opinions are welcome in the conference, however the ethics of the
behavior of people that write viruses, or name calling, is frowned
upon. Likewise, accusations of virus writing are strictly forbidden.
Please keep opinions down to a single message, and do not
repeatedly post them, as these messages tend to water down the
purpose of the conference and degrade the level of information that
is being presented.
10. Handling of off-topic messages or messages that violate the
conference rules will be done by the moderator. First and second
warnings on these messages will be in private Netmail. Please
do not respond to the off-topic messages so that the conference
doesn't get further off-track. Let the moderator do the moderating.
11. Handles are allowed in this conference, however sysops of boards
carrying the conference are expected to be able to determine which
of their users entered a message if a problem arises. This in
effect means, for example, that Opus systems must not set this echo
up to allow anonymous messages.
12. If a matter arises where the moderator needs to contact a participant
in the echo, the moderator will contact the system where the message
was entered and request that the sysop allow the user netmail access,
or call the participant with a request for them to logon to the
moderator's system or provide a phone number with the participant's
permission. Sysops are not expected to provide their users' phone
numbers to the moderator without the user's express permission, their
privacy is important. There are times, however, when a phone call
or chat can resolve a problem much faster than any other route. This is
the only reason for this rule.
12. This echo is not a programming echo for answering questions
on how to code programs in assembler. If you want to exchange
assembler (or any other program language) techniques, please
locate an appropriate programming echo or start your own echo.

Patricia M. Hoffman is the moderator of the VIRUS_INFO echo conference. She
has previously used the name "Merry Hughes" in moderating this conference, and
is the originator of the conference and the original moderator.

Patricia Hoffman is also the author of the Virus Information Summary List, and
is an independent anti-viral researcher.

Please contact the moderator, Patricia Hoffman, at 1:204/869 or 99:9403/2
if you need assistance on setting up an echofeed for this echo to your
system.

thanks...
Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2909 *Virus Info*
08-26-90 15:13:00 (Read 7 Times)
From: PATRICIA HOFFMAN
To: PRAKASH JANAKIRAMAN
Subj: REPLY TO MSG# 2763 (LEPROSY)
PJ> Exactly what is the Leprosy virus supposed to do? I was informed that
PJ> it had been included in McAfee's latest version of Scan, but, having
PJ> never used Scan before in my life, and never having encountered a
PJ> virus, are there "symptoms", shall we say, caused by the Leprosy virus,
PJ> or for any virus? If there is a textfile explaining what each virus is
PJ> capable of doing, and how it can be detected, I'd like to get a copy of
PJ> it, if any of you know where I can get something of that sort.

The Leprosy virus is a non-resident overwriting virus. It infects .COM and
.EXE files, overwriting the first 666 bytes of the file. Symptoms of it
include that infected files will not execute properly...instead of what they
are supposed to do, they will upon execution, infect other files then display a
message and end. A complete description of this virus and all (with the
exception of V2P2, V2P6, V2P6 and Stoned II) known MS-DOS viruses as of August
10, 1990 is available in the Virus Information Summary List. Its current
version is VSUM9008.ZIP. It is available on my system at 408-244-0813, as well
as many other systems, including McAfee's BBS. Check around your area before
you make the long distance call, it could save you the phone call cost.

PJ>
PJ> Also, does anyone have the number to McAfee's BBS? I'd like to become a
PJ> user over there as well. (I remember it being in the 408 area code, but
PJ> I can't recall the actual number). Anyways, thanks a bunch, all...

The number of the HomeBase BBS is 408-988-4004. The 9600 HST number is
408-988-5138.

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 2910 *Virus Info*
08-24-90 23:05:00 (Read 7 Times)
From: CY WELCH
To: TALLEY RAGAN
Subj: REPLY TO MSG# 2898 (REMOVING JOSHI)
In a message to Mike Mccune <20 Aug 90 17:09:00> Talley Ragan wrote:

>MM>> Just be sure to boot off a clean diskette to remove the
>MM>>virus from memory, otherwise the virus will not be removed.
>MM>> If RMJOSHI is used on an unifected hard drive, it will
>MM>>destroy the partition table. This next program, RETURN.COM
>MM>>will restore the partition table.
>MM>> I will post this program in my next listing...<MM>.

TR> Does this mean that RMJOSHI.COM, if run on an uninfected hard
TR> drive by it self is a virus?

Actually I think it would fit the description of trojan rather than virus as it
doesn't replicate.

--- XRS! 3.40+
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)



Msg#: 2911 *Virus Info*
08-26-90 21:13:00 (Read 6 Times)
From: TOM PREECE
To: SANDY LOCKE
Subj: REPLY TO MSG# 2758 (RE: REMAPPING...)
As you may see by looking at my other entry's, I have been loading a cache
program that is clearly implementing software to remap my keys to s certain
extent. If this is possible as a glitch, its is obviously possible as an
attack. Let's hope it never comes to that.
--- TBBS v2.1/NM
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)



Msg#: 2993 *Virus Info*
08-27-90 07:54:00 (Read 7 Times)
From: JAMES DICK
To: KEN DORSHIMER
Subj: REPLY TO MSG# 2762 (RE: HAVE ANYONE TRIED SECURE ?)
On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking Broccoli Jello
and drinking jolt, Ken Dorshimer wrote to Kevin Higgins, TO WIT...

KD > sounds like a plan to me. it would actually be fairly simple to write
KD > a
KD > program to look at all the files in your upload directory, unpack them
KD > based
KD > on the extension, scan them, then re-compress them (if needed). of

Sounds like CHECKOUT....available here, homebase excaliber! and others as
CKOT11.*

-={ Jim }=-



--- QM v1.00
* Origin: The Clipperist - Home to happy Clippheads in Ottawa, Canada
(1:163/118.0)



Msg#: 2994 *Virus Info*
08-27-90 19:34:00 (Read 6 Times)
From: PHILLIP LAIRD
To: ALAN DAWSON
Subj: REPLY TO MSG# 2750 (RE: SCAN WEIRDNESS)
** Quoting Alan Dawson to Patricia Hoffman **
>among them a SCAN-known Dark Avenger. I SCAN this floppy from
>the C
>drive, and the "hey, nothing to worry about there" report comes
>back.
>Strange. I SCAN it again. This time 'round, SCAN barfs after
>
>--- Opus-CBCS 1.13
> * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand
>(3:608/9.0)
** End of Quote **

Allan, I NEVER SCAN from the C Drive or any hard disk. I always scan from a
write protected Floppy Diskette in Drive A. I also have a third system (Yep
that's right a third system to do all my scanning from. However, I have never
had happen to me what happened to you. I did one time find Scan.EXE infected
at my place of employment when I didn't write protect the floppy and scanned
the b drive, PLEASE write protect the floppy or SCAN.EXE on the hard drive...

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 2995 *Virus Info*
08-27-90 19:50:00 (Read 10 Times)
From: PHILLIP LAIRD
To: SANDY LOCKE
Subj: REPLY TO MSG# 2753 (RE: VIRUS ORIGINALS)
Sandy, maybe this might help. I have read an excellent book on the Subject of
Origins of Viruses, but let me quote you guys first...

** Quoting Sandy Locke to Sky Raider **
>SR> effort to see what kind of stuff could be done with them,
>a group of
>SR> programmers (financed by the US government as I recall)
>institued a se
>SR> programs that would attempt to 'beat' others in taking
>over a computer
>SR> system. These programs led to a gaming system known as
>the CORE WARS.
>SR> today there is an International Core Wars Society.
>
>SR> I think it can be easily seen how a program to destroy/circumvent
>a st
>SR> operating system can develope into a virus.
>
>SR> I tried to double check this information for accuracy,
>names, dates, e
>SR> but it seems I have deleted this file. I will try to get
>further info
>SR> you, but beleive this info is shrouded in secrecy, and
>may be hard to
>SR> relocate.
>
>SR> So, the original viruses did come from the US (and even
>possibly with
>SR> government help).
>
>SR> Ivan Baird
>SR> * Origin: Northern Connection, Fredericton, N.B. Canada
><HST 14.4K>
>SR> (1:255/3)
>WHAT a LOAD of UNADULTERATED CRAP... redcode is simply a GAME
>created by
>bored programmers... ORIGINAL CORE WARS games were created
>as far back
>as 1969 back on the OLD IBM 360 architectures under both OS/MFT
>and
>OSMVT OS's... neither had anything to do with so-called secret
>financing by the US government...BTW I was AROUND and A Systems
>Programmer during that period... we created our own versions
>when we
>heard of the rumours... it was an old system programmers game
>designed
>to give Egotistal programmers some lighthearted fun... at this
>point
>ALL code ran in real Address space and redcode hadnt even been
>though
>of... the MUCH later article by Scientific American in 1979
>gave this
>fun with out harm via the redcode interpreter implemented on
>early 6502
>and 8080 systems... really... I am going to have to move to
>canada...
>sounds like there are some really potent and fun drugs in circulation
>up there... jeese... what a simp...
> sandy
>
>
>--- QM v1.00
> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
>(1:204/869.0)
** End of Quote **

O.K. The above message is what I am quoting to you....

If you get a chance, you can pick this book up at Wladen Software at the
following locations in California and maybe other bookstores near you can order
the book, too:

Viruses, A High Tech Disease
By Ralph Burger
Published by Abacus
ISBN 1557550433
Retails at 18.95 US

Can be picked up at the following Walden Software Stores:

Doly City, Ca (415) 756-2430
San Leandro, Ca (415) 481-8884

It starts from way back when...

Phillip Laird

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 2996 *Virus Info*
08-27-90 19:58:00 (Read 7 Times)
From: PHILLIP LAIRD
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 2760 (RE: ONTARIO VIRUS)
** Quoting Patricia Hoffman to Phillip Laird **
>after it was submitted by Mike Shields (Sysop of 1:244/114).
> Ontario is a memory resident generic infector of .COM and
>.EXE files, including COMMAND.COM. Infected .COM files will
>increase in length by 512 bytes. Infected .EXE files will
>A more complete description of the Ontario virus is in VSUM9008,
>which was released on August 10. The above is just off of
>the top of my head, which happens to hurt right now. Hope
>it is understandable.....
>
>Patti
>
>
>--- QM v1.00
> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
>(1:204/869.0)
** End of Quote **

Yea, I think Mike was the one the message came from I read about. He Was
instrumental in helping us with another problem he found, too. I am sure that
he is on the up and up about the hard disk problems. Nope, I don't have the
Ontario Virus that I know of! I read about the Virus after I had posted to
you, Thanx for the info. Nice to know where it loads in Mem, that would make
a util easier to write once I had a fix on what you have already told me.

I will see if I can locate that message from Mike about the Virus originally
and let you read it...

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 3029 *Virus Info*
08-26-90 14:01:00 (Read 7 Times)
From: RICK WILSON
To: SANDY LOCKE
Subj: RE: CORE WARS
yep core wars was something that a bunch of people that had access to systems
messed with after hours, there was a artical in DDJ a few years ago about a
bunch of em out a Berkely of Stanford or something. really weired how these
folks that have recently ( within the last 8 to 10 years ) become such experts
on micros and mainframes and their history. later...
Rick

--- Telegard v2.5 Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 3030 *Virus Info*
08-26-90 16:45:00 (Read 7 Times)
From: JOE MORLAN
To: CY WELCH
Subj: KEYBOARD REMAPPING.
In addition to PKWares's Safe-ANSI, ZANSI does not support keyboard remapping.
However, NANSI.SYS does have keyboard remapping.

--- Telegard v2.5 Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 3070 *Virus Info*
08-30-90 23:11:45 (Read 9 Times)
From: SKY RAIDER
To: SANDY LOCKE
Subj: REPLY TO MSG# 2753 (Re: VIRUS ORIGINALS)
Firstly, I did not wish to anger you (although I seem to have done just this),
but only sought to answer your question to the best of my abilities (which you
seem to doubt).

Secondly, I stand by my original assertions that viruses were developed through
the original Core Wars gaming system. This has been corroborated by various
'virus gurus' here at the local university. In fact, without prompting, one
mentioned Bell Labs. Since, as you state, you are a Systems Programmer - it
should be obvious to yourself that a RedCode program could be easily adapted to
the microcomputer world. It should also be equally as obvious that these
RedCode experiments have laid the groundwork for many of the various virus
types infecting micros today (ie. trojans, worms, etc.).

Thirdly, I did not state, nor did I mean to imply (as you seem to believe),
that these RedCode 'fighter programs' are in fact the viruses we see today -
merely that they (RedCode fighters) provided the techniques for the micro
viruses. Furthermore, since the RedCode experiments were "old system
programmers games designed to give Egoistical programmers some lighthearted
fun", and since it is generally accepted that virus writers are in this for the
same reasons (the egotistical, not the fun), I find it hard to beleive that you
cannot equate the two.

If you will note in the extract below, I am not the only person who who
beleives the RedCode experiments were the forerunners of the modern viruses (in
fact, it may be noted they refer to these as viruses - which, of course, they
were);

From the Sept./89 issue of Popular Science;

Despite all the recent publicity, viruses aren't new. In the 1950's researchers
studied programs the called "self-altering automata," says Mike Holm...

In the 1960s computer scientists at Bell Laboratories had viruses battling each
other in a game called Core Wars. The object was to create a virus small enough
to destroy other viruses without being caught....

Also, just for the record, allow me to mention that this is an American
publication (apparently there are strange drugs down there too).

Again, for the record, allow me to mention that it is fact that Robert Morris,
Sr. was a participant in the Core Wars games. Is it a coincidence that his son
wrote the Internet Virus, or did his father give him the building blocks to
build upon? (With my apologies to the Morris family, but I felt this example
might carry some weight with Know-it-all System Programmers).

To answer your original question, in a form that you may deem acceptable (ie.
no RedCode, no mainframe systems, the US is not the origin - all those naive
things), the original micro virus was (at least in the IBM world, I can not be
sure this applies to early Apple ][ systems, or even the Pets from Commodore)
the "Pakistani Brain", released in Jan. '86.

But it must be noted (although I feel you will reject this also (ie. mainframe,
US, etc)), in Nov. '83, Fred Cohen, in 8 hours wrote a virus which attached
itself to users programs, and proceeded to use this program to gain access to
all system rights (in an average time of 30 mins). Also, although I don't have
a date (the computer name itself may give some indication of age) - on a UNIVAC
1108, with a secure operating system using the Bell-Lapadula model for OS
security, a virus was created that: infected the system in 26 hours, used only
legitimate activity with the Bell-Lapadula rules, and the infection took only
250 (approx.) of code (From "Computer Security: Are Viruses the AIDS of the
Computing Industry?", by Prof. Wayne Patterson, Chairman, Dept. of Computer
Science, University of New Orleans.).

I am not interested in a war of words, so I will suggest some reading before
you go off half cocked to this reply - "Computer Security; A Global Challenge,"
J.W. Finch & E.G. Douglas, eds., Elsevier Science Publishers, North-Holland -
especially the chapters by Fred Cohen. I have not read this, but will try to
when it becomes available to me. Also see the message posted by Phillip Laird.
--- TBBS v2.1/NM
* Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K> (1:255/3)


Msg#: 3154 *Virus Info*
08-28-90 06:33:00 (Read 7 Times)
From: PATRICIA HOFFMAN
To: ALAN DAWSON
Subj: REPLY TO MSG# 2994 (SCAN WEIRDNESS)
AD> Anybody heard of this? I've got a floppy with some viruses on it,
AD> among them a SCAN-known Dark Avenger. I SCAN this floppy from the C
AD> drive, and the "hey, nothing to worry about there" report comes back.
AD> Strange. I SCAN it again. This time 'round, SCAN barfs after 64K of
AD> the memory check, telling me Dark Avenger is in memory, power down,
AD> load the .45, get the cyanide tablet ready and so on.
AD> But DA of course is NOT in memory or active in any way. It is,
AD> however, on the floppy, unrun.
AD> The above occurred with SCANV64. Out of curiosity, I cranked up
AD> SCAN-54 and -- EXACTLY the same result.
AD> AST Bravo 286, no TSRs, nothing else loaded, clean (normal) boot
AD> just performed.
AD> I have a bunch of viruses that I don't expect SCAN to find --
AD> ever. But this kind of thing has never happened to me before. Can
AD> anyone match this story, or event?

There are a couple of possibilities here. First, if the virus is on a
non-executable file, such as one with a .VOM or .VXE extension, Scan won't find
it since it is not one of the file extensions it checks for Dark Avenger. In
this case, a subsequent run of Scan may find it in memory anyways since the DOS
buffers in memory are not cleaned out between program executions. If this is
the case, running Scan with the /A option will find it on any file, regardless
of extension.

Likewise, if your copy of Dark Avenger has ever had a disinfector run against
it, it may have some "dead" Dark Avenger code after the end of file mark, but
within the last sector of the program as allocated on disk. In this case, Scan
won't find it on disk, but may later find it in memory since the code after the
end of file mark was read in with the rest of the last sector of the program to
memory. This is what is sometimes referred to as a "ghost virus", it isn't
really the virus, just dead remnant code remaining in the slack space in the
sector. It can't be executed. Running a disk optimization utility such as
Speed Disk from Norton Utilities will get rid of the "ghost virus". They are
caused by the way DOS fills out the end of the buffer before it writes it out
to disk, doesn't always occur when disinfecting programs, but it sometimes will
occur.

The other case is if your copy of Dark Avenger does not occur at the correct
place in the file. Dark Avenger always adds its code to the End Of Programs.
If your copy happens to have it at the beginning of the program, or perhaps
imbedded in the middle where it shouldn't be, it may not get found. In this
case, your copy doesn't match either of the Dark Avenger's that McAfee has.

Hope that helps....those are the only three cases that I've heard of a similar
problem to yours.

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3155 *Virus Info*
08-28-90 15:16:00 (Read 5 Times)
From: KEN DORSHIMER
To: JAMES DICK
Subj: REPLY TO MSG# 2993 (RE: HAVE ANYONE TRIED SECURE ?)

On 27-Aug-90 with bulging eyes and flailing arms James Dick said:

JD> On Fri, 24 Aug, 1990 at the ungodly hour of 23:37, while ducking
JD> Broccoli Jello and drinking jolt, Ken Dorshimer wrote to Kevin
JD> Higgins, TO WIT...
KD >> sounds like a plan to me. it would actually be fairly simple to write
KD >> a
KD >> program to look at all the files in your upload directory, unpack them
KD >> based
KD >> on the extension, scan them, then re-compress them (if needed). of

JD> Sounds like CHECKOUT....available here, homebase excaliber! and
JD> others as CKOT11.*
JD>
thanks but you might want to tell kevin higgins about that. :-) as for me,
hell i'll write the bloody thing myself. just wouldn't be a day without some
programming in it.

...All of my dreams are in COBOL...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 3156 *Virus Info*
08-27-90 14:14:00 (Read 5 Times)
From: MICHAEL CHOY
To: ALL
Subj: IN THE MAC WORLD
Disinfectant 2.0 was released in July...it has the Disinfectant INIT, which is
like SAM only it removes viruses as well as detecting them..it catches the
Frankie virusa whoch in an old virus that ran on mac emulators for Atari..I
guess nobody has to worry about that...it also has much more info on protecting
yourself from virus and such..

--- Telegard v2.5 Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 3157 *Virus Info*
08-27-90 20:25:00 (Read 5 Times)
From: JOE MORLAN
To: ALL
Subj: LHARC114?
I had heard that and infected version of LHARC was released last year under the
name LHARC114. I also heard that because of that, the next release of LHARC
was expected to be LHARC200 to avoid confustion with the virus. This week a
file appeared on a local board called LHARC114. I left a message to the sysop
to check it out and he says it's clean. The docs say that this is version
114b, the latest version.

Does anybody know what the deal is or was here? Is LHARC114 safe to use? Is
there a virus associated with this program? Thanks.

--- Telegard v2.5 Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 3158 *Virus Info*
08-28-90 15:01:00 (Read 6 Times)
From: KEVIN HIGGINS
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 3155 (RE: HAVE ANYONE TRIED SECURE ?)
Thanks for the info on CheckOut. I'd seen the file description usage
included in a .bat for for TAG, but never implemented it, or d/l'd the checkout
file because on my XT it sometimes takes awhile to dearc. a large .zip file--a
real pain for L/D types... Probably be wise to start using something like that,
though, since the BBS can do all the checking automatically following
uploads....
Guess most users won't mind waiting a minute or so, if it makes their d/l's
almost certifiably safe.
Kevin

--- TAGMAIL v2.40.02 Beta
* Origin: The Hornet's Nest BBS (1:128/74)



Msg#: 3177 *Virus Info*
08-28-90 18:10:00 (Read 6 Times)
From: RICK PERCIVAL
To: KEVIN HIGGINS
Subj: REPLY TO MSG# 3158 (RE: HAVE ANYONE TRIED SECURE ?)
> command line and let the .bat file take care of unzipping, scanning
> and rezipping the file. Be best if someone would write a program
> that would do this, but I haven't found one yet.
> Kevin

Hi there, you guys must be behind the times or something but there is a very
good program which does exactly what you are looking for. Its called CHECKOUT.
The version we are using over here is called CKOT11.ZIP and it is a little
pearler!!

What it does is, unzips a file, scans it and rezips it, menu driven or
command line driven. Try it, you'll love it.

--- FD 1.99c
* Origin: The Cyclops BBS Auckland NEW ZEALAND (3:772/170)



Msg#: 3178 *Virus Info*
08-14-90 09:39:00 (Read 7 Times)
From: DAN BRIDGES
To: KEN DORSHIMER
Subj: RE: CRC?
I've been reading, with interest, the messages about a program that provides a
demo of circumventing a single CRC generating program. I thought that its name
would be common knowledge, but apparently it isn't.

You were told the name of the file was MCRCx. May I suggest that you look for
it as FICHECKx. The one I got is v5 and has program called PROVECRC which
demonstrates the problem.

**********************
* FICHECK Ver 5.0 *
* MFICHECK Ver 5.0 *
**********************

(C)Copyright 1988,1989 Gilmore Systems
P.O. Box 3831, Beverly Hills, CA 90212-0831
U.S.A.

Voice: (213) 275-8006 Data: (213) 276-5263

Cheers,
Dan (no connection with the above firm).

--- Maximus-CBCS v1.02
* Origin: Marwick's MadHouse (3:640/820)



Msg#: 3179 *Virus Info*
08-18-90 14:19:00 (Read 7 Times)
From: YVETTE LIAN
To: FRED GOLDFARB
Subj: RE: VIRUS GROUPS....
FG> writing viruses". The idea I got was that there are actual
FG> "virus groups" similar to the game cracking groups you hear
FG> of occasionally, who's sole purposes are to write viruses,
FG> not for research's sake, but to infect people. Has anyone
FG> else heard of this before? Are there really such groups?
FG> Imagine, when a new virus comes out three or four groups
FG> claiming to be the writers.. Kinda like terrorist bombings
FG> only different. Come to think of it, I remember reading a

That'd be right... you would think that if these people were intelligent enough
to program something such as a virus they'd probably be better off not wasting
their time with it...

--- QuickBBS 2.64 (Eval)
* Origin: Virus Info .. how to do it and not get it ! (3:640/886)



Msg#: 3180 *Virus Info*
08-18-90 14:42:00 (Read 7 Times)
From: ROD FEWSTER
To: KERRY ROBINSON
Subj: RE: VIRUS CHECKERS
> In a message of <12 Jun 90 7:31:31>, Patrick Curry (1:133/425) writes:
>
> Rarely does a MAC get a virus It is an IBM phonomonum
^^^^^^^^^^^^^^^^^^^^^^^
Tell it to an Amiga user !! B-)

--- FD 1.99c
* Origin: The Edge of Reality .. THE NIGHTMARE BEGINS ! (3:640/886)



Msg#: 3181 *Virus Info*
08-30-90 13:01:00 (Read 7 Times)
From: BRIAN WENDT
To: ALL
Subj: NEWSPAPER CLIPPING
The following item appeared in a newspaper in Brisbane, Austsralia yesterday.
Anyone care to comment?

VIRUS ATTACKS STATE'S PERSONAL COMPUTERS

A sophisticated computer virus is feared to have infected Queensland Government
and home computers. The COMPUTER VIRUS INFORMATION GROUP at the QUEENSLAND
UNIVERSITY OF TECHNOLOGY has issued it first major warning to personal computer
users about the virus.

The virus, initially detected by the Israeli defence force, freezes computers
on September 22, the birthday of a character in Tolkien's book, 'Lord of the
Rings'.

A computer virus is a program designed to attach copies of itself to software
and disable a computer system, or destroy files. Acting technologist, MR
EMLYN CREEVY said the warning was issued after a State Government public
servant gave the virus to the group for investigation.

Mr Creevy said somputers infected with the virus - known as FRODO, 4096, or
CENTURY - would freeze on September 22 or until the end of the year unless it
was removed. He said the group expected to know if the virus had infected
computers in Queensland next week after users report the results of searches
they were requested to conduct. The group warned all personal computer
operators that there was a bug in the FRODO virus which prevented it from
displaying a message 'FRODO LIVES' on September 22 and instead caused the
computer to 'hang' or freeze.

"It is from the FRODO name that the significance of the 22nd September can be
identified," they said. "This is the birthday of Frodo Baggins in Tolkien's
story. Users are advised to theck for the virus as soon as possible.

Mr Creevy said the virus had the ability to avoid detection and spread but was
not 'seriously destructive'. He said it could become damaging if an expert
could disassemble the virus and change the instructions to wipe the computer's
disk. "I'd say there's people working on it somewhere although probably not
in Australia," Mr Creevy said.

An expert would have created the Frodo virus because it had only one bug while
most viruses had more.

Mr Creevy said more than 100 viruses were believed to exist worldwide.

ENDS

Brian Wendt
Sysop
SUNMAP BBS

--- Maximus-CBCS v1.02
* Origin: Sunmap BBS Node 5 (HST/DS) - Brisbane - Australia (3:640/206)



Msg#: 3182 *Virus Info*
08-28-90 19:33:00 (Read 7 Times)
From: SANDY LOCKE
To: PATRICK TOULME
Subj: REPLY TO MSG# 3177 (RE: HAVE ANYONE TRIED SECURE ?)
MM> Maybe I should say all virus that are in the "public domain".
MM> Virus 101 is a research virus that only a few people have (and
MM> you wrote). Nothing is fool proof but Secure is better than any
MM> other interrupt moniter.

PT>
PT> I agree with you, Mike.

and I have to concur with patrick, out of all the TSR type monitor
programs out there , SECURE is indeed the best of the group... BUT
PLEASE do NOT depend upon this as your ONLY protection... as on part of
a multilayered protection scheme it would be fine... I guess my real
problems with it stem from the NAME the Mark wasburn has chosen...it
can mislead the neophyte too easily...into thinking that it really is
the be-all and end-all of protection...I wouldnt hestitate to recommend
it over the socalled commercial products in this class... BUT again NOT
as a SOLE protection against viruses... sorry for any confusion my
comments may have caused...
cheers
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3183 *Virus Info*
08-28-90 19:35:00 (Read 6 Times)
From: SANDY LOCKE
To: ALAN DAWSON
Subj: REPLY TO MSG# 2749 (RE: VIRUS SCANNERS....)
DS> You can't win on this! I've been downloading for quite a while
DS> - always running a virus checker on the information. So, where
DS> did our virus come from? Off a shrink-wrapped anti-virus
DS> diskette one of our guys picked up in the US!

AD> Nothing new about this, as people learn all the time. One MAJOR
AD> company (really big, really well known) has shipped shrink-wrapped
AD> viruses twice -- once on purpose! Shrink wrap doesn't keep the bugs
AD> out.

UH ALAN... you mind sending the NAME of this vendor via private
e-mail... accidentally I can understand BUT ON PURPOSE??? what end
would this kind of action serve???
cheers
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3184 *Virus Info*
08-28-90 19:44:00 (Read 6 Times)
From: SANDY LOCKE
To: KEN DORSHIMER
Subj: REPLY TO MSG# 2905 (RE: CRC CHECKING)
well close... without discussing HOW its done... the file length is
altered back to the original length... its not that hard and does point
out one of the MAJOR problesm with crc scanners...that is that the
critical information that tells the operating system how long the file
is can be altered at will... as far as the comments of a virus author
disassembling the CRC package its commonly done during product testing
to find out ahead of time what algorithms are in use by the product...
it really depends on the level of security one wants for ones PC...
I really wouldnt put it past a good virus author to specifically
target anti-viral programs in this fashion... as far as disassemblies
being hard... well I do an average of 5-6 per day with files ranging in
size from 2k to 90k(although I will admit that some of the trickier
ones do cause head scratching occasionally...) note that i said
programs and not specifically viruses...
cheers
sandy

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3185 *Virus Info*
08-28-90 19:53:00 (Read 6 Times)
From: SANDY LOCKE
To: TOM PREECE
Subj: REPLY TO MSG# 2911 (RE: REMAPPING...)
TP> As you may see by looking at my other entry's, I have been loading a c
TP> program that is clearly implementing software to remap my keys to s ce
TP> extent. If this is possible as a glitch, its is obviously possible as
TP> attack. Let's hope it never comes to that.
Tom,
without adding too much fuel to any fire... certain
non-communication programs are susceptible to the ANSI programmable
attack... on my end I run no program that implements ANSI3.64
terminal control language without having a way to turn thoses "FEATURES
" off... certain programs without mentioning brand names do allow
this. if the echo moderator allows I will post a list of good and bad
programs in this regard... so that you can all protect yourselves
better...(n.b. after being chewed out by the moderator I am
constraining my comments carefully...)
cheers
sandyp.s. these attacks have been common since programmable
terminals came into being during the middle 1970's the problem is that
when these features were implemented in comm programs the possibility
arose that it was possible for malicious individuals to finally do some
real damage...the way to protect yourself is to STOP using programs
that implement such features and switch to others that are more secure
in their usage of such features...

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3186 *Virus Info*
08-29-90 05:44:00 (Read 6 Times)
From: PATRICIA HOFFMAN
To: SANDY LOCKE
Subj: REPLY TO MSG# 3185 (RE: REMAPPING...)
SL> attack... on my end I run no program that implements ANSI3.64
SL> terminal control language without having a way to turn thoses "FEATURES
SL> " off... certain programs without mentioning brand names do allow
SL> this. if the echo moderator allows I will post a list of good and bad
SL> programs in this regard... so that you can all protect yourselves
SL> better...(n.b. after being chewed out by the moderator I am
SL> constraining my comments carefully...)

Please feel free to go ahead and post the list. Was just trying to keep you
out of trouble, you do sometimes get over excited in messages...didn't mean for
it to be "chewing out".

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3187 *Virus Info*
08-29-90 06:27:00 (Read 7 Times)
From: PATRICIA HOFFMAN
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 2996 (RE: ONTARIO VIRUS)
PL> Nope, I don't have the Ontario Virus that I know of! I read about the
PL> Virus after I had posted to you, Thanx for the info. Nice to know
PL> where it loads in Mem, that would make a util easier to write once I
PL> had a fix on what you have already told me.
PL>

Ontario loads into the top of free memory, right below the 640K boundary. It
takes up 2,048 bytes. If you run chkdsk after it is in memory, both total
system memory and free available memory will have decreased by 2,048 bytes.
Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3326 *Virus Info*
08-30-90 15:05:00 (Read 6 Times)
From: KEN DORSHIMER
To: SANDY LOCKE
Subj: REPLY TO MSG# 3184 (RE: CRC CHECKING)

...at a time when Western civilization was declining
too rapidly for comfort, yet too slowly to be very
exciting Sandy Locke was saying:

SL> well close... without discussing HOW its done... the file length is
SL> altered back to the original length... its not that hard and does
SL> point out one of the MAJOR problesm with crc scanners...that is that

interesting why don't you drop me some net-mail on this (see origin line)

SL> the critical information that tells the operating system how long the
SL> file is can be altered at will... as far as the comments of a virus
SL> author disassembling the CRC package its commonly done during product
SL> testing to find out ahead of time what algorithms are in use by the

i think that's one of the things i mentioned; that they would have to have
pre-existing knowledge of the crc scheme in order to make that work.

SL> product... it really depends on the level of security one wants for
SL> ones PC... I really wouldnt put it past a good virus author to
SL> specifically target anti-viral programs in this fashion... as far as

one of the reasons i am interesting in developing my own anti-viral utils for
my software business. i figure if they stay primarily in house, the chance
that some bozo will screw around with them and try to break them is reduced.

SL> disassemblies being hard... well I do an average of 5-6 per day with
SL> files ranging in size from 2k to 90k(although I will admit that some
SL> of the trickier ones do cause head scratching occasionally...) note
SL> that i said programs and not specifically viruses... cheers sandy

heh, yup source to assembled is always easier than the reverse process, of
course there's head scratching that goes on at that end too. :-)
the client said he wanted it to do what?!

...just part of the food chain...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 3327 *Virus Info*
08-29-90 11:37:00 (Read 6 Times)
From: PAUL FERGUSON
To: EVERYONE
Subj: FLOPPY MBR BACKUP
I had originally posted this question to the moderator, but after a
little thought decided that I would be sure to receive a myriad of
answers from the ECHO participants if asking the question here,
also.....
It is simply this:
Does anyone have any decent (and simple) suggestions for extraction of
the floppy MBR???.....There are several very good utilities in the
public domain for strictly Hard Drive Boot Sector (ie. ST0) and other
utilities contained within, say for instance, PCTools, that can back-up
the HARD Drive Partition Table (I forgot to mention several PD programs
to back-up the FAT).....But, almost all of these that I have seen
pertain to the HDU! I realize that there are ways to write it to a file
using certain SPY-type programs, but what I am really interested in is
a simplified program that is easy to use at the lowest end of the USER
pyramid

-Thanks in advance for your suggestions and assistance.....

-Paul ^@@^.........

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3328 *Virus Info*
08-29-90 18:46:00 (Read 6 Times)
From: PAUL FERGUSON
To: EVERYONE
Subj: STEALTH FAMILY
I have read with great interest the July editions of VIRUS-L digest
(along with about the first week or so of August) and cannot, for the
life of me, figure the almighty hype with The (noticed that I
capitolized that!) Stealth Family of Virus....Only a Trojan should
deserve such attentention.....If one takes appropriate precautionary
measures, then the virus will (theoretically) be caught in memory..
...that is, it will make (and reside) a noticeable difference in
vectoring.....I truly believe WAY too much hype (Ok, maybe that is a
little strong!) has been given to this.....Yes, it can be a true menace
if one does not expect such a rogue, but come on.......I downloaded
some code today....Yes, I must say it IS quite ingenius, but at the
same time, I must also say, I enjoy the work I do, etc....

PS.....Patrick Toulme, Check your E-Mail....

........"The Delicate Sound of Thunder".......

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3329 *Virus Info*
08-29-90 22:07:00 (Read 6 Times)
From: PAUL FERGUSON
To: EVERYONE
Subj: LATENITE
Ok, so we're up again in the pale moonlite (unquote)...

Next question (in paticular, to you, Sandy)
is:
What diverse opinions do you have concerning those that, also,
fight the battle on the front lines (I'm noy alluding to who has any
more experience, to wit)...I feel that many of us (Tech
Support/Slash/Gov't Contractors)(No, We're not scum, nor
unknowledgable) have done much to benefit the Anti-Viral Research
Community.....I would like a little input on this topic.....


.......We're not all BAD guys!........

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3330 *Virus Info*
08-31-90 13:05:00 (Read 6 Times)
From: HERB BROWN
To: ALL
Subj: PKZ120.ZIP

I was informed that there is a bad version of PKZIP floating around by the name
of PKZ120.ZIP.. I am not sure if it is viral or not, but delete it if you find
it..

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 3331 *Virus Info*
09-01-90 11:34:00 (Read 7 Times)
From: DEREK BILLINGSLEY
To: ALL
Subj: POSSIBLE VIRUS?

This just hit me today - I am not sure if it is some kind of system error or a
potential virus.

Last night (September first) and before gave me no indication of any virus
being present on my system. It is now september 1st and now, whenever a file is
written to disk (I noticed the text files first, but a downloaded zip'd file
was also garbled...) it took out about 10 bytes from the beginning of each
line...

When I realized this may be set to occur on this date, I set my DATE back a
night and everything worked fine... I made a sample text file with a known
pattern of characters -- any date past september 1st 1990 leaves the file
altered as mentioned above. Any date previous is written unharmed...

SCANV56 reports only that the SCAN program is damaged - no disk presence of the
source is evident.

Has anyone heard of something like this happening?

Derek Billingsley

--- SLMAIL v1.36M (#0198)
* Origin: Atlantic Access SJ/NB 1-506-635-1964 HST You can Run With Us !
(1:255/1)



Msg#: 3354 *Virus Info*
08-29-90 09:02:00 (Read 6 Times)
From: CY WELCH
To: SANDY LOCKE
Subj: REPLY TO MSG# 2759 (KEYBOARD REMAPPING....)
In a message to Cy Welch <25 Aug 90 6:39:00> Sandy Locke wrote:

>CW> In a message to Everyone <16 Aug 90 6:32:00> Paul Ferguson wrote:

> PF> Isn't it possible to remap some (or any) keyboard functions via
> PF> communications with some funky ANSI control characters?....I seem to
> PF> remember mention of this somewhere.....I really can't remember if was
> PF> in the form of a question, though, or an answer.....It also made
> PF> mention of PKWares' Safe-ANSI program...Somebody help us out here...

>CW> I think most of the "FAST" ansi replacements do not have the keyboard
>CW> remapping so that danger is removed in those cases.
SL> Well if you are referring to FANSI.SYS by hershey Microsystems it too
SL> is vunerable to remap effects... and since it implemnt FULL ANSI 3.64
SL> terminal control codes plus some extensions it is even more vunerable
SL> to a whole class of tricks that go way beyond noremally keyboard
SL> remapping... but to there credit they ahve include a way to turn this
SL> "FEATURE" OFF... just most users get it off a BBS and never order or
SL> look at the 50.00 set of docs that come when you pay for the
SL> products...

Actually I was refering to zansi.sys which is a high speed replacement which
part of what they did to do it was to remove the keyboard remapping functions.

--- XRS! 3.40+
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)



Msg#: 3355 *Virus Info*
08-26-90 15:45:00 (Read 6 Times)
From: MIKE MCCUNE
To: SANDY LOCKE
Subj: SECURE
Sandy,
Thanks for the information. I suspected that Secure probably had some
holes in its protection scheme and that someone knew about it. I am
curious about how the modified Jerusalem-B got around it. I'm pretty
sure how Virus 101 does it (the Air Force uses it) but I would like
to know if there are any other hole in secure...<MM>

--- Opus-CBCS 1.13
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 3477 *Virus Info*
09-01-90 15:56:00 (Read 6 Times)
From: KEN DORSHIMER
To: HERB BROWN
Subj: REPLY TO MSG# 3330 (RE: PKZ120.ZIP)
>
> I was informed that there is a bad version of PKZIP floating
> around by the name of PKZ120.ZIP.. I am not sure if it
> is viral or not, but delete it if you find it..

seem to remember seeing something about this a couple of months ago.
mostly, i wanted to drop a line and say "hey". got your net-mail, hopefully if
the routing is working right, you got a response. :-) how's new orleans this
time of year? later.


--- Opus-CBCS 1.12 & NoOrigin 3.7a

--- QM v1.00
* Origin: Ion Induced Insomnia (1:203/42.753)



Msg#: 3478 *Virus Info*
09-02-90 10:45:00 (Read 6 Times)
From: JAMES KLASSEN
To: PRAKASH JANAKIRAMAN
Subj: REPLY TO MSG# 2909 (LEPROSY)
I have a copy of the Leprosy virus along with its source and
"documentation". What it does is copies itself to 4 exe or com files
each time it is run and produces a memory error code so the user thinks
there is a problem with memory and runs it again. After all the com and
exe files have been infected, it displays a message that they have a
virus and "Good luck!"... It increases file sizes by 666 but when I
tested it on a floppy, the bytes didn't increase...

--- W2Q v1.4
* Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328)



Msg#: 3479 *Virus Info*
09-01-90 07:18:00 (Read 6 Times)
From: YASHA KIDA
To: PAUL FERGUSON
Subj: REPLY TO MSG# 3329 (LATENITE)
In a message of <29 Aug 90 22:07:29>, Paul Ferguson (1:204/869) writes:

PF> EID:6368 151db0ee
PF> Support/Slash/Gov't Contractors)(No, We're not scum, nor
PF> unknowledgable) have done much to benefit the Anti-Viral Research
PF> Community.....I would like a little input on this topic.....
PF>


I am a Private contractor for a Large Network installation an support company.
I work for the good of the Customer and the population (users).

I hear the phrase " SLIMY CONTRACTOR" " M.F.C." everyday. I also heard
"Can this be done", "Would you look into this...", "What are your suggestions
so I can put them in my report" when things get deep. We are the WHIPPING BOYS
and EMERGENCY 911 all in one.

I am sure there are Software contractors who have planted or released a virus
at contract renewal time. To show how much they are needed.
There are also those of us the that want to see their job sites safe from such
problems. We are the ones who own our time (Non-Paid) Compile information
on ways to safe guard our data from compermise or viral attacks.

The Anti-Viral reseach done by Mrs. Hoffman (PAT) and John McAfees group
is carefully read and evaluated on my end. I am sure it has saved many a rear
from a bear trap.


--- msged 1.99S ZTC
* Origin: Bragg IDBS, (FT. Bragg, NC - we're gonna kick some booty)
(1:151/305)



Msg#: 3480 *Virus Info*
09-02-90 19:19:00 (Read 6 Times)
From: HERB BROWN
To: KEN DORSHIMER
Subj: REPLY TO MSG# 3477 (RE: PKZ120.ZIP)
With a sharp eye <Sep 01 15:56>, Ken Dorshimer (1:203/42.753) noted:
>
> I was informed that there is a bad version of PKZIP floating
> around by the name of PKZ120.ZIP.. I am not sure if it
> is viral or not, but delete it if you find it..
KD>
KD>seem to remember seeing something about this a couple of months ago.
KD>mostly, i wanted to drop a line and say "hey". got your net-mail,
KD>hopefully if the routing is working right, you got a response. :-)
KD>how's new orleans this time of year? later.
KD>

Hmmmm, first time I heard of this file. How long ago did it appear?
Rained Sunday and had to BBQ inside. Made watching TV a little hard, but we
managed.

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 3630 *Virus Info*
09-01-90 20:49:00 (Read 6 Times)
From: PAUL FERGUSON
To: KEN DORSHIMER
Subj: REPLY TO MSG# 3326 (RE: CRC CHECKING)
Ken...

I've GOT to agree with you on this one....only preconceived CRC
defeaters are just that...preconceived....no such luck...

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 3813 *Virus Info*
09-01-90 13:11:00 (Read 6 Times)
From: KEVIN HIGGINS
To: JAMES DICK
Subj: SECURING YOUR UPLOADS
I've got checkout, and while its a pretty neat program, there are a few
things I don't like about it, the main one being the initial memory scan. I
also don't like the auto-pause that seems to be at the beginning of it. That
means running gateway, which means the user may be able to get into DOS and
party. (have heard of Key-fake, but never seen it around to play with it..).
TAG calls a file named postul.bat after every upload (if the .bat file is
present), so I hacked up this .bat file to auto-check for virii. But I'm not
smart enough to know how to use the %%f in a batch file to have it run through
for all the files in the active directory (for batch uploads)...
Maybe there's a genius out there who can help. FYI the parameters passed to
the .bat file are: [Baud] [ComPort] [User#] [U/L Dir] [Filename].

Here it is. Chuckle, then help make it better <grin>.

echo off
cd\bbs\uploads
echo Verifying latest Pkzip version...... > com2
REM This program checks file integrity.
ozf -v %5 > com2
echo : > com2
REM These are the directories I don't want checked.
if %4 == D:\ZIPSTUFF\WRITERS\ goto end
if %4 == D:\ZIPSTUFF\AMIGA goto end
echo Testing file integrity, and checking for virii. > com2
echo Please wait..... (this is the scary part, eh?) > com2
echo : > com2
echo Moving the suspect file to a sterile cell for interogation.... > com2
REM This moves the file to an empty directory for the examination.
move %4%5 d:\bbs\bads
echo File is now undergoing interrogation... > com2
cd\bbs\bads
pkunzip -x D:\bbs\bads\%5 *.exe *.com > com2
scan d:\bbs\bads\*.exe /NOMEM > com2
scan d:\bbs\bads\*.com /NOMEM > com2
if errorlevel 1 goto Oops
echo Alright! (whew) File passed. > com2
del *.exe
del *.com
echo Almost finished. Releasing innocent file back into public. > com2
move %5 d:\bbs\uploads
echo : > com2
echo Now adding (Nested) zip comment to file... > com2
cd\
REM This adds the Hornet's Nest comment to the .Zip file.
call d:\commentr.bat
cd\bbs
echo Thanks for waiting!..
goto end
:Oops
echo Arrrrgghhhhh! File had a virus! File deleted! > com2
erase *.*
echo Logging your name to Scumbag.lst! > com2
echo Hey, Kato! User number %3 tried to upload a virus infected file! >>
d:\fd\scumbag.lst
echo Maybe you need to leave a message to Kato, eh? > com2
cd\bbs
:end

(Note: the fourth line from the end is a continuation of the line above it.)
Also, I have a program that will make a .com fil out of a .bat file, for faster
processing. Any reason why this couldn't be done with the above .bat file? How
about after the %%f is added?
Kevin

--- TAGMAIL v2.40.02 Beta
* Origin: The Hornet's Nest BBS (1:128/74)



Msg#: 3814 *Virus Info*
09-03-90 23:40:00 (Read 5 Times)
From: RICK THOMA
To: HERB BROWN
Subj: REPLY TO MSG# 3480 (RE: PKZ120.ZIP)
> Hmmmm, first time I heard of this file. How long ago did it
> appear?

I have a copy, and think it came out around March, or so. At the time,
SCANV detected no virus, but I thought better of running it.

Sorry, folks. Whatever it is, it isn't available for downloading, so please
don't ask. I'm just waiting for the time to pick it apart, to see just what
kind of hack it is.

--- FD 2.00
* Origin: Village BBS, Mahopac, NY 914-621-2719 *HST* (1:272/1)



Msg#: 3815 *Virus Info*
09-03-90 03:38:00 (Read 5 Times)
From: KEN DORSHIMER
To: PAUL FERGUSON
Subj: REPLY TO MSG# 3630 (RE: CRC CHECKING)

...at a time when Western civilization was declining
too rapidly for comfort, yet too slowly to be very
exciting Paul Ferguson was saying:

PF> Ken... I've GOT to agree with you on this one....only preconceived CRC
PF> defeaters are just that...preconceived....no such luck...
PF>

that's what i figured. that is if you're responding to the msg i think you're
responding to. what the hell does that mean?

...space is merely a device to keep everything from being
in the same spot...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 3816 *Virus Info*
09-03-90 18:03:00 (Read 5 Times)
From: KEN DORSHIMER
To: HERB BROWN
Subj: REPLY TO MSG# 3814 (RE: PKZ120.ZIP)

...at a time when Western civilization was declining
too rapidly for comfort, yet too slowly to be very
exciting Herb Brown was saying:

HB> Hmmmm, first time I heard of this file. How long ago did it appear?
HB> Rained Sunday and had to BBQ inside. Made watching TV a little hard,
HB> but we managed.

i think it was a couple of months ago. which means any mention of it has long
since been renumbered off my system. yup BBQing indoors does have a certain
mystique. i know dinner is ready when the smoke alarm goes off.

...space is merely a device to keep everything from being
in the same spot...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 3817 *Virus Info*
09-03-90 18:08:00 (Read 7 Times)
From: KEN DORSHIMER
To: DEREK BILLINGSLEY
Subj: REPLY TO MSG# 3331 (RE: POSSIBLE VIRUS?)

...at a time when Western civilization was declining
too rapidly for comfort, yet too slowly to be very
exciting DEREK BILLINGSLEY was saying:

DB> This just hit me today - I am not sure if it is some kind of system
DB> error or a potential virus.
DB>
DB> Last night (September first) and before gave me no indication of any
DB> virus being present on my system. It is now september 1st and now,
DB> whenever a file is written to disk (I noticed the text files first,
DB> but a downloaded zip'd file was also garbled...) it took out about 10
DB> bytes from the beginning of each line...
DB>

could you send a copy of what you believe is infected to me? i'd like to
analyse this myself, thanks.
my address is:
Dorshimer Software Systems
P.O. Box 191126
Sacramento, Ca. 95819-1126 USA

...space is merely a device to keep everything from being
in the same spot...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 3818 *Virus Info*
09-03-90 20:57:00 (Read 4 Times)
From: JOHN HERRBACH
To: ALL
Subj: PUBLIC KEY ENCRYPTION
Does anyone know the status or progress in regards to public key encryption?
Thanks.

John {|-)

--- ME2
* Origin: The Lighthouse BBS/HST; Lansing, MI; 517-321-0788 (1:159/950)



Msg#: 3819 *Virus Info*
09-01-90 20:26:00 (Read 5 Times)
From: SEAN SOMERS
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 3186 (RE: REMAPPING...)

Off topic here, anybody out there encounter the French Revoloution virus? I was
the first out here to discover it. What it does is nuke your HD while
displaying an anti Western/English speaking Canadians.



--- outGATE v2.10
# Origin: SIGnet International GateHost (8:7501/103)
* Origin: Network Echogate (1:129/34)



Msg#: 3938 *Virus Info*
09-06-90 11:51:00 (Read 13 Times)
From: YASHA KIDA
To: SKY RAIDER (Rcvd)
Subj: REPLY TO MSG# 2995 (RE: VIRUS ORIGINALS)

GLAD TO SEE SOMEONE does their homework...

Well written.. If you don't mind I wish to post it as a bulletin
on my System (BBS).. Re written to as a document instead of a
msg reply...
'

Yasha
sysop 151/305


"What do you do when all of your users are in the sand lands, without a phone."




--- Maximus-CBCS v1.00
* Origin: Bragg IDBS, We hunt bugs for the 82nd Airborne (1:151/305)



Msg#: 3974 *Virus Info*
09-08-90 13:42:35 (Read 5 Times)
From: SKY RAIDER
To: YASHA KIDA
Subj: VIRUS POST ON BBS
Yasha,

You write:

GLAD TO SEE SOMEONE does their homework...

Well written.. If you don't mind I wish to post it as a bulletin on my System
(BBS).. Re written to as a document instead of a msg reply...

Sure, no problems in rewritting and posting on your system. I try not to enter
into this type of a conversation without at least a bit of a footing in fact. I
wish I could find the original document I had quoting these things (it had
names, dates, etc.). How about giving me your system number so I can call and
see the finished form (never been quoted in this manner before).

A questor of knowledge,

Sky Raider
Ivan Baird, CET
--- TBBS v2.1/NM
* Origin: Northern Connection, Fredericton, N.B. Canada <HST 14.4K> (1:255/3)


Msg#: 4025 *Virus Info*
09-06-90 13:32:00 (Read 6 Times)
From: JONO MOORE
To: JOE MORLAN
Subj: REPLY TO MSG# 3157 (LHARC114?)
JM >I had heard that and infected version of LHARC was released
JM >last year under the name LHARC114. I also heard that
JM >because of that, the next release of LHARC was expected to
JM >be LHARC200 to avoid confustion with the virus. This week a
JM >file appeared on a local board called LHARC114. I left a
JM >message to the sysop to check it out and he says it's clean.
JM >The docs say that this is version 114b, the latest version.

LHARC v1.14b is a real release. The author brought it out after the
controversy on the fake 1.14 release.



--- outGATE v2.10
# Origin: SIGnet International GateHost (8:7501/103)
* Origin: Network Echogate (1:129/34)



Msg#: 4026 *Virus Info*
09-05-90 19:47:00 (Read 5 Times)
From: PATRICIA HOFFMAN
To: PAUL FERGUSON
Subj: LET ME REPHRASE THAT.....
PF> Actually, I really should have said "virtually preconceived".
PF> From what I can gather on the topic (I don't yet have a copy of 4096),
PF> they actually redirect CRC/Checksum interrogators to a "snapshot" of
PF> the original file as it appeared before infection.(Someone, I'm sure,
PF> will correct me if I'm wrong or at least add enlightenment.)

You are correct.....What the CRC/Checksum interrogator sees, if 4096 is in
memory, is the disinfected version of the program in memory, not what is
actually out on disk. Fish 6 also does this, as do a couple of other viruses
using Stealth techniques.

PF> The infected file, in the case of 4096, has in reality grown by 4096
PF> bytes and would more than likely hang the system, therefore, which
PF> would lead me to believe that running the CRC check without the virus
PF> TSR would allow you to identify the actual infected files. Also, it
PF> seems like the only way to catch it TSR is to trace the interrupt
PF> vectors (although everyone seems to have a little bit of differing
PF> ideas on this '->)

Lots of 4096 infected files will run without hanging the system....the virus
disinfects the program when it is read into memory so that anti-viral packages
can't find the virus as easily. CRC checkers and scanners won't be able to
find it in the infected file if the virus is in memory, in fact, these viruses
usually infect on file open as well as execute. Run a CRC checker or Scanner
that doesn't check memory for the virus with it present and you'll infect
everything that is openned that meets its infection criteria.

If the virus isn't in memory, the CRC checker technique will work to identify
the infected files in 99% of the cases. I'm not going to say 100% because I
believe some of the 512 virus variants can get around it due to the way it
attaches to the files in some cases, but not all. Some CRC checkers don't
actually CRC the entire file either....and as soon as I state it is a fool
proof way of doing it, someone will write a virus that gets around it
perfectly in all cases.

Patti

PF> Until I can get my hands on this little fellow, I guess that I'll
PF> just follow the more logical explanations from the sources with
PF> credibilty and make a judgement from that! Sounds credible. But, as I'v
PF> said before- I sure would like to see it.
PF>
PF> I've been following several different message base threads on
PF> this particular virus, with input from users at the basic levels to BBS
PF> SysOps to the AntiViral research community.......I must say, it gets
PF> overwhelming at times to keep objective. *:)
PF>
PF> -Paul
PF>
PF>
PF> --- QM v1.00
PF> * Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813
PF> (1:204/869.0)
PF>

--- W2Q v1.4
* Origin: The C.F.I BBS * Norfolk, Va. * (804)423-1338 * (1:275/328)



Msg#: 4027 *Virus Info*
09-07-90 12:48:00 (Read 4 Times)
From: MICHAEL ADAMS
To: RICHARD HUFFMAN
Subj: RE: ARC.EXE
Thank you for the warning .... Kill keep an eye out for it.

--- Maximus-CBCS v1.00
* Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1)



Msg#: 4028 *Virus Info*
09-07-90 20:21:00 (Read 5 Times)
From: HERB BROWN
To: JONO MOORE
Subj: REPLY TO MSG# 4025 (LHARC114?)

JM >I had heard that and infected version of LHARC was released
JM >last year under the name LHARC114. I also heard that
JM >because of that, the next release of LHARC was expected to
JM >be LHARC200 to avoid confustion with the virus. This week a
JM >file appeared on a local board called LHARC114. I left a
JM >message to the sysop to check it out and he says it's clean.
JM >The docs say that this is version 114b, the latest version.

JM>LHARC v1.14b is a real release. The author brought it out after the
JM>controversy on the fake 1.14 release.
JM>

Now, how is someone going to know the difference? That is about as dumb as
BBQ'ing indoors and forgetting to open the windows... Sheesh..

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 4029 *Virus Info*
09-07-90 20:25:00 (Read 4 Times)
From: HERB BROWN
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 4026 (LET ME REPHRASE THAT.....)

PH>can't find the virus as easily. CRC checkers and scanners won't be
PH>able to
PH>find it in the infected file if the virus is in memory, in fact, these
PH>viruses
PH>usually infect on file open as well as execute. Run a CRC checker or
PH>Scanner
PH>that doesn't check memory for the virus with it present and you'll
PH>infect
PH>everything that is openned that meets its infection criteria.

I seem to be missing something here. As I understand it, to check for virii
with a scanner, such as SCAN, or whatever, you boot from a uninfected floppy
that has scan residing on it. Ok, now, how would a virus that works as a TSR,
that probably is loaded from the boot sector from the hard disk be loaded, if
you are booting from the floppy? Which, the floppy being write protected, of
course, would not have this viral infection. I was under the assumption that
the BIOS first checked drive A: at bootup for a disk, etc. It seems that it
would be impossible to find a virii in memory with this type of scheme.. Please
enlighten me..

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 4030 *Virus Info*
09-07-90 17:03:00 (Read 5 Times)
From: TALLEY RAGAN
To: MIKE MCCUNE
Subj: REPLY TO MSG# 2910 (RE: REMOVING JOSHI)

In a message to Talley Ragan <09-04-90 16:04> Mike Mccune wrote:

MM>>I have posted a new version that checks for the virus
MM>>before
MM>>trying to remove it (now that I have a working copy of the
MM>>virus). It will not damage the partition table on
MM>>uninfected
MM>>hard disks...<MM>.

Thanks for the information. This was very educational, as I have
had one case of a virus. I don't know how it workedbut the screen would
show all garbage and then the computer would hang. I low level formatted
the hard disk and restored from good backups. I sure would like to know
how it got to me and where it came from!!... Thanks again.

Talley


--- ZAFFER v1.01
--- QuickBBS 2.64 [Reg] Qecho ver 2.62
* Origin: Southern Systems *HST DS* Tampa Fl (813)977-7065 (1:377/9)



Msg#: 4031 *Virus Info*
09-05-90 21:23:00 (Read 5 Times)
From: TOM PREECE
To: HERB BROWN
Subj: REPLY TO MSG# 3816 (RE: PKZ120.ZIP)
I seem to remember running into this file several months ago. I don't remember
concluding that it had a virus - just that it didn't work properly. The sysop
on the sytem that had it apparently reached the same conclusion or something
similar because it disappeared here (SF Bay Area.)
--- TBBS v2.1/NM
* Origin: G.A.D.M. Multi-User TBBS Hayward,CA.(415) 581-3019 (1:161/208)



Msg#: 4032 *Virus Info*
09-06-90 19:15:00 (Read 5 Times)
From: KEN DORSHIMER
To: PAUL FERGUSON
Subj: REPLY TO MSG# 4029 (RE: LET ME REPHRASE THAT.....)

...at a time when Western civilization was declining
too rapidly for comfort, yet too slowly to be very
exciting Paul Ferguson was saying:

PF> Ken- This is a continuation of msg.# 156 (I dropped the

just FYI the msg numbers don't have much bearing here. on my system is was
#75 or something. :-)

PF> don't yet have a copy of 4096), they actually redirect CRC/Checksum
PF> interrogators to a "snapshot" of the original file as it appeared
PF> before infection.(Someone, I'm sure, will correct me if I'm wrong or

interesting. seems there would be some simple method of circumventing what
the virus does. (i don't have a copy of that one yet either)

PF> system, therefore, which would lead me to believe that running the CRC
PF> check without the virus TSR would allow you to identify the actual
PF> infected files. Also, it seems like the only way to catch it TSR is to
PF> trace the interrupt vectors (although everyone seems to have a little

i've always thought that by having your own tsr grab the interupts first
might be a good way to stop unwanted tsr's from grabbing them. (i'm sure
someone will argue the point tho)

...space is merely a device to keep everything from being
in the same spot...

--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)



Msg#: 4278 *Virus Info*
09-08-90 13:51:00 (Read 5 Times)
From: DUANE BROWN
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 3813 (SECURING YOUR UPLOADS)
PL>present. I have the Key fake program if it will help you!
PL>That file will enter the "Y or N" Question when the batch
PL>file comes to Are you sure? Y or N. Meaning you had the
PL>batch file to delete all programs in the temp check

That's easy to fix the problem about del *.* -- just do

echo y | del *.*

then the Y gets placed in there automatically...no keyfake, nothing!

---
* Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16)



Msg#: 4279 *Virus Info*
09-07-90 12:45:00 (Read 5 Times)
From: CHARLES HANNUM
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 4031 (RE: PKZ120.ZIP)
>Didn't someone say that because someone had already hacked an earlier
>version of PKZIP that 120 would be the next scheduled release?
>Anybody have any info?

Yes. Phil Katz said it.

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)



Msg#: 4280 *Virus Info*
09-08-90 10:49:00 (Read 4 Times)
From: JAMES BARRETT
To: ALL
Subj: SEPTEMBER 18-20, 1990
I have heard somebody mention that there will be a major virus in the next
couple of weeks. What's the scoop? I'm involved in a college campus computer
lab and need to know what's coming and how to prepare for it. Will ScanV66
catch it????

Thanks in advance...
--JCB
--- XRS 3.40+
* Origin: >- c y n o s u r e -< 919-929-5153 <HST><XRS> (RAX 1:151/501.14)



Msg#: 4281 *Virus Info*
09-08-90 17:39:00 (Read 4 Times)
From: HERB BROWN
To: KEN DORSHIMER
Subj: REPLY TO MSG# 4032 (RE: LET ME REPHRASE THAT.....)
With a sharp eye <Sep 06 19:15>, Ken Dorshimer (1:203/42.753) noted:

KD>i've always thought that by having your own tsr grab the interupts
KD>first
KD>might be a good way to stop unwanted tsr's from grabbing them. (i'm
KD>sure
KD>someone will argue the point tho)

Depends on who got there first, I would presume.. Also, multiple TSR's would be
a nightmare, colliding and such.

--- QM v1.00
* Origin: Delta Point (1:396/5.11)



Msg#: 4535 *Virus Info*
09-07-90 08:04:00 (Read 4 Times)
From: PAUL FERGUSON
To: DOUG EMMETT
Subj: SCAN FROM C:
Hello, Doug....
Doug, I must tell you that it is not advisable to run ViruScan
from your hard disc....It really should ALWAYS be run from a WRITE
PROTECTED FLOPPY....Scan can become easily infected when ran in an
infected environment on a HD. BTW....Software that "Write Protects" you
r hard disc may work in some cases, but can be circunvented.
Be safe.....
-Paul

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4536 *Virus Info*
09-07-90 08:06:00 (Read 4 Times)
From: PAUL FERGUSON
To: LONNIE DENNISON
Subj: WELCOME...
Glad to have you........
Welcome aboard....
-Paul ^@@^........

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4537 *Virus Info*
09-07-90 08:09:00 (Read 4 Times)
From: PAUL FERGUSON
To: RICHARD HUFFMAN
Subj: REPLY TO MSG# 4027 (ARC.EXE)
Richard,
Please E- me out of the conference....I would like to discuss this
a little further......Better yet, contact me at the NCSA BBS in DC
(202) 364-1304 at 1200/2400, 8,N,1.....I can be reached in the VIRUS
Conference.....Thanks, -Paul

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4538 *Virus Info*
08-16-90 08:30:00 (Read 5 Times)
From: ALAN DAWSON
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 3183 (RE: VIRUS SCANNERS....)
PH> I just wish the people writing this viruses would find more
PH> useful things to do with their talents....such as trying to
PH> help people instead of harm their systems.

Hear, hear! The frustrating, rug-chewing, desk-beating,
monitor-smashing, stomp-down crying SHAME is that some of these
viruses, on a technical level, are tremendously slick, wonderous
programs. The people writing them are wonderful programmers. Just
think what these people could be doing to help our PCs work better by
writing a different kind of program -- and, potentially, how much
money they might be able to make. They obviously have inventive
minds, many of them. Such inventiveness could be put to such great
use.


--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4539 *Virus Info*
08-16-90 08:36:00 (Read 5 Times)
From: ALAN DAWSON
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 4538 (RE: VIRUS SCANNERS....)
PH> I'd agree with that. The anti-viral program should be able to
PH> detect that it is infected and produce a warning, though it may
PH> still execute. By the time the anti-viral program has
PH> determined its been infected, you've already infected system
PH> memory or spread the virus.

Sure. Something ELSE has infected it. No reason not to let it run so
long as it still works. One of our local youngsters wrote a wonderful
remover of the Dark Avenger -- about 1400 bytes and worked like a
charm. Only one teensy-weensy trouble -- the remover got infected and
didn't warn you. That's not really one of the more useful programs to
have around.
Since it seems to be the constant topic of conversation here,
SCANV's routine of warning of infection and continuing its duties is
great.
A common cause of re-infection is forgetting to remove the tools
you used in the disinfection process -- stuff like LIST, just for
example, that you might have used to examine the virus.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4540 *Virus Info*
08-16-90 08:52:00 (Read 5 Times)
From: ALAN DAWSON
To: MICHAEL TUNN
Subj: REPLY TO MSG# 2899 (RE: WHAT'S THE SOLUTION?)
MT> It seems to me our Virus checking programs will just get bigger
MT> and bigger as more viruses and strains of the same viruses are
MT> discovered. If so (and if their development is excelerating)

Right. Question of the Year (1991??): What can you call it after you've
hit the SCANV999 wall?

MT> Do we do develop new Operating Systems which are far more
MT> secure!

Well, at least a new DOS which allows 9-character names? Then we
could do SCANV9999. [joke].

MT> Do we crawl in a hole and hope it wont happen to us?

No, in a metaphor placed in 1970 terms, we get to the airport two
hours before flight time for the security checks. And for the same
reason, too -- the unwillingness of the many to take the resolve to
remove the few. We have, most of us, helped the virus writers build
up their existing sick belief that we are willing participants in
some kind of game here. They win if they manage to steal our time,
programs, disk space and data. They only do it because they had an
unhappy childhood, right?
One tangible result of allowing them to feed on this warped view
is this echo, where we're all trying to get to the airport two hours
early for the security check -- AND WE'RE ALL WASTING TWO HOURS
because somebody we don't know might try to hurt us.
We should have sympathy for Robert Morris, of course, because
after all, he was just experimenting and not REALLY trying to hurt
anyone, right? I have a one-word, two-syllable response to that but
FidoNet policy frowns down upon me for thinking of using it.


--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4541 *Virus Info*
08-16-90 09:25:00 (Read 4 Times)
From: ALAN DAWSON
To: KEN DORSHIMER
Subj: RE: VIRUSES, WHAT ELSE...
KD> not sure on that one, who knows what menagerie of thoughts
KD> wander through clients minds.. :-) actually, i was unaware of
KD> Corporate Vaccine (maybe I should get out more). I'm a little
KD> concerned that the commercial programs may not be aware of some
KD> of the newer viruses which crop up from time to time.

This is just a thought, too. But why not take your clients into your
confidence, and point out to them that it is virtually impossible for
anyone to match the up-to-dateness of a BBS distribution system?
You're a BBSer. You know, just for example, that without BBSes McAfee
couldn't have a program-of-the-week. Distribution of what your
clients think of as commercial software simply isn't up to this
standard -- isn't meant to be; never was; probably never will be.
Seems to me if your clients like the SCANV concept, you should
explain to them why they should be using SCANV. Why reinvent the
wheel?
If it wasn't that commercial messages which mention something
other than SCANV often seem to get flamed here, I'd tell you about my
commercial, non-BBS, wholly generic virus detector that doesn't need
upgrading, which is available in North America and which soon will be
launched there. But I don't want to get flamed, so I won't.


--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4542 *Virus Info*
08-29-90 12:26:00 (Read 5 Times)
From: ALAN DAWSON
To: KEN DORSHIMER
Subj: REPLY TO MSG# 3815 (RE: CRC CHECKING)
PH>> Except in the case of Stealth Viruses....CRC checking doesn't work
PH>> with them.
PH>>

KD> i'd have to see that for myself. i think a complex enough
KD> algorithm would keep them at bay. the probability factor is
KD> just too low for such a stealth scheme to work.

Roger that. A program (such as a virus) can possibly figure out a
checksum or CRC and "fool" your checker. But complex and random
checksumming or CRCing is beyond the real-world possibility of defeat
by a PC virus -- it would have to be too big and complex itself.
Our strategy on our anti-virus program is to have eight different
algorithms, and to use two of them on each checksum pass. Which two,
even we do not know. Your virus then would have to take into account
64 reasonably complex algorithmic possibilities to defeat it.
Patti is technically correct that this can be done -- but not in
the real world. I'd tend to be slightly suspicious if my word
processor suddenly grew by the size of THIS virus. Most programs
would, in fact, be incapable of loading it.
As you say -- make it complex (which isn't so difficult) and keep
churning out hundreds of different algorithms. Then you can forget
about "stealth" viruses succeeding.

- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4543 *Virus Info*
09-01-90 21:26:00 (Read 5 Times)
From: ALAN DAWSON
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 3154 (RE: SCAN WEIRDNESS)
PL> Allan, I NEVER SCAN from the C Drive or any hard disk. I
PL> always scan from a write protected Floppy Diskette in Drive A.

This is absolutely correct, of course, and EXACTLY what's recommended
in the doc. I was just curious whether others had had the experience.
I do do some experimenting with viruses and anti-virus stuff, because
Bangkok's a "virus capital" (dumb dealers plus a whole raft of
pirates) and because I'm involved in a commercial anti-virus project.
This was just a weird thing that happened to me when I was "playing"
with Dark Avenger. I do wonder how many people follow that
"write-protected floppy" recommendation (order???) in the SCAN docs,
though.
One note on your comment: it might be hard for some people to
follow the recommendation, i.e. those with one floppy. The total
beauty of SCAN, really, is to look over that new stuff. A lot of
machines go to new people with one floppy drive.
A lot also go with two different floppy drives (my own setup)
although this of course is combatted simply by having TWO
write-protected diskettes with SCAN aboard.
- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4544 *Virus Info*
09-01-90 23:00:00 (Read 5 Times)
From: ALAN DAWSON
To: SANDY LOCKE
Subj: REPLY TO MSG# 3819 (RE: REMAPPING...)
SL> long time programmer I can testify the keyboard mapping is
SL> really quite simple... no real problem and the business of
SL> using terminal control code is quite as simple...
SL> sandy

Finally, some sanity, sandy. [grin] (no pun intended until after I
read that). The letter bomb, as a friend calls it, is alive, well and
could certainly flourish. I wouldn't lay a huge amount of money on
the ability to write a *virus* with remapping, but a bomb's a piece
of cake.
I THINK this thread started with the ability to put one directly
over a terminal BBS-to-user connection, and in general there seem by
my own experiments to be two chances of this: slim and fat. But, like
a virus, a letter bomb can be transmitted via a BBS to a user, and
then set off by that user in a number of pernicious ways that occur
to me right off the top of my head. None of which you will see writ
here, you understand -- but after watching this thread for a few
weeks, I'm glad you leapt in with both feet.
- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4545 *Virus Info*
09-06-90 18:59:00 (Read 5 Times)
From: ALAN DAWSON
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 4543 (RE: SCAN WEIRDNESS)
PH> There are a couple of possibilities here. First, if the virus
PH> is on a non-executable file, such as one with a .VOM or .VXE

Nope, wasn't either of these Patti. I tried to put in everything, and
then forgot to say it was a regular file called AVENGER.COM -- a
small utility I infected to harbor the virus when I ran it for tests.
The utility originally was a small screen shell for looking at files
a la LIST. It USED to be 3K, but now it's a little bigger [grin]

PH> The other case is if your copy of Dark Avenger does not occur
PH> at the correct place in the file. Dark Avenger always adds its
PH> code to the End Of Programs. If your copy happens to have it at

Roger. This is right up against the end of the file.

PH> Hope that helps....those are the only three cases that I've
PH> heard of a similar problem to yours.

OK, no biggie. It was just that it was so weird I thought maybe you'd
heard of it. I'll try it again when we get SCAN66B just for fun. It's
not the kind of "bug" that's detrimental -- it's just one of those
hey-it's-not-supposed-to-do-that things. Stupid machines.
- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4546 *Virus Info*
09-06-90 19:00:00 (Read 5 Times)
From: ALAN DAWSON
To: SANDY LOCKE
Subj: REPLY TO MSG# 4539 (RE: VIRUS SCANNERS....)
SL> UH ALAN... you mind sending the NAME of this vendor via private
SL> e-mail... accidentally I can understand BUT ON PURPOSE??? what
SL> end would this kind of action serve???
SL> cheers
SL> sandy

This was before the Great Virus Scare of 1989 of course -- it was, if
my tremendously failing memory isn't failing me, in 1986. A Toronto
magazine put the virus in as a joke -- every time you started an
infected program, a brief ad for the mag jumped up. Ald. . . whoops,
the company name almost slipped out there, thought this was
hilarious, left it in and shipped the thing. I'll send full details
your way.
This same company, the next time it shipped viruses, claimed that
a guy in the shipping department was playing a game and accidentally
infected the shipment (exclaimer!!!!). Is this a company with a weird
sense of security, or what?
- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 4746 *Virus Info*
09-09-90 14:33:00 (Read 4 Times)
From: CHARLES HANNUM
To: PHILLIP LAIRD
Subj: RE: MAKING SCAN READ ONLY.
> Patti, is it feasible to make Scan.Exe Read only? Doug Emmett was
> wondering about doing that. Couldn't you change the archive bits to
> read only? Also, doesn't scan have an internal routine to determine
> if it is damaged?

Setting the "Read-only" attribute wouldn't even *phase* a decent virus, and
SCAN's internal checksum is VERY weak. (It quite literally is a checksum.
It simply checks to see if all the words in the files add up to 0.)

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)



Msg#: 4747 *Virus Info*
09-09-90 07:35:00 (Read 5 Times)
From: JERRY MASEFIELD
To: CHARLES HANNUM
Subj: REPLY TO MSG# 4279 (RE: PKZ120.ZIP)
> >Didn't someone say that because someone had already hacked an earlier
> >version of PKZIP that 120 would be the next scheduled release?
> >Anybody have any info?
>
> Yes. Phil Katz said it.

No, Phil Katz said there WOULDN'T be a 120 release because of the same reason.
This would eliminate any confusions between the real and phony versions. Also,
Katz is offering a reward for any info leading to the arrest of the perpetrator
of this hacking.

--- TosScan 1.00
* Origin: On A Clear Disk You Can Seek Forever! (1:260/212)



Msg#: 4748 *Virus Info*
09-09-90 23:16:00 (Read 5 Times)
From: PHILLIP LAIRD
To: CHARLES HANNUM
Subj: REPLY TO MSG# 4747 (RE: PKZ120.ZIP)
** Quoting Charles Hannum to Phillip Laird **
>Yes. Phil Katz said it.
>
>--- ZMailQ 1.12 (QuickBBS)
> * Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
** End of Quote **

That is what I thought. As soon as he went and said it, somebody appearently
decided to hack it, huh?

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 4749 *Virus Info*
09-08-90 17:42:00 (Read 4 Times)
From: PAUL FERGUSON
To: KEN DORSHIMER
Subj: YEAH, BUT...
You're on the right track, Ken....But TSR's have a nasty habit of
fighting for control amongst each other. Some do not behave very well.
-Paul

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4750 *Virus Info*
09-09-90 08:43:00 (Read 6 Times)
From: PATRICIA HOFFMAN
To: PHILLIP LAIRD
Subj: JERUSALEM B AND CLEANP64.ZIP
PL> I cleaned 17 infected files today with clean version 64. I have a good
PL> question. While the program removes the file, some where removed the
PL> first time around, others were scanned several times before the virus
PL> was actually removed. Can you tell me why?

The programs that were scanned several times probably were infected multiple
times with Jerusalem virus. A lot of the variants of Jerusalem B will infect
.EXE files repeatedly, eventually the program will get too large to fit into
memory. On files that are infected multiple times with Jerusalem, you'll see a
message come up for each infection as it is removed.

That is my guess as to what you observed...

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4751 *Virus Info*
09-09-90 11:01:00 (Read 5 Times)
From: PATRICIA HOFFMAN
To: HERB BROWN
Subj: REPLY TO MSG# 4281 (LET ME REPHRASE THAT.....)
HB> I seem to be missing something here. As I understand it, to check for
HB> virii with a scanner, such as SCAN, or whatever, you boot from a
HB> uninfected floppy that has scan residing on it. Ok, now, how would a
HB> virus that works as a TSR, that probably is loaded from the boot sector
HB> from the hard disk be loaded, if you are booting from the floppy?
HB> Which, the floppy being write protected, of course, would not have this
HB> viral infection. I was under the assumption that the BIOS first
HB> checked drive A: at bootup for a disk, etc. It seems that it would be
HB> impossible to find a virii in memory with this type of scheme.. Please
HB> enlighten me..

The memory resident viruses that are a real problem when they are in memory and
any antiviral, whether a scanner or CRC checker, is run are not boot sector
infectors....4096, Fish-6, Dark Avenger, and many others which infect on file
open are file infectors. There are three that are file infectors but can also
infect and replicate from the partition table and/or boot sector: V2100,
Anthrax, and Plastique 5.21. (These last three are extremely rare, fairly new,
and not known in the United States.) All of the viruses mentioned about use
"Stealth" techniques to avoid detection or infect on file open.

If you are booting from an uninfected diskette when powering on the computer,
you wouldn't ever find a virus in memory. However, if you are performing a
warm reboot from a floppy, you could have a virus in memory still. The real
point here was that most people do not run scan or other anti-viral utilities
after powering on and booting from a floppy, so it is always possible for the
virus to be in memory.

In that particular case, for a CRC checker which is what was being discussed,
there are definite cases (the "Stealth" viruses) where the virus can get around
the CRC checker simply because if the virus is in memory it disinfects the
infected programs as they are read into memory. The CRC checker, since it is
performing file reads, reads the DOS buffers to check the program, so the
program it sees isn't infected and isn't the same as what is actually on the
disk. In the case of viruses that infect on file open, running an anti-viral
product against all the programs on a system with the virus active in memory
can very well result in all the programs becoming infected.

I'm not against CRC checkers, I use one all the time on several of my systems.
These systems all have master boot diskettes with clean system files, the CRC
checker, and the log of all the expected crc values to be returned. Most
people simply do not have that type of diskette setup for their systems since
they feel they'll never be infected with a virus. In fact, the probability
that a person will be infected with a virus is fairly low, though it does
change depending on the person's computing habits and how often they exchange
diskettes and/or programs with others.

I was trying to point out that NONE of the current anti-virals will absolutely
protect a user from getting a virus....all the techniques currently used by
anti-viral products can be circumvented by some of the newer, more
technologically advanced viruses. Not to point that out would be like burying
one's head in the sand, especially when the discussion has to do with someone
thinkin of writing a new anti-viral who needs to know what can currently be
circumvented. It is easier to fix the design before the program is written
then to fix it later after the hole is found....

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 4967 *Virus Info*
09-10-90 16:55:00 (Read 5 Times)
From: CHARLES HANNUM
To: JERRY MASEFIELD
Subj: REPLY TO MSG# 4748 (RE: PKZ120.ZIP)
>> >Didn't someone say that because someone had already hacked an earlier
>> >version of PKZIP that 120 would be the next scheduled release?
>> >Anybody have any info?
>>
>> Yes. Phil Katz said it.

> No, Phil Katz said there WOULDN'T be a 120 release because of the
> same reason. This would eliminate any confusions between the real
> and phony versions. Also, Katz is offering a reward for any info
> leading to the arrest of the perpetrator of this hacking.

Err, <retracting foot from mouth> I must have misread the original note...

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)



Msg#: 4968 *Virus Info*
09-10-90 17:54:00 (Read 5 Times)
From: CHARLES HANNUM
To: WHOM IT MAY CONCERN
Subj: LHARC 1.14B(ETA)
The 'b' is actually a beta, which makes me think he released it for testing
and it got loose, but is not yet an "official" release.

At any rate, I NEED AN ANSWER!! I have "LHarc 1.14b(eta)", and I really need
a definitive answer. IS IT REAL OR NOT?

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)



Msg#: 4969 *Virus Info*
09-10-90 23:13:00 (Read 4 Times)
From: PHILLIP LAIRD
To: DUANE BROWN
Subj: REPLY TO MSG# 4278 (RE: SECURING YOUR UPLOADS)
** Quoting Duane Brown to Phillip Laird **
>
>That's easy to fix the problem about del *.* -- just do
>
>echo y | del *.*
>
>then the Y gets placed in there automatically...no keyfake,
>nothing!
>
>---
> * Origin: End of the Line. Stafford, Va. (703)720-1624. (1:274/16)
** End of Quote **

Thanx.... Using the pipe redirection will do just that like you say. I use
the KEYFAKE Program for a reason with KEY.DAT in the program I just finished
that will check for bugs in uploads. It calls the routine externally from the
Execute file.

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 4970 *Virus Info*
09-10-90 23:21:00 (Read 6 Times)
From: PHILLIP LAIRD
To: ALAN DAWSON
Subj: REPLY TO MSG# 4545 (RE: SCAN WEIRDNESS)
** Quoting Alan Dawson to Phillip Laird **
>
>This is absolutely correct, of course, and EXACTLY what's recommended
>
>in the doc. I was just curious whether others had had the experience.
>
>I do do some experimenting with viruses and anti-virus stuff,
>because
>Bangkok's a "virus capital" (dumb dealers plus a whole raft
>of
>pirates) and because I'm involved in a commercial anti-virus
>project.
>--- Opus-CBCS 1.13
> * Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand
>(3:608/9.0)
** End of Quote **



I totally agree that most people do not read the docs. I work for a University
in South East Texas. Some of the Micros have been plagued with viruses. I
have setup a routine for the Labs to Scan the Floppies coming in with SCAN.
This has just taken Place. Next thing I know, the clerk decides to run SCAN
From her hard drive on her desktop! Then Alameda hit her! The SCAN Program
has gone over good at the University. We are getting an order ready for a Site
License Agreement with MCafee and Associates. I do a little research on some
of the strains. However this BBS keeps me busy after work!

Weird thing about CLEAN.EXE the program to remove the Viruses. I am using
Clean Version 66 and sometimes the program will scan the file numerous times
before the virus is eventually removed. I guess the Marker is trying to move
around in the file? Anybody know?

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 4971 *Virus Info*
09-09-90 10:59:00 (Read 5 Times)
From: MIKE BADER
To: MARC SHEWRING
Subj: INFORMATION
Several anti-virus programs use signature files.
IBM (yech) for one, but VirHUNT by DDI alos
uses a file for signatures and goes into
quite a bit of detail in their manual.
I'll look up a better address and phone.

Mike

--- FD 1.99c
* Origin: P-1 BBS ][ (313) 542-9615 Ferndale, MI (HST) (1:120/45)



Msg#: 4972 *Virus Info*
09-06-90 20:56:00 (Read 8 Times)
From: CY WELCH
To: DEREK BILLINGSLEY
Subj: REPLY TO MSG# 3817 (POSSIBLE VIRUS?)
In a message to All <01 Sep 90 11:34:00> Derek Billingsley wrote:

DB> This just hit me today - I am not sure if it is some kind of system
DB> error or a potential virus.

DB> Last night (September first) and before gave me no indication of any
DB> virus being present on my system. It is now september 1st and now,
DB> whenever a file is written to disk (I noticed the text files first,
DB> but a downloaded zip'd file was also garbled...) it took out about
DB> 10 bytes from the beginning of each line...

DB> When I realized this may be set to occur on this date, I set my DATE
DB> back a night and everything worked fine... I made a sample text file
DB> with a known pattern of characters -- any date past september 1st
DB> 1990 leaves the file altered as mentioned above. Any date previous
DB> is written unharmed...

DB> SCANV56 reports only that the SCAN program is damaged - no disk
DB> presence of the source is evident.

DB> Has anyone heard of something like this happening?

Can't say I have heard of that but it sure sounds like a virus. I would
recommend getting a copy of scan v64 and see what it says. It might even be
something new.

--- XRS! 3.41+
* Origin: Former QuickBBS Beta Team Member (99:9402/122.1) (Quick 1:125/122.1)



Msg#: 4973 *Virus Info*
08-14-90 18:15:00 (Read 5 Times)
From: JAMES BLEACHER
To: DOUG BAGGETT
Subj: REPLY TO MSG# 2904 (ANTI VIRUS VIRUSES)
* Replying to a message originally to Patricia Hoffman
DB>well..here is a question..where exactly did viruses
DB>originate anyway..was it in this country or others?
DB>Doug

According to want I've read Dr. Fred Cohen at MIT developed the first virus
back in 1964 or so. This was to prove that code could actually replicate and
spread throughout a mainframe. My question is why on earth would he want to do
that in the first place?
---
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)



Msg#: 4974 *Virus Info*
08-14-90 18:23:00 (Read 5 Times)
From: JAMES BLEACHER
To: PAUL FERGUSON
Subj: REPLY AND ADDENDUM TO MSG 145
* Replying to a message originally to Alan Dawson
PF>You can always be sure of an uninfected SCAN IF you download
PF>from the
PF>authors' BBS....The program itself will terminate upon
PF>detection and
PF>has safeguards written into it to protect against such
PF>occurances....Of
PF>course, there are ways for an unsuspecting user (You know
PF>who) to
PF>infect the programs themselves and then re-archive
PF>unwittingly a
PF>viral Scan that will never know (depending upon the

WRONG! Scan checks itself upon startup and will give you a message to the
effect of:

FILE DAMAGED! "C:\SCAN.EXE"

But will continue to operate. If you see that message then you're in big
trouble. Viruses like the Dark Avenger will use scan's file checking (since it
opens all the files it's checking) to spread itself all over your floppy/hard
drive. Unless you've got a totally new virus that scan can't detect you don't
have anything to worry about if it's already infected when you get it. (Except
that it's probably detecting the virus all over your drive because it just
helped put it there!)
---
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)



Msg#: 4975 *Virus Info*
09-10-90 18:02:00 (Read 6 Times)
From: JAMES BLEACHER
To: DEREK BILLINGSLEY
Subj: REPLY TO MSG# 4972 (POSSIBLE VIRUS?)
DB>SCANV56 reports only that the SCAN program is damaged - no
DB>disk presence of the source is evident.
DB>
DB>Has anyone heard of something like this happening?

Well, first of all you've got an old version of scan. Try downloading scanv66b
from someone. I have it if you can't locate it elsewhere. Second if scan ever
reports being damaged there's a 99% chance that you've got a virus! Better
check into it quick! Hope you don't find that you have one but it sure sounds
like you do!
---
* Origin: "Hey! Why's my COMMAND.COM larger than normal?" (1:151/801)



Msg#: 5238 *Virus Info*
09-10-90 15:11:00 (Read 6 Times)
From: JOE MORLAN
To: JONO MOORE
Subj: REPLY TO MSG# 4028 (RE: LHARC114?)
I have learned from other sources that the latest official release of LHARC
is LH113D. The 'new' LHARC114 is said to be another unauthorized hack. It
evidently is NOT a virus. Yoshi has been quoted as stating on GENIE that the
next official release will be ver. 2.0. I hope this helps.

--- Telegard v2.5i Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 5239 *Virus Info*
09-10-90 15:12:00 (Read 6 Times)
From: JOE MORLAN
To: HERB BROWN
Subj: REPLY TO MSG# 5238 (RE: LHARC114?)
Exactly. LHARC v1.14b is not a real release. Just another unauthorized hack.

--- Telegard v2.5i Standard
* Origin: Telegard BBS (000-000-0000) (1:161/88.0)



Msg#: 5240 *Virus Info*
09-07-90 20:35:00 (Read 6 Times)
From: CHRIS BARRETT
To: SIMON FOSTER
Subj: RE: MYSTERY VIRUS??
Could I ask wy the buffers would be causing the Boot Block to be altered.

I have since removed the val checks using ScanV66B and put some new ones on
using ScanV66B.

Could it be possible that someone has altered a bit of the code and as ScanV66
uses a string (or is it hex search) it doesn't find it?

eg In the Virus it originaly said "Your disk is stoned' and the person
converted it to say 'Your disk is now stoned'. If ScanV66 happens to look for
the original string to my knowlegde the virus would not be recognized.

Chris.
--- TBBS v2.1/NM
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)



Msg#: 5241 *Virus Info*
09-12-90 22:11:00 (Read 6 Times)
From: PHILLIP LAIRD
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 4751 (RE: LET ME REPHRASE THAT.....)
** Quoting Patricia Hoffman to Herb Brown **
>If you are booting from an uninfected diskette when powering
>on the computer, you wouldn't ever find a virus in memory.
> However, if you are performing a warm reboot from a floppy,
>you could have a virus in memory still. The real point here
>was that most people do not run scan or other anti-viral utilities
>after powering on and booting from a floppy, so it is always
>possible for the virus to be in memory.
** End of Quote **

THat is exactly the way I have found some of the Virii I researched as being.
If the virus is present in memory, then it is possible the the file will
infect, however, if the Scan Diskette is write protected and the diskette is
bootable, Like oyu say. It is BEST to cut the power to the system and then
re-boot the system. However, if you wanted to go a step further, it is
possible to clear all volatile RAM if you want to do a warm boot. The Warm
Boot can result in infection, since the ram is not cleared. The various
hardware interrupts are still performed and cotrol passed to Command.com, but
the System files are still present in memory, along with a virus possibly. Too
many people are now taking the virus issue too lightly. It can effect you,
take precaution and use the Floppy to boot up on with a Write Protect on the
Diskette. Then scan the drive from there.

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 5242 *Virus Info*
09-12-90 22:16:00 (Read 6 Times)
From: PHILLIP LAIRD
To: PATRICIA HOFFMAN
Subj: RE: JERUSALEM B AND CLEANP64.Z
** Quoting Patricia Hoffman to Phillip Laird **
> PL> I cleaned 17 infected files today with clean version 64.
> I have a good
> PL> question. While the program removes the file, some where
>removed the
> PL> first time around, others were scanned several times before
>the virus
> PL> was actually removed. Can you tell me why?
>
>The programs that were scanned several times probably were
>infected multiple times with Jerusalem virus. A lot of the
>variants of Jerusalem B will infect .EXE files repeatedly,
>eventually the program will get too large to fit into memory.
> On files that are infected multiple times with Jerusalem,
>you'll see a message come up for each infection as it is removed.
>
>
>That is my guess as to what you observed...
>
>Patti
>
** End of Quote **

That is exactly what I had suspected. I assumed the file was re-infected
several times as the size of the Original WP.EXE files that were infected once
was for example 112K, and the ones that were infected several times was around
173K. Some of the programs were non functional after clean ws performed on the
file. We just delte the file and re-copy it when that happens. The only safe
way to do it I have found is to go ahead anuse scans' /D option and delete the
file and re-copy it.

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 5887 *Virus Info*
09-14-90 14:05:00 (Read 5 Times)
From: MIKE MCCUNE
To: PATRICK TOULME
Subj: MOTHER FISH
Everybody was talking about the Mother Fish a few weeks ago. Now that it has
been out for mor than a week, nobody is saying anything about it. What's the
deal with this virus?

--- Opus-CBCS 1.13
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 6048 *Virus Info*
09-14-90 07:05:00 (Read 4 Times)
From: JOE MORLAN
To: CHARLES HANNUM
Subj: REPLY TO MSG# 4968 (RE: LHARC 1.14B(ETA))
According to folks posting on the technical echo, Yoshi has stated on Genie
that the next official release after LHarc 1.13c will be LHarc 2.xx. Beta
versions of LHarc 2.0 are said to have been released in Japan. It is illogical
that 114b would be a valid release. The main change is the same as the known
unauthorized hack, ICE.

There are a few people on that echo that seem to believe that the release is
"real" based mostly on the source where the file had been posted. It seems
clear to me that it is just another unauthorized hack.

--- Telegard v2.5i Standard
* Origin: The Twilight Zone (415)-352-0433 (1:161/88.0)



Msg#: 6659 *Virus Info*
09-15-90 08:13:00 (Read 4 Times)
From: RICHARD HECK
To: ALL
Subj: CLEAN UP
I think that the newest version of cleanup was alot better then the version
before it.
Oh and watch out for that Sunday Virus.



--- outGATE v2.10
# Origin: SIGnet International GateHost (8:7501/103)
* Origin: Network Echogate (1:129/34)



Msg#: 6660 *Virus Info*
09-16-90 11:28:00 (Read 5 Times)
From: SATYR DAZE
To: CHRIS BARRETT
Subj: REPLY TO MSG# 5240 (RE: MYSTERY VIRUS??)

Sorry to butt in ..... you aparently have been infected by the Stoner-Marijauna
Virus , quite a few people here in florida myself included have seen this
little beauty.

After disinfecting yourself the damaged caused by the virus is unaltered.
Backup your harddrive and reformat it, after restoring it. Delete and redo
Autoexec.bat and Config.sys they have both also been altered.

Your Hardrive should now be back to snuff .... but before i forget run a
utility to mark and lock out bad sectors the Virus may have caused. These
unfortunaly are not always recoverable.

G'Day ....................... The Satyr Daze
--- TBBS v2.1/NM
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)



Msg#: 6661 *Virus Info*
09-16-90 11:39:00 (Read 4 Times)
From: SATYR DAZE
To: GARY MOYER
Subj: REPLY TO MSG# 4546 (RE: VIRUS SCANNERS....)
Well you can Download a Virus scanner from a reputable BBS -- one that
actually checks all of it's files for viruses --- or go out and purchase a
Virus Scanner. Most of the downloadable stuffis by Mcaffe Associates, You can
purchase Virucide (commercial version) which checks and disinfects your files,
also by Mcaffe Associates for about $30.00. Not a bad buy when you consider the
consequences of not having a good scanner.

Just make sure that after Downloading a file, unarc-unzip-unwhatever it, But
under no circumstance activate it --- run it --. Run the scanner, if the file
checks clean go ahead and run it then. If it dosn't the program will warn you
and disinfect it. The reason you must open the file (unzip) is because
scanners can't look into an archived file.

The Satyr Daze
--- TBBS v2.1/NM
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)



Msg#: 6662 *Virus Info*
09-16-90 13:40:00 (Read 4 Times)
From: SATYR DAZE
To: CHARLES HANNUM
Subj: REPLY TO MSG# 4973 (RE: ANTI VIRUS VIRUSES)
Actually the Honor of creating Viruses Belongs to John Conway, he was trying to
develop software that emulated living organisms. He developed the first "Game
of Life". As he created these new programs they became more and more complex
having intricate enviroments that the elements would have to over come in order
to survive.

But these were never allowed to get beyond that scope, Virus programs where
never destructive untill the "Core Wars". Opposing Programmers would create
self-replicating programms that when they encountered other self-replicaters
would try to devour them. Incidently it was called "Core Wars" because the
game itself took place in Core Memory . These young Programmers were actually
quite small in number and never publicly discussed what they were doing. If
any blame is to be attached it should be to Ken THompson who went public with
the process in 1983..... at that point it was "Discovered" by university
students who began creatingthe real nasties ..... Today many strains are just
variation of their original work.

Just a little History...............

The Satyr Daze
--- TBBS v2.1/NM
* Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748 (1:135/2)



Msg#: 6663 *Virus Info*
09-14-90 19:31:00 (Read 5 Times)
From: RAJU DARYANANI
To: ALL
Subj: NETWARE BYPASSING JERUSALEM VIRUS
Does anyone have any details on the CERT announcement that it has
isolated a version of the Jerusalem virus that can bypass Novell
Netware's file protection settings and infect files ? Anyone know
of actual infections, how common it is and whether McAfee's SCAN detect
this virus ?

Raju

--- via Silver Xpress V2.24 [NR]

--- QM v1.00
* Origin: TAIC Maximus - DVNet Asia, PEP/V.32 High Speed PathFinder
(3:700/1.0)



Msg#: 6664 *Virus Info*
09-16-90 00:41:00 (Read 4 Times)
From: ALAN DAWSON
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 4970 (RE: SCAN WEIRDNESS)
PL> been plagued with viruses. I have setup a routine for the Labs
PL> to Scan the Floppies coming in with SCAN. This has just taken
PL> Place. Next thing I know, the clerk decides to run SCAN From
PL> her hard drive on her desktop! Then Alameda hit her! The SCAN

The next "killer-ap" should be the anti-stupidity program. If ever it
needed to be proved that "a little knowledge is a dangerous thing,"
computer users prove it to their techies daily!

PL> Weird thing about CLEAN.EXE the program to remove the Viruses.
PL> I am using Clean Version 66 and sometimes the program will scan
PL> the file numerous times before the virus is eventually removed.

I really don't like the whole idea of a "popular" virus remover. (A
specific cure for a specific virus on one site is different.) Any
yo-yo with PC-Tools or Norton can make a "new" virus and this makes
the possible results from a removal program very iffy. I really
believe in brute-force removal i.e. DEL VIRUS.COM, and re-install.
It's safer that way, and certain (after you check the floppies, of
course).
- From Thailand, a warm country in more ways than one.



--- Opus-CBCS 1.13
* Origin: PCBBS -- WOC'n in the Land of Smiles -- Thailand (3:608/9.0)



Msg#: 7165 *Virus Info*
08-31-90 20:15:00 (Read 4 Times)
From: CHRIS BARRETT
To: ALL
Subj: BOOKS ON VIRUSES
Could someone tell me somenames of books on Viruses and their authors.
As I am in Australia getting hold of them may be a problem though.

Hope you can help...
Chris..
--- TBBS v2.1/NM
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)



Msg#: 7166 *Virus Info*
08-31-90 20:21:00 (Read 5 Times)
From: CHRIS BARRETT
To: ALL
Subj: REPLY TO MSG# 6660 (MYSTERY VIRUS??)
At my school we have some XT's with 2 360K FDD each. Lately we have noticed
that some of the students disks are being over written by the program disk they
were using. Eg some people have found the Turbo pascal files on their data
disks.

I brought in a copy of ScanV66 and placed a validation check on the program
disks (Not the data disks). Scanning showed no viruses (well known ones
anyway). But when we scanned them a week later we found some had had their Boot
Blocks altered.

In some cases the files on the data disk are just renamed to one on the program
disk. Eg we listed "TURBO.EXE" and found it to contain a students pascal source
code.

Could someone shed some light please..
I have told the teacher it is most likely home grown and he is sh*tting
himself.

Chris.
--- TBBS v2.1/NM
* Origin: 1990 MultiLine Perth Western Australia - 09-370-3333 - (690/654)



Msg#: 7167 *Virus Info*
09-01-90 18:28:00 (Read 4 Times)
From: DOUG EMMETT
To: PHILLIP LAIRD
Subj: REPLY TO MSG# 6664 (RE: SCAN WEIRDNESS)
For the new boy would you mind explaining how to write protect Scan.Exe on the
C: drive-Thanks

--- Opus-CBCS 1.13
* Origin: The U.S.A. Connection-*HN-NZ*-(+64-71-566851) (3:772/260.0)



Msg#: 7168 *Virus Info*
09-02-90 14:18:00 (Read 4 Times)
From: WARREN ANDERSON
To: MIKE DURKIN
Subj: REPLY TO MSG# 2475 (INTERNET WORM)
Hi, No I have never come across the book. I would appreciate it if you could
provide a copy of the password list (just in case I can't get hold of a copy of
the book). Thanks again.
Regards
\/\/ /\/\ Anderson

--- Telegard v2.5 Standard
* Origin: InfoBoard BBS - Auckland - New Zealand (3:772/140.0)



Msg#: 7169 *Virus Info*
09-04-90 06:12:00 (Read 4 Times)
From: PAUL FERGUSON
To: YASHA KIDA
Subj: REPLY TO MSG. 134
Right on, Yasha......I couldn't have said it better myself.....This
town (DC) seems to have a real problem concerning this. That's OK,
though, as you have said, we shall see who they come running to when
the going gets rough.....

-Paul

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 7170 *Virus Info*
09-05-90 12:50:00 (Read 4 Times)
From: MICHAEL ADAMS
To: RICK THOMA
Subj: RE: PKZ120.EXE
Rick .. I had one uploaded to my Board called "PKZ120.exe". The File looks
Authentic. Even went to the point of -AV and the Pkware registeration number
on the last line after self extraction. If it were not for the file
"Warning.txt" put out by "Pkware" I'd still be using it. Really went through
alot of trouble authenticating it!

Michael Adams
Baud Horizons
(504) 436-9590

--- Maximus-CBCS v1.00
* Origin: The Southern Star - SDS/SDN/PDN - 504-885-5928 - (1:396/1)



Msg#: 7171 *Virus Info*
09-05-90 16:06:00 (Read 4 Times)
From: LONNIE DENISON
To: ALL
Subj: HEY
Just letting you know that I have joined my board (The Maze) to this echo..
hope we can contribute some info here!

Lonnie Denison

--- Telegard v2.5i Standard
* Origin: => The Maze <= 916-391-6118 "Would ya Believe" (1:203/60.0)



Msg#: 7172 *Virus Info*
09-05-90 18:28:00 (Read 4 Times)
From: PHILLIP LAIRD
To: KEVIN HIGGINS
Subj: REPLY TO MSG# 4969 (RE: SECURING YOUR UPLOADS)
Kevin, nice batch file for testing files for virrii. I am now Alpha testing my
new program that will work with TAG at present. I have the Key fake program if
it will help you! That file will enter the "Y or N" Question when the batch
file comes to Are you sure? Y or N. Meaning you had the batch file to delete
all programs in the temp check directory. I plan on a new realease of the
program to several BBSES that will work to help all Sysops keep out the Virii.
If you want Keyfake Program, just Tell me, and I will netmail it to you... I
had a run in with Jerusalem B [jeru] today at Lamar University. Seems the
Chemistry Department stockroom manager had already infected 17 files on his
hard drive. Clean removed the virus.

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 7173 *Virus Info*
09-05-90 18:30:00 (Read 5 Times)
From: PHILLIP LAIRD
To: PATRICIA HOFFMAN
Subj: REPLY TO MSG# 4750 (JERUSALEM B AND CLEANP64.ZIP)
Patti:

I cleaned 17 infected files today with clean version 64. I have a good
question. While the program removes the file, some where removed the first
time around, others were scanned several times before the virus was actually
removed. Can you tell me why?

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 7174 *Virus Info*
09-05-90 18:32:00 (Read 4 Times)
From: PHILLIP LAIRD
To: RICK THOMA
Subj: REPLY TO MSG# 4967 (RE: PKZ120.ZIP)
Didn't someone say that because someone had already hacked an earlier version
of PKZIP that 120 would be the next scheduled release? Anybody have any info?

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 7175 *Virus Info*
09-05-90 18:37:00 (Read 4 Times)
From: PHILLIP LAIRD
To: ALL
Subj: PROCOMM 3.10
Beware, there is a version of Procomm.zip going around in our area here in
Texas which boasts Procomm 3.10. After consulting with my friend at Datastorn
Technologies, he called my BBS and downloaded the file. I had a user complain
that the file hung and said "NUKE" at the lower left of his terminal.
Datastorm Technologies stated that this version doesn't exist, I.E.... the
latest was 2.4.3. The same user told me that the file one night then put a
message on his screen that stated "Does this IBM PC or Compatible have more
than one drive? Y or N " He immediately turned off the computer and didn't
answer the question. Althought we scanned this program and found no virus, we
disassembled it and also didn't find anything suspicious either. Be careful,
it might be a time bomb. If you know of this program, let me know at 1:19/49.
I would like to keep tabs on it.

--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)



Msg#: 7176 *Virus Info*
09-04-90 16:04:00 (Read 4 Times)
From: MIKE MCCUNE
To: TALLEY RAGAN
Subj: REPLY TO MSG# 4030 (RE: REMOVING JOSHI)
I have posted a new version that checks for the virus before
trying to remove it (now that I have a working copy of the
virus). It will not damage the partition table on uninfected
hard disks...<MM>.

--- KramMail v3.15
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)



Msg#: 7177 *Virus Info*
09-04-90 13:31:00 (Read 4 Times)
From: PAUL FERGUSON
To: KEN DORSHIMER
Subj: REPLY TO MSG# 5241 (LET ME REPHRASE THAT.....)
Ken-

This is a continuation of msg.# 156 (I dropped the
keyboard....Looong day, you know).....

Actually, I really should have said "virtually preconceived".
From what I can gather on the topic (I don't yet have a copy of 4096),
they actually redirect CRC/Checksum interrogators to a "snapshot" of
the original file as it appeared before infection.(Someone, I'm sure,
will correct me if I'm wrong or at least add enlightenment.)
The infected file, in the case of 4096, has in reality grown by 4096
bytes and would more than likely hang the system, therefore, which
would lead me to believe that running the CRC check without the virus
TSR would allow you to identify the actual infected files. Also, it
seems like the only way to catch it TSR is to trace the interrupt
vectors (although everyone seems to have a little bit of differing
ideas on this '->)
Until I can get my hands on this little fellow, I guess that I'll
just follow the more logical explanations from the sources with
credibilty and make a judgement from that! Sounds credible. But, as I'v
said before- I sure would like to see it.

I've been following several different message base threads on
this particular virus, with input from users at the basic levels to BBS
SysOps to the AntiViral research community.......I must say, it gets
overwhelming at times to keep objective. *:)

-Paul

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 7178 *Virus Info*
09-05-90 09:20:00 (Read 4 Times)
From: PAUL FERGUSON
To: EVERYONE
Subj: DETAILED INFO ON 4096...
The description in VSUM (August 15 release) of the 4096 virus has
gotten my usual curiousity arouser, along with a plethora of discussion
on this particular virus within many message conferences and viral
echos......Since I have not had the opportunity, yet, to obtain a
sample to personally examine, I must post a few questions to the field:

1.) Would someone like to elaborateon the structure of "Phases" that
the CVIA uses to catorgorize viruses? Please? ;-)

2.) I seem to remember mention (No, I don't have my copy of VSUM in
front of my now) of the virus (4096) containing it's own boot sector.
Could someone enlighten me on this , also?

3.) And, under what ? circumstances does the 'FRODO LIVES' msg.
appear and when does it not?

No offense, Patti, but I did think that on a couple of these points
that the VSUM doc was kinda sketchy (I know that is ALOT of work to
compile that baby and continually update, etc.!).
Perhaps with a little more detail, I will have settled my
curiousity and returned to other problems at hand...

-Paul

Patti- Any luck with last U/L? ,-)

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 7179 *Virus Info*
09-05-90 20:34:00 (Read 5 Times)
From: PATRICIA HOFFMAN
To: SEAN SOMERS
Subj: REPLY TO MSG# 4544 (RE: REMAPPING...)
SS> Off topic here, anybody out there encounter the French Revoloution
SS> virus? I was the first out here to discover it. What it does is nuke
SS> your HD while displaying an anti Western/English speaking Canadians.

Haven't seen or heard of that one before.... What does it infect? .COM, .EXE,
overlays, boot sectors, only floppies? If you want to send me a copy of it,
I'd be happy to take a look at it as well as pass it along to John McAfee's
group. Snail mail address is:

Patricia M. Hoffman
1556 Halford Avenue #127
Santa Clara, CA 95051

It can also be sent in a .ZIP file to my system, though be sure you don't route
it thru anyone, or directly uploaded here to a suspect area that is secured.

Not off-topic at all, that is what this conference is for....

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 7180 *Virus Info*
09-05-90 20:01:00 (Read 5 Times)
From: PATRICIA HOFFMAN
To: PAUL FERGUSON
Subj: REPLY TO MSG# 7178 (DETAILED INFO ON 4096...)
PF> 1.) Would someone like to elaborateon the structure of "Phases" that
PF> the CVIA uses to catorgorize viruses? Please? ;-)
PF>

VSUM doesn't necessarily use the McAfee or CVIA categorization techniques to
classify viruses. VSUM's categorization is a bit finer than McAfee's since in
many cases he can group things together for detection/removal purposes.
However, in describing them they don't make much sense that way. I haven't
seen a copy of the CVIA categorization in some time, but I believe they
classified by:

boot sector infector
parasitic file infector
overwriting file infector

Partition table infectors were (I think) thrown in with boot sector infectors
since at the time the only partition table infector was Stoned, which also
infected floppy boot sectors. They also classified by memory resident or
non-resident.

Generally, VSUM classified by memory resident/non-resident, what it infects,
file length change, symptoms, and other characteristics, as well as what virus
the new entry is based on if applicable. In the case of memory resident
viruses, there is a code to indicate how or where it is memory resident.

McAfee and I had a loooonnnnnggggg discussion on classification and naming
awhile back, and "agreed we could disagree" since how he uses the names in Scan
isn't workable for VSUM, and using the VSUM naming in Scan would not serve his
purposes since he needs to group variants in many cases. If possible, though,
we try to use the same names. If VSUM differs, the name that will be indicated
by Scan is indicated as an alias. McAfee's current classification methods as
indicated in VIRLIST.TXT which comes out with Scan also differs from the CVIA
classifications, and is fairly close to VSUM.

PF> 2.) I seem to remember mention (No, I don't have my copy of VSUM in
PF> front of my now) of the virus (4096) containing it's own boot sector.
PF> Could someone enlighten me on this , also?
PF>

Yes, it includes a boot sector, though do to an error in the virus, the
included boot sector isn't ever written to the hard disk or floppy boot sector.
This boot sector is where the "FRODO LIVES" message is....

PF> 3.) And, under what ? circumstances does the 'FRODO LIVES' msg.
PF> appear and when does it not?
PF>

Normally, due to a bug in the virus, the message is never displayed. If one
copies the boot sector from within the 4096 virus to a floppy diskette as
sector 0, and boots from it, the message will appear.

Of course, the above bugs may be fixed in a later version of the virus....but
the versions I've seen hang on September 22 when they were meant to activate
the Frodo Lives message.

PF>
PF> No offense, Patti, but I did think that on a couple of these points
PF> that the VSUM doc was kinda sketchy (I know that is ALOT of work to
PF> compile that baby and continually update, etc.!).
PF> Perhaps with a little more detail, I will have settled my
PF> curiousity and returned to other problems at hand...
PF>

No problem....A lot of time what makes perfect sense to me doesn't make sense
to others :-). There is always this question with VSUM on where to draw the
line on the descriptions.

PF> Patti- Any luck with last U/L? ,-)
PF>

Not yet....I'm busy working on analysing a new virus right now, and it is going
to take awhile....will probably be a Whale of a tale when I get done....and I
don't want to say anything prematurely on it.

Patti

--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)



Msg#: 7181 *Virus Info*
09-06-90 11:33:00 (Read 4 Times)
From: TONY JOHNSON
To: ALL
Subj: REPLY TO MSG# 3029 (CORE WARS)
Core Wars was a simulation system, it was not per se' a breeding ground for the
type of viri that you see today attacking systems and PCs. The programs tested
were called viri in the way they attacked and behaved while operating
within the Core Wars environment. I believe the "arena" used for the "viruses"
was an 8K memory grid, and that the programs/"viri" were limited to that area.

While those programs were not the same thing as what we see today chewing up
our beloved computers, I can say that Core Wars was an extremely enlightening
experience that had the programmers thinking about how a similiar type of
situation could apply to the actual computing world.

--- QM v1.00
* Origin: The 286 Express (504-282-5817) (1:396/30.0)



Msg#: 7182 *Virus Info*
09-06-90 13:09:00 (Read 5 Times)
From: CHARLES HANNUM
To: CHRIS BARRETT
Subj: REPLY TO MSG# 7166 (RE: MYSTERY VIRUS??)
>At my school we have some XT's with 2 360K FDD each. Lately we have
>noticed that some of the students disks are being over written by the
>program disk they were using. Eg some people have found the Turbo
>pascal files on their data disks.

This could happen (and has) if you are using disk caching software. That would

be a good place to look first.

--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS

 
www.pigdog.org