About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NCSA Virus Report #15


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????????????????
? VIRUS REPORT ?
? 4096 virus ?
???????????????????????????????

Synonyms: Century Virus, IDF Virus, Stealth Virus, 100 Years Virus

Date of Origin: January, 1990.

Host Machine: PC compatibles.

Increase in Size of Infected Files: 4096 bytes.

Nature of Damage: Remains resident. Infects COMMAND.COM, COM, EXE,
overlay files.

Detected by: Scanv53+, F-Prot, IBM Scan, Pro-Scan.

Removed by: CleanUp, Scan/D, F-Prot. See below.

This virus is one of the most brutal ever developed, and no one seems
to successfully recover from it. It infects COM, EXE, and overlay files,
adding 4,096 bytes to their length. Once the virus is resident in memory,
the increase in length will not appear in a directory listing, and it
will infect any executable file that is opened, including those opened
with the COPY or XCOPY command.

Through FAT manipulation, the virus destroys files through a slow
crosslinking process that would seem to be a hardware problem.

If the virus is present in memory and you attempt to copy infected
files, the new copy of the file will not be infected if the extension is
neither COM nor EXE. Thus, one way to disinfect a system is as follows:

* copy all the infected files to diskettes with a non-executable file
extension. For instance, you might COPY *.EXE *.E and COPY
*.COM *.C.

* Shut the system off. Reboot from an uninfected and write-protected
disk.

* Delete any infected files and restore the backed up files to the
original executable file names and extensions. (COPY *.C *.COM; COPY
*.E *.EXE)

This procedure will not save any cross-linked files, however.

Some notes:

* Systems infected with this virus may hang after September 22 of any
year, due to a bug. This is the birthday of Bilbo and Frodo Baggin, in
the Lord of the Rings.

* The virus contains an unused boot sector, which if copied to the boot
sector of a diskette, will produce the message "FRODO LIVES".

??????????????????????????????????????????????????????????????????????
? This document was adapted from the book "Computer Viruses", ?
? which is copyright and distributed by the National Computer ?
? Security Association. It contains information compiled from ?
? many sources. To the best of our knowledge, all information ?
? presented here is accurate. ?
? ?
? Please send any updates or corrections to the NCSA, Suite 309, ?
? 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS ?
? and upload the information: (202) 364-1304. Or call us voice at ?
? (202) 364-8252. This version was produced May 22, 1990. ?
? ?
? The NCSA is a non-profit organization dedicated to improving ?
? computer security. Membership in the association is just $45 per ?
? year. Copies of the book "Computer Viruses", which provides ?
? detailed information on over 145 viruses, can be obtained from ?
? the NCSA. Member price: $44; non-member price: $55. ?
? ?
? The document is copyright © 1990 NCSA. ?
? ?
? This document may be distributed in any format, providing ?
? this message is not removed or altered. ?
??????????????????????????????????????????????????????????????????????
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS