TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: DAVID DESROSIERS
from: DYLAN SIDES
date: 1997-03-07 21:32:00
subject: Re: GIFS and Viruses

"Re: GIFS and Viruses!" screamed David, as he pulled the trigger.
DD> Ok, let's change that. Let's say the "virus" is not executable, but as
DD> it sits in memory, the viewer (which this "virus" is specifically 
DD> tailored to work with) sees it as a part of itself, like two parts of a 
Possible, but /very/ unlikely.
If you can find any program that loads data over it's own executable in 
memory,
and then executes it, I'd be very suprised.
 (__)  -=* faze@response.coracle.com *=-  (__)
 oo )   -=* y024590dylan@yale.ac.uk *=-   ( oo
 |_/\    -=* www.coming.soon.co.uk *=-    /\_|
--- FiPS/32 v0.98 W95/NT [Unreg]
---------------
* Origin: You ain't seen me. Roight? (2:442/621.2600)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.