"Re: GIFS and Viruses!" screamed David, as he pulled the trigger.
DD> Ok, let's change that. Let's say the "virus" is not executable, but as
DD> it sits in memory, the viewer (which this "virus" is specifically
DD> tailored to work with) sees it as a part of itself, like two parts of a
Possible, but /very/ unlikely.
If you can find any program that loads data over it's own executable in
memory,
and then executes it, I'd be very suprised.
(__) -=* faze@response.coracle.com *=- (__)
oo ) -=* y024590dylan@yale.ac.uk *=- ( oo
|_/\ -=* www.coming.soon.co.uk *=- /\_|
--- FiPS/32 v0.98 W95/NT [Unreg]
---------------
* Origin: You ain't seen me. Roight? (2:442/621.2600)
|