TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: KURT WISMER
from: JOHN KISMUL
date: 1996-12-20 17:08:00
subject: Macs

KW>  KW>  JK> Ever heard about BOOTSECTOR virus?
KW>  KW>
KW>  KW> no, you're wrong... bootsector viruses need the computer to boot 
ith
KW>  KW> the infected bootsector... the booting process *executes* the
KW>  KW> bootsector... ergo even bootsector viruses require execution to do
KW>  KW> anything...
KW>
KW>  JK> OK but if you writes DIR A: then the BOOTSECTOR virus will
KW>  JK> be active. Wouldn't it?
KW>
KW> no, it would only be stored in a disk buffer... to be active the
KW> computer has to run the code, it doesn't run things in disk buffers by
KW> default so the virus would NOT be active as the instructions in the
KW> virus won't be processed... the disk buffer is essentially a data
KW> buffer, when was the last time you saw a computer execute data?...
KW>
KW> the only way to get an infected bootsector is to leave an infected disk
KW> in the drive when you boot the computer or to executed a dropper program
KW> or a multipartite infected file... dir a: cannot activate a virus...
OK!, but if you read from the bootsector with some utility program will the 
virus then be activated?
... nfx v2.9 [C0000]
--- BBBS/D v3.33 How-C
---------------
* Origin: Circle of Protection - +47 55961259 (2:211/37)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.