KW> KW> JK> Ever heard about BOOTSECTOR virus?
KW> KW>
KW> KW> no, you're wrong... bootsector viruses need the computer to boot
ith
KW> KW> the infected bootsector... the booting process *executes* the
KW> KW> bootsector... ergo even bootsector viruses require execution to do
KW> KW> anything...
KW>
KW> JK> OK but if you writes DIR A: then the BOOTSECTOR virus will
KW> JK> be active. Wouldn't it?
KW>
KW> no, it would only be stored in a disk buffer... to be active the
KW> computer has to run the code, it doesn't run things in disk buffers by
KW> default so the virus would NOT be active as the instructions in the
KW> virus won't be processed... the disk buffer is essentially a data
KW> buffer, when was the last time you saw a computer execute data?...
KW>
KW> the only way to get an infected bootsector is to leave an infected disk
KW> in the drive when you boot the computer or to executed a dropper program
KW> or a multipartite infected file... dir a: cannot activate a virus...
OK!, but if you read from the bootsector with some utility program will the
virus then be activated?
... nfx v2.9 [C0000]
--- BBBS/D v3.33 How-C
---------------
* Origin: Circle of Protection - +47 55961259 (2:211/37)
|