TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: KURT WISMER
from: DENIS MOREAUX
date: 1997-04-30 16:03:00
subject: Linux and viruses...

Hello Kurt!
Lundi Avril 28 1997 14:25, Kurt Wismer wrote to Asher Densmore-Lynn:
 AD>> "Gee, my Linux kernel and COMMAND.COM are both up by 172 kb! Whoa."
 KW>> gee, did i possibly just say BOOT INFECTORS? they infect the
 AD>> I know, it was just an example. It'd have the same problems trying to
 AD>> do anything useful to a Linux (LILO) MBR -- stealth viruses would be a
 AD>> joke.
 KW> viruses tend not to try to do useful things... and as far as what
 KW> they'll do on a linux platform, it would be rather unpleasant for all
 KW> but those simple generic boot infectors... one_half would definitely
 KW> cause a lot of problems...
By the conception of Linux, No BOOT viruses can remain resident...
1) all interrupt vectors are overwritten (the old address is LOST !!!)
2) all I/O is done directly by the kernel, without using the BIOS
3) Linux grab all the memory for it's own use and, if a chunk of memory is  
somehow hidden by a virus, it won't be executable (protected mode)
So a boot virus can come to the computer but can't spread from it... A minor 
DOS virus check will remove it from the boot record...
Other viruses can't infect Linux as they are DOS executable based.
Linux specific viruses can't spread on the system except for the security 
holes. And the task of a good UN*X administrator is to remove these holes...
If the process if not executed by root (and root should only be used to setup 
the system, not to run applications) it can't do much damage...
Denis
--- FMail/386 1.02
---------------
* Origin: Living in interesting times (2:293/3212.89)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.