| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Virus Hysteria |
Hi Robert!
[..]
RK> Been there, done that.. Screen writes use memory, and hence can be
RK> stopped by the OS, direct port I/O is another matter entirely.
Nope. Read some literature about the design of the 386. OS/2 uses all of
the offered features.
RK> The point was and is, though virus attacks have not been a big problem under
RK> OS/2, the key point is they haven't been YET.
Unless you bring some evidence, you can stop rumouring about this topic -
your credibility regarding this topic is slowly sinking. I know fairly well
(PF knows surely _very_ well) about possible security leaks in the OS/2
system and the big problems virus authors would have when programming a
virus for the OS/2 system.
However, I agree to you in principle. I claim as well that there is a
possibility to write a virus for OS/2, but compared to DOS OS/2's
architecture is vastly more effective than every existing virus scanner.
It is (almost) impossible to
a) bring "unknown" code into execution -> no hidden processes
are possible
b) infect other systems, "growing virus population"
c) hide the origin of possible destruction (means the virus will always be
easy to identify)
Without extreme efforts it is impossible to write an advanced,
"effective" virus for OS/2 !
__
|_)
cu/2 |atrick
--- FleetStreet 0.98wb
* Origin: OS/2 Bodensee ! (2:246/2320.18)SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 246/2320 2300 2200 2426/99 2030 270/101 396/1 3615/50 229/2 12/2442 @PATH: 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.