| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Virus Strategies |
> What everyone with more than two brain cells to rub together has > been saying is that a virus, as in the kind that > surreptitiously loads into memory by riding on top of another > program, and _sticks around after the program exits_, cannot > exist in the OS/2 environment. > OS/2 is not proof against all forms of attack, but it is > protected against the most common and easily spread kinds. > RK's senseless babbling aside. What are you talking about??? The system is wide open! Don't let the memmory protection fool you. 1. Can a program read another exe file ? 2. Can a program write over another exe file ? 3. Can a program alter the config.sys and install a new driver ? Some ways are blocked that a virus under DOS can use but its still not near safe. I have noticed that there are more than one definition on whats a virus and whats not. I define virus as a unwanted code pice that can reproduce itself. For me a virus dont have to take over the system or hide in the OS. A trojan is only the program thats deliver the virus. Say I hade a virus and I wanted to spread it I would at this time make a DOOM/2 to put it in. Thats makes the DOOM/2 a trojan If UNIX can be infected by a virus so can OS/2. ---* Origin: lazy sysop - origin lost in space (2:201/220.5) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 201/220 201 2104 109/347 2 7 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.