TIP: Click on subject to list as thread! ANSI
echo: os2prog
to: Peter Hansen
from: Kenneth johansson
date: 1995-01-08 16:05:20
subject: Virus Strategies

> What everyone with more than two brain cells to rub together has 
 > been saying is that a virus, as in the kind that 
 > surreptitiously loads into memory by riding on top of another 
 > program, and _sticks around after the program exits_, cannot 
 > exist in the OS/2 environment.  

 > OS/2 is not proof against all forms of attack, but it is 
 > protected against the most common and easily spread kinds.  
 > RK's senseless babbling aside.

What are you talking about??? The system is wide open! Don't let the
memmory protection fool you.

1. Can a program read another exe file ?
2. Can a program write over another exe file ?
3. Can a program alter the config.sys and install a new driver ?

Some ways are blocked that a virus under DOS can use but its still not near safe.

I have noticed that there are more than one definition on whats a virus and
whats not. I define virus as a unwanted code pice that can reproduce
itself. For me a virus dont have to take over the system or hide in the OS.
A trojan is only the program thats deliver the virus. Say I hade a virus
and I wanted to spread it I would at this time make a DOOM/2 to put it in.
Thats makes the DOOM/2 a trojan

If UNIX can be infected by a virus so can OS/2.
---
* Origin: lazy sysop - origin lost in space (2:201/220.5)
SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430
SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809
@PATH: 201/220 201 2104 109/347 2 7 3615/50 229/2 12/2442 711/409 808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.