| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Virus Hysteria |
ROBERT KING wrote something original about Virus Hysteria RK> It's sad, the level of ignorance present in the OS/2 community. RK> You show me a stupid basic application that relies on the operating RK> system to do any and all I/O. Virusi by-pass the operating system RK> entirely. Get it? Good. So, you think that virus writers are smart enough to write one single bit of code that can detect and operate every single MFM, RLL, ESDI, SCSI, SCSI-2, IDE, EIDE hard disk controller ever made? (in only a few hundred bytes, even?) I think that you have an extremely exaggerated opinion of their abilities. Even the companies designing the chips in some of these controllers have trouble doing this WITH THEIR OWN CHIPS. Like most dos programs, viruses generally access hard disks through BIOS or DOS services using an interrupt instruction. (including 25h, 26h: absolute disk read and write, and 13h: BIOS disk services). Trying to use either of these to change the hard disk in a dos session in OS/2 DOES NOT AFFECT the hard disk. OS/2 terminates the program attempting it. DOS programs which attempt to access I/O ports that they are not specifically permitted to die a similar death. Try to change the global descriptor table? Nope. Set the processor back to real mode? Sorry, you can't do that either. The only time viruses can entirely bypass the OS/2 operating system is when you boot DOS instead of OS/2. Get it? Good. BTW, the language of the conference is English, not latin, and in English, the plural of 'virus' is 'viruses'. * KWQ/2 1.2g * "Taglines: steal all you want. We'll make more." --- QScan v1.14b / 01-0093* Origin: La Cantina BBS * El Paso * 915-532-0332 6GB, 3 Nodes (1:381/123) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 381/123 900 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.