| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Virus Hysteria |
Hello JdBP, > One of them even contains some assembly. I'll bet > that all of those non-existent OS/2 virus writers that are > lurking will be so impressed ... If you have internet access, get you a copy of 40Hex... > // OS/2 does not allow self-modifying code. > // OS/2 does not allow direct access to the I/O ports > // OS/2 does not allow a running EXE or DLL to be modified > // OS/2 doesn't allow low-level write access to an active > partition A virus doesn't need to do anything of the above to be a virus (ie reproduce). It hasn't to be self-modifying, it doesn't have to use port writes, can infect non-running EXE (or DLLs), doesn't need low-level access to an active partition. Strictly speaking, I am disadvantaged here because you can post source code to prove your point. If I don't I could be called a liar and if I do, i'll be called a criminal or a vandal ! So, since you and Peter Fitzsimmons seem to be reasonnable persons, let's say that I'll send you more info through crash mail. Pierre Vandevenne - F-PROT Technical Support BENELUX & France --- Squish v1.01* Origin: DataRescue's BBS +32-41-720237 (2:293/2213) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 293/2213 2203 292/500 850 285/1 280/0 801 24/24 396/1 3615/50 229/2 @PATH: 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.