| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Virus Hysteria |
In a message dated , Jonathan Markevich wrote to Robert King: JM> Yup, you got that right. Only it ain't JdeBP you're talking JM> about! JM> JM> | You show me JM> | a stupid basic application that relies on the operating system to JM> do JM> any JM> |and all I/O. Virusi by-pass the operating system entirely. Get it? JM> Good. JM> JM> Just for kicks, boot up a VDM and run something that bypasses the JM> OS JM> entirely, a sector editor, a DOS game or something. Hmmm... run the JM> DOS JM> game JM> in a window. Hey, isn't that doing DIRECT SCREEN WRITES? Why does JM> it only JM> print in a window? JM> Been there, done that.. Screen writes use memory, and hence can be stopped ¨by the OS, direct port I/O is another matter entirely. Are you truely so ¨blind that you do not understand the topic? The point was and is, though ¨virus attacks have not been a big problem under OS/2, the key point is they ¨haven't been YET. And this attitude of, it can't happen here, only envites ¨the problem. There is nothing that cannot be done, clearly, common sense is ¨lacking in anyone arguing against the eventuality of virus attacks on OS/2 ¨based systems. Robert --- Simplex/2 BBS (v1.07.00Beta [OS/2])* Origin: Cyberdyne Systems BBS. OS/2 for the 90's (1:214/13) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 @PATH: 214/13 33 203/530 396/1 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.