TIP: Click on subject to list as thread! ANSI
echo: os2prog
to: Clemens Anhuth
from: Peter Hansen
date: 1995-01-01 19:05:00
subject: Virus Strategies

In a message on 01-01-95, Clemens Anhuth said to All:

CA> ...i write this mail because some of you ... seem to have quite 
CA> wrong ideas of how a virus would have to work under os/2 in order to
CA> do damage.

You are misinterpreting the responses.  Nobody is saying that a program
cannot be created that will damage an OS/2 system.  When folks say that
a "virus" cannot damage OS/2 they are talking specifically about the
kind that are activated when you run an .EXE and that stick themselves
into memory and walk around trashing things.  They are NOT talking about
cousins to viruses such as trojan horses.

It is quite possible to write a trojan horse that modifies the
CONFIG.SYS, and it is quite possible to come up with lots of other ways
to damage OS/2 systems.  The easiest is a program that just deletes
everything on the hard drive by overwriting all files.  (On the other
hand, this is merely an annoyance if you have backups.)

What everyone with more than two brain cells to rub together has been
saying is that a virus, as in the kind that surreptitiously loads into
memory by riding on top of another program, and _sticks around after the
program exits_, cannot exist in the OS/2 environment.  

OS/2 is not proof against all forms of attack, but it is protected
against the most common and easily spread kinds.  RK's senseless
babbling aside.
___
 * MR/2 * Now cruising at Warp 3!

--- QScan v1.131b / 01-0348
* Origin: FidoNet: CRS Online, Toronto, Ontario (1:229/15)
SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430
SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1
@PATH: 229/15 3615/50 229/2 12/2442 711/409 808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.