TIP: Click on subject to list as thread! ANSI
echo: os2prog
to: Jon Guthrie
from: Jonathan de Boyne Pollard
date: 1994-12-26 05:08:02
subject: Virus Alert!

ZZ>
  > Of course running executables can't be written to, but it's hardly ever the
  > RUNNING ones that are infected.  I remain unconviced that
  > this is a real problem for Virus writers.
ZZ>

  Think of it this way.  Virus writers infect the EXE on disk mainly, so
  that the virus has a greater chance of being run another time.

  If they cannot infect the programs that are *currently running* then
  it is less likely that they are going to infect the programs that will
  ever *be run*.  This is based on the theory that the programs that are
  currently running are the programs that are regularly run.

  Under DOS, if a virus infects COMMAND.COM, it will be run every time
  that the machine boots.

  Under OS/2, a virus cannot achieve the same effect, since it won't be
  *able* to infect PMSHELL.EXE, and there's no guarantee that CMD.EXE
  will ever be run by the user (I don't use it here, for example).

ZZ>
  > question whether or not the difficulties in dealing with
  > HPFS are a real problem when DosOpen and so forth work just
  > as well for a possible virus writer as they do for more
  > normal applications programs.
ZZ>

  This is an issue relating to the damage that a virus can do when
  activated.  Lots of viruses like to trash the hard disc.  This is a
  lot more difficult to do with HPFS than FAT.  A lot more of the
  partition would have to be written to.

  As I said before, CHKDSK /F:3 can even recover from FORMAT most of the
  time with HPFS, so you can guess at the level of redundancy in the
  filesystem that the hypothetical OS/2 virus writer would have to deal
  with.

ZZ>
  >                         I seriously doubt that many people
  > would detect a virus in process listing even if they
  > routinely produced such listings.
ZZ>

  They'd notice if a process that they expected to stop didn't stop,
  though.  If the process were to stop then -- *poof* -- the virus is
  not in memory anyway.  A virus that intends to remain active must have
  a thread running somewhere.

  Incidentally, most programs are written so that when the main thread
  exits it kills off all of the other threads irrespective of what they
  were doing.  So a virus would have a hard time sticking around even if
  it spawned off a secondary thread with DosCreateThread.  The virus
  writer would have to learn all about exit lists -- yet another thing
  for the hypothetical OS/2 virus writer to have to learn about and
  cater for.  Yet more viral code bloat.

ZZ>
  >                                      To my mind, a person
  > wishing to code destructive programs for OS/2 would be
  > better off coding worms for OS/2 rather than viruses.
ZZ>

  Worms or trojans are more likely to succeed than the parasites like
  viruses.

ZZ>
  > Especially considering the built-in networking stuff that
  > IBM is promising.
ZZ>

  Probably about the most dangerous program running on a normal setup is
  sendmail, but even then the IBM sendmail is a crippled version which I
  doubt would have most of the "usual" holes.

  Mind you, in a short while I won't be running sendmail any more.  (-:

  > JdeBP <
___
 X MegaMail 2.10 #0:
--- Maximus/2 2.02
* Origin: DoNoR/2,Woking UK (01483-725167) (2:440/4)
SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430
SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1
@PATH: 440/4 141/209 270/101 396/1 3615/50 229/2 12/2442 711/409 808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.