| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Sub-cellular life forms |
On Thursday, 12-22-1994 Robert King wrote to Brian May about "Virus Alert!" as follows: RK> #1, Writing to executing executables is simple and is in fact done RK> quite often by shareware and some comercial applications. Not under OS/2, it isn't. The OS/2 loader opens the .EXE with sharing denied to write applications; try running LINK386.EXE on a file you are currently running. You _can_ modify the extended attributes, but these are not loaded as part of the executable code. RK> #2, Protected mode means nothing to the virus programmer. I suppose "page descriptor table" means nothing also. Such concepts do tend to limit the memory access of ring 3 (normal program) applications. Getting into ring 0 (operating system) privileges is impossible without being booted as a device driver or the kernel and having ring 0 privileges established at boot time. All ring 3 access to ring 0 functions is done by API calls that have ring transitions established when the system is booted, or inherited from such. RK> #3, Even a DOS based program can read/write to HPFS drives under RK> OS/2 RK> just as they do in DOS. NO VIRUS uses BIOS/DOS calls RK> for reads and writes. Such operations are performed at RK> the port level which, as you RK> apparently aren't aware, bypasses the operating system entirely. Actually, the hardware itself prevents this. There is a flag bit called I/O Privilege Level that can only be set at ring 0 (when the descriptor table entry is built) and VDM's do not have this privilege. When IOPL is off, you cannot touch the I/O ports. All VDM's have their legitimate I/O requests (INT 21H, various functions) escalated back to OS/2; illegitimate attempts result in the program being killed by the operating system. A virus dies with its host. RK> #4, The OS/2 scanners that are available, DO NOT detect several RK> virusi. RK> One that I can demonstrate readily is the Frankenstien RK> virus which I have on a floppy. Not only do the OS/2 RK> scanners not see it, but the DOS RK> based scanners don't recognise it either when run under OS/2. And at RK> this point, the ONLY scanner I've found that DOES find that particular RK> virus is Symantec's Anti-Virus for DOS/Windows. Central Point Anti-Virus (for DOS and Windows) works fine in a VDM, at least as far as the signatures it has currently installed are concerned. You have to keep updating the signature file (from CP, nowadays Symantec) if you want to keep up-to-date with the morons. Any virus scanner is no better than its signature file. Incidentally, the plural of "virus" is "viruses". Regards Dave * KWQ/2 1.2i * NO, I'm not a Kennedy. My pants just fell down. --- Maximus/2 2.02* Origin: OS/2 Shareware BBS, Fairfax, VA: 703-385-4325 (1:109/347) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 @PATH: 109/347 2 7 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.