TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: PAUL WALKER
from: EARL MONTGOMERY
date: 1997-07-30 10:55:00
subject: StealthBoot.a

 EM>  as it should. Someone suggested that even though 
 EM> everything appears normal I should run FDISK /MBR. Since 
 EM> this is an undocumented switch I hestitate to use it. 
 EM> Appreciate any
 PW> I really recommend /not/ doing this. If you're using a boot 
 PW> manager, or extended drive (whatever they're called), 
 PW> performing this operation can mean you
 PW> lose access to the drive!
 PW> I don't have any information on stealthboot.a (can't find 
 PW> it in F-Prot or Dr Solly's), but if you're worried about it 
 PW> still being there, the best thing to do
 PW> is boot from a known clean disk, and use a known clean copy 
 PW> of, say, F-Prot to check the system.
     Try AMSE (boot virus). When AVP first detected the virus it
     referred to it as StealthBoot.a. But I didn't let it cure it
     at that time because of the warning AVP gave me. About an hour
     later (out of desperation) I let AVP cure it and this time it
     called it AMSE.
     Regards
--- Msgedsq 2.2e
---------------
* Origin: Earl's Point * Dallas TX * (1:124/1113.5)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.