| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Batch file virus ??? |
* An ongoing debate between Greg Paksi and Mike Ross rages on ... GP: > What I said in my first post was that he was writing a batch file for GP: > network usage. I don't remember the exact F-Prot warning, but I do This isn't the best place for this thread, but we can continue the discussion in ANTI_VIRUS of you like. Pertinent info for Batch files: as it turned out it was a valid infection (and yes, there ARE Batch file virii, called Trojans) namely the IRC/Flood.Bat Trojan that exploits network shares via a Batch file command-line interface along with several "support" programs (called the payload: Net.Exe & MSdisk.Exe). I'll post the McAfee info in ANTI_VIRUS if interested ... Be well, : Ben aka cMech http://bellsouthpwp.net/c/m/cmech617/ : + WildCat! Board 24/7 (337) 232-4155 33.6kBps 8,N,1 --- GoldED+/DPMI32 v1.1.5 r0513* Origin: FIDONet - The Positronium Repository (1:393/68) SEEN-BY: 633/267 270 @PATH: 393/68 261/38 123/500 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.