TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: PETER LOUWEN
from: BETTY HOLDER
date: 1997-01-17 07:18:00
subject: Warning

 -=> Quoting Peter Louwen to Betty Holder <=-
 
 BH> FC /B A:PROGRAM.EXE C:\PROGRAM\PROGRAM.EXE
 
 BH> If it differs, then you know something was playing with the program.
 PL> However, if they do not differ, then you may not infer that everything
 PL> is hunky dory. Stealth viruses are able to make FC see what it (the
 PL> virus) would like it (FC) to see, so that FC is not able to detect any
 PL> differences. 
 PL> Peter
You are exactly right.  That didn't come to my mind as I wrote that.
But, if they did come up different (and you didn't play with or change
the .EXE), that would indicate that there was a problem, but like you
said, if they come up the same, you can't always assume you are safe.
Also, not all "hackers" (the malicious kind, the careless geniuses,
and the wannabe's) have the skill to write a good stealth virus.  But,
even if the odd were low, if your data is really that important, then
even low odds are too much of a risk to take.  That is where backups
(and multiple volume backups at that) can be life-savers.  I guess a
good write protected diskette (or CD-ROM for that matter) is one of
the best ways to store and run an anti-virus program to where at least
the physical copy won't get tampered with.  There is no telling what
will be done to the copy in memory since a stealth could recognize
what the antivirus is doing and somehow abort or otherwise screw with 
the program (perhaps cause a CPU exception error or call int 21h using
the terminate program service, or fake out the disk accesses).
Betty
--- GEcho 1.11+
---------------
* Origin: [ The Mach ][ BBS ] - RA 2.50+ - USR DS V.34+/33600 (1:3654/144)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.