TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: RICK COLLINS
from: CURTIS CANNING
date: 1997-01-25 16:56:00
subject: Warning

Hi Rick
 cc> Lets make up a theoretical question, What if the virus was so
 cc> advanced, lets say a trojan with stealth capabilities, and it
 cc> got past my virus scanner and it went straight to TBAV and
 cc> infected it.
 RC> OK, lets.  But let's also keep one foot in reality and say what we
 RC> mean.  Are you talking about a virus or about a Trojan?  They are
 RC> _not_ the same things.
Well my understanding of a virus and a trojan is that,
a trojan sits on your computer and waits for a certain
time and date and then it activates it self and infects
your files, and a virus is when it keeps on infecting
files when you activate a program or reboot the computer.
"please correct me if I'm wrong"
 CC> Even if I did a clean boot it will still be infected, lets say
 CC> it was such a good trojan that it infected my emergency TBAV
 CC> backup on disk as well, because I didn't realized that there was
 CC> a virus on it everything is infected.
 RC> Why not ask for somethig just as unreasonable: "Software companies
 RC> should make the files so they can't get infected and cover all
 RC> possibilities".  Then, you wouldn't need to worry about "infected
 RC> files" at all.
Nothing is impossible, and if they do invent something
like that, the person who programed it will be very rich,
and it will change the virus industry and put the major
virus companys out of business.
Then people would have to resort to programming bombs, instead
of viruses.
... I know a good tagline when I steal one.
___ Blue Wave/386 v2.30
---
---------------
* Origin: Melbourne PC User Group BBS (3:632/309)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.