💾 Archived View for spam.works › mirrors › textfiles › virus › fungen7.cvp captured on 2023-06-16 at 21:02:37.

View Raw

More Information

-=-=-=-=-=-=-

FUNGEN7.CVP   911113

                         File checking

Most file infecting viral programs can be checked for quite
simply, and without any special programs or equipment. 
Provided, that is, that the computer user will pay the most
minimal attention to the system, and take the most basic
precautions.

The simplest form of antivirus detection "equipment" is a list
of all the programs to be run on the computer, with the size and
"last changed date" for each.  (The list for "resource" based
systems such as the Macintosh will, of necessity, be somewhat
larger, and must include all "code" resources on the disk.) 
With some few (albeit important) exceptions, programs should
never change their size or file date.  Any changes that are
made, should be at the request of the user, and thus easy enough
to spot as exceptions.

While "stealth" technology of various types has been applied to
viral programs, the most common (and successful) viri, to the
date of this writing, have not used it.  Most change the size of
the file, and generally do it in such a standardized fashion
that the "infective length" of the virus is often used as an
identification of the specific viral program.  The file date is
changed less often, but is sometimes deliberately "used" by the
virus as an indicator to prevent reinfection.  (One used the
value of "31" in the seconds field, which is presumably why the
later 1.xx versions of F-PROT all had dates ending in 31. 
Another used the "impossible" value of 62.)

Even when stealth techniques are used, they generally require
that the virus itself be running for the measures to be
effective.  We thus come to the second piece of antiviral
equipment; the often cited "known clean boot disk".  This is a
bootable system (floppy) disk, created under "sterile"
conditions and known to be free of any viral program infection,
and write protected so as to be free from possible future
contamination.  When the computer is "booted" from this disk,
the hard disk boot sector and system areas can be bypassed so as
to prevent "stealth" programs from passing "false data" about
the state of the system.

Viral protection can thus start with these simple, and
non-technical provisions.  Starting with a known-clean system,
the list can be checked regularly for any discrepancies.  The
"clean disk" can be used to "cold boot" the system before these
checks for added security.  Checks should be performed before
and after any changes made to software, such as upgrades or new
programs.

Security does not, of course, end here.  This is only a very
simple first line of defence.

copyright Robert M. Slade, 1991   FUNGEN7.CVP   911113