💾 Archived View for spam.works › mirrors › textfiles › apple › DOCUMENTATION › apple.rx captured on 2023-06-16 at 21:14:21.
-=-=-=-=-=-=-
Documentation for Apple.Rx -------------------------- This program requires an Apple IIgs or an enhanced //e or //c WITH a 65802 or 65816 microprocessor. A 65802 chip can be bought for around $20 and can easily be inserted in place of the 65C02 in the latter two machines. --------- This program is "virus medicine". It will read your system files (and any other types you specify) and create a data file that contains information on these files. At any time, you can run it in check mode and it will report any of these files that have been altered. For obvious reasons, I am not going to detail exactly what sort of data the program saves, but suffice it to say that it is virtually impossible to change any of these files without detection by this program and it would also be very difficult to either alter this program or the data file it creates without detection. The program makes an effort to protect itself and its data file from modification. It encrypts itself and resaves itself whenever it is used to write a new data file. However, despite these safeguards, the safest way to use it is to keep this program and its data file on a separate dedicated 3.5" disk, which you use only for running this program. THE PROGRAM NAME If you do not keep this program on a separate dedicated disk then you should change its name, so that a viral program specifically looking for this program cannot easily find it and modify it. THE DATA FILE The name of the data file defaults to RX.FILE. This name is kept in the STARTUP position of the program. If not kept on a dedicated disk, then its name too should be changed using BLOCK.WARDEN from ProSel. Unless you give it a full pathname, it will be kept on the same disk as the program. THE VOLUME NAME The program must be told what volume to check. This defaults to /HARD1, but this can be changed via the Change defaults function in the program. FILES CHECKED The program has two means of deciding which files to check. (Ordinarily, pure data files need not be checked, only programs.) The first way it decides whether to check a file is by a list of file types it keeps. It will check all files whose file type is in this list. The list presently contains only SYS (type $FF) and S16 (type $B3) types. You should add the NDA, CDA and TOL types ($B8, B9 and BA) and the tool setup type $B6. There is an option in the program for modifying this list. For example, you could add type $06 for BIN files, or type $FC for BAS files. Since many BIN files are data files, however, it is probably best to use the second option for them. The second way it decides is by a list of "special files". This list presently contains the file PROSEL. Again, there is an option in the program for adding to and deleting from this list. Note that if you have a file name in this list and the file cannot be found, then a program error will be reported and the program will abort. In such a case, you must remove that file name from the list. It is suggested that you either add the type $F1 to cover the CD.EXT file, or add that file to the name list. Whenever you add a program file to your system, you should run Apple.Rx in check mode to make sure things are now ok, and then rerun it in Create mode to revise the data file to include the new program file. You should run this program in check mode at frequent intervals, perhaps every day, to quickly determine if a problem exists before it has a chance to spread further. In particular it is a good idea to run a check before backing up a hard disk. PASSWORD To protect itself somewhat, the program requires a password when you enter it. The initial password is APPLEAPPLEAPPLE (passwords are not case sensitive) and one of the first things you should do is to change it with the built in facility to do that. A password must be at least 12 characters long, and when it is changed the program will encrypt most of itself and resave itself to disk. After that point you MUST remember your password. Recreation of the password from the encrypted file is virtually impossible unless you have the facilities of the CIA. It is in the nature of the encryption that even knowing the encryption algorithm, and having both encrypted and decrypted files at one's disposal will not, without gargantuan effort, yield the password that was used to drive the encryption. You can change the password any time you want, but you must know the old password to access the program in order to make that change. Some functions, including changing the password, are disabled and payment of the shareware fee will bring enabling instructions. WHAT THE PROGRAM CANNOT DO The program only checks that files have not been changed (by a virus or whatever). It cannot prevent damage by a program that does not change other files; for example, a program that just starts erasing a disk at a certain date. Only well kept backups can protect from that. Even backups cannot protect against a virus that invades other programs, however, and that is the purpose of this utility. DISEASE PREVENTION Nothing can be 100% protection against viruses. You should practice diligence and prevention. Do not ever download (and use) a program from a pirate board. (I can imagine and understand a software publisher uploading an infected program onto such boards, in sheer retribution.) Never use, in a susceptible environment (such as a hard disk), any program downloaded by or otherwise received from someone you do not know or in whom you do not have confidence. COPYRIGHT This program is copyrighted 1988 by Glen Bredon. It is expressly forbidden to give this program to anyone else or to upload it to any bulletin board. If the program was not uploaded by me to a major service then you should not use it. These restrictions are to make it more difficult for a look-alike contaminated program to be distributed. The program is SHAREWARE for $20. When you pay your fee, you should indicate where you got the program, so I can warn you if it is not legitimate. (Of course, this notice is unlikely to appear in a non-legitimate copy.) Just clip and mail: ---------------------------------------------------------------------------- To: Glen E. Bredon Re: Apple.Rx version 1.0 521 State Road Software viral protection program Princeton, NJ 08540 Glen: ____ Enclosed is my check for $20 in payment for Apple.Rx. I obtained the program from: Compuserve (or) ____ Enclosed is my check for $25, for which please send me the Apple.Rx program on a 5.25" disk. I understand that you will not distribute the program in this manner during the months of June, July and August. I understand that the payment entitles me to receive instructions on how to enable the disabled functions, and to receive a warning if my source for the program is not legitimate, and that I may download any future updates from the same source with no further payment, or obtain a revision from you for a P&H fee of $5. I further understand that it is not possible to have 100% sure protection against software viruses and that no such implied warrantee is given. I agree to abide by the copyright and to not distribute any copies of the program to other people or services. From: ________________________________________ ________________________________________ ________________________________________