⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer security.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                                    - 19 -6.9  VIRUS DETECTOR AND ANTIDOTE SOFTWARE          *** None offer complete protection ***Some do NOT test for boot sector viruses, modification of the commandinterpreter, branching into the BIOS, etc., unconventional things thatnasty viruses are known to do.  This is not a comprehensive list, butyou'll have an idea of what's available, either commercially or throughpublic domain.  Look for a product that will detect as many of theeffects identified in the previous section as possible.  Warning:  somehighly publicized virus detectors only search for ONE (1) virus!  Othersare more sophisticated, and may even act as a disinfector as well as adetector.Old virus symptoms vs file changesAntidoteAntigenBombsqadCanaryCylene-4C-4Disk Defender * recommended (add-on board - write-protects hard disk)Disk watcherDr. Panda UtilitiesIBM - COMPare in DOSMace vaccineMagic BulletsSyringeSentry * recommended for systems booted regularlyVaccineViraidVirus-Pro * recommended for large corporate environmentsShareware:   Novirus             Flushot4+             Virusck             ViruscanPlus what's shown on preceding pages as a "Disinfector that works".  Ialso have a list of over 100 shareware products that do everything fromdetect and/or disinfect to write-protecting the hard drive and requiringpassword access .... but my fingers are getting tired from typing at thispoint, and there are more important things to cover - after all, ifyou're careful, you won't need a list of detectors/disinfectors.                                 - 20 -6.10  TROJAN HORSESWhile a "virus" is something hidden within another program that iswaiting to make your system really sick, and a "worm" may be somethingthat lives on its own and usually transmits through networked computers, a "Trojan Horse" is a little of both, so I've included it with this virussection if only to warn you of its existence.  It lives on its own as aprogram, and will bring you down like Helen of Troy's soldiers.  "Iwouldn't copy something like that," you say.  Well, like Helen's horse,it comes disguised.  It will purport to do something really neat, likecompress files (so you have more disk space available), sort yourdirectories (so you can find things more easily), or play chess oranother game with you.  In actuality, it's really just waiting to do thethings that viruses do - trash your files, scramble your boot sector, fryyour FAT, or erase your hard disk.  It doesn't usually do anything itpromises to do.The following are just a few examples of the known Trojan Horses, mostof which come from bulletin boards.  Please don't misunderstand me, mostBB operators are honest people who are trying to help the computerindustry as a whole, but they can't be held responsible for the peoplewho might dial into their BB and leave a disaster waiting until the nextcaller(s).SCRNSAVE.COM:  This is supposed to blank your screen after x seconds of               inactivity, thus preventing image burn-in or apparently               offering a sense of security;  say goodbye to your files               while it erases your harddisk.TSRMAP:        For the 'sophisticated' user who uses Terminate and Stay               Resident programs, it's sometimes handy to have a map of               where these programs are loaded in memory, and be able to               delete some if you're short of memory;  hopefully this               same 'sophisticated' user has a copy of track 0, because               his was just sent to heaven ..... or elsewhere.DOS-HELP:      Sounds great, doesn't it?  This TSR program is supposed to               give on-line help on DOS commands.  Your hard disk was               just formatted.ULTIMATE.EXE:  This is supposed to be a DOS shell (if you've used               Directory Scanner or some other software that allows you               to move around directories and load programs easily, or               even a menu system, then you know what a DOS shell is).                While the "Loading..." message shows on your screen, the               FAT (file allocation table) of your hard disk went to the               trash bin.BARDTALE.ZIP   This purports to be a commercial game from Electronic Arts               (BARDTALE I)  Someone reverse engineered this program, and               wrote in a routine to format your hard disk upon               invocation.                                 - 21 -COMPRESS.ARC   This is dated April 1 1987, is executed from a file named               RUN-ME.BAT, and is advertised as "shareware from Borland"               (Borland is a highly reputable company).  It will not               compress your files, but it will very competently destroy               your FAT table.DANCERS.BAS    You'll actually see some animated dancers in colour -               while your FAT is being tromped on.DEFENDER.ARC   Think you're going to get a copy of Atari's DEFENDER for               nothing, huh?  There's still no such thing as a free               lunch, and this one will be particularly expensive:  it               not only formats your hard disk, but it writes itself to               your ROM BIOS - the chip that holds the Basic Input Output               System for your machine.  Get your wallet out.SIDEWAYS.COM   The good "SIDEWAYS.EXE" is about 30Kb, while this version               is about 3Kb.  The really big difference, though, is what               happens to your hard drive - it's spun off into oblivion.These are only a few of the 70 or so Trojans I have listed at work, butI'm sure you've got the idea.  These programs (a) stand alone, (b) oftenclaim to do something useful, (c) may be hacked versions of goodsoftware, (d) may be named the same as good software, (e) may send youback to using a quill pen.                                 - 22 -7.   PC RULES OF THUMB  (Additional to Basic Rules of Thumb)Run virus check BEFORE backupBoot floppy systems from known, protected disks onlyNever work with masters - first make copies on a trusted machineStore data on floppy:     set path in autoexec.bat, but load from A: to      ensure data goes to floppySave your data periodically while workingUse write protect tabsUse write protect software on hard disk / backup track 0Never boot HD systems from floppies (unless known and     protected)New/repaired hard disk? - run a virus detectorUse protection package (practice safe hex)Avoid shareware / BB demos     if you use a BB, set path to A: beforehand,     download only to A:, poweroff immediately after,     then powerup and do a virus scan on the floppy;     always scan sharewareKnow the source of your softwareDon't use illegal copiesIf your data is truly confidential, don't depend on     DELETE - you must use, e.g., WipefileAutopark softwareHardcards                                 - 23 -6.   A FEW EASY TRICKS FOR PC SECURITY1.   Set Read only attributes on all files ending with .COM, .EXE, .SYS,     . OVL,  .BIN,  .BAT          e.g.:     ATTRIB +R *.SYS2.   Use an undocumented trick in DOS of naming your data files ending     with an ASCII blank or NUL character (ASCII 32 or 255): ***          e.g.:     COPY  A:OLDFILE.TXT  NEWFILECHR$(255).TXT              or    REN  A:MYFILE.DAT  MYFILECHR$(32).DAT     ***  Newer versions of DOS will give the ASCII blank or null by          holding the [Alt] key and striking the numeric keypad numbers;          e.g.  COPY  A:OLDFILE.TXT  NEWFILE[Alt]2553.   Prevent inadvertent formatting of the hard disk:          Rename FORMAT.EXE to (e.g.) DANGER.EXE          Write a 1-line batch file called FORMAT.BAT:               DANGER A: %1 %2 %3 %4 %5 %64.   Have a batch program as a shutdown routine, to run:          1. Virus Check          2. Copy Track 0          3. Back up your data files          4. Park the heads                                 - 24 -9.   SO YOU'RE INFECTEDTerminate all connections with other computersRecord your last activitiesDetermine the nature and extent of the damageNotify other usersContact the source of the carrier software_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Back up data files to new diskettesErase infected disk (using high or low level format -     low level is preferred to re-write track 0)Check master disks with detection program(s)Restore system filesRestore data filesRun detection program(s) againBe careful in future - think like a thief!                       ------------------

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -