📄 computer security.txt
字号:
- 19 -6.9 VIRUS DETECTOR AND ANTIDOTE SOFTWARE *** None offer complete protection ***Some do NOT test for boot sector viruses, modification of the commandinterpreter, branching into the BIOS, etc., unconventional things thatnasty viruses are known to do. This is not a comprehensive list, butyou'll have an idea of what's available, either commercially or throughpublic domain. Look for a product that will detect as many of theeffects identified in the previous section as possible. Warning: somehighly publicized virus detectors only search for ONE (1) virus! Othersare more sophisticated, and may even act as a disinfector as well as adetector.Old virus symptoms vs file changesAntidoteAntigenBombsqadCanaryCylene-4C-4Disk Defender * recommended (add-on board - write-protects hard disk)Disk watcherDr. Panda UtilitiesIBM - COMPare in DOSMace vaccineMagic BulletsSyringeSentry * recommended for systems booted regularlyVaccineViraidVirus-Pro * recommended for large corporate environmentsShareware: Novirus Flushot4+ Virusck ViruscanPlus what's shown on preceding pages as a "Disinfector that works". Ialso have a list of over 100 shareware products that do everything fromdetect and/or disinfect to write-protecting the hard drive and requiringpassword access .... but my fingers are getting tired from typing at thispoint, and there are more important things to cover - after all, ifyou're careful, you won't need a list of detectors/disinfectors. - 20 -6.10 TROJAN HORSESWhile a "virus" is something hidden within another program that iswaiting to make your system really sick, and a "worm" may be somethingthat lives on its own and usually transmits through networked computers, a "Trojan Horse" is a little of both, so I've included it with this virussection if only to warn you of its existence. It lives on its own as aprogram, and will bring you down like Helen of Troy's soldiers. "Iwouldn't copy something like that," you say. Well, like Helen's horse,it comes disguised. It will purport to do something really neat, likecompress files (so you have more disk space available), sort yourdirectories (so you can find things more easily), or play chess oranother game with you. In actuality, it's really just waiting to do thethings that viruses do - trash your files, scramble your boot sector, fryyour FAT, or erase your hard disk. It doesn't usually do anything itpromises to do.The following are just a few examples of the known Trojan Horses, mostof which come from bulletin boards. Please don't misunderstand me, mostBB operators are honest people who are trying to help the computerindustry as a whole, but they can't be held responsible for the peoplewho might dial into their BB and leave a disaster waiting until the nextcaller(s).SCRNSAVE.COM: This is supposed to blank your screen after x seconds of inactivity, thus preventing image burn-in or apparently offering a sense of security; say goodbye to your files while it erases your harddisk.TSRMAP: For the 'sophisticated' user who uses Terminate and Stay Resident programs, it's sometimes handy to have a map of where these programs are loaded in memory, and be able to delete some if you're short of memory; hopefully this same 'sophisticated' user has a copy of track 0, because his was just sent to heaven ..... or elsewhere.DOS-HELP: Sounds great, doesn't it? This TSR program is supposed to give on-line help on DOS commands. Your hard disk was just formatted.ULTIMATE.EXE: This is supposed to be a DOS shell (if you've used Directory Scanner or some other software that allows you to move around directories and load programs easily, or even a menu system, then you know what a DOS shell is). While the "Loading..." message shows on your screen, the FAT (file allocation table) of your hard disk went to the trash bin.BARDTALE.ZIP This purports to be a commercial game from Electronic Arts (BARDTALE I) Someone reverse engineered this program, and wrote in a routine to format your hard disk upon invocation. - 21 -COMPRESS.ARC This is dated April 1 1987, is executed from a file named RUN-ME.BAT, and is advertised as "shareware from Borland" (Borland is a highly reputable company). It will not compress your files, but it will very competently destroy your FAT table.DANCERS.BAS You'll actually see some animated dancers in colour - while your FAT is being tromped on.DEFENDER.ARC Think you're going to get a copy of Atari's DEFENDER for nothing, huh? There's still no such thing as a free lunch, and this one will be particularly expensive: it not only formats your hard disk, but it writes itself to your ROM BIOS - the chip that holds the Basic Input Output System for your machine. Get your wallet out.SIDEWAYS.COM The good "SIDEWAYS.EXE" is about 30Kb, while this version is about 3Kb. The really big difference, though, is what happens to your hard drive - it's spun off into oblivion.These are only a few of the 70 or so Trojans I have listed at work, butI'm sure you've got the idea. These programs (a) stand alone, (b) oftenclaim to do something useful, (c) may be hacked versions of goodsoftware, (d) may be named the same as good software, (e) may send youback to using a quill pen. - 22 -7. PC RULES OF THUMB (Additional to Basic Rules of Thumb)Run virus check BEFORE backupBoot floppy systems from known, protected disks onlyNever work with masters - first make copies on a trusted machineStore data on floppy: set path in autoexec.bat, but load from A: to ensure data goes to floppySave your data periodically while workingUse write protect tabsUse write protect software on hard disk / backup track 0Never boot HD systems from floppies (unless known and protected)New/repaired hard disk? - run a virus detectorUse protection package (practice safe hex)Avoid shareware / BB demos if you use a BB, set path to A: beforehand, download only to A:, poweroff immediately after, then powerup and do a virus scan on the floppy; always scan sharewareKnow the source of your softwareDon't use illegal copiesIf your data is truly confidential, don't depend on DELETE - you must use, e.g., WipefileAutopark softwareHardcards - 23 -6. A FEW EASY TRICKS FOR PC SECURITY1. Set Read only attributes on all files ending with .COM, .EXE, .SYS, . OVL, .BIN, .BAT e.g.: ATTRIB +R *.SYS2. Use an undocumented trick in DOS of naming your data files ending with an ASCII blank or NUL character (ASCII 32 or 255): *** e.g.: COPY A:OLDFILE.TXT NEWFILECHR$(255).TXT or REN A:MYFILE.DAT MYFILECHR$(32).DAT *** Newer versions of DOS will give the ASCII blank or null by holding the [Alt] key and striking the numeric keypad numbers; e.g. COPY A:OLDFILE.TXT NEWFILE[Alt]2553. Prevent inadvertent formatting of the hard disk: Rename FORMAT.EXE to (e.g.) DANGER.EXE Write a 1-line batch file called FORMAT.BAT: DANGER A: %1 %2 %3 %4 %5 %64. Have a batch program as a shutdown routine, to run: 1. Virus Check 2. Copy Track 0 3. Back up your data files 4. Park the heads - 24 -9. SO YOU'RE INFECTEDTerminate all connections with other computersRecord your last activitiesDetermine the nature and extent of the damageNotify other usersContact the source of the carrier software_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Back up data files to new diskettesErase infected disk (using high or low level format - low level is preferred to re-write track 0)Check master disks with detection program(s)Restore system filesRestore data filesRun detection program(s) againBe careful in future - think like a thief! ------------------
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -