home *** CD-ROM | disk | FTP | other *** search
- ------------------------------
-
- Date: Wed 15 Jun 88 15:36:53-PDT
- From: Ted Shapin <BEC.SHAPIN@ECLA.USC.EDU>
- Subject: Review of IBM Protection Programs
-
- This file is IBMPROT.DOC. Reviews of Virus Protection Programs. Please
- feel free to add to this list.
-
- Version 1, 6/15/88, T. Shapin
-
- ===============================================================
-
- Class 1 are programs that warn of changes to system files after the fact.
- These methods either compute some sort of CRC or hash sum, or compare a
- file against a copy of the file. While it is theoretically possible for a
- particular CRC to be forged, each program seems to use a different
- algorithm for the computation so that different values are obtained.
- Furthermore, each version of DOS will give a different values, so I doubt
- that the signature can be forged practically.
-
- ===============================================================
-
- CHKSUM.ARC, contains: CHKSUM.C, CHKSUM.DOC, CHKSUM.EXE, CRC16.C, STOI.C.
- From: Bob Taylor, compiled using Turbo C 1.5.
-
- What it does: Computes a redundancy check (CRC) for any file, (including
- system and hidden), and compares a computed CRC for a file with a
- specified one given as a parameter to the program. Wildcard file names and
- more than one filename can be supplied as parameters. Either gives a
- warning message or optionally sets a return code. On a vanilla 4.77 Mhz
- PC, it takes about 7 seconds to check all three system files.
-
- Evaluation: Fast and very useful. [T.S.]
-
- - - - -
-
- CHECK-OS.ARC, contains: CHECK-OS.DOC, CHECK-OS.EXE, CHECK-OS.PAS.
- From: R.J. Bartlett & Erik Ch. Ohrnberger
- Compiled with Turbo Pascal version 4.0.
-
- What it does: It checks the Filesize, File Date/Time (last updated), and
- Checksum of COMMAND.COM, AUTOEXEC.BAT, and CONFIG.SYS. Will also check
- system files.
-
- Evaluation: On my system it would not handle the "FCBS=" parameter in my
- CONFIG.SYS file. It needs some work. [T.S.]
-
- - - - -
-
- CHKUP14.ARC, contains: CHECKUP.DOC, CHECKUP.EXE, REGISTER.DOC.
-
- From: Richard B. Levin. BBS's: (215) 969-8379 or (215) 635-5226
- Compiled Microsoft BASIC v.6.0
-
- What it does: Compares a target file's size, its incremental checksum, and
- its total checksum.
-
- Evaluation: While the method of computing hash sums would be difficult to
- forge, it prints lots of messages when it runs, and there is no provision
- for returning error codes that can be tested in a batch file. I find the
- the lack of source code a minus and the appeals for money obnoxious. [T.S]
-
- - - - -
-
- CONDOM.ARC, contains: CONDOM.BAT, CONDOM.DOC, CPY.C, CPY.EXE,
- DIF.C, DIF.EXE, READ-ME.NOW.
-
- From:
- Charlie Ros5e [sic], Boulder, Colorado, BBS Fido Node 104/23, Account
- Name: Charlie Rose; and Gerry Williams, Albuquerque, New Mexico, BBS Fido
- Node 15/1001.
-
- DIF.C and CPY.C, were compiled with Aztec C86, Version 3.40b, Manx
- Software Systems.
-
- What it does: CPY makes a reference copy of any file, including system, or
- hidden. DIF compares a current file to the reference copy and sets an
- error return code that can be tested in a batch file that indicates what
- happened.
-
- Evaluation: Very useful for checking system files for any changes. [T.S.]
-
- - - - -
-
- FILECRC.ARC, contains: COMPARE.CHN, COMPARE.COM, COMPARE.PAS,
- FILECRC.COM, FILECRC.DOC and FILECRC.PAS.
-
- From: Ted H. Emigh, Department of Genetics, North Carolina State University
- Box 7614, Raleigh, NC 27695-7614, emigh@ncsugn.uucp, NEMIGH@TUCC.BITNET.
- Compiled with Turbo Pascal 3.0.
-
- What it does: FILECRC creates a list of all the files on the default drive
- along with creation date, file size, and a CRC (cyclic redundancy check)
- for each file. When FILECRC is run again the new list is compared with
- the old list.
-
- Evaluation: I tried it on two systems and it didn't work. They both hung
- and I had to reboot. [T.S]
-
- - - - -
-
- SYSCHK1.ARC contains SYSCHK.EXE and SYSCHK.DOC.
-
- From: Terratech, 19817 61st Ave. S.E., Snohomish, WA 98290
-
- What it does: Performs checksums of the first and second files in the root
- directory and the COMSPEC file. These are the three system files. The
- first time the checksums are displayed. If they are given as parameters,
- they are compared against the current values. Error levels are set so a
- batch file can test the results.
-
- Evaluation: Works well. This is shareware, with donation information only
- given if you request it with "SYSCHK /?". [T.S.]
-
- - - - -
-
- VACCINE.ARC, contains VACCINE.EXE, VACCINE.DOC.
-
- From: BBS (616)361-7500
-
- What it does: A compiled BASIC program that will give the size, time and
- date of a supllied file name. If these are given as parameters, it will
- compare the current values with the parameters and print a message that
- they agree or disagree. It will not read files with the system attribute.
-
- Evaluation: Probably not very useful. [T.S.]
-
- - - - -
-
- VIRUSCK.ARC contains: LICENSE, README, VIRUSCK.DOC, VIRUSCK.EXE.
-
- From: Matt Cohen, PO Box 10589, State College, PA 16805-0589
- Written in Turbo or Microsoft C
-
- Source code: 83 lines
-
- What it does: It runs a program and reports any changes in its size or
- date after it is executed.
-
- Evaluation: Not recommended. [T.S.]
-
- ===============================================================
-
- Class 2 programs terminate and stay resident and attempt to stop
- undesirable activity.
-
- ===============================================================
-
- C-4.COM, INSTALL.EXE
-
- From: Interpath, 4423 Cheeney St., Santa Clara, CA 95054,
- (408) 988 3832.
-
- What it does: This is a commercial product that costs $40. It makes
- itself resident, hooking vectors 9, 13, 21, 22, 26 and 2F. A message pops
- up if any forbidden disk activity tries to take place and gives you the
- option of allowing or aborting the action. It protects against any program
- that attemots an interrupt level write ti a disk, or any program that
- attempts to modify or rename an EXE or COM program or CONFIG.SYS.
-
- Evaluation: It does not warn of batch file modifications. The vendor has
- cooperative in modifying the program when indesirable interactions with
- other TSR programs were found. Useful in a situation where existing
- applications are being run. Probably not suitable for use where
- programmers are busy developing new programs. (These people seem to
- operate the National BBS Society, too.) [T.S.]
-
- - - - -
-
- DPROTECT.ARC contains: DPROTECT.COM, DPROTECT.DOC, READ.ME.
-
- From: Gee M. Wong for Public Domain use ONLY.
-
- What it does: It installs itself as a resident program, and monitors the
- use of the BIOS level interupt 13H to protect one or more disks. If it
- detects a write request to a protected disk, it will warn you and then
- reboot your PC.
-
- Evaluation: Not very practical. I need to be able to write to my hard
- disk. [T.S.]
-
- - - - -
-
- STOP1.ARC contains: NEWSTOP.ASM, NEWSTOP.COM, STOP.DOC.
-
- From: Carey Nash, The Programmer's Forum, (818) 701-1021
-
- What it does: TSR that hooks interrupt 13H used for ALL low level disk
- I/O. If write or format is requested, it will not allow interrupt 13 to
- perform the command, but instead, it return a value to tell the calling
- program that the write, or format was successful. It also uses interrupts
- 9 and 1C. It can be turned on and off from the keyboard.
-
- Evaluation: When I tested it with a program that modifies sector 0, it an
- error message saying A: was write protected. It might be useful in
- particular circumstances with unknown programs, but I would not recommend
- it for general use. [T.S.]
-
- - - - -
-
- HDSENTRY.ARC contains: HDSENTRY.ASC, HDSENTRY.ASM, HDSENTRY.COM, and
- README.1ST.
-
- From: Andrew M. Fried, 895 Cynthia Drive, Titusville, Fla. 32780
- (305) 268-4500
-
- What it does: It will enable you to run any program on a floppy drive
- undisturbed, but prevent most programs from accessing the hard disk for
- any type of destructive call. Nondestructive calls such as reading or
- resetting the drive are permitted; formatting and writing to the disk are
- trapped and prevented from occuring. Interrupt 26h, the absolute disk
- write interrupt, is also effectively removed from the system by this
- program. Hooks interrupt vectors 13h and 26h.
-
- Evaluation: Useful. It prevented a program from changing sector 0 on my
- hard disk, although the program ran to completion and thought that it did.
- [T.S]
-
- - - - -
-
- BOMBSQAD.ARC contains: BOMBSQAD.COM, BOMBSQAD.DOC. (Version 1.3)
-
- From: Andy Hopkins, 526 Walnut Lane, Swarthmore, PA 19081.
- BBS: 302-764-7522
-
- What it does: It hooks interrupt vectors 13 and 70, intercepts calls,
- displays what is going to happen, and asks if you want to continue
-
- Evaluation: It did stop calls to write to a sector on my hard drive, but
- it also interfered with being able to read from A: when it should have
- allowed that operation. [T.S.]
-
- =================================================================
-
- Class 3 Combination programs. These combine a check of system files with
- a TSR part that watches for dangerous disk activity.
-
- =================================================================
-
- FSP-12.ARC contains: $READ_ME.1ST, $TOC, FLUSHOT.DAT, FLU_POKE.COM,
- FLU_REG.FRM, FSP.COM, FSP.TXT, F_FEED, HARDWARE.TXT, MY_OWN.CPY,
- PRINT.BAT, RAMNET.TXT, REWARD.FRM, REWARD.LST, THE_COOP.TXT,
- UPDATES.TXT. [Flu_shot+]
-
- From: Ross M. Greenberg, 594 Third Avenue, New York, N.Y. 10016
- BBS:(212)-889-6438.
-
- What it does: After performing a check sum of the three system files, it
- installs itself as a TSR COMMAND.COM copy, hooking interrupt vectors 8, 9,
- 13, 20, 21, 26, 27 and 28. It reads a data file that tells how you wish
- files to be protected, e.g. no read, read only, no EXE or COM or BAT
- files, etc. When any program attempts to do something forbidden, a pop-up
- window tells you and lets you abort or allow the operation.
-
- Evaluation: Although PC Magazine, June 88 recommended it, a number of
- people have reported serious bugs that have not yet been fixed by the
- author. At this time, this version is *not* recommended.
-
- =================================================================
-
- Miscellaneous
-
- =================================================================
-
- CHK4BOMB.EXE ("Check for Bomb").
-
- From: Andrew M. Fried, 895 Cynthia Drive, Titusville, Fla. 32780
- (305) 268-4500
-
- What it does: It reads a .EXE of .COM program file from disk and attempts
- to spot dangerous code and suspicious messages.
-
- Evaluation: Useful for displaying text strings in program files, but of
- almost no usefulness for virus protection. [T.S.]
-
- - - - -
-
- VIRU-SIM.TXT, VIRU-SIM.EXE.
-
- From: National BBS Society/ICUG, 4423 Cheeney Street, Santa Clara, CA
- 95054.
- Voice - 408 727 4559, BBS - 408 988 4004
-
- What it does: VIRU-SIM is a program that simulates characteristic
- activities that .COM and .EXE infector viruses use for replication. It
- also simulates some of the destructive activities used by viruses to
- destroy disk information. It does not simulate the infection techniques
- of boot infector viruses (such as the Pakistani Brain Virus).
-
- VIRU-SIM may be used as a tool to test the effectiveness of anti-viral
- measures and as demonstration tool for viral replication activities.
-
- VIRU-SIM is available free of charge from the BBS Society's Homebase
- bulletin board, or is available on diskette for a $3.00 mailing and
- handling fee.
-
- Evaluation: Useful for testing protection programs. [T.S.]
-
- ------------------------------
-