home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ukma!cs.widener.edu!dsinc!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: bontchev@fbihh.informatik.uni-hamburg.de (Vesselin Bontchev)
- Newsgroups: comp.virus
- Subject: Re: Filler virus - Need Help! (PC)
- Message-ID: <0011.9211171913.AA17490@barnabas.cert.org>
- Date: 16 Nov 92 13:42:01 GMT
- Sender: virus-l@lehigh.edu
- Lines: 23
- Approved: news@netnews.cc.lehigh.edu
-
- ames@bcstec.ca.boeing.com (Wes Ames) writes:
-
- > packages in our "anti-virus toolkit", including CPAV. My experience
- > has been that early versions of CPAV did indeed have a problem with
- > viral scan strings in memory, but the problem has been eliminated in
- > more recent versions. Not only are the strings encrypted, but they
- > are specifically overwritten when the user exits the app. That has
- > been my understanding of the current product - have you seen something
- > different??
-
- Maybe we should clarify to each other the particular version of CPAV
- we are speaking about. The latest version we have here is 1.3. In the
- same time, I have seen a clone of the program that is rumored to be
- supplied with MS-DOS 6.0 and it doesn't have the unencrypted strings
- problem. Did CPS produce any version of their product between those?
-
- Regards,
- Vesselin
- - --
- Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg
- Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN
- < PGP 2.0 public key available on request. > Vogt-Koelln-Strasse 30, rm. 107 C
- e-mail: bontchev@fbihh.informatik.uni-hamburg.de D-2000 Hamburg 54, Germany
-