home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!paladin.american.edu!gatech!darwin.sura.net!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: aryeh@mcafee.com (McAfee Associates)
- Newsgroups: comp.virus
- Subject: Questions about OS2SCAN and OS/2-based AV software in general (OS/2)
- Message-ID: <0018.9212221358.AA03720@barnabas.cert.org>
- Date: 21 Dec 92 22:07:12 GMT
- Sender: virus-l@lehigh.edu
- Lines: 36
- Approved: news@netnews.cc.lehigh.edu
-
- Hello Vesselin,
-
- You write:
- >>I write:
-
- >This is not actually a problem. Since the scanner runs in its own area
- >of memory, protected from the other processes, it cannot be fooled by
- >a stealth virus and cannot be made to spread a fast infector on all
- >files it scans... In fact, I am wondering why a memory check is
- >performed at all by an OS/2-based scanner...
-
- Are you aware OS/2 scanners that do? I know that IBM's Antivirus/2
- has a DOS-based TSR component which scans memory when a DOS session is
- started up. But that's really an anti-viral for DOS, not OS/2.
-
-
- >> - - OS2SCAN checks "extended filenames" and HPFS-partitioned
- >> drives as well as DOS (FAT) drives.
-
- >Do you know any way in which a known DOS virus can infect an extended
- >filename on an HPFS partition?
-
- Nope. But I myself create directories under OS/2 HPFS with names like
- "MS-DOS 3.3 Files" and "Today's Downloads" in which I keep normal DOS
- files. I'm sure other people do as well :-)
-
- Regards,
-
- Aryeh Goretsky
- Technical Support
-
- - --
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- McAfee Associates, Inc. | Voice (408) 988-3832 | INTERNET: aryeh@mcafee.COM
- 3350 Scott Blvd, Bldg 14 | FAX (408) 970-9727 | IP# 192.187.128.1
- Santa Clara, California | BBS (408) 988-4004 | CompuServe ID: 76702,1714
-