PC Viruses: Detection, Analysis and Cure by Alan Solomon

By Alan Solomon

Computing device viruses are usually not unavoidably an important catastrophe regardless of what's occasionally written approximately them. yet a scourge an infection is at least a nuisance, and possibly can result in lack of information. as a rule it's the user's panic response to learning an epidemic an infection that does greater than the virus itself. This publication demystifies workstation viruses, delivering transparent, actual information regarding this rather new workstation challenge. It permits managers and computing device clients to formulate a suitable reaction; sufficient for prevention and healing, yet now not `over the top'. Over 100 percent viruses and versions are documented intimately. you're instructed easy methods to recognize each, what it does, the way it copies itself, and the way to dispose of it. different beneficial and correct technical info can also be supplied. ideas for facing power and genuine virus outbreaks are defined for company, educational and different environments, with the emphasis on brilliant yet now not unreasonable precautions. All clients of IBM computing device or appropriate pcs - from unmarried machines to significant LAN's - will locate this e-book priceless. All that's required is a operating wisdom of DOS. Dr. Alan Solomon has been accomplishing basic learn into computer viruses for the reason that they first seemed, and has constructed the best-selling virus safety software program Dr. Solomon's Anti-Virus Toolkit.

Show description

Read or Download PC Viruses: Detection, Analysis and Cure PDF

Best management information systems books

Engineering Web Applications

These days, internet purposes are virtually omnipresent. the net has turn into a platform not just for info supply, but additionally for eCommerce platforms, social networks, cellular prone, and dispensed studying environments. Engineering net functions comprises many intrinsic demanding situations because of their disbursed nature, content material orientation, and the requirement to cause them to to be had to a large spectrum of clients who're unknown prematurely.

Integration Models: Templates for Business Transformation

This publication offers a confirmed method of EAI, supplying examples from genuine perform, and exploring the stairs to stick with for its day by day implementation. initially designed for corporations present process major merger and acquisition task, Integration versions have advanced right into a operating toolkit for bridging the space among company and technical types.

Service Engineering: Entwicklung und Gestaltung innovativer Dienstleistungen

Die schnelle und effiziente Realisierung innovativer Dienstleistungen stellt zunehmend einen Erfolgsfaktor für die Wettbewerbsfähigkeit von Dienstleistungsunternehmen dar. Dienstleistungen werden in der Praxis jedoch oft "ad hoc", d. h. ohne systematische Vorgehensweise, entwickelt. Das Konzept des "Service Engineering" beschreibt Vorgehensweisen, Methoden und Werkzeugunterstützung für die systematische Planung, Entwicklung und Realisierung innovativer Dienstleistungen.

Additional info for PC Viruses: Detection, Analysis and Cure

Sample text

The second way is to use a published signature - a number of magazines publish virus signatures. Unfortunately, these lists are rarely complete, and may contain the usual typographical errors. The third way is to look at someone else's program, and reverse engineer it sufficiently to extract the signatures that it uses. This third method mayor may not be in breach of copyright, depending on the laws of the country where it is done. But it certainly is one of the most widely used methods. It is a pity that this is true, because many companies report that they are using more than one scanner, on the assumption that perhaps the second scanner will pick up anything that the first misses.

The simplest form of this is a virus that is encrypted, and the encryption key is chosen randomly for each instance of the virus. But then the decryptor /loader is a constant that can be scanned for. So the next step is to ensure that the decryptor /loader changes with each instance, by juggling the bytes around while retaining the same function, by adding random bytes that do nothing, or by using instructions that are different, but functionally equivalent. Examples of this are Virus101, the Life-after-Death series, and Chameleon (1260).

Another thing that is not a virus is a hardware failure. I get a number of people trying to report Cascade (1701) virus; some of these are genuine, of course, but many of them are one of two things. The first is the "1701" diagnostic message that the PC BIOS gives when the disk fails . This is analogous to the 301 message for the keyboard, and the 601 for the floppy drive. It means hardware failure. Another thing that I occasionally get reported is that there is Cascade virus in the interrupts.

Download PDF sample

Rated 4.03 of 5 – based on 40 votes