FromTheRafters wrote:
> ~BD~ wrote:
>> §ñühwö£f wrote:
>>> ~BD~<~BD~@nomail.afraid.org> wrote in
>>> news:gfudnZulffqy2dTSnZ2dnUVZ8lOdnZ2d@bt.com:
>>>
>>>> §ñühwö£f wrote:
>>>>
>>>>> Because he dosn't know how to boot his macintosh from a linux live cd
>>>>> and do it safely?
>>>>>
>>>>>
>>>>
>>>> Why would anyone want to do such a thing in the first place?
>>>>
>>>> Makes no sense to me!
>>>>
>>>>
>>> Go stand in the corner, dimmy.
>>
>> :-)
>>
>> Whilst standing there, I happened across this:-
>>
>> Quote:
>>
>> Not necessarily, no. This dummy virus doesn't actually cause any
>> damage to the system. However it does make changes to the registry
>> from the command line.
>>
>> Now the one I wrote back in the days of Windows 95/98, did. It
>> rendered the hard drive un bootable. In other words, once the victim
>> restarted their computer it halted on a black screen with the words
>> "Missing operating system" as it deleted key boot files; io.sys,
>> msdos.sys and command.com.
>>
>> The only recourse from that (should one be so lucky) is to boot from a
>> system diskette and "sys" the drive from the command line.
>>
>> Issuing the command: sys C: would fix that by putting those files back
>> onto the hard drive.
>>
>> I also had two files from the Windows directory being targeted as
>> well.. they were user.dat and user.da0. Which meant that any and all
>> programs that were installed would have to be reinstalled again since
>> the system's registry would be gone too.
>>
>> A "dummy virus" is so named due to the fact there are no actual virus
>> code antivirus software could scan for. These were merely batch files
>> (files that use the .bat extension) that contained commands the
>> computer would recognize and execute.
>>
>> If I really wanted to be devious I could use something like this in a
>> batch file....
>>
>> @ECHO OFF
>> CD/
>> attrib -r -a -s -h ntldr
>> del ntldr
>> ECHO.
>> ECHO Please restart your system...
>> ECHO.
>>
>> In the above example, regardless what directory that was ran from it
>> would go right to the root of the drive. At that point it would remove
>> the read only, archive, system and hidden attributes to ntldr then
>> delete the file without confirmation.
>>
>> But that would render the system inoperable and display the "NTLDR
>> missing" message. My method makes things more interesting due to the
>> simple fact that I could use the command: net view \\ip.addy.goes.here
>> to look for the shared drive. Unless I knew the IP address was static.
>>
>> Then once I found it issue the command net use * \\ip.addy.goes.here\C
>> to map the drive. It basically allows me to see the hard drive in My
>> Computer as though it were physically attached to my system by adding
>> another drive letter. Then I could do whatever I wanted.. copy
>> files\folders from their hard drive to mine or vice versa, move
>> files\folders around, delete files, rename files, etc.. and they would
>> never know.
>>
>> **
>>
>> I'm wondering if the author is correct in what he claims. Some guidance
>> on this will be welcomed!
>>
> It is wrong to call it a virus, dummy or otherwise.
Maybe you should tell Sycho that yourself?!! ;-)
How about commenting on the 'bat' file situation? I always value your
opinion on such matters.
--
Dave - "It is much better to be hated for what you are, than to be loved
for what you definitely are not." "Do unto others as you would have them
do unto you."



Reply With Quote