From owner-freebsd-hackers Mon Jan 23 15:17:05 1995 Return-Path: hackers-owner Received: (from root@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id PAA20488 for hackers-outgoing; Mon, 23 Jan 1995 15:17:05 -0800 Received: from nomad.osmre.gov (nomad.osmre.gov [192.243.129.244]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id PAA20482 for ; Mon, 23 Jan 1995 15:17:03 -0800 Received: (from gfoster@localhost) by nomad.osmre.gov (8.6.8/8.6.6) id SAA26113; Mon, 23 Jan 1995 18:15:36 -0500 Date: Mon, 23 Jan 1995 18:15:36 -0500 From: Glen Foster Message-Id: <199501232315.SAA26113@nomad.osmre.gov> To: julian@tfs.com CC: terry@cs.weber.edu, dbaker@concorde-mail.neosoft.com, hackers@FreeBSD.org In-reply-to: (julian@tfs.com) Subject: Re: Virus Scanner Sender: hackers-owner@FreeBSD.org Precedence: bulk > From: julian@tfs.com (Julian Elischer) > Date: Mon, 23 Jan 1995 13:57:13 -0800 (PST) > Cc: dbaker@concorde-mail.neosoft.com, hackers@FreeBSD.org > > > > Where can I get a virus for FreeBSD? > hmm I bet we would be susceptible to a bootblock virus.. ? Well, most common PC boot block viruses know only about booting DOS and, typically, reveal themselves by not honoring the boot select choice the user makes. When a client says "my computer won't boot Unix anymore!" I always have them scan for a boot block virus and, almost always, it has turned out they have one. I would classify a boot block virus as a hardware virus rather than an OS-specific one (although it will only propagate through DOS). Glen Foster