Path: utzoo!attcan!uunet!mcvax!ukc!s1!jrk From: jrk@s1.sys.uea.ac.uk (Richard Kennaway CMP RA) Newsgroups: comp.sys.mac Subject: Re: nVIR virus found in "Kill Virus" Message-ID: <199@s1.sys.uea.ac.uk> Date: 28 Nov 88 10:02:40 GMT References:Organization: UEA, Norwich, UK Lines: 30 In article , ll12+@andrew.cmu.edu (Laura Ann Lemay) writes: > Roland Mansson writes, quoting me: > .Please do NEVER state that a program is NOT infected. You can't be sure! > > Ah, but I CAN be sure. > KillVirus is an INIT. Unless someone goes in and physically puts nVIR > resources into it, there is NO WAY that it can become infected. That's a pretty big unless. Like saying, "Unless someone physically breaks in to my house, there is NO WAY anything can be stolen from it". > And even if someone did put a virus in it, there is no way it could spread > anywhere else. Why not? INITs contain code. When run, it will do whatever it was programmed to do. It may be that nVIR itself doesnt work when run as INIT code, but there's no reason you cant make INIT viruses, or for that matter WDEF or cdev or MDEF viruses. > KillVirus is safe, and I still maintain that its the best nVIR removal > and protection program out there. May well be (I dont have it - is it free? Can someone send me a binhex?) But how do you know that something called KillVirus hasnt been subverted? > Laura Lemay > ll12+@andrew.cmu.edu -- Richard Kennaway SYS, University of East Anglia, Norwich, U.K. uucp: ...mcvax!ukc!uea-sys!jrk Janet: kennaway@uk.ac.uea.sys