[comp.sys.apple] Apple ][ computer viruses

mdavis@pro-sol.cts.COM (Morgan Davis) (03/24/88)

Patt Haring <phri!dasys1!patth> posts:

>      We have a problem in the Apple computer family. Viruses have begun to
> invade our programs.

I think it's a good idea to inform those who are unaware that such things
exist.  But instead of scaring the wits out of those folks, why not post a
list of program titles that have been known to contain viruses, rather than
making such a rash statement?  Surely, after creating this well-written and
comprehensive description of viruses, the author must know of dozens of such
tainted Apple II programs (he says with a sarcastic tone).

The piece didn't mention trojan horse programs and their equally
destructive nature.  Trojan programs are far easier to write than viruses,
and are quite different, though the extent of their devastation is just as
cataclysmic.

>     Just as an aside- if you think that this is a joke- think again. The
> action of the computer virus is the same as a virus that infects people-
> that's why it's called a virus. Just like the AIDS virus, and the Hepatitis
> virus, you can pass it along without even knowing that you have done so.

(So be sure to practice "safe software usage" by using keyboard condoms. 
Brings a whole new meaning to the word "trojan", doesn't it?)

>      1) If you are in the habit of downloading software from
> telecommunications boards- keep all hard drives turned off during the
> download process. I MEAN POWER OFF, NOTHING SPINNING- A WELL WRITTEN VIRUS
> CAN BREAK THROUGH MANY THINGS- THE ONLY SURE PROTECTION IS TURN IT OFF.
> Download into RAM disks and transfer to 3.5 or 5.25 floppy or download
> right to floppys.

This is B.S.  Unless your operating system is already infected, downloading
a file from an information service or bulletin board cannot poison your
system through a controlled terminal program.  Although a real biological
virus is autonomous, a virus inside a downloaded file is not free-moving. 
It cannot slip into the workings of your computer system until that code is
actually executed, or made part of executable code.

You are safe to copy the downloaded file and move it around your
filesystem, until you actually try to run it.  That's when you ought to
shut down all your important drives.

> Also, exit the program through the proper channels- a virus counter could
> be tied into the quit routines as easily as the boot routines.

That's a self-defeating statement.  If anything, you'd think you'd want the
user to reboot right out of the program instead of going through the "quit
routines" in order to avoid the possibility of such counters being employed.

> 5) Be careful of what you download- a virus could be hidden in anything.
> Possible targets are:
> 
> CDA's, NDA's, and fonts for the Apple II GS
> Picture files, song and voice files and other 'execable' files. These are
> files that you 'run' and they show you a picture or play a song while they
> implant themselves into or destroy your system.

Fonts?  Picture files?  You "run" these?  I think not.  If you do happen to
download a program that, when run, shows you a picture or plays music, it
certainly isn't a IIGS picture, sound, or font file.

> I JUST HEARD THAT A FRIEND OF MINE LOST A FULL 20 MEG SIDER DRIVE
> WITH A HIGHER VERSION OF PROSEL. BE CAREFUL, PLEASE.
> 
> It is going to be things like these- common utilities that will be the
> infected programs because everyone wants the latest versions and everyone
> assumes that the latest versions are from the factory.

While it's possible that someone might have sabotaged Glen Bredon's ProSEL,
if anyone happens to run a copy that is infected, and it destroyed their
drive, then they got exactly what they deserve for using pirated software.
ProSEL is not a public domain program, and I don't think Mr. Bredon would
find pleasure in putting viruses in his commercial program.  Of course, the
ProSEL contains serious (potentially dangerous) disk utilities that if not
used with caution, could do as much damage, if not more, as a nasty virus.

> Our best defense is to be smart- ...

As one who regularly downloads software from information services, the
smartest thing you could do is to wait it out -- wait a couple of days or
weeks, after a new program has been posted and downloaded by many others
before getting a copy for yourself.  Let those impatient ones who are
not-so-wise be the guinea pigs.  This won't insure that your system will
not get sick and die by a long-dormant virus, but it can prevent you from
being zapped by quick-and-dirty trojan horse programs.

> Just as an aside- the Department of Defense is spearheading development of
> ways to detect, prevent, and limit the spread and damage of viruses.

I highly doubt the Apple II community will benefit from the DOD's
activities any time soon, if ever.  Don't hold your breath.

> Courtesy of: Apple Cider/Computer Corner BBS, Queens, New York.
> 300-1200-2400 baud 24 hours, DLX multiuser system, official Apple and IBM
> users groups, 718-482-0089.

--Morgan Davis

UUCP: crash!pnet01!pro-sol!mdavis
ARPA: crash!pnet01!pro-sol!mdavis@nosc.mil
INET: mdavis@pro-sol.cts.com