W8SDZ@WSMR-SIMTEL20.ARMY.MIL (Keith Petersen) (12/16/88)
Posting-number: Volume 01 Issue 059 Originally-from: Eric Newhouse <no email address> Submitted-by: Keith Petersen <W8SDZ@WSMR-SIMTEL20.ARMY.MIL> Archive-name: dirtyd8b/part02 part02/02 BEGIN--cut here--cut here CDRAGON1.ARC 45056 PG Sea Dragon CENTIPED PG Be careful with this one. At least two other legitimate, PD copies of Centipede are in circulation. The pirated one is supposedly PUBLIC DOMAIN BY ATARI. Yeah, Right. CHIWRITR.ARC PU The last Shareware version of this scientific word processor is version 1.32. Any more recent version, such as version 2.0, is commercial; apparently the author(s) tired of never receiving donations for what sounds like a good program. CMASTER.ARC PG Chess Master 2000 by Electronic Arts COMMANDR.ARC PG Norton Commander COSMIC PG Cosmic Crusaders COPYRITE PU Quaid Software's COPYWRITE COPYWRIT PU Quaid Software's COPYWRITE again COSMIC PG Cosmic Crusaders again CROSFIRE.COM PG Crossfire CRUSH-CC.ARC PG Crush, Crumble & Chomp DAMBUST.ARC PG Dambusters by Accolade cracked DEB88.EXE PM DeSmet 'C' debugger DECATH PG Microsoft's Decathalon DEFENDER PG Defender, by Atari DIGDUG.COM PG Dig Dug, also by Atari DIGDUG.COM PG Dig Dug again DISKEX PU Quaid's Disk Explorer DOSHELP.EXE PU This is really Central Point Software's PC-tools. One special note: poorly written documentation usually accompanies this file. In the documentation ERIC HSU asks for a monetary contribution to his bbs. Well, It seems that this was a poor attempt to damage ERIC HSU's reputation; Eric is a legitimate SysOp in the Houston area. DOSMENU.ARC 208240 PU Intech's Dosmenu - Opening screen says "PC DOS MENU SYSTEM 5.0." - (C) is on the bottom of the screen. DOSSHELL PU Autodex again DRL PG Avalon Hill's "Dnieper River Line." DIPLOMCY PG Avalon Hill's "Computer Diplomacy" game. EGADIAG PU Quadram EGA (Quad EGA+) diagnostics. EINSTIME PU IBM internal utility EMPIRE.ARC 75611 PG Insterstel's Empire EXPLORER.COM PU Quaid Disk Explorer again EVOLUTIO PG Evolution F15 PG F-15 Strike Eagle FALCON.ARC PG Falcon by Spectrum Holobyte - flight sim FIGHTER.ARC PG Sublogic's JET FILEEASE PU A File manager FILEMGR PU Filemanager by Lotus Devel. Corp. FILEMAN.COM 1???? PU Also Filemanager FINDIT PU IBM internal 'locate a file' utility FSDEBUG PU IBM's Full Screen Debug program.. GOLDCUP PG Gold Cup championship soccer GOLF21.ARC PG Golf's Best version 2.1 GREMLINS.COM PG Gremlins HARDHAT.COM PG Hard Hat Mack HIGHORBT PG High Orbit (like Star Wars) HOOP.COM PG One-on-1 by Electronic Arts ID PU Persyst Ram disk software IBM21 PG 21c again IKARI.ARC 210944 PG Ikari Warriors - CGA/EGA, joystick reqd. IPLTIME.COM PU IBM Internal Clock utility JBIRD PG Jbirds -- Q-bert Game JEOPARDY 195??? PG Jeopardy, the game show. JET PG Jet JETDRIVE.ARC PU Jet Drive -- copies files quickly JOUST PG Joust. There is a 6K, PD version KEYWORKS.ARC PU Keyworks macro program, usu. version 2.0 KOBAYASH.ARC PG Star Trek -- The Kobayashi Alternative KONG PG Donkey Kong LIGHTNIN PU Can be either the cache or spell checker MACE+ PU Paul Mace's MACE+ utilities MACROS PU Again Superkey - sometimes Prokey MEDMAG.COM PU Quaid Software's Media Magician MINER49R.ARC PG Miner '49er MISSLEC PG Missle command MONTYS.COM PG Montezuma's Revenge MOONBUGS PG Moon Bugs MS PU IBM utility. MTS PU IBM Multitasker like Double-Dos MULE PG M.U.L.E -- players is on alien planet MULTASK PU MTS again MURDRBY# PG Murder by Numbers by Electroni Arts MUSICCON PM Music Construction Set, also by EA NFL.ARC PG Xor's NFL challenge. NGHTSTLK PG Night Stalker NICE PM NicePrint - printer controller NODISK-A.COM PU Central Point software's Nokey NORTON.COM PU Peter Norton's Utilities ANORTON.ARC PU Peter Norton's Advanced Utilities NOVATRON PU Tron light cycles ONE-ON-1 PG One-on-1 basketball game, again PATHMIND PU Pathminder, Dos Shell PC-POOL PG Pool PC-TOOLS PU Central Point Software's PC-tools PCBOSS PU DOS shell PCED PU Pro CED, DOS command line editor EII PU IBM Personal Editor II PANGO.ARC 17957 PG Pango, sometimes cracked to read cracked by Eric Newhouse PINCONST PG Pinball Construction Set by EA POOL.ARC PG PC-POOL again POPALARM.COM PU Part of POP DOS POPDOS.ARC PU TSR DOS utilities PRIME PU Columbia Data Co. hard disk utility. PROKEY PU Prokey macros program PROMPRPH PG Star Trek -- The Promethian Prophesy PSHIFT PU Memory Shift PSRD.ARC PU IBM utility (redirects PrtSc) QDOS PU Quick DOS QUCKDOS PU Quick DOS QIX PG Qix RACTER PG Racter RASTER-B PG Raster Blaster RE.ARC PG Romantic Encounters at the Dome RIGHTW PU Right Writer (writing style checker) ROBOTRON PG Robotron, hacked to read PUBLIC DOMAIN BY ATARI. Do pirates have any imagination? ROGUE.EXE PG Game very similar to the PD: HACK.EXE ROMANTIC PG Romantic Encounters at the Dome, again SEADRAG.ARC 45056 PG Also Sea Dragon SEE PM DeSmet editor SFX PU Autodex (again!) SKYRUNER PG Sky Runner, $14.95 game. SIMCGA40 15360 PU According to a user of mine, version 4.0 of the CGA emulator for Herc cards is no longer a shareware program SM.COM PU Realia's Spacemaker utility. .EXE->.COM SMAP PU IBM Internal utility, with the copyright notice and real author's name replaced by "Dorn W. Stickle". SNIPER PG Sniper -- arcade action type game. SOLOFLT.ARC PG Solo Flight (by SSI?) cracked SPACNVDR.ARC 9513 PG Space Invaders SPYHUNT PG Bally's Spy Hunter STARFLIT.ARC 30???? PG Electronic Art's Star Flight STARGATE.EXE 57??? PG Hacked to say "PUBLIC DOMAIN BY ATARI," but don't you believe it! Be careful not to confuse this arcade game with the public domain STARGATE MERCHANT game, which is a little 12 KB BASIC program by G. E. Wolfworth. STRIPKR PG Strip Poker by Artworx SUBCMDR.ARC PG Gato cracked: SUBCMDR.EXE & overlays SUPERCAD PM Easy CAD SUPERCAD.LQR 242660 PM Easy CAD again. SUPERKEY PM Superkey again TEMPOFAP PG Temple of Apshai THEQUEST.BAS/EXE PG The Quest TIRES.EXE PG Bc's Quest for Tires again TREASURE PG Pirate's Treasure TROJAN.ARC 304128 PG Trojan - CGA/EGA, (C) 1987, like D&D. TWIN.ARC 22784 PU Central Point's Copy II PC TWINCOPY.ARC 22784 PU Also Copy II PC ULTIII 111616 PG Origin's Ultima 3 ULTIMA2.ARC 84992 PG Origin's Ultima 2 UTILITY PU Norton's Utilities Arced and with the file names changed. When run, however, the programs display the copyright notice of Peter Norton. Many other pirated utilities could also go under the name UTILITY. VOYAGERI PG Avalon-Hill Game VS PU Also INTECH'S DOSMENU WCKARATE PG World Championship Karate by Epyx WG-BBALL PG World's Greatest Baseball Game by SSI WGAMES PG World Games by Epyx WOF.ARC PG Wheel of Fortune WORSTR PU Word Star XDIR PU Pre-release version of DOS FILE TRACKER XTREE PU DOS shell XTREE+ PU Xtree Plus ZAXXON PG Hacked to say "PUBLIC DOMAIN BY SEGA." (sound familiar?) ------------------------------------------------------------------ | MISCELLANEOUS ILLEGAL FILES: | | | | TYPES: | | Game (G) -- Recreational software | | Patch (P) -- Modification to another program usually | | performed through debug. | | Text (T) -- Text / Documentation File | | Util (U) -- Utility of some sort | ------------------------------------------------------------------ Name Size Category Notes ------------- ------ -- ---------------------------------------- COPYWRIT 2??? MP Although the real COPYWRITE is going around Bulletin Boards like fire, there is another illegal file under the same name. The former takes around 40 KB ARC-ed, whereas this takes about 2 KB. What I'm referring to is an archive of 1-3 files that explains how to remove the serial numbers from copywrite. Now it's allright to "unprotect" a program for backup purposes, but removing serial numbers can only lead to piracy. LOCKPICK MT This is a text file, usually with a .TXT extension, that casually explains how to pick locks. This is not illegal, but it's definitely in poor taste. It could be used as evidence against a burglar, though. MONEY.ARC MT This text file claims that with minimal MONEY.TXT 11648 effort YOU can become a millionaire. This text file, as some of you may know, is simply another chain (pyramid) letter that is of course illegal. A pyramid writer sends a letter to four people requesting money. Then, according to the pyramid writer's plan, those four will send letters to four more asking for money for themselves and the original writer. Unfortunately when the chain breaks people lose money. What one person gains someone else must lose. That's why this type of letter is illegal. MONOPOLY MG Finally I am SURE that this file violates Parker Brother's rights to the famous boardgame. Don Gibson has agreed that monopoly should NOT be distributed anymore, so SysOps, please remove this file from your download directories. MOVBASIC or MU This highly illegal file breaks IBM's SBASICA or copyright on BASIC and BASICA. It SBASIC creates new files called SBASIC or SBASICA that run "IBM BASIC" on an IBM clone. C'mon, don't you think that these clones don't run IBM BASICA for a good reason? The clones don't support BASICA because it's illegal! This file comes with Alloy's PC-Slave card. Alloy has a license agreement, and users of the PC-Slave are allowed to create copies of IBM BASIC for themselves. NO ONE ELSE IS. Stop complaining that this file is legal, people; this is one of the more blatent cases of piracy that I've seen. XTALK MP Like Copywrite, there is a patch circulating BBS's to remove the serial numbers from Crosstalk. ------------------------------------------------------------------ | Many thanks for updates to version 8.0 from: | ------------------------------------------------------------------ | | | 1. John Abolins | | 2. Randall Splinter | | 3. Mike Topf | | 4. John White | | 5. Gary Thomas | | 6. Bob Ackerman | | 7. Nich Sochs | | 8. Don Gibson | | 9. Russ Goodwin | | 10. John White | | 11. John Ford | | 12. Bob Stone | | 13. Cay Horstmann | | 14. John Curran | | 15. Gary Tivey | | 16. Leo M. Cavanaugh III | | 17. Darryl Merkley | | 18. Arnie Bell | | 19. You? | ------------------------------------------------------------------ This is the end of the "bad files list." The rest of this document contains instructions on what to do if YOU run a trojan horse, an update history, a glossary, and information on how and where to contact me with updates. ------------------------------------------------------------------ | If you run a trojan horse.. | ------------------------------------------------------------------ While reading this, bear in mind that there is no better remedy for a drive that has run a trojan horse than a recent backup.. AARGH! Perhaps your hard disk sounds like a sick moose. Perhaps your drive light starts flashing repeatedly, like a police car's lights. Perhaps your drive just sits in the computer, and the computer doesn't acknowledge its presence. Having watched my drive crash many times, I can understand the frustration you will feel after your hard disk conks out. While a faulty hard drive, disk controller, or cable can make these ailments uncurable without spending a lot of money, usually you CAN recover from a trojan horse with only investing a little time. After running a trojan horse, the first thing to do is calm down. Face the situation stoicly; it may prevent your hair from turning gray. Diagnose the damage. Was your [hard] drive formatted? Did the trojan scramble your FAT table? Did it erase every file? Did it erase or format your [hard] drive's boot sector? The odds are that the trojan incurred one of these four disasters.. After a successful diagnosis, you are ready to remedy the problem. 1) If the trojan low-level formatted your [hard] disk: Hope that you have a recent backup; that's the only remedy for this disease. 2) If the trojan high-level formatted your [hard] disk: About a year ago Paul Mace introduced a way to recover formatted data. Unfortunately, most programs can only recover formatted data COMPLETELY if you run a "snapshot" program right before the format. The reason: DOS fragments large files and without an accurate map of the formatted disk, unformatters have problems dealing with such files. You will need one of these three programs to recover your disk if the trojan formatted it: 1. PC-Tools (Central Point, $79.95 retail) 2. Mace+ Utilities (Paul Mace $99.95 retail) 3. Advanced Norton Utilities (Peter Norton, $150.00 retail) There is at least one other program that can unformat disks, but the name of it is slipping my mind. As of this printing, PC-Tools probably has the best unformatter. It can reputedly reconstruct formatted disks regardless of the disks state of fragmentation. PC-Tools may not be right for your other disk management needs, however, so you should talk to a salesmen about these products before making a purchase. 3) If the trojan scrambled your FAT table: Sector editors such as those included in the Norton Utililites, PC-Tools, and a host of other popular utility packages (not Mace+) allow experienced users to piece their FAT backtogether from Gibberish. This avenue of recovery is only open to extremely proficient users, however. Everyone else, including myself, must rely on a FAT backup program to provide a feeling of security. FATBACK.COM (available on my board) will back up your FAT table in under a minute to floppy. FATBACK makes FAT backup easy and non time consuming. 4) If the trojan erased file(s), and the FAT table is undamaged: There are many commercial and public domain packages available that undelete deleted files. Norton Utilities, PC-Tools, MACE+, and UNDEL.COM will all do the job. The commercial products are all more reliable in undeleting, but they are also more expensive that the Public-Domain UNDEL. Always undelete your most recent files first; that is, undelete files in the order of last time written to disk. I know that PC-Tools automatically lists undeletable files in the correct order, but the other three may not. 5) If the boot sector on your hard disk gets erased/formatted: There are four things to do if this happens, and the worst that can happen is that you will go without a hard disk for a while. Backup before proceeding with any of the steps here, for you may have to destroy some files to restore your hard disk to boot status. A) Try doing a "SYS C:" (or "SYS A:") from your original DOS disk. Then copy COMMAND.COM back onto the hard drive. If your hard drive still won't boot then try step B. B) If you have the MACE+ utilities go to the "other utilities" section and "restore boot sector." This should do the job if you have been using MACE+ correctly. C) If you are still stuck, BACK EVERYTHING UP and proceed to do a low level format. Instructions on how to perform a low-level format should come with your hard disk controller card. Be sure to map out bad sectors using either SCAV.COM by Chris Dunford or by manually entering the locations of bad sectors into the low level format program. After the low level format run FDISK.COM (it comes with DOS) to create a DOS partition. Refer to your DOS manual for help in using FDISK. Then put your original DOS diskette in drive A: and type FORMAT <drive letter>:/S/V. <Drive letter> represents the letter of the disk you are formatting. Try rebooting again. D) If you are still stuck, either employ some professional computer repairmen to fix your drive, or live with a non-bootable hard drive.. ------------------------------------------------------------------ | Update History: | ------------------------------------------------------------------ Version 1.0 Tom Neff enters a dozen "bad" files in the initial "dirty dozen." Version 2.0 Sees the addition of a short introduction and 3 more files. Again, I play no role in this version. Version 3.0 I write version 3.0. Tom Neff appears to have lost interest in the DDoz, so I take over. I add 22 files and completely rewrite the introduction. Version 3.0 has a total of 37 files. Version 4.0 I add another 30 or so files to the list, making the DDoz 65+ files strong, as well as adding a few paragraphs to the introduction. Version 5.0 By the time I release version 5.0 to the public, the Dirty Dozen is being greeted favorably and with enthusiasm around the country. Updates start coming in with regularity; the list prospers (if one can say that about a list!). I add a few more paragraphs to the introduction and about 40 new files bringing the file total up to 103! Version 6.0 The Dirty Dozen is now such a big project that I am now writing it in stages. Although I am going to make absolutely no effort to spread these "intermediate versions," they will always be downloadable from my board. This way everyone can keep an extremely current, if only minorly modified, issue of the DD. You might think of stage "a" of issue #6 as version 6.1, stage "b" as version 6.2, stage "c" as version 6.3, etc. New in version 6.0 is the following: A) Many minor revisions, B) 17 more files, bringing the total to 120! C) Two new paragraphs in the introduction, D) Instructions on how to recover from a trojan horse, E) A comprehensive glossary, F) This update history, G) An acknowledgments section set up for major contributors of information regarding new bogusware H) A new bogusware catagory of "miscellaneous illegal software." Version 7.0 The major changes in this version take place in the revision stages. From 6.0a to 6.0l I add fifteen trojan horses, six commercial programs, two miscellanous files, and two hacked programs. I also rewrite part of the introduction, adding a paragraph, and I augment the glossary at the end of this document. While 6.0l contains a good deal of version 7.0; however, version 7.0 is considerably different than 6.0l. For example, I add seventeen new pirated programs, bringing the file total to a whopping 165! Moreover, I rewrite virtually every paragraph in order to 'stylize' (clean up the writing in) the document. Once again I would like to thank all users who called in updates to the Dirty Dozen; such users encourage me to keep maintaining the dirty dozen! Version 8.0 One of my hard disks has been down for about six months. Unfortunately version 8.0 was ready for release RIGHT before the hard disk crash, and, naturally, the new version was on the busted HD un-backed-up. Finally I've taken the time (about 50 hours) to just sit down and work with the Dirty Dozen. I feel guilty that I've held back the DDoz for so long, but fortunately until recently there have been NO trojan horses to report. In anycase, I have modified v. 7.0 of the Dirty Dozen extensively; changes include: 1) New illegal software category: VIRUS. Virii are potentially more dangerous than trojan horses. 2) New illegal software category: CAREFUL These file are suspect; excercise caution when running these unverified programs. 3) All paragraphs rewritten. There were quite a few cases of ambiguity in version 7.0; now I hope to have eliminated those cases. 4) New Field added for filesize. One of these days trojan horse authors will think and start uploading old trojans using new filenames. To combat this possibility, the Dirty Dozen now holds a filesize for EVERY new file added. This way you can crossreference file descriptions and filesizes to nip a trojan in the bud. 5) The Dirty Dozen is now printable. The right margin is now 66, so all printers should be able to print the DDoz without printing off the right side of the paper. 6) 1 new Virus added. 7) 9 New Trojan Horses added 8) 22 New Pirated programs added 9) 0 New Hacked programs added 10) 2 New Miscellaneous files added 11) 1 New Careful file added 12) Glossary Update Total bad files listed: 200 Version 8.0a New: Miscellaneous : 1 Trojan : 4 Viral : 3 Commercial : 3 I also update five or six glossary terms, a paragraph about protecting COMMAND.COM from virii, and two trojan horse entries. Version 8.0b New: Miscellaneous : 0 Trojan : 3 Viral : 0 Commercial : 8 Updated: Miscellaneous : 1 Trojan : 2 Viral : 1 Commercial : 0 Note: I still have quite a few pirated files to add, but in the interest of warning YOU of all the new trojans recently released, I will hold those pirated files off for version 8.0c Dates of release: Version 1.0 -- October 20, 1985. Version 2.0 -- Version 3.0 -- Version 4.0 -- Version 5.0 -- Version 6.0 -- Version 7.0 -- January 3, 1987. Version 8.0 -- February 5, 1988. Version 8.0a-- February 21, 1988. Version 8.0b-- April 4, 1988. ------------------------------------------------------------------ | Glossary: | ------------------------------------------------------------------ | | | This glossary is for the beginning to intermediate level | | user. Experienced users can skip this with confidence. All | | users should use this as a reference since this material makes | | for exceptionally droll. reading. | | | ------------------------------------------------------------------ ?Q? -- ('?' represents any character) File extension for SQueezed files. Squeezed files are unusable until unsqueezed by a utility such as NUSQ.COM or USQ.COM. The advantage of a SQueezed file is that it is smaller than a regular UnSQueezed file, thus saving disk space and download time. ARChives are more efficient than Squeezed files; that's why there are so many more ARChives on BBS's these days. Example of the extensions of SQueezed files: .EQE, .CQM, .LQR, .TQT, .DQC, etc. ABBRV -- Abbreviation for the word: "abbreviation" ARC -- File extension for an ARChive file -- many files combined together to save space and download time that require ARC.EXE, PKXARC.COM, ARCE.COM, or ARCLS.EXE to separate the files in to runnable and readable (in the case of text) form. BAS -- Abbrv for "BASIC," as in the programming language BBS -- Abbrv for "Bulletin Board System" BBS's -- Abbrv for "Bulletin Board Systems" BOARD -- Also "Bulletin Board System" BOGUSWARE -- Software that is damaging to one or more parties BOOT or -- To boot a computer is to restart it from scratch, REBOOT erasing all TSR programs. One reboots by either powering off and then back on, or pressing Ctrl-Alt-Del at the same time. BYTES -- Bytes measure the length of a file, with one byte equaling one character in a file. CACHE [disk] -- Area of memory set aside to hold recent data. All programs then read recent data from that memory rather than from disk. CLUSTER -- A phyical block on all [hard] disks, composed of sectors, that holds data. COM -- File extension for a file that is executable from DOS level DD -- Abbrv for "dirty dozen" DEBUG -- Either (V) to remove glitches in a program or (N) the assembly language editor/compiler/disassembler provided with DOS DOC -- Abbrv for "documentation" EMS -- Enhanced Memory Specification. An EMS card holds 2 MB extra mem. EXE -- file extension for a file that is executable from DOS level FAT -- File Allocation Tables - First sectors of [hard] disks where file sizes and physical locations are stored. FRAGMENT -- DOS physically saves files all over disks-not continously this slows down drives and cause problems for recovering deleted files or formatted disks. HACKED -- See "definitions" section HIDDEN -- A "hidden" file will not show up in a 'dir'ectory HIGH LEVEL FORMAT -- This type of format is what most computer users view as a regular DOS-format. That is, formatting a disk using FORMAT.COM (included with DOS) is a high level format. IBM -- International Business Machines IBMBIO.COM -- Hidden, System, Readonly file used by DOS IBMSYS.COM -- Hidden, System, Readonly file used by DOS IBM OR COMP -- IBM computer or a 99% or greater IBM Compatible computer KB -- Abbreviation for "KiloBytes," one Kb equals 1024 bytes LBR -- Extension on Library files. Library files are really many combined files like ARChives, but they require different utilities to extract the individual files. Some examples of such utilities are LUU.EXE, LUE.EXE, LAR.EXE, AND ZIP.EXE. See "ARC" LOW LEVEL FORMAT -- This type of format is only executed on a hard disk, therefore most hard disk low-level format programs come only with a hard disk controller card. There are a few PD low-level formatting packages, though. Most manufacturers low-level format their hard drives at the factory. Low level formatting is the first step in the three part formatting process; the second step is to use FDISK, and the third is to execute a high level format. MB -- Abbrv for "Megabytes," or "millions of bytes." MISC -- Abbrv for "miscellaneous" OPTIMIZE -- To make all files on a disk "contiguous," or physically linked together on a [hard] drive. PATCH -- A file that is patched (combined) into another file to change the original file in some way PD -- Abbrv for "Public Domain" PKXARC -- Phil Katz's ARChive extracter PIRATED -- See DEFINITIONS section in this issue. RAM -- Abbrv for "Random Access Memory." (memory used by software) RBBS -- Abbrv for RBBS-PC, a type of BBS (Remote Bulletin Board System) READONLY -- One can NOT write to "readonly" files (ie erasing) ROM -- Abbrv for "Read Only Memory." (memory used by hardware to boot) SQUASHING -- File compression technique used by PKXARC but not by SEA's ARC.EXE SYSOP -- SYStem OPerator of a BBS SYSTEM -- DOS reserves a "System" file for its own use TROJAN -- See DEFINITIONS section in this issue. TROJAN HORSE -- See DEFINITIONS section in this issue. TSR -- Abbv for "Terminate, Stay Resident" Synonym = "Memory Resident" TXT -- Abbrv for "text" USU -- Abbrv for "usually" UNP -- Abbrv for "unprotect" UNPROTECT -- An "unprotect file" is a patch file that results in the breaking of copy protection (no doubt for back up purposes). UTIL -- abbrv for "utility" VIRUS -- See definition section WORM -- Trojan Horse ------------------------------------------------------------------ | Update Information: | ------------------------------------------------------------------ If you have any additions or corrections for this list, send them to Eric Newhouse at any of the following places. Please be sure to leave the problem file name, size, and description. Please note that the West LA PC-Store is currently DOWN. Thank You. (in order of most frequented): * The Crest RBBS/CAMS (213-471-2518) (1200/2400) (160/50 MB) [ This is my board ] * The Dirty Dozen List [ this is my mailing address ] c/o Eric Newhouse 1834 Old Orchard Rd Los Angeles, CA, 90049 D * The West LA PC-STORE (213-559-6954) (300/1200/2400) (50 MB) * Camelot PC-Board (213-204-6158) (300/1200/2400) (80 MB?) (leave mail to "NORMAN TEETER." He will reley your message). * The Source (leave E-mail to "Doctor File Finder" in IBM SIG #4). Doctor File Finder (Mike Callahan) will relay your update to me. ------------------------------------------------------------------ | Finally: | ------------------------------------------------------------------ Many people have asked about donating for the Dirty Dozen service. Considering that in the last six months I've lost 160 MB worth of disk drives, a floppy drive, and a modem to equipment failure, I've decided to start accepting donations. Please understand, however, that there is a difference between accepting and soliciting. I am NOT soliciting donations. The Dirty Dozen list is a free service, and I take pleasure in helping other people avoid trojan horses and other illegal programs. If, however, you'd like to support this list -- if you'd like to see the Crest BBS go back up in the near future, I guarantee that all donations will be used to buy new BBS equipment. All checks can be sent to my mailing address made out to Eric Newhouse. Thank You; even if you don't donate, I appreciate that you've read this document all the way through and that now perhaps you too can help in the war agaisnt illegal software. ----------------------------------------------------------------- END. END--cut here--cut here