[comp.binaries.ibm.pc] v01i059: Dirty Dozen list 8

W8SDZ@WSMR-SIMTEL20.ARMY.MIL (Keith Petersen) (12/16/88)

Posting-number: Volume 01 Issue 059
Originally-from: Eric Newhouse <no email address>
Submitted-by: Keith Petersen <W8SDZ@WSMR-SIMTEL20.ARMY.MIL>
Archive-name: dirtyd8b/part02

part02/02
BEGIN--cut here--cut here
CDRAGON1.ARC   45056  PG  Sea Dragon
CENTIPED              PG  Be careful with this one.  At least two
                         other legitimate, PD copies of
                         Centipede are in circulation.  The
                         pirated one is supposedly PUBLIC DOMAIN
                         BY ATARI.  Yeah, Right.
CHIWRITR.ARC          PU  The last Shareware version of this
                         scientific word processor is version
                         1.32.  Any more recent version, such as
                         version 2.0, is commercial; apparently
                         the author(s) tired of never receiving
                         donations for what sounds like a good
                         program.
CMASTER.ARC           PG  Chess Master 2000 by Electronic Arts
COMMANDR.ARC          PG  Norton Commander
COSMIC                PG  Cosmic Crusaders
COPYRITE              PU  Quaid Software's COPYWRITE
COPYWRIT              PU  Quaid Software's COPYWRITE again
COSMIC                PG  Cosmic Crusaders again
CROSFIRE.COM          PG  Crossfire
CRUSH-CC.ARC          PG  Crush, Crumble & Chomp
DAMBUST.ARC           PG  Dambusters by Accolade cracked
DEB88.EXE             PM  DeSmet 'C' debugger
DECATH                PG  Microsoft's Decathalon
DEFENDER              PG  Defender, by Atari
DIGDUG.COM            PG  Dig Dug, also by Atari
DIGDUG.COM            PG  Dig Dug again
DISKEX                PU  Quaid's Disk Explorer
DOSHELP.EXE           PU  This is really Central Point
                         Software's PC-tools.  One special note:
                         poorly written documentation usually
                         accompanies this file.  In the
                         documentation ERIC HSU asks for a
                         monetary contribution to his bbs.  Well,
                         It seems that this was a poor attempt to
                         damage ERIC HSU's reputation; Eric is a
                         legitimate SysOp in the Houston area.
DOSMENU.ARC   208240  PU  Intech's Dosmenu - Opening screen says
                         "PC DOS MENU SYSTEM 5.0." - (C) is on
                         the bottom of the screen.
DOSSHELL              PU  Autodex again
DRL                   PG  Avalon Hill's "Dnieper River Line."
DIPLOMCY              PG  Avalon Hill's "Computer Diplomacy" game.
EGADIAG               PU  Quadram EGA (Quad EGA+) diagnostics.
EINSTIME              PU  IBM internal utility
EMPIRE.ARC     75611  PG  Insterstel's Empire
EXPLORER.COM          PU  Quaid Disk Explorer again
EVOLUTIO              PG  Evolution
F15                   PG  F-15 Strike Eagle
FALCON.ARC            PG  Falcon by Spectrum Holobyte - flight sim
FIGHTER.ARC           PG  Sublogic's JET
FILEEASE              PU  A File manager
FILEMGR               PU  Filemanager by Lotus Devel. Corp.
FILEMAN.COM    1????  PU  Also Filemanager
FINDIT                PU  IBM internal 'locate a file' utility
FSDEBUG               PU  IBM's Full Screen Debug program..
GOLDCUP               PG  Gold Cup championship soccer
GOLF21.ARC            PG  Golf's Best version 2.1
GREMLINS.COM          PG  Gremlins 
HARDHAT.COM           PG  Hard Hat Mack
HIGHORBT              PG  High Orbit (like Star Wars)
HOOP.COM              PG  One-on-1 by Electronic Arts
ID                    PU  Persyst Ram disk software
IBM21                 PG  21c again
IKARI.ARC     210944  PG  Ikari Warriors - CGA/EGA, joystick reqd.
IPLTIME.COM           PU  IBM Internal Clock utility
JBIRD                 PG  Jbirds -- Q-bert Game
JEOPARDY      195???  PG  Jeopardy, the game show.
JET                   PG  Jet
JETDRIVE.ARC          PU  Jet Drive -- copies files quickly
JOUST                 PG  Joust.  There is a 6K, PD version
KEYWORKS.ARC          PU  Keyworks macro program, usu. version 2.0
KOBAYASH.ARC          PG  Star Trek -- The Kobayashi Alternative
KONG                  PG  Donkey Kong
LIGHTNIN              PU  Can be either the cache or spell checker
MACE+                 PU  Paul Mace's MACE+ utilities
MACROS                PU  Again Superkey - sometimes Prokey
MEDMAG.COM            PU  Quaid Software's Media Magician
MINER49R.ARC          PG  Miner '49er
MISSLEC               PG  Missle command
MONTYS.COM            PG  Montezuma's Revenge
MOONBUGS              PG  Moon Bugs
MS                    PU  IBM utility.
MTS                   PU  IBM Multitasker like Double-Dos
MULE                  PG  M.U.L.E -- players is on alien planet
MULTASK               PU  MTS again
MURDRBY#              PG  Murder by Numbers by Electroni Arts
MUSICCON              PM  Music Construction Set, also by EA
NFL.ARC               PG  Xor's NFL challenge.
NGHTSTLK              PG  Night Stalker
NICE                  PM  NicePrint - printer controller
NODISK-A.COM          PU  Central Point software's Nokey
NORTON.COM            PU  Peter Norton's Utilities
ANORTON.ARC           PU  Peter Norton's Advanced Utilities
NOVATRON              PU  Tron light cycles
ONE-ON-1              PG  One-on-1 basketball game, again
PATHMIND              PU  Pathminder, Dos Shell
PC-POOL               PG  Pool 
PC-TOOLS              PU  Central Point Software's PC-tools
PCBOSS                PU  DOS shell
PCED                  PU  Pro CED, DOS command line editor
EII                   PU  IBM Personal Editor II
PANGO.ARC      17957  PG  Pango, sometimes cracked to read cracked
                         by Eric Newhouse
PINCONST              PG  Pinball Construction Set by EA
POOL.ARC              PG  PC-POOL again
POPALARM.COM          PU  Part of POP DOS
POPDOS.ARC            PU  TSR DOS utilities 
PRIME                 PU  Columbia Data Co. hard disk utility.
PROKEY                PU  Prokey macros program
PROMPRPH              PG  Star Trek -- The Promethian Prophesy
PSHIFT                PU  Memory Shift
PSRD.ARC              PU  IBM utility (redirects PrtSc)
QDOS                  PU  Quick DOS
QUCKDOS               PU  Quick DOS
QIX                   PG  Qix
RACTER                PG  Racter
RASTER-B              PG  Raster Blaster
RE.ARC                PG  Romantic Encounters at the Dome
RIGHTW                PU  Right Writer (writing style checker)
ROBOTRON              PG  Robotron, hacked to read PUBLIC DOMAIN
                         BY ATARI.  Do pirates have any
                         imagination?
ROGUE.EXE             PG  Game very similar to the PD: HACK.EXE
ROMANTIC              PG  Romantic Encounters at the Dome, again
SEADRAG.ARC    45056  PG  Also Sea Dragon
SEE                   PM  DeSmet editor
SFX                   PU  Autodex (again!)
SKYRUNER              PG  Sky Runner, $14.95 game.
SIMCGA40       15360  PU  According to a user of mine, version 4.0
                         of the CGA emulator for Herc cards is no
                         longer a shareware program
SM.COM                PU  Realia's Spacemaker utility.  .EXE->.COM
SMAP                  PU  IBM Internal utility, with the copyright
                         notice and real author's name replaced by
                          "Dorn W. Stickle".
SNIPER                PG  Sniper -- arcade action type game.
SOLOFLT.ARC           PG  Solo Flight (by SSI?) cracked
SPACNVDR.ARC    9513  PG  Space Invaders
SPYHUNT               PG  Bally's Spy Hunter
STARFLIT.ARC  30????  PG  Electronic Art's Star Flight 
STARGATE.EXE   57???  PG  Hacked to say "PUBLIC DOMAIN BY ATARI,"
                         but don't you believe it!  Be careful not
                         to confuse this arcade game with the
                         public domain STARGATE MERCHANT game,
                         which is a little 12 KB BASIC program by
                         G. E.  Wolfworth.
STRIPKR               PG  Strip Poker by Artworx
SUBCMDR.ARC           PG  Gato cracked: SUBCMDR.EXE & overlays
SUPERCAD              PM  Easy CAD
SUPERCAD.LQR  242660  PM  Easy CAD again.
SUPERKEY              PM  Superkey again
TEMPOFAP              PG  Temple of Apshai
THEQUEST.BAS/EXE      PG  The Quest
TIRES.EXE             PG  Bc's Quest for Tires again
TREASURE              PG  Pirate's Treasure 
TROJAN.ARC    304128  PG  Trojan - CGA/EGA, (C) 1987, like D&D.
TWIN.ARC       22784  PU  Central Point's Copy II PC
TWINCOPY.ARC   22784  PU  Also Copy II PC
ULTIII        111616  PG  Origin's Ultima 3
ULTIMA2.ARC    84992  PG  Origin's Ultima 2
UTILITY               PU  Norton's Utilities Arced and with the
                         file names changed.  When run, however,
                         the programs display the copyright notice
                         of Peter Norton.  Many other pirated
                         utilities could also go under the name
                         UTILITY.
VOYAGERI              PG  Avalon-Hill Game
VS                    PU  Also INTECH'S DOSMENU
WCKARATE              PG  World Championship Karate by Epyx
WG-BBALL              PG  World's Greatest Baseball Game by SSI
WGAMES                PG  World Games by Epyx
WOF.ARC               PG  Wheel of Fortune
WORSTR                PU  Word Star
XDIR                  PU  Pre-release version of DOS FILE TRACKER
XTREE                 PU  DOS shell
XTREE+                PU  Xtree Plus
ZAXXON                PG  Hacked to say "PUBLIC DOMAIN BY SEGA."
                         (sound familiar?)


------------------------------------------------------------------
|                  MISCELLANEOUS ILLEGAL FILES:                  |
|                                                                |
|   TYPES:                                                       |
|          Game  (G) -- Recreational software                    |
|          Patch (P) -- Modification to another program usually  |
|                       performed through debug.                 |
|          Text  (T) -- Text / Documentation File                |
|          Util  (U) -- Utility of some sort                     |
------------------------------------------------------------------

Name          Size Category  Notes
------------- ------  --  ----------------------------------------

COPYWRIT        2???  MP  Although the real COPYWRITE is going
                          around Bulletin Boards like fire, there
                          is another illegal file under the same
                          name.  The former takes around 40 KB
                          ARC-ed, whereas this takes about 2 KB.
                          What I'm referring to is an archive of
                          1-3 files that explains how to remove
                          the serial numbers from copywrite. Now
                          it's allright to "unprotect" a program
                          for backup purposes, but removing serial
                          numbers can only lead to piracy.
LOCKPICK              MT  This is a text file, usually with a
                          .TXT extension, that casually explains
                          how to pick locks.  This is not 
                          illegal, but it's definitely in
                          poor taste.  It could be used as
                          evidence against a burglar, though.
MONEY.ARC             MT  This text file claims that with minimal
MONEY.TXT  11648          effort YOU can become a millionaire.
                          This text file, as some of you may know,
                          is simply another chain (pyramid) letter
                          that is of course illegal.  A pyramid
                          writer sends a letter to four people
                          requesting money.  Then, according to
                          the pyramid writer's plan, those four
                          will send letters to four more asking
                          for money for themselves and the
                          original writer.  Unfortunately when the
                          chain breaks people lose money.  What
                          one person gains someone else must lose.
                          That's why this type of letter is
                          illegal.
MONOPOLY              MG  Finally I am SURE that this file
                          violates Parker Brother's rights
                          to the famous boardgame.  Don Gibson has
                          agreed that monopoly should NOT be
                          distributed anymore, so SysOps, please
                          remove this file from your download
                          directories.
MOVBASIC or           MU  This highly illegal file breaks IBM's
                          SBASICA or copyright on BASIC and
                          BASICA.  It SBASIC creates new files
                          called SBASIC or SBASICA that run "IBM
                          BASIC" on an IBM clone.  C'mon, don't
                          you think that these clones don't run
                          IBM BASICA for a good reason?  The
                          clones don't support BASICA because it's
                          illegal!  This file comes with Alloy's
                          PC-Slave card.  Alloy has a license
                          agreement, and users of the PC-Slave are
                          allowed to create copies of IBM BASIC
                          for themselves.  NO ONE ELSE IS.  Stop
                          complaining that this file is legal,
                          people; this is one of the more blatent
                          cases of piracy that I've seen.
XTALK                 MP  Like Copywrite, there is a patch
                          circulating BBS's to remove the serial
                          numbers from Crosstalk.

------------------------------------------------------------------
|          Many thanks for updates to version 8.0 from:          |
------------------------------------------------------------------
|                                                                |
|          1.          John Abolins                              |
|          2.          Randall Splinter                          |
|          3.          Mike Topf                                 |
|          4.          John White                                |
|          5.          Gary Thomas                               |
|          6.          Bob Ackerman                              |
|          7.          Nich Sochs                                |
|          8.          Don Gibson                                |
|          9.          Russ Goodwin                              |
|         10.          John White                                |
|         11.          John Ford                                 |
|         12.          Bob Stone                                 |
|         13.          Cay Horstmann                             |
|         14.          John Curran                               |
|         15.          Gary Tivey                                |
|         16.          Leo M. Cavanaugh III                      |
|         17.          Darryl Merkley                            |
|         18.          Arnie Bell                                |
|         19.          You?                                      |
------------------------------------------------------------------



 This is the end of the "bad files list."  The rest of this
document contains instructions on what to do if YOU run a trojan
horse, an update history, a glossary, and information on how and
where to contact me with updates.





------------------------------------------------------------------
|                  If you run a trojan horse..                   |
------------------------------------------------------------------


 While reading this, bear in mind that there is no better remedy
for a drive that has run a trojan horse than a recent backup..

 AARGH!  Perhaps your hard disk sounds like a sick moose.  Perhaps
your drive light starts flashing repeatedly, like a police car's
lights.  Perhaps your drive just sits in the computer, and the
computer doesn't acknowledge its presence.

 Having watched my drive crash many times, I can understand the
frustration you will feel after your hard disk conks out.  While a
faulty hard drive, disk controller, or cable can make these
ailments uncurable without spending a lot of money, usually you
CAN recover from a trojan horse with only investing a little time.

 After running a trojan horse, the first thing to do is calm down.
Face the situation stoicly; it may prevent your hair from turning
gray.  Diagnose the damage.  Was your [hard] drive formatted?
Did the trojan scramble your FAT table?  Did it erase every file?
Did it erase or format your [hard] drive's boot sector?  The odds
are that the trojan incurred one of these four disasters..  After
a successful diagnosis, you are ready to remedy the problem.


    1)   If the trojan low-level formatted your [hard] disk:

         Hope that you have a recent backup; that's the only remedy
        for this disease.

    2)   If the trojan high-level formatted your [hard] disk:

         About a year ago Paul Mace introduced a way to recover
        formatted data.  Unfortunately, most programs can only
        recover formatted data COMPLETELY if you run a "snapshot"
        program right before the format.  The reason: DOS
        fragments large files and without an accurate map of the
        formatted disk, unformatters have problems dealing with
        such files.  You will need one of these three programs to
        recover your disk if the trojan formatted it:

          1. PC-Tools (Central Point, $79.95 retail)
          2. Mace+ Utilities (Paul Mace $99.95 retail)
          3. Advanced Norton Utilities (Peter Norton, $150.00
              retail)

         There is at least one other program that can unformat
        disks, but the name of it is slipping my mind.  As of this
        printing, PC-Tools probably has the best unformatter.  It
        can reputedly reconstruct formatted disks regardless of
        the disks state of fragmentation.  PC-Tools may not be
        right for your other disk management needs, however, so
        you should talk to a salesmen about these products before
        making a purchase.

    3)   If the trojan scrambled your FAT table:

         Sector editors such as those included in the Norton
        Utililites, PC-Tools, and a host of other popular utility
        packages (not Mace+) allow experienced users to piece
        their FAT backtogether from Gibberish.  This avenue of
        recovery is only open to extremely proficient users,
        however.  Everyone else, including myself, must rely on a
        FAT backup program to provide a feeling of security.
        FATBACK.COM (available on my board) will back up your FAT
        table in under a minute to floppy.  FATBACK makes FAT
        backup easy and non time consuming.

    4)  If the trojan erased file(s), and the FAT table is
        undamaged:

         There are many commercial and public domain packages
        available that undelete deleted files.  Norton Utilities,
        PC-Tools, MACE+, and UNDEL.COM will all do the job.  The
        commercial products are all more reliable in undeleting,
        but they are also more expensive that the Public-Domain
        UNDEL.  Always undelete your most recent files first; that
        is, undelete files in the order of last time written to
        disk.  I know that PC-Tools automatically lists
        undeletable files in the correct order, but the other
        three may not.

    5)  If the boot sector on your hard disk gets
        erased/formatted:

         There are four things to do if this happens, and the
        worst that can happen is that you will go without a hard
        disk for a while.  Backup before proceeding with any of
        the steps here, for you may have to destroy some files to
        restore your hard disk to boot status.

          A)   Try doing a "SYS C:" (or "SYS A:") from your
              original DOS disk. Then copy COMMAND.COM back onto
              the hard drive.  If your hard drive still won't boot
              then try step B.

          B)   If you have the MACE+ utilities go to the "other
              utilities" section and "restore boot sector."  This
              should do the job if you have been using MACE+
              correctly.

          C)   If you are still stuck, BACK EVERYTHING UP and
              proceed to do a low level format.  Instructions on
              how to perform a low-level format should come with
              your hard disk controller card.  Be sure to map out
              bad sectors using either SCAV.COM by Chris Dunford
              or by manually entering the locations of bad sectors
              into the low level format program.  After the low
              level format run FDISK.COM (it comes with DOS) to
              create a DOS partition.  Refer to your DOS manual
              for help in using FDISK.  Then put your original DOS
              diskette in drive A: and type FORMAT <drive
              letter>:/S/V.  <Drive letter> represents the letter
              of the disk you are formatting.  Try rebooting
              again.

          D)   If you are still stuck, either employ some
              professional computer repairmen to fix your drive,
              or live with a non-bootable hard drive..



------------------------------------------------------------------
|                        Update History:                         |
------------------------------------------------------------------

    Version 1.0    Tom Neff enters a dozen "bad" files in the
                  initial "dirty dozen."

    Version 2.0    Sees the addition of a short introduction and 3
                  more files.  Again, I play no role in this
                  version.

    Version 3.0    I write version 3.0.  Tom Neff appears to have
                  lost interest in the DDoz, so I take over.  I
                  add 22 files and completely rewrite the
                  introduction.  Version 3.0 has a total of 37
                  files.

    Version 4.0    I add another 30 or so files to the list,
                  making the DDoz 65+ files strong, as well as
                  adding a few paragraphs to the introduction.

    Version 5.0    By the time I release version 5.0 to the
                  public, the Dirty Dozen is being greeted
                  favorably and with enthusiasm around the
                  country.  Updates start coming in with
                  regularity; the list prospers (if one can say
                  that about a list!).  I add a few more
                  paragraphs to the introduction and about 40 new
                  files bringing the file total up to 103!

    Version 6.0    The Dirty Dozen is now such a big project that
                  I am now writing it in stages.  Although I am
                  going to make absolutely no effort to spread
                  these "intermediate versions," they will always
                  be downloadable from my board.  This way
                  everyone can keep an extremely current, if only
                  minorly modified, issue of the DD.  You might
                  think of stage "a" of issue #6 as version 6.1,
                  stage "b" as version 6.2, stage "c" as version
                  6.3, etc.

                   New in version 6.0 is the following:

                       A)  Many minor revisions,
                       B)  17 more files, bringing the total to
                          120!
                       C)  Two new paragraphs in the introduction,
                       D)  Instructions on how to recover from a
                          trojan horse,
                       E)  A comprehensive glossary,
                       F)  This update history,
                       G)  An acknowledgments section set up for
                          major contributors of information
                          regarding new bogusware
                       H) A new bogusware catagory of
                          "miscellaneous illegal software."

    Version 7.0     The major changes in this version take place
                   in the revision stages.  From 6.0a to 6.0l I
                   add fifteen trojan horses, six commercial
                   programs, two miscellanous files, and two
                   hacked programs.  I also rewrite part of the
                   introduction, adding a paragraph, and I augment
                   the glossary at the end of this document.
                   While 6.0l contains a good deal of version 7.0;
                   however, version 7.0 is considerably different
                   than 6.0l.  For example, I add seventeen new
                   pirated programs, bringing the file total to a
                   whopping 165!  Moreover, I rewrite virtually
                   every paragraph in order to 'stylize' (clean up
                   the writing in) the document.

                    Once again I would like to thank all users who
                   called in updates to the Dirty Dozen; such
                   users encourage me to keep maintaining the
                   dirty dozen!

    Version 8.0     One of my hard disks has been down for about
                   six months.  Unfortunately version 8.0 was
                   ready for release RIGHT before the hard disk
                   crash, and, naturally, the new version was on
                   the busted HD un-backed-up.  Finally I've taken
                   the time (about 50 hours) to just sit down and
                   work with the Dirty Dozen.  I feel guilty that
                   I've held back the DDoz for so long, but
                   fortunately until recently there have been NO
                   trojan horses to report.  In anycase, I have
                   modified v. 7.0 of the Dirty Dozen extensively;
                   changes include:
                   
                       1) New illegal software category: VIRUS.
                   Virii are potentially more dangerous than
                   trojan horses.

                       2) New illegal software category: CAREFUL
                   These file are suspect; excercise caution
                   when running these unverified programs.

                       3) All paragraphs rewritten.  There were
                   quite a few cases of ambiguity in version 7.0;
                   now I hope to have eliminated those cases.

                       4) New Field added for filesize.  One of
                   these days trojan horse authors will think and
                   start uploading old trojans using new
                   filenames.  To combat this possibility, the
                   Dirty Dozen now holds a filesize for EVERY new
                   file added.  This way you can crossreference
                   file descriptions and filesizes to nip a trojan
                   in the bud.

                       5) The Dirty Dozen is now printable.  The
                   right margin is now 66, so all printers should
                   be able to print the DDoz without printing off
                   the right side of the paper.

                       6)  1 new Virus added.
                       7)  9 New Trojan Horses added
                       8) 22 New Pirated programs added
                       9)  0 New Hacked programs added
                      10)  2 New Miscellaneous files added
                      11)  1 New Careful file added
                      12) Glossary Update

                 Total bad files listed: 200


    Version 8.0a    New:

                    Miscellaneous : 1
                    Trojan        : 4
                    Viral         : 3
                    Commercial    : 3


                    I also update five or six glossary terms, a
                   paragraph about protecting COMMAND.COM
                   from virii, and two trojan horse entries.

    Version 8.0b    New:

                    Miscellaneous : 0
                    Trojan        : 3
                    Viral         : 0
                    Commercial    : 8

                    Updated:

                    Miscellaneous : 1
                    Trojan        : 2
                    Viral         : 1
                    Commercial    : 0

        Note: I still have quite a few pirated files to add,
but in the interest of warning YOU of all the new trojans recently
released, I will hold those pirated files off for version 8.0c

Dates of release:

   Version 1.0 -- October 20, 1985.
   Version 2.0 --
   Version 3.0 --  
   Version 4.0 --    
   Version 5.0 -- 
   Version 6.0 -- 
   Version 7.0 -- January  3, 1987.
   Version 8.0 -- February 5, 1988.
   Version 8.0a-- February 21, 1988.
   Version 8.0b-- April 4, 1988.


------------------------------------------------------------------
|                            Glossary:                           |
------------------------------------------------------------------
|                                                                |
|  This glossary is for the beginning to intermediate level      |
| user.  Experienced users can skip this with confidence.  All   |
| users should use this as a reference since this material makes |
| for exceptionally droll. reading.                              |
|                                                                |
------------------------------------------------------------------


?Q?          -- ('?' represents any character) File extension for
                SQueezed files.  Squeezed files are unusable until
                unsqueezed by a utility such as NUSQ.COM or
                USQ.COM.  The advantage of a SQueezed file is that
                it is  smaller than a regular UnSQueezed file,
                thus saving disk space and download time.
                ARChives are more efficient than Squeezed files;
                that's why there are so many more ARChives on
                BBS's these days.  Example of the extensions of
                SQueezed files:  .EQE, .CQM, .LQR, .TQT, .DQC,
                etc.
ABBRV        -- Abbreviation for the word: "abbreviation"
ARC          -- File extension for an ARChive file -- many files
                combined together to save space and download time
                that require ARC.EXE, PKXARC.COM, ARCE.COM, or
                ARCLS.EXE to separate the files in to runnable and
                readable (in the case of text) form.
BAS          -- Abbrv for "BASIC," as in the programming language
BBS          -- Abbrv for "Bulletin Board System"
BBS's        -- Abbrv for "Bulletin Board Systems"
BOARD        -- Also "Bulletin Board System"
BOGUSWARE    -- Software that is damaging to one or more parties
BOOT or      -- To boot a computer is to restart it from scratch,
REBOOT          erasing all TSR programs.  One reboots by either
                powering off and then back on, or pressing
                Ctrl-Alt-Del at the same time.
BYTES        -- Bytes measure the length of a file, with one byte
                equaling one character in a file.
CACHE [disk] -- Area of memory set aside to hold recent data.  All
                programs then read recent data from that memory
                rather than from disk.
CLUSTER      -- A phyical block on all [hard] disks, composed of
                sectors, that holds data.
COM          -- File extension for a file that is executable from
                DOS level
DD           -- Abbrv for "dirty dozen"
DEBUG        -- Either (V) to remove glitches in a program or (N)
                the assembly language editor/compiler/disassembler
                provided with DOS
DOC          -- Abbrv for "documentation"
EMS          -- Enhanced Memory Specification. An EMS card holds 2
                MB extra mem.
EXE          -- file extension for a file that is executable from
                DOS level
FAT          -- File Allocation Tables - First sectors of [hard]
                disks where file sizes and physical locations
                are stored.
FRAGMENT     -- DOS physically saves files all over disks-not
                continously this slows down drives and cause
                problems for recovering deleted files or formatted
                disks.
HACKED       -- See "definitions" section
HIDDEN       -- A "hidden" file will not show up in a 'dir'ectory
HIGH LEVEL
 FORMAT      -- This type of format is what most computer users
                view as a regular DOS-format.  That is, formatting
                a disk using FORMAT.COM (included with DOS) is a
                high level format.
IBM          -- International Business Machines
IBMBIO.COM   -- Hidden, System, Readonly file used by DOS
IBMSYS.COM   -- Hidden, System, Readonly file used by DOS
IBM OR COMP  -- IBM computer or a 99% or greater IBM Compatible
                computer
KB           -- Abbreviation for "KiloBytes," one Kb equals 1024
                bytes
LBR          -- Extension on Library files.  Library files are
                really many combined files like ARChives, but they
                require different utilities to extract the
                individual files.  Some examples of such utilities
                are LUU.EXE, LUE.EXE, LAR.EXE, AND ZIP.EXE.  See
                "ARC"
LOW LEVEL
 FORMAT      -- This type of format is only executed on a hard
                disk, therefore most hard disk low-level format
                programs come only with a hard disk controller
                card.  There are a few PD low-level formatting
                packages, though.  Most manufacturers low-level
                format their hard drives at the factory.  Low
                level formatting is the first step in the three
                part formatting process; the second step is to use
                FDISK, and the third is to execute a high level
                format.
MB           -- Abbrv for "Megabytes," or "millions of bytes."
MISC         -- Abbrv for "miscellaneous"
OPTIMIZE     -- To make all files on a disk "contiguous," or
                physically linked together on a [hard] drive.
PATCH        -- A file that is patched (combined) into another
                file to change the original file in some way
PD           -- Abbrv for "Public Domain"
PKXARC       -- Phil Katz's ARChive extracter
PIRATED      -- See DEFINITIONS section in this issue.
RAM          -- Abbrv for "Random Access Memory."  (memory used by
                software)
RBBS         -- Abbrv for RBBS-PC, a type of BBS (Remote Bulletin
                Board System)
READONLY     -- One can NOT write to "readonly" files (ie erasing)
ROM          -- Abbrv for "Read Only Memory." (memory used by
                hardware to boot)
SQUASHING    -- File compression technique used by PKXARC but not
                by SEA's ARC.EXE
SYSOP        -- SYStem OPerator of a BBS
SYSTEM       -- DOS reserves a "System" file for its own use 
TROJAN       -- See DEFINITIONS section in this issue.
TROJAN HORSE -- See DEFINITIONS section in this issue.
TSR          -- Abbv for "Terminate, Stay Resident" Synonym =
                "Memory Resident"
TXT          -- Abbrv for "text"
USU          -- Abbrv for "usually"
UNP          -- Abbrv for "unprotect"
UNPROTECT    -- An "unprotect file" is a patch file that results
                in the breaking of copy protection (no doubt for
                back up purposes).
UTIL         -- abbrv for "utility"
VIRUS        -- See definition section
WORM         -- Trojan Horse


------------------------------------------------------------------
|                      Update Information:                       |
------------------------------------------------------------------


 If you have any additions or corrections for this list, send them
to Eric Newhouse at any of the following places.  Please be sure
to leave the problem file name, size, and description.  Please
note that the West LA PC-Store is currently DOWN.  Thank You.

                  (in order of most frequented):


   * The Crest RBBS/CAMS   (213-471-2518)   (1200/2400)
         (160/50 MB)       [ This is my board ]

   * The Dirty Dozen List  [ this is my mailing address ]
     c/o Eric Newhouse
     1834 Old Orchard Rd
     Los Angeles, CA, 90049

D  * The West LA PC-STORE  (213-559-6954)   (300/1200/2400)
         (50 MB)

   * Camelot PC-Board      (213-204-6158)   (300/1200/2400)
         (80 MB?) (leave mail to "NORMAN TEETER."  He will reley
                   your message).

   * The Source   (leave E-mail to "Doctor File Finder" in IBM SIG
                   #4).  Doctor File Finder (Mike Callahan) will
                   relay your update to me.


------------------------------------------------------------------
|                            Finally:                            |
------------------------------------------------------------------

     Many people have asked about donating for the Dirty Dozen
service.  Considering that in the last six months I've lost 160 MB
worth of disk drives, a floppy drive, and a modem to equipment
failure, I've decided to start accepting donations.

     Please understand, however, that there is a difference
between accepting and soliciting.  I am NOT soliciting donations.
The Dirty Dozen list is a free service, and I take pleasure in
helping other people avoid trojan horses and other illegal
programs.  

     If, however, you'd like to support this list -- if you'd like
to see the Crest BBS go back up in the near future, I guarantee
that all donations will be used to buy new BBS equipment.

     All checks can be sent to my mailing address made out to Eric
Newhouse.  Thank You; even if you don't donate, I appreciate that
you've read this document all the way through and that now perhaps
you too can help in the war agaisnt illegal software.

-----------------------------------------------------------------
END.
END--cut here--cut here