W8SDZ@WSMR-SIMTEL20.ARMY.MIL (Keith Petersen) (12/16/88)
Posting-number: Volume 01 Issue 059
Originally-from: Eric Newhouse <no email address>
Submitted-by: Keith Petersen <W8SDZ@WSMR-SIMTEL20.ARMY.MIL>
Archive-name: dirtyd8b/part02
part02/02
BEGIN--cut here--cut here
CDRAGON1.ARC 45056 PG Sea Dragon
CENTIPED PG Be careful with this one. At least two
other legitimate, PD copies of
Centipede are in circulation. The
pirated one is supposedly PUBLIC DOMAIN
BY ATARI. Yeah, Right.
CHIWRITR.ARC PU The last Shareware version of this
scientific word processor is version
1.32. Any more recent version, such as
version 2.0, is commercial; apparently
the author(s) tired of never receiving
donations for what sounds like a good
program.
CMASTER.ARC PG Chess Master 2000 by Electronic Arts
COMMANDR.ARC PG Norton Commander
COSMIC PG Cosmic Crusaders
COPYRITE PU Quaid Software's COPYWRITE
COPYWRIT PU Quaid Software's COPYWRITE again
COSMIC PG Cosmic Crusaders again
CROSFIRE.COM PG Crossfire
CRUSH-CC.ARC PG Crush, Crumble & Chomp
DAMBUST.ARC PG Dambusters by Accolade cracked
DEB88.EXE PM DeSmet 'C' debugger
DECATH PG Microsoft's Decathalon
DEFENDER PG Defender, by Atari
DIGDUG.COM PG Dig Dug, also by Atari
DIGDUG.COM PG Dig Dug again
DISKEX PU Quaid's Disk Explorer
DOSHELP.EXE PU This is really Central Point
Software's PC-tools. One special note:
poorly written documentation usually
accompanies this file. In the
documentation ERIC HSU asks for a
monetary contribution to his bbs. Well,
It seems that this was a poor attempt to
damage ERIC HSU's reputation; Eric is a
legitimate SysOp in the Houston area.
DOSMENU.ARC 208240 PU Intech's Dosmenu - Opening screen says
"PC DOS MENU SYSTEM 5.0." - (C) is on
the bottom of the screen.
DOSSHELL PU Autodex again
DRL PG Avalon Hill's "Dnieper River Line."
DIPLOMCY PG Avalon Hill's "Computer Diplomacy" game.
EGADIAG PU Quadram EGA (Quad EGA+) diagnostics.
EINSTIME PU IBM internal utility
EMPIRE.ARC 75611 PG Insterstel's Empire
EXPLORER.COM PU Quaid Disk Explorer again
EVOLUTIO PG Evolution
F15 PG F-15 Strike Eagle
FALCON.ARC PG Falcon by Spectrum Holobyte - flight sim
FIGHTER.ARC PG Sublogic's JET
FILEEASE PU A File manager
FILEMGR PU Filemanager by Lotus Devel. Corp.
FILEMAN.COM 1???? PU Also Filemanager
FINDIT PU IBM internal 'locate a file' utility
FSDEBUG PU IBM's Full Screen Debug program..
GOLDCUP PG Gold Cup championship soccer
GOLF21.ARC PG Golf's Best version 2.1
GREMLINS.COM PG Gremlins
HARDHAT.COM PG Hard Hat Mack
HIGHORBT PG High Orbit (like Star Wars)
HOOP.COM PG One-on-1 by Electronic Arts
ID PU Persyst Ram disk software
IBM21 PG 21c again
IKARI.ARC 210944 PG Ikari Warriors - CGA/EGA, joystick reqd.
IPLTIME.COM PU IBM Internal Clock utility
JBIRD PG Jbirds -- Q-bert Game
JEOPARDY 195??? PG Jeopardy, the game show.
JET PG Jet
JETDRIVE.ARC PU Jet Drive -- copies files quickly
JOUST PG Joust. There is a 6K, PD version
KEYWORKS.ARC PU Keyworks macro program, usu. version 2.0
KOBAYASH.ARC PG Star Trek -- The Kobayashi Alternative
KONG PG Donkey Kong
LIGHTNIN PU Can be either the cache or spell checker
MACE+ PU Paul Mace's MACE+ utilities
MACROS PU Again Superkey - sometimes Prokey
MEDMAG.COM PU Quaid Software's Media Magician
MINER49R.ARC PG Miner '49er
MISSLEC PG Missle command
MONTYS.COM PG Montezuma's Revenge
MOONBUGS PG Moon Bugs
MS PU IBM utility.
MTS PU IBM Multitasker like Double-Dos
MULE PG M.U.L.E -- players is on alien planet
MULTASK PU MTS again
MURDRBY# PG Murder by Numbers by Electroni Arts
MUSICCON PM Music Construction Set, also by EA
NFL.ARC PG Xor's NFL challenge.
NGHTSTLK PG Night Stalker
NICE PM NicePrint - printer controller
NODISK-A.COM PU Central Point software's Nokey
NORTON.COM PU Peter Norton's Utilities
ANORTON.ARC PU Peter Norton's Advanced Utilities
NOVATRON PU Tron light cycles
ONE-ON-1 PG One-on-1 basketball game, again
PATHMIND PU Pathminder, Dos Shell
PC-POOL PG Pool
PC-TOOLS PU Central Point Software's PC-tools
PCBOSS PU DOS shell
PCED PU Pro CED, DOS command line editor
EII PU IBM Personal Editor II
PANGO.ARC 17957 PG Pango, sometimes cracked to read cracked
by Eric Newhouse
PINCONST PG Pinball Construction Set by EA
POOL.ARC PG PC-POOL again
POPALARM.COM PU Part of POP DOS
POPDOS.ARC PU TSR DOS utilities
PRIME PU Columbia Data Co. hard disk utility.
PROKEY PU Prokey macros program
PROMPRPH PG Star Trek -- The Promethian Prophesy
PSHIFT PU Memory Shift
PSRD.ARC PU IBM utility (redirects PrtSc)
QDOS PU Quick DOS
QUCKDOS PU Quick DOS
QIX PG Qix
RACTER PG Racter
RASTER-B PG Raster Blaster
RE.ARC PG Romantic Encounters at the Dome
RIGHTW PU Right Writer (writing style checker)
ROBOTRON PG Robotron, hacked to read PUBLIC DOMAIN
BY ATARI. Do pirates have any
imagination?
ROGUE.EXE PG Game very similar to the PD: HACK.EXE
ROMANTIC PG Romantic Encounters at the Dome, again
SEADRAG.ARC 45056 PG Also Sea Dragon
SEE PM DeSmet editor
SFX PU Autodex (again!)
SKYRUNER PG Sky Runner, $14.95 game.
SIMCGA40 15360 PU According to a user of mine, version 4.0
of the CGA emulator for Herc cards is no
longer a shareware program
SM.COM PU Realia's Spacemaker utility. .EXE->.COM
SMAP PU IBM Internal utility, with the copyright
notice and real author's name replaced by
"Dorn W. Stickle".
SNIPER PG Sniper -- arcade action type game.
SOLOFLT.ARC PG Solo Flight (by SSI?) cracked
SPACNVDR.ARC 9513 PG Space Invaders
SPYHUNT PG Bally's Spy Hunter
STARFLIT.ARC 30???? PG Electronic Art's Star Flight
STARGATE.EXE 57??? PG Hacked to say "PUBLIC DOMAIN BY ATARI,"
but don't you believe it! Be careful not
to confuse this arcade game with the
public domain STARGATE MERCHANT game,
which is a little 12 KB BASIC program by
G. E. Wolfworth.
STRIPKR PG Strip Poker by Artworx
SUBCMDR.ARC PG Gato cracked: SUBCMDR.EXE & overlays
SUPERCAD PM Easy CAD
SUPERCAD.LQR 242660 PM Easy CAD again.
SUPERKEY PM Superkey again
TEMPOFAP PG Temple of Apshai
THEQUEST.BAS/EXE PG The Quest
TIRES.EXE PG Bc's Quest for Tires again
TREASURE PG Pirate's Treasure
TROJAN.ARC 304128 PG Trojan - CGA/EGA, (C) 1987, like D&D.
TWIN.ARC 22784 PU Central Point's Copy II PC
TWINCOPY.ARC 22784 PU Also Copy II PC
ULTIII 111616 PG Origin's Ultima 3
ULTIMA2.ARC 84992 PG Origin's Ultima 2
UTILITY PU Norton's Utilities Arced and with the
file names changed. When run, however,
the programs display the copyright notice
of Peter Norton. Many other pirated
utilities could also go under the name
UTILITY.
VOYAGERI PG Avalon-Hill Game
VS PU Also INTECH'S DOSMENU
WCKARATE PG World Championship Karate by Epyx
WG-BBALL PG World's Greatest Baseball Game by SSI
WGAMES PG World Games by Epyx
WOF.ARC PG Wheel of Fortune
WORSTR PU Word Star
XDIR PU Pre-release version of DOS FILE TRACKER
XTREE PU DOS shell
XTREE+ PU Xtree Plus
ZAXXON PG Hacked to say "PUBLIC DOMAIN BY SEGA."
(sound familiar?)
------------------------------------------------------------------
| MISCELLANEOUS ILLEGAL FILES: |
| |
| TYPES: |
| Game (G) -- Recreational software |
| Patch (P) -- Modification to another program usually |
| performed through debug. |
| Text (T) -- Text / Documentation File |
| Util (U) -- Utility of some sort |
------------------------------------------------------------------
Name Size Category Notes
------------- ------ -- ----------------------------------------
COPYWRIT 2??? MP Although the real COPYWRITE is going
around Bulletin Boards like fire, there
is another illegal file under the same
name. The former takes around 40 KB
ARC-ed, whereas this takes about 2 KB.
What I'm referring to is an archive of
1-3 files that explains how to remove
the serial numbers from copywrite. Now
it's allright to "unprotect" a program
for backup purposes, but removing serial
numbers can only lead to piracy.
LOCKPICK MT This is a text file, usually with a
.TXT extension, that casually explains
how to pick locks. This is not
illegal, but it's definitely in
poor taste. It could be used as
evidence against a burglar, though.
MONEY.ARC MT This text file claims that with minimal
MONEY.TXT 11648 effort YOU can become a millionaire.
This text file, as some of you may know,
is simply another chain (pyramid) letter
that is of course illegal. A pyramid
writer sends a letter to four people
requesting money. Then, according to
the pyramid writer's plan, those four
will send letters to four more asking
for money for themselves and the
original writer. Unfortunately when the
chain breaks people lose money. What
one person gains someone else must lose.
That's why this type of letter is
illegal.
MONOPOLY MG Finally I am SURE that this file
violates Parker Brother's rights
to the famous boardgame. Don Gibson has
agreed that monopoly should NOT be
distributed anymore, so SysOps, please
remove this file from your download
directories.
MOVBASIC or MU This highly illegal file breaks IBM's
SBASICA or copyright on BASIC and
BASICA. It SBASIC creates new files
called SBASIC or SBASICA that run "IBM
BASIC" on an IBM clone. C'mon, don't
you think that these clones don't run
IBM BASICA for a good reason? The
clones don't support BASICA because it's
illegal! This file comes with Alloy's
PC-Slave card. Alloy has a license
agreement, and users of the PC-Slave are
allowed to create copies of IBM BASIC
for themselves. NO ONE ELSE IS. Stop
complaining that this file is legal,
people; this is one of the more blatent
cases of piracy that I've seen.
XTALK MP Like Copywrite, there is a patch
circulating BBS's to remove the serial
numbers from Crosstalk.
------------------------------------------------------------------
| Many thanks for updates to version 8.0 from: |
------------------------------------------------------------------
| |
| 1. John Abolins |
| 2. Randall Splinter |
| 3. Mike Topf |
| 4. John White |
| 5. Gary Thomas |
| 6. Bob Ackerman |
| 7. Nich Sochs |
| 8. Don Gibson |
| 9. Russ Goodwin |
| 10. John White |
| 11. John Ford |
| 12. Bob Stone |
| 13. Cay Horstmann |
| 14. John Curran |
| 15. Gary Tivey |
| 16. Leo M. Cavanaugh III |
| 17. Darryl Merkley |
| 18. Arnie Bell |
| 19. You? |
------------------------------------------------------------------
This is the end of the "bad files list." The rest of this
document contains instructions on what to do if YOU run a trojan
horse, an update history, a glossary, and information on how and
where to contact me with updates.
------------------------------------------------------------------
| If you run a trojan horse.. |
------------------------------------------------------------------
While reading this, bear in mind that there is no better remedy
for a drive that has run a trojan horse than a recent backup..
AARGH! Perhaps your hard disk sounds like a sick moose. Perhaps
your drive light starts flashing repeatedly, like a police car's
lights. Perhaps your drive just sits in the computer, and the
computer doesn't acknowledge its presence.
Having watched my drive crash many times, I can understand the
frustration you will feel after your hard disk conks out. While a
faulty hard drive, disk controller, or cable can make these
ailments uncurable without spending a lot of money, usually you
CAN recover from a trojan horse with only investing a little time.
After running a trojan horse, the first thing to do is calm down.
Face the situation stoicly; it may prevent your hair from turning
gray. Diagnose the damage. Was your [hard] drive formatted?
Did the trojan scramble your FAT table? Did it erase every file?
Did it erase or format your [hard] drive's boot sector? The odds
are that the trojan incurred one of these four disasters.. After
a successful diagnosis, you are ready to remedy the problem.
1) If the trojan low-level formatted your [hard] disk:
Hope that you have a recent backup; that's the only remedy
for this disease.
2) If the trojan high-level formatted your [hard] disk:
About a year ago Paul Mace introduced a way to recover
formatted data. Unfortunately, most programs can only
recover formatted data COMPLETELY if you run a "snapshot"
program right before the format. The reason: DOS
fragments large files and without an accurate map of the
formatted disk, unformatters have problems dealing with
such files. You will need one of these three programs to
recover your disk if the trojan formatted it:
1. PC-Tools (Central Point, $79.95 retail)
2. Mace+ Utilities (Paul Mace $99.95 retail)
3. Advanced Norton Utilities (Peter Norton, $150.00
retail)
There is at least one other program that can unformat
disks, but the name of it is slipping my mind. As of this
printing, PC-Tools probably has the best unformatter. It
can reputedly reconstruct formatted disks regardless of
the disks state of fragmentation. PC-Tools may not be
right for your other disk management needs, however, so
you should talk to a salesmen about these products before
making a purchase.
3) If the trojan scrambled your FAT table:
Sector editors such as those included in the Norton
Utililites, PC-Tools, and a host of other popular utility
packages (not Mace+) allow experienced users to piece
their FAT backtogether from Gibberish. This avenue of
recovery is only open to extremely proficient users,
however. Everyone else, including myself, must rely on a
FAT backup program to provide a feeling of security.
FATBACK.COM (available on my board) will back up your FAT
table in under a minute to floppy. FATBACK makes FAT
backup easy and non time consuming.
4) If the trojan erased file(s), and the FAT table is
undamaged:
There are many commercial and public domain packages
available that undelete deleted files. Norton Utilities,
PC-Tools, MACE+, and UNDEL.COM will all do the job. The
commercial products are all more reliable in undeleting,
but they are also more expensive that the Public-Domain
UNDEL. Always undelete your most recent files first; that
is, undelete files in the order of last time written to
disk. I know that PC-Tools automatically lists
undeletable files in the correct order, but the other
three may not.
5) If the boot sector on your hard disk gets
erased/formatted:
There are four things to do if this happens, and the
worst that can happen is that you will go without a hard
disk for a while. Backup before proceeding with any of
the steps here, for you may have to destroy some files to
restore your hard disk to boot status.
A) Try doing a "SYS C:" (or "SYS A:") from your
original DOS disk. Then copy COMMAND.COM back onto
the hard drive. If your hard drive still won't boot
then try step B.
B) If you have the MACE+ utilities go to the "other
utilities" section and "restore boot sector." This
should do the job if you have been using MACE+
correctly.
C) If you are still stuck, BACK EVERYTHING UP and
proceed to do a low level format. Instructions on
how to perform a low-level format should come with
your hard disk controller card. Be sure to map out
bad sectors using either SCAV.COM by Chris Dunford
or by manually entering the locations of bad sectors
into the low level format program. After the low
level format run FDISK.COM (it comes with DOS) to
create a DOS partition. Refer to your DOS manual
for help in using FDISK. Then put your original DOS
diskette in drive A: and type FORMAT <drive
letter>:/S/V. <Drive letter> represents the letter
of the disk you are formatting. Try rebooting
again.
D) If you are still stuck, either employ some
professional computer repairmen to fix your drive,
or live with a non-bootable hard drive..
------------------------------------------------------------------
| Update History: |
------------------------------------------------------------------
Version 1.0 Tom Neff enters a dozen "bad" files in the
initial "dirty dozen."
Version 2.0 Sees the addition of a short introduction and 3
more files. Again, I play no role in this
version.
Version 3.0 I write version 3.0. Tom Neff appears to have
lost interest in the DDoz, so I take over. I
add 22 files and completely rewrite the
introduction. Version 3.0 has a total of 37
files.
Version 4.0 I add another 30 or so files to the list,
making the DDoz 65+ files strong, as well as
adding a few paragraphs to the introduction.
Version 5.0 By the time I release version 5.0 to the
public, the Dirty Dozen is being greeted
favorably and with enthusiasm around the
country. Updates start coming in with
regularity; the list prospers (if one can say
that about a list!). I add a few more
paragraphs to the introduction and about 40 new
files bringing the file total up to 103!
Version 6.0 The Dirty Dozen is now such a big project that
I am now writing it in stages. Although I am
going to make absolutely no effort to spread
these "intermediate versions," they will always
be downloadable from my board. This way
everyone can keep an extremely current, if only
minorly modified, issue of the DD. You might
think of stage "a" of issue #6 as version 6.1,
stage "b" as version 6.2, stage "c" as version
6.3, etc.
New in version 6.0 is the following:
A) Many minor revisions,
B) 17 more files, bringing the total to
120!
C) Two new paragraphs in the introduction,
D) Instructions on how to recover from a
trojan horse,
E) A comprehensive glossary,
F) This update history,
G) An acknowledgments section set up for
major contributors of information
regarding new bogusware
H) A new bogusware catagory of
"miscellaneous illegal software."
Version 7.0 The major changes in this version take place
in the revision stages. From 6.0a to 6.0l I
add fifteen trojan horses, six commercial
programs, two miscellanous files, and two
hacked programs. I also rewrite part of the
introduction, adding a paragraph, and I augment
the glossary at the end of this document.
While 6.0l contains a good deal of version 7.0;
however, version 7.0 is considerably different
than 6.0l. For example, I add seventeen new
pirated programs, bringing the file total to a
whopping 165! Moreover, I rewrite virtually
every paragraph in order to 'stylize' (clean up
the writing in) the document.
Once again I would like to thank all users who
called in updates to the Dirty Dozen; such
users encourage me to keep maintaining the
dirty dozen!
Version 8.0 One of my hard disks has been down for about
six months. Unfortunately version 8.0 was
ready for release RIGHT before the hard disk
crash, and, naturally, the new version was on
the busted HD un-backed-up. Finally I've taken
the time (about 50 hours) to just sit down and
work with the Dirty Dozen. I feel guilty that
I've held back the DDoz for so long, but
fortunately until recently there have been NO
trojan horses to report. In anycase, I have
modified v. 7.0 of the Dirty Dozen extensively;
changes include:
1) New illegal software category: VIRUS.
Virii are potentially more dangerous than
trojan horses.
2) New illegal software category: CAREFUL
These file are suspect; excercise caution
when running these unverified programs.
3) All paragraphs rewritten. There were
quite a few cases of ambiguity in version 7.0;
now I hope to have eliminated those cases.
4) New Field added for filesize. One of
these days trojan horse authors will think and
start uploading old trojans using new
filenames. To combat this possibility, the
Dirty Dozen now holds a filesize for EVERY new
file added. This way you can crossreference
file descriptions and filesizes to nip a trojan
in the bud.
5) The Dirty Dozen is now printable. The
right margin is now 66, so all printers should
be able to print the DDoz without printing off
the right side of the paper.
6) 1 new Virus added.
7) 9 New Trojan Horses added
8) 22 New Pirated programs added
9) 0 New Hacked programs added
10) 2 New Miscellaneous files added
11) 1 New Careful file added
12) Glossary Update
Total bad files listed: 200
Version 8.0a New:
Miscellaneous : 1
Trojan : 4
Viral : 3
Commercial : 3
I also update five or six glossary terms, a
paragraph about protecting COMMAND.COM
from virii, and two trojan horse entries.
Version 8.0b New:
Miscellaneous : 0
Trojan : 3
Viral : 0
Commercial : 8
Updated:
Miscellaneous : 1
Trojan : 2
Viral : 1
Commercial : 0
Note: I still have quite a few pirated files to add,
but in the interest of warning YOU of all the new trojans recently
released, I will hold those pirated files off for version 8.0c
Dates of release:
Version 1.0 -- October 20, 1985.
Version 2.0 --
Version 3.0 --
Version 4.0 --
Version 5.0 --
Version 6.0 --
Version 7.0 -- January 3, 1987.
Version 8.0 -- February 5, 1988.
Version 8.0a-- February 21, 1988.
Version 8.0b-- April 4, 1988.
------------------------------------------------------------------
| Glossary: |
------------------------------------------------------------------
| |
| This glossary is for the beginning to intermediate level |
| user. Experienced users can skip this with confidence. All |
| users should use this as a reference since this material makes |
| for exceptionally droll. reading. |
| |
------------------------------------------------------------------
?Q? -- ('?' represents any character) File extension for
SQueezed files. Squeezed files are unusable until
unsqueezed by a utility such as NUSQ.COM or
USQ.COM. The advantage of a SQueezed file is that
it is smaller than a regular UnSQueezed file,
thus saving disk space and download time.
ARChives are more efficient than Squeezed files;
that's why there are so many more ARChives on
BBS's these days. Example of the extensions of
SQueezed files: .EQE, .CQM, .LQR, .TQT, .DQC,
etc.
ABBRV -- Abbreviation for the word: "abbreviation"
ARC -- File extension for an ARChive file -- many files
combined together to save space and download time
that require ARC.EXE, PKXARC.COM, ARCE.COM, or
ARCLS.EXE to separate the files in to runnable and
readable (in the case of text) form.
BAS -- Abbrv for "BASIC," as in the programming language
BBS -- Abbrv for "Bulletin Board System"
BBS's -- Abbrv for "Bulletin Board Systems"
BOARD -- Also "Bulletin Board System"
BOGUSWARE -- Software that is damaging to one or more parties
BOOT or -- To boot a computer is to restart it from scratch,
REBOOT erasing all TSR programs. One reboots by either
powering off and then back on, or pressing
Ctrl-Alt-Del at the same time.
BYTES -- Bytes measure the length of a file, with one byte
equaling one character in a file.
CACHE [disk] -- Area of memory set aside to hold recent data. All
programs then read recent data from that memory
rather than from disk.
CLUSTER -- A phyical block on all [hard] disks, composed of
sectors, that holds data.
COM -- File extension for a file that is executable from
DOS level
DD -- Abbrv for "dirty dozen"
DEBUG -- Either (V) to remove glitches in a program or (N)
the assembly language editor/compiler/disassembler
provided with DOS
DOC -- Abbrv for "documentation"
EMS -- Enhanced Memory Specification. An EMS card holds 2
MB extra mem.
EXE -- file extension for a file that is executable from
DOS level
FAT -- File Allocation Tables - First sectors of [hard]
disks where file sizes and physical locations
are stored.
FRAGMENT -- DOS physically saves files all over disks-not
continously this slows down drives and cause
problems for recovering deleted files or formatted
disks.
HACKED -- See "definitions" section
HIDDEN -- A "hidden" file will not show up in a 'dir'ectory
HIGH LEVEL
FORMAT -- This type of format is what most computer users
view as a regular DOS-format. That is, formatting
a disk using FORMAT.COM (included with DOS) is a
high level format.
IBM -- International Business Machines
IBMBIO.COM -- Hidden, System, Readonly file used by DOS
IBMSYS.COM -- Hidden, System, Readonly file used by DOS
IBM OR COMP -- IBM computer or a 99% or greater IBM Compatible
computer
KB -- Abbreviation for "KiloBytes," one Kb equals 1024
bytes
LBR -- Extension on Library files. Library files are
really many combined files like ARChives, but they
require different utilities to extract the
individual files. Some examples of such utilities
are LUU.EXE, LUE.EXE, LAR.EXE, AND ZIP.EXE. See
"ARC"
LOW LEVEL
FORMAT -- This type of format is only executed on a hard
disk, therefore most hard disk low-level format
programs come only with a hard disk controller
card. There are a few PD low-level formatting
packages, though. Most manufacturers low-level
format their hard drives at the factory. Low
level formatting is the first step in the three
part formatting process; the second step is to use
FDISK, and the third is to execute a high level
format.
MB -- Abbrv for "Megabytes," or "millions of bytes."
MISC -- Abbrv for "miscellaneous"
OPTIMIZE -- To make all files on a disk "contiguous," or
physically linked together on a [hard] drive.
PATCH -- A file that is patched (combined) into another
file to change the original file in some way
PD -- Abbrv for "Public Domain"
PKXARC -- Phil Katz's ARChive extracter
PIRATED -- See DEFINITIONS section in this issue.
RAM -- Abbrv for "Random Access Memory." (memory used by
software)
RBBS -- Abbrv for RBBS-PC, a type of BBS (Remote Bulletin
Board System)
READONLY -- One can NOT write to "readonly" files (ie erasing)
ROM -- Abbrv for "Read Only Memory." (memory used by
hardware to boot)
SQUASHING -- File compression technique used by PKXARC but not
by SEA's ARC.EXE
SYSOP -- SYStem OPerator of a BBS
SYSTEM -- DOS reserves a "System" file for its own use
TROJAN -- See DEFINITIONS section in this issue.
TROJAN HORSE -- See DEFINITIONS section in this issue.
TSR -- Abbv for "Terminate, Stay Resident" Synonym =
"Memory Resident"
TXT -- Abbrv for "text"
USU -- Abbrv for "usually"
UNP -- Abbrv for "unprotect"
UNPROTECT -- An "unprotect file" is a patch file that results
in the breaking of copy protection (no doubt for
back up purposes).
UTIL -- abbrv for "utility"
VIRUS -- See definition section
WORM -- Trojan Horse
------------------------------------------------------------------
| Update Information: |
------------------------------------------------------------------
If you have any additions or corrections for this list, send them
to Eric Newhouse at any of the following places. Please be sure
to leave the problem file name, size, and description. Please
note that the West LA PC-Store is currently DOWN. Thank You.
(in order of most frequented):
* The Crest RBBS/CAMS (213-471-2518) (1200/2400)
(160/50 MB) [ This is my board ]
* The Dirty Dozen List [ this is my mailing address ]
c/o Eric Newhouse
1834 Old Orchard Rd
Los Angeles, CA, 90049
D * The West LA PC-STORE (213-559-6954) (300/1200/2400)
(50 MB)
* Camelot PC-Board (213-204-6158) (300/1200/2400)
(80 MB?) (leave mail to "NORMAN TEETER." He will reley
your message).
* The Source (leave E-mail to "Doctor File Finder" in IBM SIG
#4). Doctor File Finder (Mike Callahan) will
relay your update to me.
------------------------------------------------------------------
| Finally: |
------------------------------------------------------------------
Many people have asked about donating for the Dirty Dozen
service. Considering that in the last six months I've lost 160 MB
worth of disk drives, a floppy drive, and a modem to equipment
failure, I've decided to start accepting donations.
Please understand, however, that there is a difference
between accepting and soliciting. I am NOT soliciting donations.
The Dirty Dozen list is a free service, and I take pleasure in
helping other people avoid trojan horses and other illegal
programs.
If, however, you'd like to support this list -- if you'd like
to see the Crest BBS go back up in the near future, I guarantee
that all donations will be used to buy new BBS equipment.
All checks can be sent to my mailing address made out to Eric
Newhouse. Thank You; even if you don't donate, I appreciate that
you've read this document all the way through and that now perhaps
you too can help in the war agaisnt illegal software.
-----------------------------------------------------------------
END.
END--cut here--cut here