p1@arkham.wimsey.bc.ca (Rob Slade) (06/18/91)
[Ed. My apologies for the length of this digest. The reviews below, and the vendor list, are available on cert.sei.cmu.edu for anonymous FTP in the pub/virus-l/docs/reviews directory. Thanks once again to Rob Slade for all of this work which he is making available to all of us!] Comparison Review Company and product: Delta Base Enterprises 9800A - 140th St. Surrey, B. C. V3T 4M5 604-582-15922 Fax: (604) 582-0101 CIS# 72137,603 Bangkok Security Associates BBS: 662-255-5981 Victor Charlie 4.0 Summary: Change detection with self generating "bait" files and viral signature capture Cost $99 Cdn Rating (1-4, 1 = poor, 4 = very good) "Friendliness" Installation 2 Ease of use 3 Help systems 4 Compatibility 2 Company Stability 3 Support 3 Documentation 3 Hardware required 4 Performance 2 Availability 2 Local Support 2 General Description: Victor Charlie is a series of batch and data files that generate a number of programs for trapping of viral infections. There is also provision for the capture of viral signatures. Utilities are included for viewing of boot sectors and recovery of hard disk system areas. Requires DEBUG.COM for some operations. Version 5.0 has, as of this writing, been released, but has not yet been received for review. Due to the novelty of the program, and its relative anonymity in North America and Europe, I am releasing this review now, with some notes about version 5.0, rather than wait for the next version. Comparison of features and specifications User Friendliness Installation The installation procedure outlined in the manual starts "earlier" in the process than any other reviewed so far. Not only does it recommend booting from a floppy, but it suggests that you SYS and replace the COMMAND.COM file on the hard disk before doing anything else. An initial "Quick Start" section of the manual relies on an intermediate knowledge of MS-DOS by the user, but this is stated at the beginning. (Unfortunately, it does not immediately point novice users to the later, and more detailed, VINSTALLATION chapter, nor does it point out the possible dangers of replacing the operating system on the hard disk. Also, although there is some discussion is the alter chapter about the DOS disk, some discussion of the importance of write protection of the original disks might avoid possibilities for infection at this point.) Installation of VC is not foolproof by any means. Almost all error messages are hidden from the user, and a lack of file space or an incorrect assumption regarding drive specifications will cause the installation to fail to complete. This, however, is not communicated to the user, and may not be obvious. To the novice this can be dangerous, in that the user may consider that the system is protected when, in fact, it is not. Experienced users will be able to custom tailor the installation to their own needs, since everything is done through batch files. Although the documentation does indicate that the package can be run on floppy only systems, installations onto floppies is problematic. If the command VINSTALL A: is given, the system will determine that A: is not a hard drive, and install only a portion of the full set of files. If, however, the command VINSTALL A:\VC is given, the program will not determine that A: is a floppy. When installing to a floppy drive, the boot sector and other system areas are "protected" (VC will detect an infection by a BSI), but not reparable (the back file of the boot sector is not generated.) A floppy installation program, FINSTALL.BAT, is provided, but it does not seem to work properly unless called from VINSTALL. Even then, on every attempt to install the program terminated with an error message about an improper drive or path specification. Although not mentioned in the manual until page 64, DEBUG.COM is required by a number of VC's programs. It should be on the computer, and in a directory in the active path. Options in regard to installation are legion, but should be performed only by experienced users, as they are not necessarily well explained for the novice. Path and directory settings are vitally important, and it is quite possible to generate additional copies of the program which no longer will trap changes to programs. Ease of use The ability to use the programs effectively is very much dependent upon the installation chosen. With proper installation, occasional virus checks can be as simple as a single keystroke (Alt-V). The program can, however, give conflicting messages. When the Stoned virus was active, it correctly detected that something had happened to the boot sequence. On a floppy system it was not able to recover the boot sector, but finished the sequence with a message that "Right now, you have NO active virus on this computer." Help systems There is help of various sorts provided for, but in testing the program very often "lost" its help file, even when installed as directed. When a virus is detected, the messages that appear give a useful explanation of what has happened and why. The steps to take, and optional explanations of what has happened are realistic, and should be clear even to a novice. Compatibility Although no part of the package is "resident", it warns against having TSR's active during installation. Company Stability The program is produced by Bangkok Security Associates (programmer John DeHaven, technical writer Alan Dawson, marketing director Simon Royle and financial director Ramesh Indhewat). BSA is a Thai company registered in the British Virgin Islands from Hong Kong. Company Support In Australia, where the product has had its major success to date, the product is supported by Combat Software. Otherwise company support is provided by the BBS listed above. Documentation The manual is entertainingly written, and contains a great deal of information on viral programs in general. Parts of the manual explain computer operations to the novice in great detail. There are, however, other parts that give out brief, or even misleading, information. (A note on this business of directions to novice users. It may seem like a "fractal" type of problem, in that no matter how much you explain, there is still more to do. For example, TBSCAN's documentation suggests write protecting diskettes, and explains how to do it on a 3.5" diskette, but not on a 5.25". Victor Charlie does explain that you should put a "... sticker ... over the notch at the right-hand side of the disk when you look at it from the front." However, failing to mention that the notch is *square*, on the *side* of the disk cover and that you cannot see the magnetic disk through it might allow some to permanently read *and* write protect the disk by placing the sticker over the drive head access slot. Still, in many cases Victor Charlie gives the best explanation to novice users yet reviewed.) The tone of the documentation (both hardcopy and on disk) varies between jingoism ("... ultimate security ... defeat any current or future virus") and realism, while ultimately falling somewhat short in terms of actual details. In testing the system, I came to the conclusion that, while suitable for any users as a warning system, technical personnel will need more details as to the ultimate effectiveness, and how far to trust the package. Hardware Requirements MS-DOS 2.0 or higher and a minimum 64K of RAM. Performance Unfortunately, even at this point, I am unable to state the performance of the system with confidence. It will find viral infections of programs, and of boot sectors. (In spite of the difficulties encountered in installing the system to a floppy, it had no difficulty in identifying "Stoned" infections on floppy. Further testing revealed that it was, somehow, detecting a change in the boot sector, rather than memory. Although the program checks memory and the system areas of the disk, the "signatures" of the original system are not stored with program file signatures.) The actions of the package as a whole, regenerating itself from batch and data files, are quite fascinating. The program is a radical departure from any other reviewed system, and should be a valuable extra component for system security. The change detection of the signature list may possibly be bypassed by a sophisticated virus, as it depends upon file length and checksum, rather than some of the more rigourous mathematical methods. However, the checksum is described by the company as "double-encrypted", and the method of calculation and protection, while not user definable, is not uniform throughout any release of the product. The program, as it stands, is most useful against memory resident, program file infecting viri. Specific identification of sources of infection is not strong. Local Support In Australia, provided by Combat Software. Support Requirements Installation of the program is possible for novice users with standard computer configurations, but should likely be supported for any non- standard systems. Novice or intermediate users will require assistance to identify the source of infection if a virus is detected. General Notes This package is quite fascinating in its novel approach to virus detection. There are numerous shortcomings, but the approach could be a valuable adjunct to current methods. While the current implementation has significant shortcomings, particularly in non-standard configurations, the concept is a valuable one and, hopefully, future development will make the package more valuable as a stand alone product. Version 5.0 is said to be a major rewrite and upgrade. The virus signature library, which contains only two signatures in version 4.01, will identify all viral programs identified as "common" in the Hoffman Summary listing (the date of the listing is not specified.) The library will also "accumulate" signatures as new viral programs are encountered. Changes effective in version 5.0 will include a new interface and installation process. New utilities will be added, and protection against "stealth" viri will be enhanced. System requirements will increase to 256K RAM and DOS 3.0 or higher, but the use of DEBUG.COM will be dropped. The documentation will include a 200 page book on computer viral operations, with separate version specific technical references. copyright Robert M. Slade, 1991 PCVC.RVW 910617 ============= Vancouver p1@arkham.wimsey.bc.ca | "If you do buy a Institute for Robert_Slade@mtsg.sfu.ca | computer, don't Research into (SUZY) INtegrity | turn it on." User Canada V7K 2G6 | Richards' 2nd Law Security | of Data Security