TMPLee@DOCKMASTER.NCSC.MIL (06/22/91)
For one, I wouldn't touch this offer with a ten foot pole -- it sounds like the perfect scenario for introducing and propagating a virus: a) the program sounds too good to be true, and b) the author refuses to supply source. I do hope that anyone foolish enough to grab a copy of it never thereafter downloads any other software to the net -- the fact that everything seems OK for you doesn't mean there hasn't been something subtly planted that will show up a few generations later.
bill@braille.uwo.ca (Bill Carss) (06/22/91)
TMPLee@DOCKMASTER.NCSC.MIL writes: >For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus: a) >the program sounds too good to be true, and b) the author refuses to >supply source. I do hope that anyone foolish enough to grab a copy of >it never thereafter downloads any other software to the net -- the fact >that everything seems OK for you doesn't mean there hasn't been >something subtly planted that will show up a few generations later. If you don't have the brains to take a few simple precautions you are probably right not to try the new software that creative people are generating. Sureley (and I will have to call you that because I don't know your first name) your aren't suggesting that everyone out there in the big wide world is sitting at home trying to come up with a way of infecting your (or our) machines at the first possible chance. I have been corresponding with the author of HEATSEAKER for a while now and (as they say) know how to get hold of him. If he intended to spread some virus around it would be a silly thing to do because others besides myself know who and where he is. In addition, if you had read the posts, you would have read that sourse will be available in the future - just not at the moment while the program is beign beta tested (actually alpha tested at his home first and then beta tested by others). I agree that some awareness of virus infection is a good idea, but to pan something out of hand, before it has been looked at is DOWN RIGHT STUPID AND SOUNDS TO ME LIKE SOUR GRAPES BECAUSE YOU DIDN'T THINK TO WRITE SUCH A PROGRAM YOURSELF!1 OR MAYBE YOU WERE PLANNING TO SPREAD SOME VIRUS WITH A UTILITY PROGRAM OF YOUR OWN AND HEATSEAKER IS STEALING YOUR THUNDER!!! Get a life!!!!!!!!!!!!!!!!! -- Bill Carss bill@braille.uwo.ca
JWANKERL@UTCVM.BITNET ("Josef W. Wankerl") (06/22/91)
On Fri, 21 Jun 1991 14:42:00 EDT <TMPLee@DOCKMASTER.NCSC.MIL> said: >For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus... Can we say the word paranoid? I, for one, would not advertise a program that I wrote and purposfully put a virus in. That would be silly. -- ===> Josef W. Wankerl, Technical Editor for GS+ Magazine BITNET: JWANKERL@UTCVM.BITNET | America Online: JWankerl ProLine: jwankerl@pro-gsplus |-------------------------------- Internet: jwankerl@pro-gsplus.cts.com | "I am a Viking" -Y. Malmsteen
curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) (06/22/91)
In article <910621184230.584787@DOCKMASTER.NCSC.MIL> TMPLee@DOCKMASTER.NCSC.MIL writes: >For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus: a) >the program sounds too good to be true, and b) the author refuses to >supply source. I do hope that anyone foolish enough to grab a copy of >it never thereafter downloads any other software to the net -- the fact >that everything seems OK for you doesn't mean there hasn't been >something subtly planted that will show up a few generations later. Dear TMPLee- I am utterly shocked at your audacity. I have spent almost two years of my life painstakingly putting this software together for the good of the Apple // community. If I had stocked a virus in Heatseeker, it would be easy to identify the source - myself - and to track me down. Anyone who reads articles here knows my full name, where I work, and my telephone number. If they have the right software, they can even find out my home address and pay me a visit. I refuse to supply source code because any programmer who does so on such a good piece of software is nothing but an idiot. Supplying source code in a program distribution violates every Trade Secret law in existence in each of the states of the Union. If I supplied source, and someone from, say, Central Point saw it - and passed it on to the Copy //+ programming team - and I sued for obvious damages - my arguments would be pointless. Source given out to anyone - even if you show it to your secretary - removes EVERY protection you have under Copyright Laws. I am no such fool. So the program sounds too good to be true. So what? You refuse to believe that I'm daring enough to use technology that no one else in the Apple // community has the guts to use? The Apple environment DESERVES the best that they can get from their machines, and the current disk utility selection for the Apple // offers NOTHING by way of performance. The monopoly of companies such as Central Point who have enormous financial backing to control and corner the utility market leave no room for small-time programmers like myself. Why else would I be offering something that is the best for FREE? If you care to continue this discussion, I would be happy to in email or over the phone. I can be reached at (708)972-8585, or, if that line is busy, call me at (708)972-4082. If you want to continue this discussion here, where you can hide, that is fine as well. However, in the future, I sincerely hope you think before you act and keep such thoughtless opinions to yourself unless they have any basis in fact. Jeffrey S. Curtis Programmer and Defender of the Apple // Faith
gwyn@smoke.brl.mil (Doug Gwyn) (06/22/91)
In article <1991Jun22.023810.26366@mcs.anl.gov> curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) writes: >In article <910621184230.584787@DOCKMASTER.NCSC.MIL> TMPLee@DOCKMASTER.NCSC.MIL writes: >>For one, I wouldn't touch this offer with a ten foot pole -- it sounds >>like the perfect scenario for introducing and propagating a virus: ... I have to say that the same thought occurred to me upon reading the offer. It is nice to hear attestations that your utility program is not a means of spreading a "virus"; however, the blurb for it did exhibit many of the characteristics that one has come to associate with software that spreads such viruses. TMPLee may be more sensitive to this than most, given that he has an account on one of NCSC's computers. He has reason to be wary. >I refuse to supply source code because any programmer who does so >on such a good piece of software is nothing but an idiot. Supplying source >code in a program distribution violates every Trade Secret law in existence No, it wouldn't violate any law. I would, however, preclude you from successfully claiming trade secret status for the code, unless you had made it available only under appropriate licensing. >So the program sounds too good to be true. So what? So one should exhibit due caution. The offer might be legitimate or it might not; there may be a "virus" or there might not. Without additional information, one would have to assess the risk as higher than usual for Apple II software, given the nature of the program and its "too good to be true" advertising. >You refuse to believe that I'm daring enough to use technology that no >one else in the Apple // community has the guts to use? That is quite a claim. Why does it take "guts" to use that technology? Having a better idea is one thing; having more courage is something else. >The monopoly of companies such as Central Point who have enormous financial >backing to control and corner the utility market leave no room for small-time >programmers like myself. Why else would I be offering something that is the >best for FREE? Guessing your motivations would be fruitless. Central Point Software, however, has no monopoly on the Apple II utility market. (They don't even seem to do much maintenance for their existing Copy II+ product.) There are several other Apple II disk utilities, or varying quality. What CPS does have an advantage in is their marketing ability. Note that "shareware" has been remarkably unsuccessful economically.
stephens@latcs1.lat.oz.au (Philip J Stephens) (06/22/91)
>For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus: a) >the program sounds too good to be true, and b) the author refuses to >supply source. I think you might be jumping the gun here. Because: a) Copy ][+ is nowhere near the faster disk utility around. Heatseeker sounds more along the lines of Locksmith, which is damn fast. b) The note about not supplying source just sounded like exagerated pride to me. The truth is, even a 5 1/4 " floppy drive can read a disk sequentially in 8 seconds flat, so with a bit of inginuity (sp?) I'm sure someone could have written something like Heatseaker. (Although I probably should look at the figures given again to see how close they are to the practical limits of the drive). <\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/><\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\> < Philip J. Stephens >< "Many views yield the truth." > < Hons. student, Computer Science >< "Therefore, be not alone." > < La Trobe University, Melbourne >< - Prime Song of the viggies, from > < AUSTRALIA >< THE ENGIMA SCORE by Sheri S Tepper > </\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\></\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/>
curtis@.uucp (Jeffrey Curtis ) (06/23/91)
Now that I've had a chance to calm down a bit, I'd like to make a brief, general statement regarding the product I'm offering. First, the software is quite virus-proof. As I have mentioned, and many other people have backed me up on (thank you B^) ), I would be committing a "Network suicide" of sorts if I tried such a stunt. It would be very obvious who the culprit was. And for that matter, in the documentation I'll be including, I'm going to recommend starting small when people receive the software - trying the commands on an isolated machine, with, if it would make them feel any more safe, their hard drives disconnected. That way, even if someone on the receiving end decides to redistribute the software with a virus attached, the users should be safe. Besides, it's been quite a while since I've seen an Apple // virus - perhaps I'm not looking hard enough. Second, the reference to how my original article sounded and the claims I made sounding like the "perfect excuse for a virus" (or whatever your exact wording was; I didn't want to include it all here), is understandable. As I wrote that, in the back of my mind, I was thinking, "Sheesh, I sound like a used car salesman." Unfortunately, that seems to be the only way to catch people's attention, though. I offered the software on "another" international Apple network about six months ago and received ZERO responses. So I was just trying a different approach, and it has proved highly successful. Third, why do you say that I couldn't claim trade secret status for the software? As far as my experience with the U.S. Copyright Laws has proven, indiscriminant distribution of object code shouldn't remove such status from the software. I have protected the source at every stage of development, though, and refuse to even tell my closest friends the "secrets" of the program. I believe I am eligible. Fourth, and this is to everyone who has sent me a request, I appreciate your patience and am pleased to say that alpha testing is 99% complete. One final run through and I should be done, and the instant that I am, copies will start being emailed out. Fifth, I say that I have "guts" because the technology is dangerous in many aspects from a programmer's perspective. But, of course, I can't go into detail here; I'd be removing my trade secret status. ;-) Jeffrey S. Curtis curtis@achilles.ctd.anl.gov
taob@micor.ocunix.on.ca (Brian Tao) (06/23/91)
curtis@.uucp (Jeffrey Curtis ) writes: > car salesman." Unfortunately, that seems to be the only way to catch people' > attention, though. I offered the software on "another" international Apple > network about six months ago and received ZERO responses. So I was just tryi > a different approach, and it has proved highly successful. If you're talking about the Apple conference on Fidonet, maybe you should try again. I would tone down your "used car salesman" approach a bit though... the moderator (Dennis) is really jumpy these days because of some illegal activity on the net. Don't think he'd appreciate anything that even hints of "virus". :-/ > Fifth, I say that I have "guts" because the technology is dangerous in > many aspects from a programmer's perspective. But, of course, I can't go int > detail here; I'd be removing my trade secret status. ;-) If you are doing low-level block read/writes (Copy II Plus does that when locking and unlocking large batches of files), I hope you will be around when/if the directory structure of ProDOS changes. Wouldn't be very nice if Heatseeker accidentally trashed my ProDOS 8 v3.0 disks a couple years down the road...
stug@pro-palmtree.cts.com (Stu Graves) (06/24/91)
In-Reply-To: message from curtis@achilles.ctd.anl.gov CS-ID: #650.apple/comp.sys.apple2@pro-palmtree, 3327 chars Date: 22 Jun 91 02:38:10 GMT From: curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) Subject: Re: Heatseeker In article <910621184230.584787@DOCKMASTER.NCSC.MIL> TMPLee@DOCKMASTER.NCSC.MIL writes: >For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus: a) >the program sounds too good to be true, and b) the author refuses to >supply source. I do hope that anyone foolish enough to grab a copy of >it never thereafter downloads any other software to the net -- the fact >that everything seems OK for you doesn't mean there hasn't been >something subtly planted that will show up a few generations later. Dear TMPLee- I am utterly shocked at your audacity. I have spent almost two years of my life painstakingly putting this software together for the good of the Apple // community. If I had stocked a virus in Heatseeker, it would be easy to identify the source - myself - and to track me down. Anyone who reads articles here knows my full name, where I work, and my telephone number. If they have the right software, they can even find out my home address and pay me a visit. I refuse to supply source code because any programmer who does so on such a good piece of software is nothing but an idiot. Supplying source code in a program distribution violates every Trade Secret law in existence in each of the states of the Union. If I supplied source, and someone from, say, Central Point saw it - and passed it on to the Copy //+ programming team - and I sued for obvious damages - my arguments would be pointless. Source given out to anyone - even if you show it to your secretary - removes EVERY protection you have under Copyright Laws. I am no such fool. So the program sounds too good to be true. So what? You refuse to believe that I'm daring enough to use technology that no one else in the Apple // community has the guts to use? The Apple environment DESERVES the best that they can get from their machines, and the current disk utility selection for the Apple // offers NOTHING by way of performance. The monopoly of companies such as Central Point who have enormous financial backing to control and corner the utility market leave no room for small-time programmers like myself. Why else would I be offering something that is the best for FREE? If you care to continue this discussion, I would be happy to in email or over the phone. I can be reached at (708)972-8585, or, if that line is busy, call me at (708)972-4082. If you want to continue this discussion here, where you can hide, that is fine as well. However, in the future, I sincerely hope you think before you act and keep such thoughtless opinions to yourself unless they have any basis in fact. Jeffrey S. Curtis Programmer and Defender of the Apple // Faith <---------------------- end of copied text ---------------> I for one believe what you say - although I haven't seen the program. I think that it's great that people are always trying to come up with innovative ideas for Apples. I do some amatuer programming of my own and can appreciate you wanting to sure you work with other Apple users. It also seems to be fairly obvious that you wouldn't be stupid enough to include a virus when we are on a system that doesn't allow handles normally and most people display their home numbers etc. I for one would be interested to see innovative new ideas. -- stug@pro-palmtree.cts.com -- The Palmtree BBS (213) 450-9394 300-9600 v.32/42bis, MNP 1-5 -- Santa Monica, California
andy@pro-palmtree.cts.com (Andy Stein) (06/24/91)
In-Reply-To: message from TMPLee@DOCKMASTER.NCSC.MIL Maybe he just wants to get it beta-tested? Whenever someone comes out with a new, innovative product, he is always shunned. This is true with Pennasillin, the airplane, and NutraSweet. He might have a legitimate program. He might not. But, let's give him the benefit of the doubt. These programs can always be tested for known viruses or destructive calls (although the latter would be much harder to detect, since a utility program tends to make destructive calls, such as formatting, deleting, copying, etc.). Why doesn't one person download this program from the author, and see what happens with it. He could isolate the program by only using it with floppy disk drives, and not with hard drives, and I'm sure after a few weeks it would be known if there were anything unKosher with it.
andy@pro-palmtree.cts.com (Andy Stein) (06/24/91)
In-Reply-To: message from curtis@achilles.ctd.anl.gov Have you considered doing an Apple IIGS version of your program, or another utility program for the GS? The Apple IIGS is severly lacking a fast utility program for copying disks, with parameters, sector editing, hard disk installing of copy-protected programs, or at least a fast one. I know it's easy to say "Do you want to do an Apple IIGS version of this wondeful, fast program?", but I'm sure all we Apple IIGS people would appreciate it. Maybe you could even get it marketed by Central Point Software, or some other Apple II software company. I know you're not even even done with this one, yet (and it might be a while with some people's paranoia on this network), but I'd love to hear your response on this.
curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) (06/24/91)
In article <Bsg141w162w@micor.ocunix.on.ca> taob@micor.ocunix.on.ca (Brian Tao) writes: > If you're talking about the Apple conference on Fidonet, maybe you >should try again. I would tone down your "used car salesman" approach a bit >though... the moderator (Dennis) is really jumpy these days because of some >illegal activity on the net. Don't think he'd appreciate anything that even >hints of "virus". :-/ That's the one. Maybe I will repost it.. I'll consider it. > If you are doing low-level block read/writes (Copy II Plus does that >when locking and unlocking large batches of files), I hope you will be >around when/if the directory structure of ProDOS changes. Wouldn't be very >nice if Heatseeker accidentally trashed my ProDOS 8 v3.0 disks a couple >years down the road... Well, I don't think Apple is that stupid. If they changed the directory structure, there would be mass chaos with people crashing disks, erasing data, trying to convert old files, etc. etc. However, they're at least smart enough to provide version information in the global pages, so programmers can check the operating system and refuse access to the program if the version is too new... *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+* + Jeffrey S. Curtis (708)972-8585 B41801 AT ANLVM curtis@achilles.ctd.anl.gov + * Computing and Telecommunications, Argonne National Laboratory * + "The opinions expressed above are mine only. Who else would want them?!" + *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
Andy Tefft <ART100@psuvm.psu.edu> (06/25/91)
My initial worry regarding this program is not viruses (mostly because I no hard drive, keep pristine archive copies of almost everything I use, and have a hard time believing that anyone would distribute a virus in such a blatant manner) but rather how safely it performs its functions. We've all heard of the bugs that copy II+ has seen, and it has to be the most-used prodos 8 file utility program, and indeed prodos disks once in a while just get screwed up for no apparent reason (there is always *some* reason...). Now we have a program that apparently uses non-standard methods of accessing files (i.e. not the normal prodos mli calls, otherwise it would be as slow as any other program) which has not yet been thoroughly tested. This simple fact has made me a bit nervous, so I will not be using it for a while (in fact, probably not in its current form) for anything I consider "important," although I do plan to test it heavily. In fact, this is the ONE utility program i have been waiting for, ever since having to copy hundreds of 3-block files into subdirectories on 5.25" disks (which takes longer and longer and longer as the directory grows). By the way, it's rather irrelevant, but I was disappointed at the way the original post came across, i.e. blatant advertising. Probably a more humble approach would have caused less worry. Well, I guess bad press is still press...
stephens@latcs1.lat.oz.au (Philip J Stephens) (06/25/91)
Andy Tefft writes: >Now we have a program that apparently uses non-standard >methods of accessing files (i.e. not the normal prodos mli calls, otherwise >it would be as slow as any other program) which has not yet been thoroughly >tested. The program will be safe *provided* that it gets it's information about the directory and file structures by following the proper pointers and such from the volume directory on a ProDOS disk, as the MLI calls do. It's speed will probably come from optimizing the actual reading and writing of a file once the info has been gathered in the normal (safe) fashion. e.g. once it gets the list of blocks that the file occupies, it could reorder these in sequential order based on the fastest interleave and **WHAM**, read it all in as fast as the drive can take it, converting the "6-bit" disk bytes into normal bytes on the fly. Writing the blocks to the target disk would just be the reversed process (yes, I know something about disk drives too, after having disassembled the RWTS and Locksmith fast disk copy :-) I personally must congratulate the author of Heatseeker on taking the time to write such a utility as this; I'm sure that if he already understands what the fastest way of reading and writing to a disk is, he has probably spent the time to understand how a ProDOS disk is structured in order to make it compatible with current (and future) versions of the OS. Or the least he would do is ensure that it only works up to version X. <\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/><\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\> < Philip J. Stephens >< "Many views yield the truth." > < Hons. student, Computer Science >< "Therefore, be not alone." > < La Trobe University, Melbourne >< - Prime Song of the viggies, from > < AUSTRALIA >< THE ENGIMA SCORE by Sheri S Tepper > </\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\></\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/>
curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) (06/26/91)
In article <91175.213841ART100@psuvm.psu.edu> ART100@psuvm.psu.edu (Andy Tefft) writes: >My initial worry regarding this program is not viruses (mostly because I >no hard drive, keep pristine archive copies of almost everything I use, and >have a hard time believing that anyone would distribute a virus in such >a blatant manner) but rather how safely it performs its functions. >We've all heard of the bugs that copy II+ has seen, and it has to be >the most-used prodos 8 file utility program, and indeed prodos disks >once in a while just get screwed up for no apparent reason (there is always > [ Stuff deleted ] That's a perfectly understandable fear, and I admire the bravery of those who were willing to give it a shot. There are now, to date, about 80 people around the globe testing out the software, and I've only heard of two bugs - one was a minor one which I knew of but forgot to mention in the bug list (incorrect hard drive free space reporting) and the other was one which I found, which was that some files in subdirectories would show up as "cannot be undeleted" even though they could be - and a fix for this was provided within about 20 minutes of when I discovered the bug. >By the way, it's rather irrelevant, but I was disappointed at the way >the original post came across, i.e. blatant advertising. Probably >a more humble approach would have caused less worry. Well, I guess >bad press is still press... True. I agree with you, the post was about as cheesy as they get. But as I mentioned, I tried a very professional, straightforward offer on FidoNet several months ago and didn't receive a single response. I had to try something new. I hope that you'll be interested in trying future versions.. and anyone else that still wants a copy, they're free for the taking.. just leave me email so I can get you on my emailing list.. *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+* + Jeffrey S. Curtis (708)972-8585 B41801 AT ANLVM curtis@achilles.ctd.anl.gov + * Computing and Telecommunications, Argonne National Laboratory * + Want a free copy of Heatseeker, the Apple's fastest disk utility? Mail me! + *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
curtis@achilles.ctd.anl.gov (Jeffrey Curtis ) (06/26/91)
In article <1991Jun25.070239.9546@clark.edu> andy@pro-palmtree.cts.com (Andy Stein) writes: >In-Reply-To: message from curtis@achilles.ctd.anl.gov > > Have you considered doing an Apple IIGS version of your program, or >another utility program for the GS? The Apple IIGS is severly lacking a >fast utility program for copying disks, with parameters, sector editing, >hard disk installing of copy-protected programs, or at least a fast one. I >know it's easy to say "Do you want to do an Apple IIGS version of this >wondeful, fast program?", but I'm sure all we Apple IIGS people would >appreciate it. Maybe you could even get it marketed by Central Point >Software, or some other Apple II software company. I know you're not even >even done with this one, yet (and it might be a while with some people's >paranoia on this network), but I'd love to hear your response on this. To be quite honest, I doubt I would ever even attempt a GS version, except for including minor GS idiosyncracies into the software's compatability list (like resource forks). I've been using a //e for about 8 years now, and so I've gotten to know the hardware inside and out - to try and accomplish something of the magnitude of Heatseeker for the //gs would require, for me, years more of research. As for professional publishing, I may or may not try that approach with the 8-bit version. I've heard that Central Point is very particular about not accepting outside work... *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+* + Jeffrey S. Curtis (708)972-8585 B41801 AT ANLVM curtis@achilles.ctd.anl.gov + * Computing and Telecommunications, Argonne National Laboratory * + Want a free copy of Heatseeker, the Apple's fastest disk utility? Mail me! + *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
scott@hsvaic.boeing.com (Scott Hinckley) (06/26/91)
In <910621184230.584787@DOCKMASTER.NCSC.MIL> TMPLee@DOCKMASTER.NCSC.MIL writes: >For one, I wouldn't touch this offer with a ten foot pole -- it sounds >like the perfect scenario for introducing and propagating a virus: a) >the program sounds too good to be true, and b) the author refuses to >supply source. I do hope that anyone foolish enough to grab a copy of >it never thereafter downloads any other software to the net -- the fact >that everything seems OK for you doesn't mean there hasn't been >something subtly planted that will show up a few generations later. Ahhh.... but, I have only a 2 floppy drive apple with 128k. Any infections would be limited to the copied floppy. So, I asked for the program. Now, I will let you all know (when I find a way to move it to my apple) if it actually A) runs B) appears to do as it says C) SEEMS to trash anything -Scott -- <<<<<<<<<<<Scott Hinckley<<<<<<<<<<<<>>>>>>>>>>VW&Apple][Forever!!!>>>>>>>>>> Internet:scott@hsvaic.boeing.com | UUCP:...!uw-beaver!bcsaic!hsvaic!scott DISCLAIMER: All contained herein are my opinions, they do not|+1 205 461 2073 represent the opinions or feelings of Boeing or its management| BTN:461-2073
gwyn@smoke.brl.mil (Doug Gwyn) (06/27/91)
In article <340@hsvaic.boeing.com> scott@hsvaic.boeing.com writes: >Ahhh.... but, I have only a 2 floppy drive apple with 128k. Any >infections would be limited to the copied floppy. No, many "viruses" hide in main RAM and pounce on any disks inserted. The only reliable way to clear them is to off the power for a while.