home *** CD-ROM | disk | FTP | other *** search
- From: Kenneth R. van Wyk (The Moderator) <krvw@CERT.SEI.CMU.EDU>
- Errors-To: krvw@CERT.SEI.CMU.EDU
- To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- Path: cert.sei.cmu.edu!krvw
- Subject: VIRUS-L Digest V4 #117
- Reply-To: VIRUS-L@IBM1.CC.LEHIGH.EDU
- --------
- VIRUS-L Digest Monday, 8 Jul 1991 Volume 4 : Issue 117
-
- Today's Topics:
-
- Recurring 4096 Infection (PC)
- VSHLD80B.ZIP - Resident virus infection prevention program (PC)
- VIRX16.ZIP - VIRX v1.6: Easy to use free virus checker (PC)
- VirusX (PC)
- Demo Disk from Mainstay (Mac)
- DOS 5.0 & FPROT116 (PC)
- Virus Scanner (PC)
- Re: McAfee on VSUM accuracy and Microcom (PC)
- sideshow on doom2:reply (PC)
- TNT AntiVirus from CARMEL / WARNING !!! (PC)
- Re: Recalciterant infection with Frodo
- IBM Anti-Virus Product 2.1.2 (PC)
- Introduction to introductory columns (general)
-
- VIRUS-L is a moderated, digested mail forum for discussing computer
- virus issues; comp.virus is a non-digested Usenet counterpart.
- Discussions are not limited to any one hardware/software platform -
- diversity is welcomed. Contributions should be relevant, concise,
- polite, etc. Please sign submissions with your real name. Send
- contributions to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's equivalent to
- VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
- anti-virus, documentation, and back-issue archives is distributed
- periodically on the list. Administrative mail (comments, suggestions,
- and so forth) should be sent to me at: krvw@CERT.SEI.CMU.EDU.
-
- Ken van Wyk
-
- ----------------------------------------------------------------------
-
- Date: 03 Jul 91 09:14:00 -0500
- From: "William Walker C60223 x4570" <walker@aedc-vax.af.mil>
- Subject: Recurring 4096 Infection (PC)
-
- From: Aviel Roy-Shapira <AVIR@BGUVM.BITNET>
- > Help please! I have a recalciterant infection by Frodo or 4096. I am
- > not sure about the source of the infection, but somehow it got into my
- > system. Clean (V. 77) cleaned the disk alright, but the infection
- > keeps poping up. It has become even wierder. Both Clean, Virus Scan,
- > and F-Fchk (115) report that all the files on my hard disk are free
- > from the virus. But, if I boot from the hard disk, and I run
- > F-SYSCHK, it says the virus is lurking in memory. I don't get this
- > warning if I boot from a floppy.
-
- > My config.sys file contains Device=DMDrvr.bin, Device=f-driver.sys,
- > files=40 and buffers=20. I don't run any programs or TSR from my
- > autoexec, which simply states the path and sets a couple of
- > environment variable. DMDrvr.bin appears to be clean, as its length
- > is 8000 bytes or so and it didnot change.
-
- > I thought that Frodo was only a COM and EXE file infector, yet it
- > somehow entered my system and refuses to leave. Any ideas?
-
- 4096 also infects COMMAND.COM and (I think) .SYS and .BIN files, but
- SCAN should still find it there. I have a few ideas to try. Since I
- don't know your level of expertise, forgive me if I say something you
- already know or have already tried.
-
- 4096 is a "stealth" virus because it covers its tracks if it is active
- in memory. For this reason, you must first boot from a known clean
- floppy (usually your original DOS diskette) before running SCAN or
- whatever. A potential problem that I see in your case is DMDRVR.BIN,
- which (if I'm not mistaken) is Disk Manager, implying that you have a
- large hard disk partitioned into several logical drives. Booting from
- a pure DOS floppy will not allow access to partitions other than C:.
- One thing you can do is create a bootable floppy (after booting from a
- known clean floppy, of course), copy DMDRVR.BIN from your original
- Disk Manager diskette (SCAN it first), make a CONFIG.SYS file on the
- floppy which contains only DEVICE=DMDRVR.BIN, and add a write-protect
- tab. Booting from this diskette should give you access to all
- partitions on your hard disk as well as provide a clean environment in
- which to run SCAN.
-
- Since you apparently do not know what is still infected, try the
- following. After booting from a known clean floppy, do
- SYS C:
- COPY COMMAND.COM C:
- to put a clean system back on your hard disk. Before rebooting,
- rename CONFIG.SYS and AUTOEXEC.BAT to something else (I know you said
- that you have no programs in AUTOEXEC, but I'm making this more
- generic). Reboot, then SCAN the system. If the virus is NOT in
- memory, restore CONFIG.SYS, but take out the DEVICE=F-DRIVER.SYS line.
- Copy the DMDRVR.BIN file from your original Disk Manager diskette to
- drive C:. Reboot and SCAN. If the virus is still NOT in memory,
- restore the line DEVICE=F-DRIVER.SYS, and copy F-DRIVER.SYS from a
- known clean source if you have one. Reboot and SCAN. Restore
- AUTOEXEC.BAT. Reboot and SCAN. Now start running programs and SCAN
- after each program. I know this seems like a pain-in-the-butt, time-
- consuming procedure, but if the anti-virus programs aren't finding the
- remaining infected files, it's about the only way.
-
- I hope this helps in some way and hasn't duplicated your efforts.
-
- Bill Walker ( WALKER@AEDC-VAX.AF.MIL ) |
- OAO Corporation | "I think, therefore I am.
- Arnold Engineering Development Center | Nah, I think not."
- M.S. 120 | *POOF*
- Arnold Air Force Base, TN 37389-9998 |
-
- ------------------------------
-
- Date: Wed, 03 Jul 91 13:13:00 -0600
- From: mcafee@netcom.COM (McAfee Associates)
- Subject: VSHLD80B.ZIP - Resident virus infection prevention program (PC)
-
- I have uploaded to SIMTEL20:
-
- pd1:<msdos.trojan-pro>
- VSHLD80B.ZIP Resident virus infection prevention program
-
- Version 80-B of VSHIELD has been released. This version
- replaces Version 80, which mis-identified some files encrypted
- with ICE as being infected with the Crypt-1 virus.
- The validation results for VSHIELD Version 80-B should be:
-
- FILE NAME: VSHIELD.EXE VSHIELD1.EXE
- SIZE: 33,723 11,281
- DATE: 07-01-1991 02-14-1991
- FILE AUTHENTICATION
- Check Method 1: 9B2B 6B40
- Check Method 2: 097C 103E
-
- Regards
-
- Aryeh Goretsky
- McAfee Associates Technical Support
- - - -
- McAfee Associates | Voice (408) 988-3832 | mcafee@netcom.com
- 4423 Cheeney Street | FAX (408) 970-9727 | (Aryeh Goretsky)
- Santa Clara, California | BBS (408) 988-4004 |
- 95054-0253 USA | v.32 (408) 988-5190 | mrs@netcom.com
- ViruScan/CleanUp/VShield | HST (408) 988-5138 | (Morgan Schweers)
-
- ------------------------------
-
- Date: Wed, 03 Jul 91 13:25:00 -0600
- From: c-rossgr@MICROSOFT.COM (Ross Greenberg)
- Subject: VIRX16.ZIP - VIRX v1.6: Easy to use free virus checker (PC)
-
- I have uploaded to SIMTEL20:
-
- pd1:<msdos.trojan-pro>
- VIRX16.ZIP VIRX v1.6: Easy to use free virus checker
-
- VIRx is a freely distributable scanning program -- there is *no*
- charge associated with it, although copyrights *are* maintained by
- both Microcom and me.
-
- In addition to SIMTEL20, it is available on CIS and on my BBS at
- 212-889-6438.
-
- ===
- What's New In VIRx Version 1.6
-
- 1. VIRx Version 1.6 now detects six newly discovered viruses,
- bringing the total count to just over 500.
-
- 2. VIRx now indicates whether an infected compressed program
- was infected before or after the compression (PKLITE and LZEXE).
- This was trivial to implement, but a useful addition.
-
- 3. Another few cycles were shaved off our decompression routines:
- experience pays. For those wondering, all decompression routines
- are completely internal and done in memory --- and always have been.
-
- Ross
- - - -
- Ross M. Greenberg <c-rossgr@microsoft.com>
- Author, Virex-PC, VIRx and FLU_SHOT+
-
- ------------------------------
-
- Date: 03 Jul 91 17:03:58 +0000
- From: Tom Carter <tcarter@53iss4.waterloo.NCR.COM>
- Subject: VirusX (PC)
-
- I have asked this question before but have received nil replies.
- PLEASE, can someone out there tell me what the latest version of
- VirusX really is??
- Thanx.....
-
- ------------------------------
-
- Date: Wed, 03 Jul 91 20:58:05 +0000
- From: robs@ux1.cso.uiuc.edu (Rob Schaeffer)
- Subject: Demo Disk from Mainstay (Mac)
-
- The demo disk from Mainstay has nVIR attached to the archive. It
- seems to not be able to spread, but it is there.
-
- Disinfectant nicely removes the virus.
-
- I would be curious to know why the virus doesn't spread.
-
- Rob
-
- - --
- robs@ux1.cso.uiuc.edu
-
- "Putting magnets on the T.V. distorts the picture and
- makes it more real."
-
- ------------------------------
-
- Date: Wed, 03 Jul 91 16:44:46 -0700
- From: Steve Clancy <SLCLANCY@UCI.BITNET>
- Subject: DOS 5.0 & FPROT116 (PC)
-
- A user recently posted this on our BBS. Has anyone else experienced this?
-
- "I was wondering if any one has experienced a problem with FPROT116.
- Since I installed it with msdos ver 5.00 it hangs my system with the
- message Virus Alert!! Int 13 has been changed. I have tested and no
- virus is found. If I disable f-driver in my config.sys file everything
- is ok. All other programs associated with this program works fine. Any
- thoughts or suggestions?"
-
- I am not familiar enough with FPROT116 or DOS 5.0 to make an
- intelligent comment. Any help will be appreciated.
-
- - -- Steve Clancy
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- % Steve Clancy, Biomedical Library % WELLSPRING RBBS %
- % University of California, Irvine % 714-856-7996 300-2400 24hrs %
- % P.O. Box 19556 % 714-856-5087 300-9600 24hrs %
- % Irvine, CA 92713 U.S.A. % SLCLANCY@UCI.BITNET %
- % % SLCLANCY@UCI.EDU %
- %.....................................................................%
- % "As long as I'm alive, I figure I'm making a profit." %
- % -- John Leas, 1973 %
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- ------------------------------
-
- Date: Thu, 04 Jul 91 09:23:14 +0700
- From: Vincent Chan <ENGP1042@NUSVM.BITNET>
- Subject: Virus Scanner (PC)
-
- Hi,
- I have read with interest some of the reviews and entries here in
- this Virus List and I must say that this is by far the most
- informative and well discussed topic on computer virus. I have also
- followed some of the discussions on various virus scanner on the
- market today, be it commercially available or shareware, these
- discussions have helped me to choose the right product that will cater
- to my need.
- Two of the virus scanners that I found most helpful for the
- detection and removal of virus are Fprot from frisk and McAfee Scan.
- Both of these product have helped me to detect and remove some of the
- prevalent virus over here. The most common virus is Joshi virus, that
- has caused me much headache and heartache at times. Both of these
- product have managed to detect and remove the virus.
- Recently I was introduced to Ross Greenberg VIRX. This program
- looks interesting and it is able to scan the harddisk for virus at
- considerable speed. But I have not really explored the potential of
- this program. But recently I tried to scan a diskette which has been
- infected with Joshi virus and it couldnt detect it! Fprot and McAfee
- Scan have no problem with it. The VIRX version is 1.5. I dunno
- whether the author realised this or not. Anyway I read from the
- latest issue of Virus-l that Ross has come out with the latest version
- of VIRX 1.6 and hopefully will be able to fix the problem that I
- mentioned above, if not in this version then future version of Virx.
-
- ------------------------------
-
- Date: Sat, 29 Jun 91 00:43:49 +0000
- From: mcafee@netcom.com (McAfee Associates)
- Subject: Re: McAfee on VSUM accuracy and Microcom (PC)
-
- c-rossgr@microsoft.COM writes:
- [stuff deleted]
- >
- >This is good news. I was under the impression that Microcom attempted
- >to license a copy from you and was told that they may not use it
- >without a license and that a license would not be issued to Microcom
- >under any circumstances.
- >
- >I am glad that the information given to me is false and that Microcom
- >is expressly being given permission to utilize this product from the
- >vendor. I would presume there is a charge for such usage: what would
- >that charge be for *only* one computer to use your product? I'll be
- >sure to report that amount to the Microcom people I deal with.
- >
- >Ross
-
- Hello Ross,
-
- I've given Mr. McAfee a copy of your message, but he hasn't typed up a
- reply yet. In the meantime, perhaps you could leave me your mailing
- address and/or fax number so that I could give that to John for a
- (faster) reply.
-
- Thanks,
-
- Aryeh Goretsky
- McAfee Associates Technical Support
- - - --
- McAfee Associates | Voice (408) 988-3832 | mcafee@netcom.com
- 4423 Cheeney Street | FAX (408) 970-9727 | (Aryeh Goretsky)
- Santa Clara, California | BBS (408) 988-4004 |
- 95054-0253 USA | v.32 (408) 988-5190 | mrs@netcom.com
- ViruScan/CleanUp/VShield | HST (408) 988-5138 | (Morgan Schweers)
-
- ------------------------------
-
- Date: Thu, 04 Jul 91 02:27:30
- From: c-rossgr@microsoft.COM
- Subject: sideshow on doom2:reply (PC)
-
- >From: "zmudzinski, thomas" <zmudzinskit@imo-uvax5.dca.mil>
- >
- >Actually, what Mr. Greenburg wrote was:
- ^
- Actually, what Mr. Greenberg wrote was:
- ^
- minor nit... :-)
-
- >> The bad guys can certainly break
- >> whatever coding scheme I use, thereby using the string list just as if
- >> it were not encoded at all.
-
- > Mr. Greenburg's statement describes his assessment of his
- >abilities to develop/implement a cryptographic system. If he says
- >that he cannot do something he believes to be difficult, so be it --
- >he knows where his strengths lie.
-
- Whoa! I'm sure that simply sticking in DES encryption is probably
- within even my meager abilities -- provided that the instruction
- manual doesn't use words that are too big... But does even using DES
- (provided I can find the on/off switch on my computer by myself)
- really buy us anything?
-
- It's just the idea that it's not that tough to break such a scheme:
- recall that I spend a good deal of my life actively disasming
- encrypted viruses. Anything that is gonna be disasmed at run time is
- trivial to disasm by anyone with their mind set on it. Remember that,
- regardless of the scheme used to make such a marvelous cryptographic
- system, the key *must* be included in the body of the program in order
- for it to work convieniently.
-
- To have different keys that are external to a program that are
- different from machine to machine would be a tech support nightmare.
- Have you ever tried to figure out what shipping >50K copies of code
- *really* means? I merely have to code this stuff: Microcom has to do
- tech support. I have the easy part of the job: disasming new viruses
- and creating fast search algorithms is nothing compared to dealing
- with Martha from BrokenHipBone, Arkansas who wants to know why she has
- to stick the ignition keys to her tractor into the floppy drive door
- when the machine asks her to "insert her key, then press any key."
-
- She will, of course, end up asking wherere the "any" key is.
-
- > And on the other hand, does anyone _really_ believe that the "bad
- >guys" _don't_ run the latest crop of anti-viral software to check that
- >their "products" won't be caught immediately?
-
- Hey, I'm sure that most of the anti-virus people probably have bad
- guys as beta testers without even knowing it!
-
- Ross
-
- ------------------------------
-
- Date: 04 Jul 91 09:02:14 +0700
- From: infocenter@urz.unibas.ch
- Subject: TNT AntiVirus from CARMEL / WARNING !!! (PC)
-
- This is a warning to everybody, who intends buying
-
- the product Turbo Anti-Virus
- from CARMEL
- distributed by EPG Softwareservice, Germany
-
- In January 91 I bought this product (Version 7.02). The program
- itself has a nice user-interface and was at the time I bought it quite
- up-to-date. By buying the product they promise you a quarterly
- update.
-
- HAAAAAAAAAAAAAAAAAAAAAAAAAA ... well, they promise ?!?!?
-
- I got version 7.02. It's now half a year later and I've never seen an
- update. I know from other people who bought the stuff later, that
- they got meanwhile up to 7.06. During a phone call with EPG they told
- me about V7.1.
-
- Totally I sent them a FAX for customer support (something they also
- promised); you expect right ... I never got an answer ... and I
- called them up three times.
-
- I think you will agree with me that nothing needs to be more
- up-to-date than Virus-protection packages.
-
- So with my experiences I can only recommend:
-
- DO NOT BUY TNT ANTI-VIRUS
-
- at least not from EPG Softwareservice, Germany.
-
- You can find enough other good software, where you get updates so you
- can catch up with the virus-spreaders.
-
- bye ............................................................. Didi
-
- ------------------------------
-
- Date: Thu, 04 Jul 91 08:10:46 +0000
- From: mcafee@netcom.com (McAfee Associates)
- Subject: Re: Recalciterant infection with Frodo <4096> (PC)
-
- AVIR@BGUVM.BITNET (Aviel Roy-Shapira) writes:
- >Help please! I have a recalciterant infection by Frodo or 4096. I am
- >not sure about the source of the infection, but somehow it got into my
- >system. Clean (V. 77) cleaned the disk alright, but the infection
- >keeps poping up. It has become even wierder. Both Clean, Virus Scan,
- >and F-Fchk (115) report that all the files on my hard disk are free
- >from the virus. But, if I boot from the hard disk, and I run
- >F-SYSCHK, it says the virus is lurking in memory. I don't get this
- >warning if I boot from a floppy.
- [rest of message deleted...]
-
- Hello Mr. Roy-Shapira,
-
- One POSSIBLE reason the virus might be occuring is because there is a
- segment of viral code stuck at the end of one of the files loaded when
- your hard disk boots. When a file is saved on disk, space is
- allocated for it in clusters. If a file does not fill up the last
- cluster allocated for it, DOS will fill the left-over space with
- garbage from memory to pad out the file so it fills up the cluster to
- the end. If the virus were in memory it could have been written into
- the "empty" space at the end of a cluster to pad the remaining space
- in the cluster. If this occurred, whenever the file was loaded into
- memory, the virus signature would appear because it was read in as
- well.
-
- The virus itself would not be infectious. First off, it's most likely
- that only a relatively small segment of code was stored at the end of
- the cluster, and secondly, such viral code exists beyond the End Of
- File marker; it's not recognized as being part of the program and will
- not be executed. So what you're left with is an annoying false alarm.
-
- The best way to deal with this is to overwrite the space at the end of
- cluster chains on the disk. A practical way to do this is to
- defragment the fixed disk with a disk optimizing program. This will
- usually overwrite any possible "virus garbage."
-
- Another solution may be a program called COVERUP1.ZIP in the SIMTEL20
- archives. It says that it erases the "tails" of clusters, and
- overwrite the offending section of viral code. I have not had a
- chance to try this myself, so use at your own risk.
-
- Regards,
-
- Aryeh Goretsky
- McAfee Associates Technical Support
-
- - --
- McAfee Associates | Voice (408) 988-3832 | mcafee@netcom.com
- 4423 Cheeney Street | FAX (408) 970-9727 | (Aryeh Goretsky)
- Santa Clara, California | BBS (408) 988-4004 |
- 95054-0253 USA | v.32 (408) 988-5190 | mrs@netcom.com
- ViruScan/CleanUp/VShield | HST (408) 988-5138 | (Morgan Schweers)
-
- ------------------------------
-
- Date: 03 Jul 91 15:22:19 -0400
- From: "David.M.Chess" <CHESS@YKTVMV.BITNET>
- Subject: IBM Anti-Virus Product 2.1.2 (PC)
-
- A new level of the IBM Anti-Virus Product now exists. It should be
- available now or shortly from IBM Marketing Reps, Branch Offices, the
- Electronic Software Delivery section of IBMLINK, and on Promenade (the
- PS/1 support BBSy-thing). I'll attach the contents of the WHATIS.NEW
- file. As I said a bit ago, I'm not an Official Anything, so don't
- send me your money! *8) As before, the U.S. terms are $35 for an
- original license, $10 for an upgrade (for terms outside the U.S.,
- contact your country IBM).
-
- DC
-
- The IBM Anti-Virus Product, Version 2.1.2
- Copyright (C) IBM Corporation 1989, 1990, 1991
-
- The following are the highlights of the changes and enhancements made
- to The IBM Anti-Virus Product since the release of Version 2.00.01:
-
- - Added signatures for approximately 42 viruses (refer to VIRSCAN.DOC,
- section 5.1, for more details)
-
- - VIRSCAN now looks for the local message file "local.msg", in the same
- directory as "virscan.exe", and if it is found, virscan displays it
- upon exit (in addition to the standard messages) when one or more
- virus signatures are found. A maximum of 10 message lines are displayed.
- This facility allows sites to tell users about local procedures that
- should be followed when viruses are encountered.
-
- - Added support for arbitrary-length "don't-cares". "%N" sequences (in
- place of a pair of bytes in a signature) mean that 0 to N arbitrary
- bytes can be in the corresponding position. 'N' is a single hex digit
- from '0' to 'F'.
-
- - Spaces are now allowed between pairs of hex digits in VIRSCAN signatures.
- This can simplify the use of signatures from other sources.
-
- - VIRSCAN now respects the "boot" keyword that can be used in the third
- line of virscan signatures. If a "boot" virus is found in a file, the
- user won't by default be warned unless the third signature line also
- contains the strings "EXE" or "COM" (or both). If the -G command line
- option is specified, then the user will be warned of boot virus
- signatures wherever they are found.
-
- - VIRSCAN now won't complain if it can't read the boot sector of a network
- drive, unless the '-v' option is used or the boot sector scan was
- explicitly specified with the '-b' option.
-
- - Added the "*" option:
- "*" scans all local fixed drives.
- "*n" scans all network drives.
- "*f" scans all local fixed drives.
- "*fn" scans all local and network drives.
- For instance, try
- virscan *
- to scan all local fixed disks.
-
- - Improved the speed of the memory scan.
-
- - Documented the -NB option.
-
- ------------------------------
-
- Date: Mon, 01 Jul 91 20:58:28 -0700
- From: p1@arkham.wimsey.bc.ca (Rob Slade)
- Subject: Introduction to introductory columns (general)
-
- INTRO1.CVP 910701
- Introduction to Computer Viral Programs Column
-
- This file/posting/column, and the ones which will follow, are a weekly
- column devoted to explaining computer viral type programs. The
- material can be roughly divided into the following topic areas:
- Introduction (this file), History, Functions, Protection and
- Implications. The file names will reflect this division, beginning
- with DEF, HIS, FUN, PRT or IMP, continuing with a further three letter
- subcategory, as appropriate, a sequence number, and all ending with
- CVP.
-
- The format is intended to be as easy as possible for all mail systems
- and terminals to handle. Each "column" will be approximately one
- typewritten page in length.
-
- The material is intended to be "non system specific", and to be
- applicable to all type of computer and operating systems. Examples
- will be given from many different computers and operating systems at
- different times. Readers will note, however, that much of the
- material relates to the MS-DOS "world": IBM compatible microcomputers.
- This is deliberately chosen. The "PC" platform demonstrates the
- concepts that are common to all computer systems in the clearest
- manner.
-
- I retain copyright of this material. Anyone is free to post any of
- this material on any publicly accessible electronic bulletin board or
- electronic mail system which does not charge for connect time or data
- transfer, provided that the files/postings are posted intact,
- including my copyright notice, the filename and date at the beginning
- and end and my contact addresses. Anyone wishing to post this
- material on a commercial system, or to print it in a book or
- periodical, please contact me, and I'm sure we can work something out.
-
- I am sure that the material will be archived at various servers, but
- the one place that I can garantee the complete set will be available
- is on the SUZY information system. This is a commercial system, but
- is accessible through a local call to a Datapac or Tymnet node for
- most people in Canada and the United States. If your local computer
- store does not carry the access kit for SUZY, contact Stratford
- Software at (604) 439-1311.
-
- Vancouver Usenet: p1@arkham.wimsey.bc.ca
- Institute for Internet: Robert_Slade@mtsg.sfu.ca
- Research into SUZY: INtegrity or 1123
- User Snailnet: Canada V7K 2G6
- Security Fidonet: 1:153/915
-
- copyright Robert M. Slade, 1991 INTRO1.CVP 910701
-
- ------------------------------
-
- End of VIRUS-L Digest [Volume 4 Issue 117]
- ******************************************
-