home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
SDN¹ Plus
/
SDN1_.cdr
/
sdn
/
util1
/
i_m113.sdn
/
I-M.DOC
< prev
next >
Wrap
Text File
|
1992-04-13
|
190KB
|
3,789 lines
I N T E G R I T Y M A S T E R (tm)
Version 1.13a
An easy to use, data integrity and anti-virus program which also
provides PC security, change control and disk error detection.
Users Guide plus Data Integrity and Virus Guide
________________________________________________
Copyright 1990 - 1992 by Wolfgang Stiller
All rights reserved
___________________
Written by Wolfgang Stiller
Stiller Research
2625 Ridgeway St.
Tallahassee, Florida 32310
U.S.A.
Electronic mail to:
CompuServe: 72571,3352
InterNet, Bitnet, etc.: 72571.3352@compuserve.com
Uunet: uunet!compuserve.com!72571.3352
Integrity Master (tm) - 2 - Version 1.13a
Second Edition (November 1991)
Updated February 1992
(C) Copyright Wolfgang Stiller 1990 - 1992. All Rights reserved.
The following paragraph does not apply where such provisions are
inconsistent with law:
Stiller Research provides this document "AS IS" without warranty
of any kind, either express or implied, including, but not limited to
the warranties of merchantability or fitness for a particular pur-
pose.
This document may include technical inaccuracies or typographical
errors. We continually update and correct this document with the
latest available information.
Note to U.S. Government users: Use, duplication, or disclosure by
the U.S. Government of the computer software and documentation
in this package shall be subject to the restricted rights applicable to
commercial computer software as set forth in subdivision (b)(3)(ii)
of Rights in Technical Data and Computer Software clause at
252.227-7013 (DFARS 52.227-7013). The manufacturer is Stiller
Research, 2625 Ridgeway St., Tallahassee, Florida 32310-5169.
Integrity Master (tm) - 3 - Version 1.13a
Use of Integrity Master (also known as IM) requires acceptance of
the following license terms and warranty disclaimer.
L I C E N S E T E R M S
TO USE INTEGRITY MASTER, YOU MUST AGREE TO AND
UNDERSTAND THE FOLLOWING LICENSE TERMS AND WARRANTY
DISCLAIMER, OTHERWISE DO NOT USE THIS PROGRAM.
Each PC must have its own licensed copy. THIS COPY MAY
ONLY BE USED ON ONE PC. It may be removed from that PC
and installed on another PC but IT MAY NOT BE INSTALLED
ON MORE THAN ONE PC AT A TIME. To use Integrity
Master on more than one PC, you must license extra copies.
W A R R A N T Y D I S C L A I M E R:
INTEGRITY MASTER AND ALL ASSOCIATED PROGRAMS ARE
LICENSED "AS-IS". STILLER RESEARCH AND WOLFGANG STILLER
MAKE NO WARRANTIES, EITHER EXPRESSED OR IMPLIED, WITH
RESPECT TO THESE PROGRAMS, THEIR QUALITY, PERFORMANCE,
MERCHANTABILITY, OR FITNESS FOR ANY PARTICULAR
PURPOSE. IN PARTICULAR, INTEGRITY MASTER IS NOT
GUARANTEED TO PREVENT OR DETECT DAMAGE TO YOUR DATA
OR PROGRAMS. IN NO EVENT SHALL STILLER RESEARCH OR
WOLFGANG STILLER BE LIABLE FOR ANY CLAIMS FOR LOST
PROFITS OR ANY DAMAGE, INCLUDING BUT NOT LIMITED TO
SPECIAL, INCIDENTAL, CONSEQUENTIAL OR OTHER DAMAGE.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION
OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE
LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
IF YOU USE INTEGRITY MASTER (IM), YOU ASSUME EXCLUSIVE
RESPONSIBILITY AND LIABILITY FOR ANY LOSS OR DAMAGE
DIRECTLY OR INDIRECTLY ARISING OUT OF THE USE OF THE
PROGRAM.
IN NO CASE SHALL STILLER RESEARCH'S OR WOLFGANG
STILLER'S LIABILITY EXCEED THE LICENSE FEES PAID FOR THE
RIGHT TO USE THE LICENSED SOFTWARE.
THE LICENSE AGREEMENT AND WARRANTY DISCLAIMER SHALL
BE CONSTRUED, INTERPRETED AND GOVERNED BY THE LAWS OF
THE STATE OF FLORIDA.
Integrity Master (tm) - 4 - Version 1.13a
T A B L E O F C O N T E N T S
-----------------------------------
PART ONE - Integrity Master(tm) User Guide
License and Warranty Terms ..................... 3
CHAPTER ONE - Why Integrity Master?
Welcome! .................................... 7
Don't read this ............................. 7
Why the user guide .......................... 7
What can Integrity Master do? ............... 8
How does it do these things? ................ 8
What Makes Integrity Master Special?......... 9
Requirements and Limitations ............... 10
CHAPTER TWO - Installing Integrity Master
Special Quick Install....................... 11
Full Installation........................... 11
Vital files ................................ 12
Screen Colors .............................. 13
Using Integrity Master Menus................ 14
CHAPTER THREE - Running Integrity Master
Integrity Master Screen Contents ........... 15
Initializing Integrity data................. 15
What is Integrity Data? .................... 16
The Check Menu ............................. 16
The Report File ............................ 18
System Sectors ............................. 19
Reloading ............................... 19
The Commands Menu .......................... 20
Ending (Quitting) .......................... 20
Statistics Summary.......................... 20
Fighting viruses with Integrity Master ..... 21
Viruses - What Are They? ................ 21
Virus Check Procedure ................... 21
Scanning for Viruses .................... 22
Detecting Viruses ....................... 22
Detecting Unknown (new) viruses ......... 23
The Integrity Master virus report ....... 24
False Alarms ............................ 25
Destroying Viruses ...................... 26
Data Corruption ......................... 26
Integrity Master and Disk Problems ........ 27
Integrity Master for PC Security ........... 28
Integrity Master for Change Control ........ 29
Command Line (BATCH) Execution ............. 30
Syntax .................................. 30
Error Levels ........................... 31
Using IMCHECK .............................. 32
Integrity Master (tm) - 5 - Version 1.13a
CHAPTER FOUR - Customizing
The Parameter (Options) File ............... 33
Options Menu ............................... 34
Options in SETUPIM ......................... 37
Location of Integrity Data.................. 38
Updating your hardware configuration ....... 38
The Advanced Option Menu.................... 39
CHAPTER FIVE - Errors
Error Recovery .............................. 42
Solving problems ............................ 42
Answers to Common Questions ................. 42
PART TWO - Data Integrity and Viruses
CHAPTER ONE - Threats to your data
Introduction - Viruses get all the glory .... 45
Hardware problems............................ 45
Finger checks ... ........................... 46
Malicious or Careless Damage................. 46
Software Problems ........................... 46
Software attacks ............................ 47
Logic Bombs ............................. 47
Trojans ................................. 47
Worms ................................... 48
Viruses ................................. 48
General Virus Behavior................ 48
System Sector Viruses................. 50
Boot Sectors ...................... 50
Partition Sectors ................. 50
File viruses ......................... 51
Miracle Infections ................ 52
How many viruses are there?.................. 52
How serious are viruses?..................... 53
CHAPTER TWO - Protection for your PC
Hardware Protection ......................... 55
"Fixing" your disk .......................... 55
Goof Protection ............................ 56
Intrusion Protection......................... 56
Virus Defenses ............................. 57
Scanners ................................. 58
Disinfectors ............................. 58
Interceptors ............................. 58
Inoculators .............................. 58
ROM and Encryption ....................... 59
Integrity Checkers ....................... 59
Gadgets .................................. 60
Prevention................................ 60
Integrity Master (tm) - 6 - Version 1.13a
CHAPTER THREE - Virus Myths
Mythical Sources ............................ 62
Quick and Easy Cures ........................ 62
Silly Tricks ................................ 63
Certified Software? ......................... 63
Retail Software Only? ....................... 64
Write Protecting Your Hard Disk ............. 64
Safe Computing (Safe Hex?)................... 65
Software is useless against viruses.......... 65
CHAPTER FOUR - Virus Realities
The ONLY Real Source of Viruses ............. 66
Shareware is as Safe or Safer ............... 66
Few Virus Free Programs ..................... 66
Write Protecting Floppies ................... 66
Beware the CE and the Demo! ................. 67
Viruses are going to get worse .............. 67
CHAPTER FIVE - What to do - Some Suggestions
Action is Vital - Now! ...................... 68
Backup Policy ............................... 68
Integrity Checking Policy ................... 69
Run CHKDSK .................................. 69
Determining Causes of Corruption ............ 70
Education ................................... 71
Signs of software problems ............... 71
Signs of viruses ......................... 71
Responsibility .............................. 72
Policy and routine .......................... 72
Networks and Viruses ........................ 72
CHAPTER SIX - Handling a virus attack
Don't panic and don't believe the virus ..... 73
Report the attack ........................... 73
Play Detective............................... 73
Clean House (steps to remove the virus)...... 74
Guard the house ............................. 74
INDEX .......................................... 75
Integrity Master (tm) - 7 - Version 1.13a
PART ONE - INTEGRITY MASTER(tm) USERS GUIDE
-------------------------------------------
___________________________________________________________________________
C h a p t e r 1 - I n t r o d u c t i o n
Welcome!
--------
Welcome to the family of Integrity Master(tm) users! Integrity
Master (also known as IM) is the fastest, most powerful data
integrity and anti-virus software available for any price. We hope
that you'll find Integrity Master an indispensable part of your PC
toolkit. From now on, you'll be back in control of all the data on
your PC.
Don't read this!
----------------
Most people should never need to read the Integrity Master Users
Guide. If you're reading this to learn how to use Integrity Master,
you're here for the wrong reason. Just copy your files onto your
hard disk and execute SetupIM. The tutorial should tell you all you
need to know to get started. For additional help when using
Integrity Master (IM), just hit F1 and select the index. The odds
are what you need to know is there.
While we think most people won't need to read Part One -
Integrity Master Users Guide (this part), we think everyone
needs to read Part 2 - Data Integrity and Viruses. This will help
you understand the different threats to your PC, and what you can
do about them. You'll be able to understand more clearly how
viruses work, how dangerous they are, and how Integrity Master
and other products can protect you.
Why read the Users Guide?
-------------------------
We've written this users guide for three reasons:
1) To provide more information on how to get the most benefit out
of Integrity Master. You'll learn how to use it to detect totally
new viruses, how to tell if damage to a file is likely due to a
hardware problem or maybe a virus or a trojan, how to use it to
protect your PC from unauthorized tampering, etc.
2) To explain certain aspects of Integrity Master in more detail and
in different terms than available from IM's internal help
screens.
Integrity Master (tm) - 8 - Version 1.13a
3) To satisfy people who prefer to read things on paper. If you
prefer to read things on paper, then you're here for the right
reason, although we'll bet the tutorial in SetupIM will surprise
you. (Give it a try!)
What can Integrity Master do?
-----------------------------
1) Detect and remove viruses. IM will even detect viruses which
are not known to exist at this point. For known viruses, IM will
recognize them by name and describe what they do.
2) Detect possible file corruption due to hardware or software
problems. This type of file damage is apparently at least 100
times more likely than virus infection, yet it usually goes
undetected.
3) Supplement or replace any PC security programs you have. IM
will inform you if anyone changes something on your PC's disk
while you were gone.
4) You just compressed your disk or you restored your files from a
backup. Are all the files really OK? IM will tell you.
5) You wanted to delete all your .BAK files, but you entered:
"DEL *.BAT" by mistake. Oops! IM will tell you exactly
which files you need to restore.
6) You need a change management system to keep track of growth
on your hard disk. Where is all that disk space going? IM will
tell you.
7) You're having problems with your disk drive. Your diagnostic
programs say all is OK... now. But were some files damaged
last night? IM tells you!
8) Your hard disk is having problems. DOS will not even
recognize it as a disk. IM can reload your partition and boot
sectors to "fix" your disk!
How does Integrity Master do all these things?
----------------------------------------------
1) It reads files as well as parts of the operating system on your
disk known as system sectors. The first time you use IM, you
will run an "initialize", which will read your disk and calculate
cryptographic signatures for each file and system sector. While
it's doing this, IM is also checking for signs of known viruses.
Integrity Master (tm) - 9 - Version 1.13a
2) This signature data along with other information such as the file
size is encrypted and recorded in the "integrity data" file. One
such file is created for each directory on your disk.
3) On subsequent checks, the files and system sectors are read
again and the computed integrity data is compared with the prior
values. This allows IM to determine if anything has changed,
even if the time and date stamps indicate no change.
4) IM detects changes that a virus may make to associate itself
(companion and cluster viruses) with a an existing program.
A virus can only infect your PC by associating itself with your
programs or system sectors. Each of these actions results in
changes to data on your disk. IM will detect these changes if a
virus tries to infect your system.
What makes Integrity Master Special?
------------------------------------
1) Integrity Master is not just an anti-virus product but a complete
data integrity system. Viruses are but one threat to the integrity
of your PC. With Integrity Master you have a complete
solution.
2) Unlike other integrity check programs, Integrity Master contains
extensive information regarding known viruses. If a portion of
a known virus is recognized, that virus will be identified and
specific instructions will given to remove it and check for
possible damage. If other file changes are detected which are
characteristic of a virus, you will be alerted to that fact and
given appropriate instructions.