Beruflich Dokumente
Kultur Dokumente
> have noticed that some of the students disks are being over
> written by the program disk they were using. Eg some people have
> found the Turbo pascal files on their data disks.
I was having a similar problem on my 386 when I got it and as I was running
DesqView, etc assumed that was causing the probs (it was, in a way) ... I since
discovered that it was simply that buffers was too low. Unfortunately you do
not have a Hard Drive to see if that would be affected but your 'symptoms' are
of a low buffers. so, simply change the config.sys and adjust the buffers value
up about 15 this SHOULD fix it. If however, it doesn't, try getting hold of
SCANv66b and try that
<ping>
Regs,
Simon
--- FD 1.99c
* Origin: Jane doesn't live here anymore! (3:712/265)
PL>
PL>
PL>
PL>
I can answer that. Jerusalem-B will infect an EXE file every time it runs. It
only infects a COM file once but infect an EXE multiple times. Clean has to be
run as many times as the file is infected to completely clean it out.
--- XRS! 3.42+
* Origin: Former QuickBBS Beta Team Member *:- (RAX 99:9402/122.1)
Remember many of the Viruses are version B & C. Many of the modifications were
not by the ORIGINAL programmers, but were people who improved on their code.
These people most likey could'nt have ever started and finnished the coding
from line 1.
What I am saying is it is easy to modify code but Being the ORIGINAL writter is
something else....
Don't kid yourself these people are doing what they enjoy.. Destroying peoples
data or making a poltical statement. They could make $$$ programing and I sure
many do. This is most likey a relief valve for them...or a way of screwing the
world a littel...
These people not super heros.
To say they are great programmers is like saying LEE HARVEY OSWALD was a great
shot.
Yasha
back, i learned you could get a copy of most any software at the Computer
stores. They had diskette copying devices. For 1 Riyal you were in business.
This is another way viruses were spread. Everybody would come in and share
diskettes.
--- TAGMAIL v2.20
* Origin: DATAMANIAC'S HIDEOUT BBS 409-842-0218/BEAUMONT,TX (1:19/49)
the next
the month).
Perhaps,
the
Are you using ScanV66 or ScanV66B? V66 itself has an bug in it with the
validation codes and was replaced with V66B shortly after release. Also, does
the boot sector (sector 0 on the floppy) have any unusual messages in it, or
does it lack the normal messages which appear at the end of the sector?
CB> In some cases the files on the data disk are just renamed to one on the
CB> program disk. Eg we listed "TURBO.EXE" and found it to contain a
CB> students pascal source code.
CB>
Again, this could be user error described above....
CB> Could someone shed some light please..
CB> I have told the teacher it is most likely home grown and he is sh*tting
CB> himself.
CB>
Those are my guesses, if you want to send one of the affected diskettes, I'd be
happy to take a look at it and see if it contains an unknown virus or one that
Scan can't detect. My mailing address is:
Patricia Hoffman
1556 Halford Avenue #127
Santa Clara, CA 95051
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
--- QM v1.00
* Origin: The Clipperist - Home to happy Clippheads in Ottawa, Canada
(1:163/118.0)
;-)
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
JOC
narrow frame of mind that you seem so intent on inflicting upon others,
then we all should take heed. For the reason that =you= have never been
confronted with any viral types is certainly no reason to make light of
the situation (you're in the wrong conference for that). You'd be quite
surprised just how many that I've run across just within my clients and
our audit sites alone....simply mind boggling what the average user can
pick up along the way. You obviously seem to be in =no= position to be
suggesting =any= Anti Viral detection/removal utilities that you have not
=personally= tried yourself, and I think that we all would benefit from
any such conjecture from anyone who has not personally been inflicted
by the scourge. I do not know what locale that you are dealing with,
but here in the nations' capitol, we seem to be constantly a target for
malcontents. Cheers, Ron.....No harm intended, just fact....
Salutations from Capitol Hill
-Paul
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
SD>
SD>
SD>
SD>
SD>
SD>
was then Reformated, but still would not Boot up correctly. It wasn't
untill the Autoexec and Config files were deleted that it would.
Oops ... I stand Corrected on Bad Sectors, I meant to run a utility to
check for bad file linkages.
Did you by any chance low-level format the drive, or just do a regular format?
Also, when you disinfected, are you sure you used the same version of DOS to
boot from before disinfecting?
SD> Thanks for your info though, I just wish whoever keeps creating
SD> Variants would turn their obvious Talents to somthing more useful.
SD>
You aren't the only one....
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
such as programs that use internal overlays, or files that have the length set
in the .EXE header incorrectly to begin with....so running a disinfector can
result in the infected file not working correctly after disinfection. The only
saving grace is that the program probably didn't run correctly before
disinfection either since in the case of files with internal overlays, the
virus would have overlayed part of the program. Also, disinfectors typically
can only disinfect the more common viruses since they account for 90%+ of all
infections, or new viruses which are thought will be a future problem due to
their characteristics. If you are unlucky enough to get a rare virus, then you
would have to replace all the programs.
The only advice I would add is if someone is infected with any of the viruses
which infect the partition table, they should backup critical data files they
can't afford to loose before attempting to disinfect the system. There are
some combinations of DOS/BIOS/Hardware which, when disinfected, can result in
the hard drive becoming inaccessible (happens in about 10% of the Stoned/Stoned
II cases).
Patti
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
>The additional week in there is to make sure the Whale virus makes it into
>the new version of the listing, as well as insuring that almost (if not)
>all of the new viruses and variants I've received are included. The
>October 2 or 3 release will be VSUM9009.Zip, there will still be an October
>release which is scheduled for late October though they will be just two or
>three weeks apart. The October release will also include another new
>"section" to the list that several people have indicated they thought would
>be useful.... <grin>....more about that right before the release date.
If this list is available via file request I would be most interested in
picking a copy up from you when it is made available. I am always trying to
keep my users up to date with the latest scan utils and virus listings. Any
help would be very much so appreciated.
Scott Howell
--- SLMAIL v1.36M (#0264)
* Origin: Foundation BBS * College Park, MD * (109:109/521)
--- QM v1.00
* Origin: The Clipperist - Home to happy Clippheads in Ottawa, Canada
(1:163/118.0)
NO!! Your system won't get infected unless you RUN of those
infected .COM or .EXE files. A virus can only do its thing
if it is executed. Reading it isn't enough.
--- [MicrStar] via TComm XRS 3.1
* Origin: Loose as a goose, boys! Here we go! <patooie!> (TComm 1:343/17.1)
INT 21h
INT 20h
NOT_FOUND_MESSAGE:
DB 'Stealth Virus not found in memory$'
FOUND:
MOV AH,9h
LEA DX,FOUND_MESSAGE
INT 21h
INT 20h
FOUND_MESSAGE:
DB $Stealth Virus active in memory$'
This program should also detect the Fish-6 and Mother Fish
(Whale) viruses, since they use the same method to redirect
interrupts.
The next message will describe how to remove the 4096...<MM>
--- Opus-CBCS 1.13
* Origin: The Slowboat BBS (404-578-1691) Atlanta, GA (1:133/311.0)
To: ALL
Subj: VSUM OCTOBER 1990 RELEASE
The October 1990 Version of the Virus Information Summary List is now
available for download and file request as VSUM9010.ZIP. It is also being sent
out thru VIRUSINF and submitted to SDS. The following new viruses have
been added with this release:
1605
Black Monday
Blood & Blood2
Burger
Casper
Christmas In Japan
Invader
Kamikazi
Nomenklatura
Number One
Scott's Valley
Stoned II
SVir (SVir A & SVir B)
Westwood
Whale
V2P2
V2P6
V2P6Z
Violator
Wisconsin
There were also several variants to previously listed viruses which were
added. Five anti-viral products were updated in the listing:
CleanUp for version V67
Dr. Solomon's Anti-Viral Toolkit to version 3.5
F-Prot for version 1.12
VirexPC for version 1.1B
ViruScan for version V67
New descriptions for Virus-90 and Virus101 which were submitted by Patrick
Toulme did not make it into this version, they will be in the early
November 1990 release of the listing. My apologies to Patrick.
Patti
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
V67
V67
V67
V67
SCANV67.ZIP
CLEANP67.ZIP
NETSCN67.ZIP
VSHLD67.ZIP
The VCopy program was not released as a V67, so the current version remains
V66B, and is downloadable as VCOPY66B.ZIP.
New viruses now detectable by Scan are: Casper, 1605, Violator, Blood2,
Wisconsin, Christmas In Japan, Burger, Leprosy-B, Whale, Invader, Scott's
Valley, Black Monday, and Nomenklatura/Nomenclature. Also added with this
release is an extinct switch: Scan will no longer automatically check for
viruses which either are research viruses or have not been reported in the
public domain for over 1 year. Please see the documentation for details.
CleanUp has added disinfectors for Whale, Invader, Slow, and EDV.
VShield now has a new feature to check the validate codes which Scan can
add to files. Again, please check the documentation.
Patti
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
Bootup through various ways though so your best bet if you THINK you have a
virus is to do a cold reboot from your ORIGINAL DOS disk and then use a virus
checker(Scan is one of the best) on your hard drive and ALL of your floppies.
Also make sure you put a w/p tab on your virus checking disk as soon as you get
it so it doesn't get infected. I find that making a bootable disk and putting
SCAN on it in the autoexec file and the put a w/p on it is pretty easy to do.
Try not to worry TOO MUCH about getting one but do take a reasonable
amount of checking.
--- XRS! 3.40
* Origin: Have a nice day, or I'll kill you! (RAX 1:275/3.4)
been run ragged stomping out Jerusalem B. He told me that a scanner called Scan
66 works real well against it. He also told me where I could get that scanner.
I haven't called this BBS yet, so I don't know for sure, but he said that
Lightning Systems at (702)588-0315 has it. WARNING!!!: That BBS is IN Lake
Tahoe where the virus is still around. Do NOT download anything from there
except Scan 66. Or, if you do at least scan it before running it!
Marshall Gatten
(Any mail to me should be to Ice Wolf)
--- TAGMAIL v2.41
* Origin: Rialto BBS - Rialto California - (714) 820-3444 (1:207/204)
SD>
SD>While with the proliferation of Shareware and BBS's, an
SD>infected program that look like it may be useful or at least
SD>moderatly entertaining, you could actually infect sizable
SD>portions of the community. With new infections poping up as
SD>people share them.
SD>
SD>I myself was infected about month and half ago with the
SD>Stoned virus from a BBS that had failed to check it's upload,
SD>and unfortunatly the individual who uploaded it was to
SD>interested in running the program versus checking it ...
SD>because it came from a reputable BBS. Very Catch-22.
SD>Ultimate responsibility falls on the user, because ultimatly
SD>it's our Butts that get fried.
SD>
SD>From my understanding the people who write these programs
SD>aren't Geniuses by any scope. Anyone can write a Virus
SD>program, all it takes is the know-how -- somthing easiliy
SD>gained in today's information Society.
SD>I feel sorry for them, they feel this is the only way to
SD>convey their angry and hurt feelings about society or
SD>themselves.
SD>
SD>They are nothing short of Terrorists.
SD>
SD>
The Satyr Daze
SD>--- TBBS v2.1/NM
SD> * Origin: Eclectic Multi-BBS System / Miami FL (305)662-1748
SD>(1:135/2)
Satyr,
I believe that you are mistaken. Virtually the only way to spread STONED is
through direct disk access (ie. Copying files, fformatin diskettes....). STONED
is a Boot sector infector and will omly spread in that fashion. It does not
attach itself to any executables but instead resides in the partition table. I
agree with your sentiment wholeheartedly, but I do not think that the BBS is to
blame. (Gosh, we BBSs get all the blame!).
-Paul
--* Origin: Sentry Net BBS C'Ville VA (1:109/229)
Look for NetMail, Eric. <grin> Glad to help you in any way I can.
Greetings from Capitol Hill
-Paul
--* Origin: Sentry Net BBS C'Ville VA (1:109/229)
// do some damage
// brag about it
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
Paul, I have been following this echo for a few days and am amazed at the
hatred spread toward viruses. They are programs, just like Lotus 123 or dBase
IV. There are good reasons for "friendly" viruses, such as automatic error
detection and correction for unattended systems. System crash cleaners, I guess
you could call them. I welcome replies, but no screaming. Just intelligent
conversation. :-)
Darin
--* Origin: GENESYS I BBS (817)-284-1520 (1:130/59)
there is one, sort of. it's called CHK4BOMB. it comes with the FLUSHOT
package. what it does is look for calls to direct disk writes and warns you
that the program you're examining uses them. mostly it just looks for calls
to INT 13 instructions. not perfect, but worth checking out.
...space is merely a device to keep everything from being
in the same spot...
--- ME2
* Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
->to belong in VIRUS since the messages being quoted from came from
->the VIRUS echo. Please verify your echomail setups if you just
->recently added either echo to your system, these two echos are not
->the same echo!
Patricia,
We pick both conferences up direct from the US and noticed the same
thing so my guess is that it is before it gets to 1;124/4115 on our
feed line.
->Thanks...
You're welcome!
BW
DA>programs, just like Lotus 123 or dBase IV. There are good
DA>reasons for "friendly" viruses, such as automatic error
DA>detection and correction for unattended systems. System crash
DA>cleaners, I guess you could call them. I welcome replies, but
DA>no screaming. Just intelligent conversation. :-)
DA>
DA>Darin
DA>--DA> * Origin: GENESYS I BBS (817)-284-1520 (1:130/59)
Hello, again, Darin....
I apologize if it seemed liked "screaming"...actually quite the opposite. You
are obviously looking at this situation from an esoteric standpoint. I see the
damage a virus can do (gone unchecked and allowed to run it's course) on a
regular basis. Some of my unsuspecting users go for months sometimes thinking
that their recurring problems (whatever they may be, in this instance) are
actually hardware problems. Technicians that must break routine and travel to
correct such viral surfacings are bogged down enough. We handle all the
hardware and software support for a very large government agency here in DC,
all their sites locally =and= around the world. It gets to be a =very= large
problem at times. I cannot at times allow myself to become esoteric. Perhaps
you see my point.
Greetings (again) from Washington, DC
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
DK> VB> a file open operation and reinfecting it again when it is closed.
DK>
DK>What about using the (good old) method of reading files as
DK>suggested in the "DOS Technical Reference"? Finding cluster
DK>number from the FAT, doing read dn then looking for the next
DK>cluster if any...
DK>
DK>Regards from Varna,
DK>Daniel
DK>
DK>--- msged 2.00
DK> * Origin: Danbo's Cave (2:359/1.1)
Your point reinforces all arguments for multi-layered protection schemes, no?
'-)
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
package a couple of
know what I mean. I
evaluation....I know
obtaining my copy as
'-)
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
KD> TP> the simple kinds of dos destruco instructions and create some generic
KD> TP> form of a scan file to prevent this kind of crud. Meanwhile I'll back
KD> TP> up often.
KD>
KD>there is one, sort of. it's called CHK4BOMB. it comes with
KD>the FLUSHOT
KD>package. what it does is look for calls to direct disk writes
KD>and warns you
KD>that the program you're examining uses them. mostly it just
KD>looks for calls
KD>to INT 13 instructions. not perfect, but worth checking out.
KD>
KD> ...space is merely a device to keep everything from being
KD>
in the same spot...
KD>
KD>
KD>--- ME2
KD> * Origin: Ion Induced Insomnia (Fidonet 1:203/42.753)
Well, it didn't wrap correctly, but what the hey....
There is a newer, enhanced offshoot of CHK4BMB called TRAPDISK. Based on the
aforementioned, it seems to work rather well...I have tested it in a couple of
instances in "triggered" type viruses without mishap (although I would =never=
rely on it =completely).
It is a decent program and worth a look.
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
PF> SD>Stoned virus from a BBS that had failed to check it's upload,
PF>
PF>
PF>
PF>
PF>
PF>
PF>
I believe that you are mistaken. Virtually the only way to spread
STONED is through direct disk access (ie. Copying files, fformatin
diskettes....). STONED is a Boot sector infector and will omly spread
in that fashion. It does not attach itself to any executables but
instead resides in the partition table. I agree with your sentiment
wholeheartedly, but I do not think that the BBS is to blame. (Gosh, we
BBSs get all the blame!).
There are several programs which send the ENTIRE CONTENTS including the boot
sector ....TELADISK.* is one for starters
Yasha Kida
sysop
Yasha
>
>
>
>
>
>
Of course, that's not to say that some inventive person didn't package Stoned
in an executable...
"Just because I'm paranoid doesn't mean they're not *really* out to get me!"
--- ZMailQ 1.12 (QuickBBS)
* Origin: The Allied Group BBS *HST* Buffett's Buddy (1:268/108.0)
suspicious...
Does anyone out there know of a virus that causes excessive read
errors on the floppy disks? This is the only machine in our shop
that does this, but it also is isolated from anything else. One of
our technicians copied some software from it to his own floppy to use on his
machine at home, and the same problem started to appear on the home machine!
There is no 'Kilroy' message or anything...just the
random failure on the disk. The floppies it's reading work fine on
the other machines in our shop, so this is beginning to make me
curious. The message we keep getting is the A)bort, R)etry, I)gnore msg.
Maestro, The Tocatta BBS
-ahc--- ConfMail V4.00
* Origin: The Tocatta BBS (1:343/61)
instaltion without removing the virii. Most of the time if it's a boot block,
I'll manually remove it with debug.
-=>- data loses due to hard drive crash(es),
Virus infection, or head crash. Towers with the legs folded in to make it fit
into smaller spaces just love to go BASH on the floor and the hard disk makes a
nice screech. It's hard, very much so, not to start giggling!
-=>- malicious damage by employees,
Take one example; Old employee at my high school was fired for misconduct, so
he found out what turning off the power to the file server did. Server had a
UPS, but he disabled it.
-=>- unauthorized access to data stored on PC's, or
-=>- other incidents involving serious data loss or security
-=>related issues,
Faulty tape backup unit, user disabled read after write , I quote 'Caus it
takes too long'. Then the 600 Meg drive decided to die, and what happened to
the poor old backups?! didn't go at all, and he was quickly terminated from
that company.
I could tell of many more tales, but I've said enough in this to get the
creative juices flowing for others to write about.
regards
Stuart Cornall.
--* Origin: Stoned.... Like wow man...
VIRUS ECHO)
of the VIRUS_INFO...
the focal point?
ability to tap UU-NET and others via
Not really a Unix/Xenix version of VIRUS_INFO, but you might want to see if you
can pickup Comp.Virus, which originates on UseNet or Internet.
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
the system caused the crosslinking of the files, but it is also possible it was
a virus. Most of the "stealth" type viruses can have this symptom,
particularly if CHKDSK is run with the /F parameter. The effect occurs because
the "stealth" type viruses adjust the directory on the fly, but not the file
allocation table. Which version of Scan did you use?
If you take a look at the Virus Information Summary List, towards the back
there is a revision history. To look at only the more recent viruses, look up
the viruses that were added with the last couple of releases.
SH> PS. I would like to take this list to the other folks at the AIS
SH> meeting here at NASA Headquarters and the meeting is on Oct. 17 so if
SH> anyone can get back to me before then I would appreciate it.
Keep in mind that the Virus Information Summary List must be site licensed with
the author (me) if it is used in one of several types of environments. NASA is
considered both "government" and "agency", and not "non-profit", as far as I'm
concerned. Please do not take it into NASA for purposes of distributing it if
they aren't going to check into licensing it. If it is distributed there, as
with any other government location or agency, it must be site licensed. (Sorry
if the words are a little harsh, but after a recent "problem", it had to be
stated.)
Patti
--- QM v1.00
* Origin: Excalibur/Virus_Info - Sunnyvale CA - 408-244-0813 (1:204/869.0)
If you have been doing even CLOSE to what you should you will have at least
your original DOS disks to boot from in a pinch. (you mean those are what you
boot from day to day?) <grin> Just put a write protect tab on it and boot. If
scan is infected it will tell you. I don't worry about the making sure I am
unifected since I ALWAYS back up to tape just before trying anything new on my
system. That way I can always reboot, low level format my drives and reinstall
DOS, Pc-Tools backup and then restore my system.
--- XRS! 3.44+
* Origin: Limping along on a 286/16. What a drag!! *:- (Super 99:9402/122.1)
Yup, I got one once that was a TSR made to look like a trojan. What it did
was you loaded it, told it how long to wait and then how many presses of the
enter key to watch for, and then would pop up a full screen display of
"Contratulations you have won a complete hard disk format" along with a
display showing as if it were really doing it. It also scanned the disk as it
did it to look more realistic. I pulled it on a friend and he really hit panic
city. Turned it off and was afraid to turn it back on. Strange he didn't
think it was funny for about 2 days. Then he couldn't stop laughing for a
week. <grin>
--- XRS! 3.44+
* Origin: Limping along on a 286/16. What a drag!! *:- (Super 99:9402/122.1)
As for possible fixes, I'd suggest that you try one of the "fixit"
programs in Norton Utilities 5.0, PC Tools Deluxe 6.0, or Mace
Utilities 1990. The "Emergency Room" utility in the latter gets
particularly high marks; I've found it to fix disks that the others
wouldn't even admit existed! If these won't help, you can contact one
Norton should be run with certain parameters (or can be changed in the config
in 5.0) to treat everything as "phyiscal" drives instead of logical drives to
recognize everything!
--- XRS! 3.44+
* Origin: Chapel Hill, NC - The Southern Part of Heaven (Quick 1:271/250.5)
Thanks, Ryan
--- Opus-CBCS 1.13
* Origin: Power Socket 404-883-6231 24hrs (1:3621/450.0)
I have had jokers try... My batch file which uses CHECKER dumps the bad
ARC-ZIPS-ZOOS-etc.. to safe area
The REAR AREA can be fun....
Yasha
--- msged 1.99S ZTC
* Origin: Bragg IDBS, 82nd Airborne Bug hunte
three versions provided erroneous results at varying times. SCAN version 67c is
now the current version.
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
--- QM v1.00
* Origin: The F e d e r a l Post -{*}- Fayetteville, NC (1:151/301.0)
YK>I have had jokers try... My batch file which uses CHECKER
YK>dumps the bad
YK>ARC-ZIPS-ZOOS-etc.. to safe area
That is why I do my SCANing "in person" instead of setting it up as an event
along with other nightly maintenance....I like to supervise. <grin>...CKOT is
good, but I dislike the idea of making =any= file available to my users without
first personally checking it out. (Overly cautious? Who? Me?)....
Later,
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
NetMail you the number. Anyone else desiring the number can make a request via
NetMail, as well.
I feel that this forum is a bit =too= public and it would not be entirely
proper to "advertise" here.
Look forward to hearing from you,
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
... Two wrongs do not make a right: it usually takes three or more.
--- via The Blue Wave v1.05
* Origin: Flight of the Raven -=* Home of the Blue Wave *=- (1:2200/107.0)
All sysops who recently added this echo (VIRUS_INFO) or the VIRUS
echo should check their systems to make sure that they have not
accidently cross-linked these two echos. Several of the messages
which have been received on my system in the last two days appear to
belong in VIRUS since the messages being quoted from came from the
VIRUS echo.
===============================================================
= you're gon'na get and awful lot of replies to this request.=
===============================================================
Scanv67. is the latest "I" know of...
Bill
--- Maximus-CBCS v1.02
* Origin: Bragg IDBS, (82nd Airborne Debugging the SandLand) (1:151/305)
I do agree with you, however, on the point that there are some very talented
programmers out there applying themselves improperly. (VB put in a good
word...). It's a cyclic, redundit, futile effort on their part...We will always
remain one step ahead.<grin>...It always helps to have the forces combine and
produce something productive at times.
Comments?
-Paul
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)
1701 is the IBM error message (equivalent) of either a Hard sisk failure or
Hard Disk Controller failure...Check out your hardware first.
--* Origin: Sentry Net BBS, Centreville, VA 703-815-3244 (1:109/229)