Computer Virus- Facts & Fantasies Once again we can thank the media for doing their twofold job- spreading facts about something, as well as perpetrating hype and allowing fantasy to creep in with the facts. The current hot topic- computer viruses. I will now take a few moments to explain how computer viruses "get around" and what they can do, and what you can do to protect your computer against viruses. I will also explain how "infected" machines can be recovered. First of all, despite the word "virus", computer viruses are not like viruses which infect living beings...computer viruses cannot float through the air, and any computer claiming to have picked something up off of a toilet seat is LYING. The general idea behind a computer virus is that it is a computer program that can "replicate" itself- that is, get itself copied into or onto other software. Many computer viruses (usually the earliest ones from years back) did only that- they replicated themselves...not doing any harm to any of the computers they were on. But then some bored losers got into the act...you know the type- probably some promising individuals who have great computer ability, but little or no social abilities, and therefore will either spend life locked away in front of a computer screen, or will shuffle from fast food joint to fast food joint trying to make a living to support their computer bills. Anyways, somewhere someone created a computer program which would copy itself onto disks that were inserted into the computer that the virus was first on. From then on, the virus would copy itself between whatever disk it was on, to whatever disk became available. Unfortunately, these viruses would do more than just spread themselves around...they would spread corruption, mayhem, misery, ruin, or some fools idea of a joke, damaging other data already on the disk the virus spread to. Viruses suddenly seem to have become a fad (no thanks to the media hype). Viruses have popped up that do much more than just corrupt data or erase disks. They put messages on the screen, play tunes, scramble screens, or just lie around waiting for some event to trigger them in the future. You may wonder- how do viruses work "by themselves"...doesn't someone have to run the program to get it to do something? Ah hah...here's the main trick behind most viruses. You most likely know that when you first turn on your computer, you have to wait a bit before you get a prompt (i.e.: C:\> ) or a menu. When you turn on (or boot) the computer, a bit of software gets run automatically by the system. It is at this point that viruses can attach themselves, so the virus starts running automatically when you turn on your machine. There are basically two types of viruses- "stand-alone" viruses that infect sections of your disks (including sections of the hard disks), and "Trojan" viruses, which hide within other software. A form of Trojan known as a "bomb" is a program that seems innocent, but is actually hiding a damaging virus or damaging program code. Many Trojans appear to be working software, and some actually do work as normal programs, only causing mayhem after a certain trigger, like a date or combination of key strokes. Hopefully now you have an idea of what computer viruses are all about. You should realize that viruses are "transmitted" via infected disks, and infected software (or "Trojans"). Therefore, you should realize that your computer has a chance of getting infected ONLY if you use an infected disk on the machine, or you run an infected program on the machine. The most misunderstood aspect of virus transmission is infected programs, which are often gotten via phone modem. You MUST understand that a modem is a device which must be installed or attached to your computer, and then a human operator must use some modem software to get programs over the phone lines with the modem. If you don't have a modem, you cannot get viruses over the phone lines! If you do have a modem, you still cannot get infected software through the phone lines unless YOU or some other HUMAN sitting at YOUR machine USES the modem AND modem software to receive (or "download") software into that computer. IT IS IMPOSSIBLE FOR YOUR COMPUTER TO RECEIVE VIRUSES THROUGH A MODEM ATTACHED TO YOUR COMPUTER UNLESS A HUMAN PHYSICALLY OPERATES THE MODEM!!! A HUMAN WOULD HAVE TO CALL ANOTHER COMPUTER FROM YOUR COMPUTER AND THEN SELECT TO RECEIVE FILES WHICH ARE INFECTED IN ORDER FOR A VIRUS TO BE RECEIVED ON YOUR MACHINE VIA THE PHONE LINES. I have had several people call me and tell me that they own a modem, and were afraid that they may have gotten viruses. I found out that one of these people still had the modem in the CARDBOARD PACKAGING! The only thing that can come into your computer through the modem and phone line without human intervention is LIGHTNING! (Before you techno-geeks start screaming, yes, someone could leave their computer running with a modem "host mode" active...this would allow their computer to function like a mini-bulletin board system, where outside users could call in and get or leave files. But again, someone has to PUT the computer into host mode with the modem software...so there...) Now you should realize that the most effective ways to prevent viruses from getting onto your machine are to be real careful about what disks you copy onto your machine, and what files you get from bulletin boards. The only way to be certain your machine will never be infected is to not use disks, and not use a modem. Of course, this isn't very practical. So how can you find out if a disk or program is infected? If your machine is already infected, often (as in the case of "Trojan" and "bomb" viruses), you won't see any symptoms, as the virus is waiting to be triggered by something (again, it can be a date, like the famous Michaelangelo birthday, or a set of key strokes). In the case of viruses like Stoned, you may turn on your computer one day and see some sort of nasty message. Or, your computer just won't work. You may experience problems like vanishing files, file errors, or problems with the floppy drives. To find out if you have a virus, and what type, you need a virus scanning program. There are lots of virus scanners on the market now, like Norton Anti-Virus, Central Point Anti-Virus, and Flu-Shot. But my personal favorite is a shareware program called McAffees's Scan and Clean (actually two seperate programs). McAffees is available for download from the McAffee bulletin board- you can be certain that you are getting the latest version and that it is virus free if you get it off their board (yes- there are some virus infected virus scanner programs circulating now). The deal with the shareware is that you receive it, use it, and send the creator (in this case McAffee Associates) a requested registration fee (using shareware without paying for it often constitutes copyright violation, and isn't fair either). McAffee's Scan program can currently detect over 400 viruses- with their variations ("strains"). For instance, there are at least three different viruses called "Stoned". If Scan does find a virus on your system, the McAffee Clean program can usually remove the virus, and sometimes repair damage. I don't know of any virus software that can repair all the damage caused by all viruses. Once again a case for how important CURRENT backups of your data are. What do you do if you suspect a virus? First rule- stay calm (that can be your first rule for life- stay calm in all situations). Don't turn the machine off unless you suspect that a virus is in the process of trashing your files or hard drive. If you can get hold of a virus scanner on a floppy disk that you know is not infected, run the virus scanner and see what it says. Be aware that older (meaning in some cases only a few months) virus scanning software can't discover all the current viruses and strains, especially some of the so called "self-mutating and self-encrypting engines". If your'e virus scanning software is over six months old, get an update. If you can't get a current version of virus scanning software, and can't access McAffees BBS via modem, CALL SOMEONE! Call your favorite computer guru for help. ALWAYS THINK- HOW MUCH IS MY DATA WORTH TO ME? Is your company invoice file worth losing? Should you pay someone $150 to recover it, or do you wan't to try and be a hero and save the company $150 by attempting to recover data using tools and software your're not familiar with (thereby losing the company invoices worth $150,000)??? So now that you've run a virus scanner on your machine and it has found no viruses (or cleaned off any that were there), how do you prevent reinfection? Review the section of this document that talks about how viruses are spread. As always, prevention is the best cure. Limit floppy disk use on your machine (don't let everyone bring disks from anywhere), unless you mandate scanning of all floppies before use. You should even scan commercial software, including disks that come with hardware like mice and graphics boards. If you ever buy some software and it isn't shrink wrapped, or the disk envelope is open- SCAN IT OR RETURN IT for a properly sealed pack. Just like biological viruses and humans- you don't have to seal yourself in a bubble to be safe. Just use your head and be aware of the true facts. Play it safe and you shouldn't catch anything. Joe Newman Computer Rescue POB 162822 Altamonte Springs, FL 32716-2822 1/4/92