499 lines
26 KiB
Plaintext
499 lines
26 KiB
Plaintext
![]() |
|
|||
|
Anti-Viral Product Evaluation
|
|||
|
May 5, 1989
|
|||
|
|
|||
|
This evaluation paper has been written by Jim Goodwin, Lynn
|
|||
|
Marsh and Tim Sankary. It is copyrighted, 1989, and is intended
|
|||
|
for circulation among fellow members of the virus research
|
|||
|
community who use IBM PCs or compatibles. We do not consider it
|
|||
|
complete, since we did not evaluate every available product, and
|
|||
|
it is not intended as a public guide to selecting antiviral
|
|||
|
programs. We hope, however, that it will prove useful to other
|
|||
|
members of the community who work with live viruses and need
|
|||
|
ongoing protection for their systems. This document may be
|
|||
|
freely copied and distributed providing the disclaimer and
|
|||
|
copyright are kept intact, and no changes, additions or deletions
|
|||
|
are made to the text.
|
|||
|
We would like to acknowledge the ample research data
|
|||
|
provided by Jim Bates and Rusty Davis in England, Ivan Grebert of
|
|||
|
Acal Corporation in Paris, Colin Haynes of the International
|
|||
|
Computer Virus Institute, and the many volunteer researchers from
|
|||
|
the Silicon Valley area that contributed so much to our efforts.
|
|||
|
We would also like to acknowledge the HomeBase users group for
|
|||
|
providing their detailed log of infection occurrences and other
|
|||
|
epidemiological data.
|
|||
|
|
|||
|
|
|||
|
The Need for a Reasonable Evaluation:
|
|||
|
In the April issue of PC Magazine you will find a review of
|
|||
|
11 antiviral products. The review, while well intentioned,
|
|||
|
tested products against only two viruses (plus one simulated
|
|||
|
virus that was developed by the magazine). None of the viruses
|
|||
|
were boot sector infectors (viruses which attach to the boot
|
|||
|
sector) and none were among the most common viruses. Since the
|
|||
|
vast majority of virus infections are boot sector infections, and
|
|||
|
since most viruses are much more difficult to detect than the two
|
|||
|
chosen, the results of the review were next to meaningless. The
|
|||
|
PC Magazine review was similar to many others published in the
|
|||
|
past year. It was performed without adequate access to the
|
|||
|
viruses actually causing problems in the user community.
|
|||
|
A second problem with these reviews, is that many of the
|
|||
|
reviewers have had limited experience with the broad range of
|
|||
|
infections that have occurred within the past 18 months. They
|
|||
|
base evaluations on assumptions that do not hold for the real
|
|||
|
world. This is not necessarily the fault of the reviewers.
|
|||
|
Viruses are a new phenomenon and few people have dedicated their
|
|||
|
time and resources to a long term study. A reviewer who has had
|
|||
|
experience with only one or two viruses might naturally draw
|
|||
|
incorrect conclusions about "generic" virus issues.
|
|||
|
For example, a number of viruses infect programs using
|
|||
|
common DOS calls (interrupt 21 or other interrupt call). This
|
|||
|
type of infection can be easily detected and prevented. An
|
|||
|
entire class of products, called Filters, has grown up around the
|
|||
|
assumption that virus infections can be prevented by redirecting
|
|||
|
certain interrupts and intercepting the infection replication
|
|||
|
process. It works for a few viruses. The vast majority of
|
|||
|
infections, though, are caused by viruses that use non-standard
|
|||
|
I/O, and these infections cannot be prevented through interrupt
|
|||
|
re-vectoring techniques. Thus, filter type products - included
|
|||
|
among them are C-4 and Flu-Shot+ - are virtually useless against
|
|||
|
most viruses. Yet many reviewers, and some product developers,
|
|||
|
still believe that viruses can be stopped through re-directing
|
|||
|
system interrupts.
|
|||
|
|
|||
|
The criteria:
|
|||
|
A lot of time and effort has gone into the various checksum,
|
|||
|
encryption, logging and chaining algorithms proposed as safe
|
|||
|
techniques for detecting viruses. And much discussion and
|
|||
|
argumentation has gone one regarding the various merits of high
|
|||
|
security algorithms. Yet, every generic application infector
|
|||
|
that we have seen to date could have been detected by merely
|
|||
|
checking to see if the SIZE of the file had changed. Developing
|
|||
|
such a virus detector requires less than an hour of programming
|
|||
|
time and is as effective as available products costing hundreds
|
|||
|
of dollars. We're not suggesting that size checking should be
|
|||
|
the criteria for detecting viruses (we know better), we are
|
|||
|
merely pointing out the vast gulf between theory and current
|
|||
|
reality. We understand that viruses of today may not reflect the
|
|||
|
situation two years from now, and we also understand that current
|
|||
|
boot sector viruses and certain operating system viruses pose a
|
|||
|
special case to our size example, but the first step in solving
|
|||
|
any problem must be a solid understanding of the current state of
|
|||
|
the problem. And the current problem is in a different world
|
|||
|
from the theoretical solutions proposed for it.
|
|||
|
An astute reader might ask at this point why we would be
|
|||
|
concerned if the proposed solutions to viruses were overkill.
|
|||
|
Isn't it better, you might think, to include as much protection
|
|||
|
as is available, to get as close to 100% security as possible?
|
|||
|
We think not. Beta testing of virus products in many
|
|||
|
corporations and our own experience with these products over the
|
|||
|
past year has shown that, beyond a certain point of
|
|||
|
reasonableness, increased security functions begin to hinder the
|
|||
|
computing process. Either increases in required run time, or
|
|||
|
user constraints or annoying additions to the system make the
|
|||
|
products so cumbersome to use that the user ultimately discards
|
|||
|
them. Alternately, false alarms and questionable product
|
|||
|
conditions desensitize the user, and thus real virus alarms, when
|
|||
|
they occur, are disregarded.
|
|||
|
Again, we are not saying that sound security principles
|
|||
|
should not be included in a given product. We are only
|
|||
|
suggesting that the search for the 100% solution must have its
|
|||
|
limits. The theoretical discussions about batch file viruses,
|
|||
|
viruses that can imbed themselves within a program without
|
|||
|
changing initial branch addresses, and viruses that can infect
|
|||
|
without making any modifications to a program are interesting and
|
|||
|
entertaining. But if you are selecting a product based on the
|
|||
|
ability to detect such viruses, then you will be disappointed.
|
|||
|
In general then, our criteria for evaluating antiviral
|
|||
|
programs are:
|
|||
|
|
|||
|
1. The program's effectiveness against existing viruses.
|
|||
|
There are anywhere from two dozen to over 50 different
|
|||
|
PC viruses (depending on how you classify them) that
|
|||
|
can infect your system today. If the product cannot
|
|||
|
detect these viruses, then it certainly cannot detect
|
|||
|
tomorrow's viruses. We rated this criteria the
|
|||
|
highest.
|
|||
|
|
|||
|
2. The techniques used by the program to anticipate new
|
|||
|
viruses. We have to admit to some subjectivity here.
|
|||
|
No-one really knows what virus may pop up tomorrow, but
|
|||
|
reasonable people can make reasonable guesses (Tim
|
|||
|
Sankary is the only member of this review team who
|
|||
|
admits to being unreasonable). We do expect to see
|
|||
|
viruses in the next few years that can imbed themselves
|
|||
|
inside a generic COM or EXE program without changing
|
|||
|
its size. We anticipate system infectors and other
|
|||
|
program-specific viruses that can imbed themselves AND
|
|||
|
not change initial branch instructions. (We feel these
|
|||
|
viruses, however, will be limited to common programs
|
|||
|
such as IBMBIO, IBMSYS, COMMAND.COM etc.). We
|
|||
|
anticipate viruses that will encrypt themselves in such
|
|||
|
a way that every infection will be different (1704
|
|||
|
nearly achieves that now). We anticipate boot sector
|
|||
|
viruses that will not need to save and execute the
|
|||
|
original boot sector. We also expect viruses that will
|
|||
|
entirely replace system modules, such as the command
|
|||
|
interpreter.
|
|||
|
|
|||
|
3. The usability of the software. This is the most
|
|||
|
subjective criteria and we accordingly weighted it the
|
|||
|
least. We decided, however, that if we felt like
|
|||
|
screaming, smashing the monitor or savagely beating the
|
|||
|
family pets while trying to install or use the program,
|
|||
|
then we would subtract points for lack of user
|
|||
|
friendliness.
|
|||
|
|
|||
|
The Viruses:
|
|||
|
Jim Goodwin insisted that there were 61 PC viruses and that
|
|||
|
we should test them all. He includes in this list three versions
|
|||
|
of the Pakistani Brain that differ only in the imbedded text and
|
|||
|
volume label copyright display, and four identical versions of
|
|||
|
the 1704 that differ only in their activation dates. Lynn
|
|||
|
Marsh, who has a new beau, and, we suspected, would like to
|
|||
|
spend time with him, suggested that there were only 14 base PC
|
|||
|
viruses. Any modifications to these viruses, she insisted, were
|
|||
|
inconsequential and should be ignored. A compromise was reached
|
|||
|
along the following lines:
|
|||
|
|
|||
|
Any modification to a base virus that materially
|
|||
|
altered its ability to be detected would be considered
|
|||
|
a different virus for our testing purpose.
|
|||
|
|
|||
|
Frankly, the definition didn't help us much because we
|
|||
|
continued to squabble, but it eventually worked itself out. It
|
|||
|
became clear that certain modifications to base viruses did
|
|||
|
indeed materially affect our test results. As an example, one
|
|||
|
modification to the Israeli virus, called the New Jerusalem,
|
|||
|
performs a format of the hard disk when it activates, and it
|
|||
|
additionally does not have the EXE infector bug that the
|
|||
|
original Israeli had. When this virus activated, one antiviral
|
|||
|
products that was able to detect the original Israeli file-delete
|
|||
|
activation and prevent it, was unable to detect the modified
|
|||
|
virus's format attempt. There were numerous other such
|
|||
|
examples. Even machine or configuration type changes (such as
|
|||
|
the numerous 1704 modifications) had an effect on testing under
|
|||
|
certain circumstances. We finally narrowed the field down to 27
|
|||
|
distinct viruses, 11 of which were boot sector infectors.
|
|||
|
We realize that our test base is skewed if you compare it
|
|||
|
to infection reporting statistics (where over 80% of infections
|
|||
|
are boot sector infections), but we feel the sampling will become
|
|||
|
more valid over time, since the boot infector ratio appears to be
|
|||
|
slowly declining.
|
|||
|
|
|||
|
The Testing:
|
|||
|
All testing was performed on systems with fixed disks.
|
|||
|
Where applicable, the infection was introduced onto the hard
|
|||
|
disk. The only exceptions to this were five boot sector viruses
|
|||
|
which would not replicate onto a fixed disk. When testing
|
|||
|
against these floppy-only viruses, a 5 and 1/4 inch, 360KB
|
|||
|
diskette was used. The test systems each contained over 300
|
|||
|
executable programs, approximately 2/3 EXE programs and 1/3 COM
|
|||
|
programs, arranged in multiple levels of directories. Programs
|
|||
|
with overlay structures were also included. DOS 2.0 and 3.3 were
|
|||
|
both used, and testing was performed with and without the memory
|
|||
|
resident program and shell routine - Carousel and Norton
|
|||
|
Commander. Monochrome and VGA graphics adaptors were also
|
|||
|
included.
|
|||
|
All product detection tests were made while boot sector
|
|||
|
viruses were already in memory and in control. This was a
|
|||
|
critical point for us. For example, the Pakistani Brain is a
|
|||
|
trivial virus to detect if you insert an infected floppy into an
|
|||
|
uninfected system and run a detection program against it. If you
|
|||
|
boot from an infected diskette, however, the detection process
|
|||
|
becomes much more difficult (since the virus traps all attempts
|
|||
|
to read the boot sector). We found only one generic product that
|
|||
|
was able to detect the Brain while it was active.
|
|||
|
When testing against generic COM and EXE infectors, we used
|
|||
|
two approaches. First, we loaded the protection software onto a
|
|||
|
clean machine and then infected it. Second, we infected a
|
|||
|
machine with the virus, then installed the protection software,
|
|||
|
and then allowed the virus to continue the infection process.
|
|||
|
Throughout the review process, we considered a product to be
|
|||
|
ineffective against a given virus if any of the following
|
|||
|
occurred:
|
|||
|
|
|||
|
- The program was unable to detect the presence of
|
|||
|
infection activity during its normal check cycle.
|
|||
|
- The system hung when the virus was introduced, or
|
|||
|
during the check cycle, and no warning indication was
|
|||
|
given by the program prior to the hang-up. (This
|
|||
|
assumed, of course, that the virus ran normally without
|
|||
|
the prevention product being present)
|
|||
|
- A loss of data occurred during the checking process.
|
|||
|
|
|||
|
A product was considered to be effective against a given
|
|||
|
virus if all of the following occurred:
|
|||
|
|
|||
|
- The product identified the presence of infection
|
|||
|
activity.
|
|||
|
- The product was able to identify each and every
|
|||
|
infected component of the system, name each infected
|
|||
|
program, and specify the program's directory path.
|
|||
|
|
|||
|
Usability ratings were loosely handled as follows:
|
|||
|
|
|||
|
1. Global detection products that required more than two
|
|||
|
seconds per program for a system scan (ten minutes on
|
|||
|
our test system) scored high on our aggravation scale.
|
|||
|
2. Programs that required us to use new system command
|
|||
|
structures or required us to modify the way in which we
|
|||
|
normally interface with the operating system or our
|
|||
|
application programs were placed in the questionable
|
|||
|
category.
|
|||
|
3. Programs that required constant attention to the user's
|
|||
|
manual in order to be useful were frowned on.
|
|||
|
(Allowances were made for Tim Sankary's slow thought
|
|||
|
processes).
|
|||
|
4. Programs that caused false alarms were given an
|
|||
|
annoyance ratio proportional to the number of false
|
|||
|
alarms.
|
|||
|
5. Programs that installed in ten minutes and remained
|
|||
|
invisible thereafter were well liked and much
|
|||
|
appreciated.
|
|||
|
|
|||
|
Please don't mistake our lighthearted attitude to the user
|
|||
|
friendly category. It's just that we could not come up with a
|
|||
|
really objective measure here. No matter how hard we tried, it
|
|||
|
usually ended up being a matter of personal opinion. Keep in
|
|||
|
mind that we weighted the whole user interface area low in
|
|||
|
importance.
|
|||
|
|
|||
|
The Products:
|
|||
|
We were able to identify over twenty PC products being
|
|||
|
distributed through vendor channels and through public
|
|||
|
domain/shareware channels. We chose five to review that we felt
|
|||
|
were the most commonly available and most widely used.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
C-4
|
|||
|
From McAfee Associates, 4423 Cheeney St, Santa Clara, CA 95054
|
|||
|
408 988 3832
|
|||
|
|
|||
|
*** NOT RECOMMENDED ***
|
|||
|
|
|||
|
C-4 is a classic virus filter product which is simple to
|
|||
|
install, easy to use and creates few false alarms. It is a
|
|||
|
memory resident program that requires about 12K of memory (not
|
|||
|
much) and seems to run efficiently, consuming few system
|
|||
|
resources. The instruction manual is brief, concise and to the
|
|||
|
point. It comes with an automatic install utility, and the
|
|||
|
installation takes about 30 seconds. From there on it's
|
|||
|
automatic. The checking function can be easily turned on and off
|
|||
|
through a keyboard toggle, and a simple mechanism for excluding
|
|||
|
"safe" programs is included. A pop-up window appears whenever a
|
|||
|
violation is reported, and the name of the violating program, and
|
|||
|
its target, are displayed. Programs that violate C-4's filter
|
|||
|
criteria can be frozen and prevented from continuing the suspect
|
|||
|
activity. All in all we found this product to be well designed,
|
|||
|
solid, easy to use and fairly unobtrusive. A solid piece of
|
|||
|
software engineering.
|
|||
|
So what's the problem? Well, it doesn't work. Like all
|
|||
|
filter products, it is limited to viruses that conform to
|
|||
|
standard operating system conventions. These conventions include
|
|||
|
using interrupts rather than branching directly into the BIOS,
|
|||
|
keeping the original boot sector intact, not modifying the
|
|||
|
command interpreter, etc. As we all know, not all viruses play
|
|||
|
by these rules.
|
|||
|
The net result of our testing showed that C-4 was unable to
|
|||
|
prevent or detect any of the boot sector viruses. Additionally,
|
|||
|
if the system was infected before loading c-4, it was unable to
|
|||
|
detect future infections from any memory resident.
|
|||
|
We cannot recommend this program.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Flu-shot+ (Shareware)
|
|||
|
from Software Concepts Design, 594 Third Avenue, NY, NY 10016
|
|||
|
212 889 6438
|
|||
|
|
|||
|
*** NOT RECOMMENDED ***
|
|||
|
|
|||
|
FluShot+ is a mixture of filter program and detection
|
|||
|
program. Like C-4, it attempts to trap system interrupts and
|
|||
|
catch viruses in the act of replication. Like C-4, it is equally
|
|||
|
unsuccessful. The infection detection aspects of the program add
|
|||
|
little to its ability to protect against infection, but they do
|
|||
|
contribute substantially to the overall cumbersome and
|
|||
|
frustrating user interface.
|
|||
|
The complicated documentation and installation required by
|
|||
|
FluShot+, however, was not our overriding concern. The program
|
|||
|
simply did not work. No boot sector virus was stopped or
|
|||
|
detected by FluShot+, and the false alarm rate was high enough to
|
|||
|
motivate many system users to ignore a real virus infection,
|
|||
|
whenever one could be detected.
|
|||
|
If we add to this the numerous quirks of the program, such
|
|||
|
as problems running with graphics software and conflicts with
|
|||
|
certain memory resident programs, we find little positive value
|
|||
|
in it.
|
|||
|
We cannot recommend this program.
|
|||
|
|
|||
|
|
|||
|
Sentry (Shareware)
|
|||
|
From McAfee Associates, 4423 Cheeney St, Santa Clara, CA 95054
|
|||
|
408 988 3832
|
|||
|
|
|||
|
*** HIGHLY RECOMMENDED ***
|
|||
|
|
|||
|
Every so often an easier, simpler approach really does work,
|
|||
|
and Sentry appears to be a one-in-a-million jewel of simplicity
|
|||
|
and effectiveness. The most invisible product that we tested,
|
|||
|
Sentry can be installed by anyone able to type the word
|
|||
|
"install", and thereafter nothing more is seen or heard of it
|
|||
|
until a virus hits the system. When it does, it's certain to get
|
|||
|
caught. Sentry was the only product able to catch every one of
|
|||
|
our test viruses.
|
|||
|
It does have some small faults however. First, it
|
|||
|
increases the system boot-up time by about 10 seconds for every
|
|||
|
100 programs in your system. For the average user this will not
|
|||
|
be a problem (the average person uses less than 50 programs, we
|
|||
|
are told). For some folks however, this may become burdensome.
|
|||
|
If you are one of those rare people who use (or at least have)
|
|||
|
2,000 programs or more, you can expect to wait over 5 minutes
|
|||
|
extra every time you boot your system.
|
|||
|
A second fault is that people who do a lot of programming or
|
|||
|
software development will constantly be changing executable files
|
|||
|
on the disk. Sentry will prod you about these changes every time
|
|||
|
you boot. The only way to shut it up is to re-install it so that
|
|||
|
it can take a new snapshot of the current system state. We all
|
|||
|
found this annoying (although, to be fair, every product that we
|
|||
|
have seen has this same annoyance). One way around it is to do
|
|||
|
all compiles, links, etc. in a given subdirectory and instruct
|
|||
|
Sentry to ignore all the happenings in that subdirectory. This
|
|||
|
works quite well. If you do not frequently compile, or daily
|
|||
|
update your software to new versions, however, then Sentry should
|
|||
|
remain innocuous.
|
|||
|
A final caution about Sentry. It does not work properly in
|
|||
|
the DOS 4.0 environment and should not be used in this
|
|||
|
environment. We understand that a new version that will correct
|
|||
|
this problem is currently under development.
|
|||
|
Sentry works by creating a snapshot file of all critical
|
|||
|
system elements and comparing that snapshot file to the current
|
|||
|
state of the system at boot time. If you power down or re-boot
|
|||
|
your system at least once a week, then Sentry will flag any
|
|||
|
infection long before the infection will activate and cause
|
|||
|
damage. If you are running in a networked environment, or in any
|
|||
|
other environment where the machine is seldom turned off or re-
|
|||
|
booted, then Sentry can be manually invoked by typing the command
|
|||
|
- SENTRY.
|
|||
|
Sentry uses a unique approach to detecting a virus. It
|
|||
|
does not checksum the entire program, but only those areas of the
|
|||
|
program would would have to change when any virus attaches to the
|
|||
|
program. This allows it to execute very rapidly, and thus makes
|
|||
|
periodic scans of the entire system feasible. This separates
|
|||
|
Sentry from all other products. The second separator, of course,
|
|||
|
is that it is effective against all of the viruses that currently
|
|||
|
exist. We believe that this effectiveness will continue for new
|
|||
|
viruses.
|
|||
|
|
|||
|
Virus-Pro
|
|||
|
From International Security Technologies, 515 Madison Avenue, NY,
|
|||
|
NY 10022 212 288 3101
|
|||
|
|
|||
|
** RECOMMENDED **
|
|||
|
|
|||
|
Virus-Pro is a product designed for large corporations, and
|
|||
|
we include it here for those researchers studying epidemiological
|
|||
|
data using multiple computers as a study base.
|
|||
|
Virus-Pro is much more than a virus detector. Virus-Pro
|
|||
|
includes sophisticated audit trails and history information that
|
|||
|
can be used track the origin of an infection within an
|
|||
|
organization, and to monitor the use and movement of programs
|
|||
|
from PC to PC. It does require a fair amount of run time for the
|
|||
|
checking process, and a dedicated Virus-Pro systems administrator
|
|||
|
or co-ordinator is needed, but it is an excellent system level
|
|||
|
product.
|
|||
|
The basic function of Virus-pro is to monitor the status of
|
|||
|
the executable programs on the logical drives and to report on
|
|||
|
changes and exceptions. Virus-Pro stores five parameters about
|
|||
|
each executable or hidden file in a scan file. These parameters
|
|||
|
are:
|
|||
|
(1) The name, extension and path
|
|||
|
(2) The size in bytes
|
|||
|
(3) The date-time stamp
|
|||
|
(4) The attributes (hidden, system, and read-only).
|
|||
|
(5) A checksum of the program
|
|||
|
|
|||
|
In addition, the program stores information about the
|
|||
|
logical drive's boot track. Virus-Pro then compares the scan
|
|||
|
file with both a prior scan file from the same logical drive and
|
|||
|
a baseline file which has been created using scans of individual
|
|||
|
software distribution diskettes. Differences in or matches to
|
|||
|
one or more of these five parameters are used to determine the
|
|||
|
presence of infection.
|
|||
|
Administrative software makes it easy for an organization's
|
|||
|
Virus-Pro co-ordinator to prepare diskettes for site co-
|
|||
|
ordinators. Each site co-ordinator has similar facilities to
|
|||
|
make Virus-Pro diskettes for his or her PC "owners". PC owner
|
|||
|
diskettes include a disk scanning and analysis program. Site co-
|
|||
|
ordinators use a program called MAKEBASE to place data extracted
|
|||
|
from vendor diskettes into baseline files which a baseline
|
|||
|
analysis program compares with the disk scan outputs. The
|
|||
|
analysis can spot viruses, pirated software, wrong program
|
|||
|
versions and a host of other inconsistencies of interest to a co-
|
|||
|
ordinator. Two system-wide administrative programs maintain
|
|||
|
master files of site co-ordinators and PC owners, print complete
|
|||
|
name/address/phone number lists of co-ordinators and owners,
|
|||
|
prepare diskettes, and provide other administrative functions.
|
|||
|
Virus-Pro is the most comprehensive system level antivirus
|
|||
|
product that we have seen or heard of. It does however require
|
|||
|
more maintenance than stand-alone utility antiviral products, and
|
|||
|
it did fail to catch four of the boot sector viruses (but caught
|
|||
|
all others). In spite of this, We feel that it provides a fair
|
|||
|
level of protection, and excellent audit trail capabilities for
|
|||
|
tracking virus spread.
|
|||
|
A note of caution: This is not a product for the individual
|
|||
|
user of a stand-alone system. It is specifically designed for
|
|||
|
the corporate environment.
|
|||
|
|
|||
|
|
|||
|
Disk Defender
|
|||
|
From Director Technologies, 906 University Place, Evanston, IL
|
|||
|
60201 312 491 2334
|
|||
|
|
|||
|
** RECOMMENDED **
|
|||
|
|
|||
|
Disk defender is an add-on board for IBM PCs and
|
|||
|
compatibles. The product write protects the hard disk from
|
|||
|
erasure or modification to programs or data files that do not
|
|||
|
require frequent changes. It can therefor protect against
|
|||
|
viruses trying to attach to system or application programs, or
|
|||
|
even to the boot sector. It blocks their attempts and provides a
|
|||
|
visual indication that disk writes are being attempted to a write
|
|||
|
protected area.
|
|||
|
A switch attached to the board write protects the entire
|
|||
|
disk, just a portion, or none of the disk. The switch can be
|
|||
|
set, then removed and stored in a secure place. In addition, the
|
|||
|
board allows a portion of the hard disk to be write protected,
|
|||
|
while allowing normal writes to other areas.
|
|||
|
Disk defender allows the hard disk to be divided into two
|
|||
|
active DOS partitions and allows the user to designate an area or
|
|||
|
zone as read only or as read/write. Indicator lights on the
|
|||
|
switch box illuminate when an attempt is made to write to a
|
|||
|
protected partition.
|
|||
|
The disk defender is one of the most effective antiviral
|
|||
|
products available for protecting the hard disk.. Clearly, if a
|
|||
|
virus cannot physically access its host program, then it cannot
|
|||
|
infect the system. It does not, however, protect against floppy
|
|||
|
viruses. There is no software utility included with the package
|
|||
|
to prevent or detect floppy boot sector infectors, for example.
|
|||
|
Thus the 5 floppy based boot viruses lived and prospered quite
|
|||
|
happily in the system with Disk Defender installed. There are
|
|||
|
some other drawbacks as well. Installation is non trivial and
|
|||
|
requires a backup of all data and a re-format of the hard disk.
|
|||
|
Then all data and programs must be restored. Disk defender also
|
|||
|
requires that files be re-organized, and some application
|
|||
|
programs will have to be reconfigured if they use the C drive for
|
|||
|
temporary storage. Thus, a degree of flexibility is lost which
|
|||
|
may be unacceptable to some people.
|
|||
|
In spite of its limits, however, Disk Defender is a highly
|
|||
|
reliable and secure product for protecting your hard disk.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Jim Goodwin, Lynn Marsh and Tim Sankary
|
|||
|
|
|||
|
From the HomeBase Virus Research Group
|
|||
|
408 988 4004
|