Click here to find books related to 'computer virus'.


-----------------------------------------------------------------------------
 WildList Notes - (c)1995 Joe Wells - c1jwells@watson.ibm - wildlist@aol.com
-----------------------------------------------------------------------------

Virus Name:  AntiCMOS

Aliases:     Lenart.

Infects:     MBR on first hard drive. DOS boot sector on floppy disks.

Disk Size:   1 sector.

Location:    MBR or boot sector. Original MBR or boot 
             sector is not stored.
 
Memory Size: The virus reserves 2k of memory by modifying the 
             available memory word at 40:13. On a 640k system 
             the value will be changed from 280h to 27Eh.
 
             Chkdsk will report 653312 bytes (638k) of memory free.

Location:    In 2k reserved at top of conventional memory.

Special:     [none]

Effects:     Portions of the CMOS will be altered, depending on the 
             type of computer infected, this may be the number or type 
             of floppy, number or type of hard drives, the time of day.

Trigger:     Random. Based on timer count.

Messages:    [none]

Bugs:        The virus contains extensive code to locate the two system 
             files on a diskette and attempt to load them. Booting from 
             an infected floppy will infect the MBR, but the bootup 
             process is highly likely to hang before completion.

Origin:      Unknown. Probably only about a year old. 

Notes:       The virus is truly mediocre, just barely infective, and 
             extremely obvious. For such a virus to so quickly become 
             as commonly found as Michelangelo is utterly amazing. 

             Some have suggested that users must be totally oblivious 
             for the virus to have spread so widely. But if that were 
             the case, why aren't other stupid viruses just as common.
         
             So, maybe the opposite is true. Perhaps, it's not actually 
             as widespread as other common viruses. Maybe is so commonly 
             found because it's stupid and users aren't. The other 
             viruses could be far more common, but undetected.

             Whatever the truth is, there is no doubt that this virus 
             is indeed a widespread and represents a major problem 
             for users.


This page was created Thu Aug 12 00:15:33 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com The Myth of the 2600Hz Detector @ Matarese.com       Acquiring Account Information @ Matarese.com      

Act2! by Symantec @ Matarese.com       All hacks / Annoyance @ Matarese.com      

Alt 2600 Group FAQ @ Matarese.com       Hacking Angelfire @ Matarese.com      

Anonymous E-Mail @ Matarese.com       Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      

      Maintaining Access - Implementing Backdoors @ Matarese.com      

How to Receive Banned Newsgroups FAQ @ Matarese.com       Hacking BBS's @ Matarese.com      

phreaking tutorial @ Matarese.com       The Bluebox @ Matarese.com      

List of Common Bugs @ Matarese.com       Things that go Bump on the Internet @ Matarese.com      

Hacking Calling Cards @ Matarese.com       Expanding the capacity of Caller ID Boxes @ Matarese.com      

What is Caller-ID? @ Matarese.com       Hacking Call Back Verify @ Matarese.com      

CULT OF THE DEAD COW @ Matarese.com       Cellular Roaming: The New Deals @ Matarese.com      

CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com       Cracking Unix passwords @ Matarese.com      

Hacking Webpages @ Matarese.com       The Matarese Circle @ Matarese.com      

Cisco Password Cracking Script @ Matarese.com       Customer Name and Address @ Matarese.com      

Cops and Robbers | UNIX Security @ Matarese.com       Cracking NT Passwords @ Matarese.com      

Odins cracking/coding and PPE resources @ Matarese.com       Credit Carding Part I @ Matarese.com      

How do I defeat Copy Protection? @ Matarese.com       What are the DTMF frequencies? @ Matarese.com      

Exploits FAQ @ Matarese.com       Making Free Calls @ Matarese.com      

FTP Bouncing @ Matarese.com       Hackers Encyclopedia @ Matarese.com      

The Conscience of a Hacker / Hacker Manifesto @ Matarese.com       Hacking from Windows9x FTP @ Matarese.com      

Hacking Tripod @ Matarese.com       Hacking Web Pages @ Matarese.com      

How to crack a UNIX password file. @ Matarese.com       Hacking Servers : A Begginners Guide @ Matarese.com      

TIPS FOR TRACKING HACKERS @ Matarese.com       Hacking Tutorial @ Matarese.com      

Hacking UNIX @ Matarese.com       How to Hack the WWWboard Message Board 2.0 @ Matarese.com      

Hackers Handbook @ Matarese.com       Guide to Harmless-Hacking @ Matarese.com      

All about security holes @ Matarese.com       Hacking Hotmail @ Matarese.com      

How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com       ]How to Hack from from Harlequin and Archangel @ Matarese.com      

Improve security by breaking into your site @ Matarese.com       Ch1can0 BEOWULF @ Matarese.com      

Internet Security @ Matarese.com       Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com      

IRC Hacking @ Matarese.com       FAQ for Trading For FileZ in IRC @ Matarese.com      

Creating a Xdcc offer bot for irc @ Matarese.com       Integrated Systems Digital Network @ Matarese.com      

Everything you should know about computer viruses @ Matarese.com       Lan Technology Scorecard @ Matarese.com      

Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com       Harmless Hacking - Linux @ Matarese.com      

INDEX @ Matarese.com       Loops wanted! @ Matarese.com      

Mail Spoofing Explained @ Matarese.com       Microsoft IIS Vulnerability @ Matarese.com      

Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com       Intresting Microsoft Access 7.0 Trick @ Matarese.com      

MS Money 2.0 Back Door @ Matarese.com       Mind Your Own Business (MYOB) @ Matarese.com      

Nameserver listing! @ Matarese.com       Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com      

Bugs in Windows NT (Too many to list here completely...) @ Matarese.com       This Hack is for the OptiChat Original Chat Room @ Matarese.com      

Internet Outdials @ Matarese.com       Pager Frequencies @ Matarese.com      

Password Recovery Techniques @ Matarese.com       How to Steal Local Calls from Most Payphones @ Matarese.com      

PBX's (Private Branch Exchanges) and WATS @ Matarese.com       Cryptography / PGP @ Matarese.com      

The PHF bug @ Matarese.com       Introduction to the Internet Protocols @ Matarese.com      

Analysis of QueSO Performance @ Matarese.com       Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      

The PPP protocol (Point-to-Point Protocol) @ Matarese.com       Scam news / Hacking / Phreaking / Anarchy / Virii @ Matarese.com      

Hacking your school computers @ Matarese.com       L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      

Sniffer FAQ V 1.7 @ Matarese.com       THE COMPLETE SOCIAL ENGINEERING FAQ! @ Matarese.com      

Socket Services @ Matarese.com       Softice Manual @ Matarese.com      

Softice Manual 2 @ Matarese.com       Softice Manual 3 @ Matarese.com      

Softice Manual 4 @ Matarese.com       Softice Manual 5 @ Matarese.com      

SSPING/JOLT patches @ Matarese.com       THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING @ Matarese.com      

@ Matarese.com       @ Matarese.com      

TCP/IP Services (Phrack Stuff) @ Matarese.com       Telenet The Secret Exposed @ Matarese.com      

WORKING OUT-TELNETS @ Matarese.com       Covering your tracks, Theory @ Matarese.com      

How to defeat the Tripod Advertisement on your webpage. @ Matarese.com       BT Basics @ Matarese.com      

BT Phreaking @ Matarese.com       The Psychotic Internet Services' Unix Bible @ Matarese.com      

The Psychotic Internet Services' Unix Bible @ Matarese.com       UNIX FAQ @ Matarese.com      

Gibe's UNIX COMMAND Bible @ Matarese.com       How to become a Unix Hacker @ Matarese.com      

Cracking that Passwd File @ Matarese.com       Hacking Commands, and Some Hints On Their Usage @ Matarese.com      

How do I post to a moderated newsgroup? @ Matarese.com       Virii 101 @ Matarese.com      

What You Should Know About Computer Viruses @ Matarese.com       How can I protect myself from viruses and such? @ Matarese.com      

What is a trojan/worm/virus/logic bomb? @ Matarese.com       VMS Info (Password Cracking) @ Matarese.com      

Bug in Windows for Workgroups, Win95 beta @ Matarese.com       HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com      

Using web proxies to disguise your IP address @ Matarese.com       Dig up hidden CD Keys @ Matarese.com      

X-Windows Security @ Matarese.com       A Known Plaintext Attack on the PKZIP Stream Cipher @ Matarese.com      

Copyright (C) 1999 - Matarese.com