{
  "disks": {
    "1": {
      "dirs": [
        {
          "path": "/",
          "files": [
            {
              "name": "BOOTSAFE EXE",
              "size": 36219,
              "date": "1991-06-14",
              "time": "11:00"
            },
            {
              "name": "CBOOT    TAV",
              "size": 1024,
              "date": "1980-01-01",
              "time": "0:02"
            },
            {
              "name": "DEFENDER COM",
              "size": 13774,
              "date": "1991-06-14",
              "time": "11:00"
            },
            {
              "name": "INSTALL  EXE",
              "size": 50018,
              "date": "1990-06-08",
              "time": "0:01"
            },
            {
              "name": "README   DOC",
              "size": 65092,
              "date": "1990-06-08",
              "time": "0:01"
            },
            {
              "name": "TNT      EXE",
              "size": 77467,
              "date": "1991-06-14",
              "time": "11:00"
            },
            {
              "name": "TSAFE    COM",
              "size": 26870,
              "date": "1991-06-14",
              "time": "11:00"
            }
          ]
        }
      ]
    }
  },
  "desc_file": "README.DOC",
  "desc_text": "哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n                          CARMEL Software Engineering\r\n                          \r\n                              is proud to present:\r\n                             \r\n                            Turbo Anti-Virus v6.80A\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n\r\n                         New Features in Version 6.80A\r\n\r\n1. At last, we have an INSTALL utility. It is VERY user friendly and does\r\n   everything automatically for you. Just type INSTALL.\r\n\r\n2. All executable files of Turbo Anti-Virus will check and validate themselves\r\n   before running.\r\n   But this is not all. In case of any virus infection - the files will cure \r\n   and clean themselves.\r\n\r\n3. New command line parameters were added to TSAFE:\r\n   \r\n   A. The '/Ax' parameter allows specification of the hot-key used to activate\r\n      the control window. If TSAFE is activated, the hot key will be <Alt-x>\r\n      instead of the default <Alt-T>. For example, To set the hot key to\r\n      <Alt-S> type: TSAFE /AS  \r\n   \r\n   B. The /X parameter will Disable / Enable the write protection of executable\r\n      files (COM & EXE).\r\n   \r\n      This feature will warn the user of any attempt to change an executable\r\n      file, (e.g. When a virus is trying to infect it).\r\n      The default for this warning is ON.\r\n\r\n4. A new option in the WARNING window of TSAFE allows the user to simulate\r\n   an error and cause the operation to FAIL.\r\n\r\n   For Example: If a virus tries to write to the boot sector - TSAFE will\r\n   open the warning window. Pressing the 'F' key (FAIL) will cause the\r\n   termination of the writing routine causing the virus to \"think\" that\r\n   the disk is write protected (Smart ah...).\r\n\r\n5. TSAFE will open a window after every program termination and prompt the\r\n   user of the virus scan which has been carried out in the memory.\r\n\r\n6. In TNTVIRUS, new options have been added to the Options menu and command\r\n   line.\r\n\r\n   A. The Check All Files option (/A from the command line) was added due to\r\n      the fact that there are some new viruses (100 Years - 4096), which also\r\n      infect data files. The virus can not be executed in data files but the\r\n      file is corrupted after infection and Turbo Anti-Virus will rebuild it's\r\n      original state.\r\n\r\n   B. The Automatic Loop option (/L from the command line) will cause the\r\n      automatic pilot to check more than one disk instead of checking once and\r\n      then exiting to DOS - This is intended for use in checking several floppy\r\n      disks.\r\n\r\n7. Many more viruses are now identified and cleaned by Turbo Anti-Virus(tm).\r\n   Just keep on reading to understand why it is so important to use Turbo Anti-\r\n   Virus(tm).\r\n\r\n8. The BOOTSAFE utility:\r\n\r\n\r\n                       CARMEL Software Engineering\r\n\r\n                     Turbo Anti-Virus software package\r\n\r\n                        The   * BOOTSAFE *   module\r\n                        \r\n       The complete boot sector and partition table security system\r\n       \r\n\r\n\r\nGENERAL DESCRIPTION\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\n\r\nBOOTSAFE is a security utility for the boot sector and partition table of\r\nhard and floppy disks.\r\n\r\nThis utility will create clean images of the boot sector and partition\r\ntable of the drives requested.\r\nBefore creating the images - BOOTSAFE will make sure that these areas\r\nare currently clean and free of any known viruses, and then it will create\r\nimages of these boot areas.  It will also enable the saving of the images\r\nto a floppy disk which can later be used in order to recover from a total\r\nloss of the disk boot areas.\r\n\r\nAs soon as these images are created and saved, BOOTSAFE will be able\r\nto compare them to all boot areas currently being used.\r\nIn case any difference is found between the images and the current boot\r\nareas - BOOTSAFE will report this, and will provide the opportunity to\r\nrestore the original boot areas from the file images.\r\n\r\nThis solution will actually solve two common problems:\r\n\r\n1)  ANY virus which attempts to place itself instead of, or together with\r\n    the boot areas, will be found and eliminated.\r\n    \r\n2)  ANY damage or changes will be fixed and the boot areas will be restored\r\n    to their original form.\r\n    \r\nIt is most recommended to run BOOTSAFE from the AUTOEXEC.BAT file, since\r\nthis method does not occupy space in the memory, and its execution-time is\r\nonly a matter of seconds.\r\n\r\nBOOTSAFE will also check the memory for all known viruses, and eliminate\r\nany virus which is found - allowing for the continuation of work as if\r\nnothing had happened.\r\n\r\nHOW TO INSTALL BOOTSAFE IN THE AUTOEXEC.BAT FILE?\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\n\r\nBOOTSAFE can be installed by the INSTALL utility contained in the original\r\nTurbo Anti-Virus package.\r\nWhile booting up the system, the INSTALL utility asks which drives to\r\ncheck. It then creates the images for these drives.\r\nBOOTSAFE can always be uninstalled by the same INSTALL utility.\r\n\r\nHOW TO RUN BOOTSAFE FROM THE DOS COMMAND LINE (INSTEAD OF THE AUTOEXEC)?\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\n\r\nVery Simple!\r\n\r\nBOOTSAFE offers several options - the following is a description of each,\r\nand a few examples:\r\n\r\nIn order to verify that the boot areas are OK:\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\nJust type:\r\n\r\nBOOTSAFE           and it will check the default drive boot areas.\r\n   or\r\nBOOTSAFE D:        and it will check the        D drive boot areas.   \r\n   or\r\nBOOTSAFE C: D:     and it will check both C & D   drives boot areas.   \r\n   etc.....\r\n   \r\nIf BOOTSAFE finds any changes in the boot areas - it will enable\r\nrestoration of the original boot areas from the images.\r\n\r\nIn order to create new images for the boot areas...\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\nThe /M option is used:\r\n\r\nE.G.\r\n\r\nBOOTSAFE D:/M and it will generate a new image file for drive D boot areas.\r\nIt will then provide the option to save the images on a seperate floppy\r\ndisk. (This will be usefull in case of a total loss of the boot areas, for\r\nwhatever reason.)\r\n\r\nIn order to restore the boot areas from a floppy disk, the floppy disk\r\ncontaining the saved images is inserted to drive A and...\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\nThe /R option is used:\r\n\r\nE.G.\r\n\r\nBOOTSAFE D:/R and it will read the original boot areas of drive D which\r\nwere previously saved as image files on drive A, and will copy them to\r\ndrive D.\r\n\r\n\r\nBy using BOOTSAFE, worry about boot sector viruses will be a thing of the\r\npast.\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n\r\n                         Description of Known Viruses\r\n                           \r\n                            Files Infecting Viruses\r\n                            \r\n\r\nThe Friday 13th viruses (7 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Jerusalem B ,Israeli virus and PLO virus.\r\n*There are many variations of this virus: Jerusalem A,B,B (new),B-2,C,D, and E.\r\n*This type of virus was released in Israel and was first discovered by CARMEL\r\n Software Engineering in Kiryat Hamachshev LTD in July 1987, and 2 weeks later \r\n at the Hebrew University of Jerusalem (causing much panic).\r\n*The size of the virus is 1808 bytes, or 1813 bytes including the last 5 bytes,\r\n which are the signature of this infection, and it infects EXE, COM and\r\n some overlay files.\r\n*Due to a bug in the virus, when it infects EXE files it does not add it's\r\n signature at the end of the file, therefor the virus does not stop after the \r\n first infection but continues infecting further EXE files.\r\n*The Friday 13th is a resident virus and uses INT 21H function 31H in order to\r\n remain in the memory. Then it infects every COM or EXE file which is executed.\r\n The virus slows down the computer, black \"boxes\" appear on the screen and\r\n on any Friday which is the 13th of the month it will erase the files being\r\n executed.\r\n\r\nThe Saturday 14th viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Durban virus.\r\n*The size of the virus is 681 (+0-15 Bytes for Paragraph alignement).\r\n*Remains resident in Memory (not using Int 21H or 27H).\r\n*Infects EXE & COM files (excluding COMMAND.COM).\r\n*On every Saturday which falls on the 14th day of the month the virus will \r\n destroy the disk by writing to the first 100 sectors of the disk - eliminating\r\n the Boot sectors, FAT & Directory areas.\r\n\r\nThe Tuesday 1st viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* This virus is almost identical to the Friday 13th virus but with two\r\n  major differences.\r\n* The activation date is every Tuesday which is the 1st day of the month.\r\n* The identification signature of the virus was changed from MsDos to MsDns.\r\n* This virus was sent to us by the virus hunter Mr. Szegedi Imre from Budapest,\r\n  Hungary.\r\n \r\nThe Friday 13th Destructive viruses  (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* This virus is almost identical to the Friday 13th virus but with one\r\n  major difference.\r\n* Infected files are not working after the infection took place and this\r\n  makes reconstruction - impossible.\r\n* This virus was sent to us by the virus hunter Mr. Szegedi Imre from Budapest,\r\n  Hungary.\r\n \r\nThe Jerusalem 3 virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Almost the same as the Friday 13th varieties with a few slight changes.\r\n\r\nThe Suriv 3.00 viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as a variety of the Jerusalem B/E or Israeli virus.\r\n*The size of the virus is 1813 bytes, including the last 5 bytes which are the\r\n signature of this infection, and it infects both EXE and COM files (SURIV).\r\n*The Suriv 3.00 is a resident virus and uses INT 21H function 31H in order to\r\n remain in the memory. Then it infects every COM or EXE file which is executed.\r\n*The virus slows down the computer, black \"boxes\" appear on the screen and on\r\n any Friday which is the 13th of the month it will erase the files being\r\n executed.\r\n\r\nThe Sunday viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 1636 virus.\r\n*The size of the virus is 1636 bytes including the last 5 bytes which are the\r\n signature of this infection and it infects both EXE and COM files.\r\n*The Sunday virus is a resident virus and uses INT 21H function 31H in order to\r\n remain in the memory. Then it infects every COM or EXE file which is executed.\r\n*Every Sunday the virus will print on the screen:\r\n\r\n Today is SunDay !                         \r\n Why do you work so hard ?                 \r\n All work and no play make you a dull boy !\r\n Come on ! Let's go out and have some fun !\r\n                  \r\n*This virus also steals Int 8 and may corrupt the FAT.\r\n\r\nThe April 1st viruses (Type A and B) (4 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The April 1st virus is also known as the TSR virus and the SURIV 1 - it only\r\n infects COM files.\r\n*The size of the virus is 897 bytes.\r\n*Discovered in Israel in July 1987.\r\n*It will remain resident in the memory, like the Friday 13th virus, but will not\r\n infect EXE files.\r\n*The virus is very easy to identify and therefore it is not very widespread -\r\n evry time the virus infects a new file it writes on the screen: \r\n \r\n YOU HAVE A VIRUS.\r\n                              \r\n on April 1st it writes:\r\n \r\n HA HA HA IT'S APRIL 1ST - YOU HAVE A VIRUS. \r\n                 \r\n*There are two types of April 1st virus, with slight differences in their codes.\r\n\r\nThe April 1st D viruses (SURIV 2 & 3) (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The April 1st D virus is also known as the SURIV 2, SURIV 3 or Jerusalem D\r\n virus, and it  infects only EXE files.\r\n*The size of the virus is 1488 bytes.\r\n*It does not remain resident in the memory, like the other April 1st viruses,\r\n but operates using MCB's (Memory Control Blocks).\r\n*There are two types of virus with only slight differences in the first 16 bytes\r\n of the virus: SURIV 2.01 or SURIV 3.00. The rest of the code is exactly the\r\n same.\r\n\r\nThe Typo COM files virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The Typo virus infects only COM files.\r\n*The size of the virus is 867 bytes.\r\n*It will remain resident in the memory using INT 21 function 31.\r\n*When an infected file is executed, the virus will search through all COM files\r\n in the current directory and infect every clean file.\r\n*This virus will mix some keystrokes at random, replacing the original keystroke\r\n with that which is immediately adjacent to it on the right. E.g. ';' instead\r\n of 'l', 's' instead of 'a' etc...\r\n*Very annoying!....\r\n\r\nThe Amstrad COM files virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nThe Amstrad virus infects only COM files.\r\nSize: 850 Bytes (including 3 null bytes at the end).\r\nIt will not stay resident and will not infect COMMAND.COM.\r\nWhen an infected file is being executed, the virus will search through all\r\nCOM files in the current directory and infect a clean file.\r\nInside the virus code there is an advertisement for AMSTRAD computers but\r\na few varieties which were sent to us contaid various messages.\r\n\r\n\r\nThe Oropax virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the Music virus.\r\n*The Oropax virus infects only COM files.\r\n*The sizeof the virus is 2756-2806 bytes.\r\n*Infected files will always be divisible by 51.\r\n*The virus will infect COM files which are not divisible by 51 - except COMMAND.\r\n COM.\r\n*It will remain resident in the memory, and will infect files in the default \r\n directory when Int 21 functions: 13H, 16H, 17H, 39H, 3AH, 3CH, 3DH, 41H, 43H,\r\n 46H are called up.\r\n*These functions are called up by standard DOS commands (COPY, RD, MD, DEL,\r\n REN).\r\n*After a few minutes, randomly, (\"decided\" by the virus) the virus will play 3\r\n different melodies with a 7 minute delay between them.\r\n\r\nThe 640K COM files virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The 640K virus infects only COM files.\r\n*Also called the Stupid virus and the Do-nothing virus.\r\n*The size of the virus is 583 bytes.\r\n*It will stay in the memory by copying itself at the location 9800:0000.\r\n*For this reason the virus works on 640K systems only. \r\n*When an infected file is executed, the virus will search through all COM files\r\n in the current directory and infect one clean file.\r\n*This virus causes no harm to the computer itself.\r\n\r\nThe MIXER 1 viruses (A & B) (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The size of the virus is 1615 bytes, version A, or 1635 bytes, version B,\r\n (plus 0-15 bytes for paragraph alignment). \r\n*The MIXER 1 virus was discovered in Israel in August 1989. The name probably\r\n indicates that there are more MIXER viruses to come. \r\n*CARMEL Software Engineering was the first to find a complete solution to this\r\n virus. The virus was written in Israel and was found on Bulletin Boards. \r\n*This virus infects only EXE files.\r\n*Unlike the April 1st and the Friday 13th viruses it does not uses the INT 21H\r\n function 31H to remain in the computer's memory.\r\n*When executing a program it will mix the information being transferred through\r\n the parallel and serial ports (e.g. � instead of �,[ instead of ]).\r\n*At the end of the infected file the string MIX1 can be found.\r\n*When the CHKDSK program is executed, if the virus is in the memory the amount\r\n of memory reported is 2K less than the actual amount.\r\n\r\nThe Alabama virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 1560 virus.\r\n*One of the smartest and most destructive file viruses.\r\n*Discovered in Israel by CARMEL Software Engineering in September 1989.\r\n*Infects EXE files only.\r\n*The size of the virus is 1560 bytes exactly.\r\n*Like the MIXER 1 it does not use INT 21H function 31H to load itself in the \r\n memory.\r\n*Unlike the MIXER 1 it loads itself 30K below the highest memory location\r\n reported by DOS, BUT IT DOES NOT LOWER THE AMOUNT OF MEMORY  reported by\r\n BIOS or DOS (this may cause big problems).\r\n*This virus steals INT 9 and checks the keyboard for the RESET combination keys\r\n (CTRL + ALT + DEL). It uses IN and OUT commands so that only experienced\r\n programmers know how to deal with this virus.\r\n*When it identifies this combination it will boot the computer using the\r\n Bootstrap routine and will keep lurking in the computer's memory.\r\n*After an hour of operation (the virus checks the hour in every INT 9 or 21\r\n call) the following flashing boxed message will appear:\r\n \r\n SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW\r\n         Box 1055 Tuscambia ALABAMA USA.        \r\n               \r\n*Now for the worst part. The infection system is one of the smartest of all.\r\n*This virus does not infect the file which is currently being executed. First it\r\n checks the current directory for other uninfected files. If it finds a clean\r\n file it will infect it. Then when no further clean files remain, it will infect\r\n the file that is being executed.\r\n*Sometimes, when the virus finds a clean file, instead of infecting it, it will\r\n exchange it for the file that is currently being executed, but will not rename\r\n it. For example, the user may think that he is executing a DISKCOPY program but\r\n instead he is executing a FORMAT program.\r\n\r\nThe 100 Years virus (COM & EXE) (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the 4K, 4096, Frodo, hiding, and Century virus.\r\n* The smartest file viruses.\r\n* Discovered in Israel by CARMEL Software Engineering in October 1989.\r\n* Infects COM, EXE, Overlay and DATA files as well as COMMAND.COM.\r\n* The size of the virus is exactly 4096 bytes.\r\n* It does not use INT 21H function 31H to load itself in the memory.\r\n* It loads itself into the highest memory location reported by DOS, BUT IT DOES\r\n  NOT LOWER THE AMOUNT OF MEMORY reported by BIOS. DOS reports about 6K less\r\n  than BIOS (try CHKDSK).\r\n* When the virus is loading itself into the memory it looks for COMMAND.COM in\r\n  the COMSPEC PATH and infects it.\r\n* The virus reports the infected files as their original size (4K less than they\r\n  are).\r\n* The header of the infected files is changed - but when the virus is in memory \r\n  it will show you the original data which is actualy at the end of the file\r\n  where the virus begins.    \r\n* It adds 100 years to the year stored in the directory. This does not appear in\r\n  the DOS dir which shows only the 2 last digits of the year. \r\n* In this way the virus \"knows\" which file is infected and will reduce its size\r\n  by 4K when executing a DIR command and will show the original file header \r\n  instead of the current header.\r\n* This \"hiding\" trick is very very smart and it makes all the Anti-Virus \r\n  utilities which look for changes in the files worthless.\r\n* Interrupt stealing is very smart and cannot be detected by any mapping utility\r\n  (SMAP, SNOOP, PCTOOLS etc.). This will also bypass any warning utility which\r\n  checks the interrupts for illegal viral actions.\r\n* The virus makes a single step in order to find the lowest memory location \r\n  and to put itself before any other programs which are hooked to the \r\n  interrputs which are used by it..\r\n* The virus is encrypted and smart anti-debugging tricks are used.\r\n* In order to avoid detection by resident warning utilities, it takes a single\r\n  step through INT 21 and checks for the lowest memory location that the system\r\n  calls. It then hooks itself to the original 21 Interrupt.\r\n  (It didn't have much success  trying to \"fool\" TSAFE).\r\n* This virus may cause serious damage to infected files. \r\n  The problem is that due to a bug - sometimes the virus infects files but does \r\n  not update the directory information -  year, size etc. \r\n  This causes DOS to report a message :\r\n \r\n  ERROR in EXE File.  \r\n                            \r\n* This problem can be solved only by running CHKDSK/F and then performing the\r\n  Turbo Anti-Virus cleaning procedure. \r\n* This virus also infects Data files (Lotus 123 SET file, DBASE DBF files etc.)\r\n  which can be restored by the regular cleaning procedure of Turbo Anti-Virus.\r\n  Just use the /A option in order to check all files in your disks - also data\r\n  files.\r\n\r\n* From September 22nd 1990 - all infected program will hang the computer\r\n  immediatlly after loading into memory.\r\n\r\nThe Vienna viruses (versions A, B, C & D) (4 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the DOS 62 seconds virus and the 648 virus.\r\n*Discovered in Israel by CARMEL Software Engineering in November 1989.\r\n*Infects COM files only, including COMMAND.COM.\r\n*The size of the virus is 648 bytes.\r\n*Unlike other file viruses, this one will not load itself into the memory.\r\n*When an infected file is executed - the virus searches in the current PATH for\r\n a clean file and infects it. An infected file can be identified as the seconds\r\n are switched to 62.\r\n*This virus will destroy files randomly by removing the first 5 bytes, and\r\n replacing them with a jump which will reboot the computer.\r\n*This will happen whenever the 7 AND (assembler command) System time in seconds\r\n equals zero.\r\n\r\nThe Lisbon virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the DOS 62 (Lisbon).\r\n*Infects COM files only, including COMMAND.COM.\r\n*The size of this virus is 648 bytes.\r\n*This virus is almost the same as the Vienna virus.\r\n\r\nThe Pretoria virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the South Africa and the June 16th virus.\r\n* Infects COM files only, including COMMAND.COM and even IBMBIO.COM.\r\n* If the virus infect SYSTEM files such as the IBMBIO.COM the disk will no\r\n  longer be bootble and it is necessery to run the SYS utility in order to\r\n  fix the system files again.\r\n* The size of this virus is 879 bytes.\r\n* It will not load itself into the memory.\r\n* On June 16th all files in the ROOR directory will be renamed to ZAPPED.\r\n\r\nThe Christmas virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the XA1 virus.\r\n* Infects COM files only.\r\n* The size of this virus is 1539 bytes.\r\n* It will not load itself into the memory.\r\n* On April 1st it will destroy the FAT.\r\n* From December 24th to January 1st it will draw a picture of a Christmas\r\n  Tree.\r\n\r\nThe Sylvia virus. (1 variety)\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Netherlands Girl virus.\r\n*Infects COM files only (excluding COMMAND.COM).\r\n*The size of the virus is 1332/1301 bytes.\r\n*It loads itself into the memory with MCB's.\r\n*The virus changes the current drive to drive 'C:'.It infects all the files\r\n in the C root directory, current directory and files being executed.\r\n*Some of the files may be destroyed and only the virus program (1332 bytes) \r\n will remain in place of the lost file.\r\n*The virus will disable write-protect messages.\r\n*A girl's name (Sylvia) and her address are in the virus asking you to send \r\n a funny postcard and in return you will be sent an anti-virus (for this virus).\r\n*We didn't try - we didn't have to!\r\n\r\nThe DataCrime A virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 1168 virus and Columbus day virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1168 bytes.\r\n*It loads itself into the memory with MCB's.\r\n*On October the 12th it will write on the screen: \r\n\r\n 1 MARCH 1989, DATACRIME VIRUS \r\n                      \r\n and then will format your hard disk (first track - that is enough!).\r\n*A very nasty virus which has caused much trouble and panic all over the world.\r\n\r\nThe DataCrime B virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 1280 virus and Columbus day virus.\r\n*Almost the same as DATACRIME A.\r\n*Beware of other anti-viruses which identify only the DATACRIME A, they might\r\n crash your files 'thinking' DATACRIME B is DATACRIME A. \r\n\r\nThe DataCrime C virus (COM & EXE) (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Columbus day virus and DataCrime II-A.\r\n*Infects COM & EXE files.\r\n*The size of the virus is 1514 bytes.\r\n*This virus is encrypted, it will stick to any executable file (including \r\n COMMAND.COM) which is smaller than 60K (approx.).\r\n*It will infect files on drives A, B and C only; other drives are safe.\r\n*Every time an infected file is executed, the virus will look through all the\r\n directories for clean files in drives A, B and C and will infect the first\r\n clean file it finds.\r\n*When the virus infects a file it will perform a sector alignment - leaving\r\n garbage at the end of the file.\r\n*On October the 12th it will write on the screen: \r\n\r\n                       谀哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\n                       � 1 MARCH 1989, DATACRIME VIRUS �\r\n                       滥哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪�\r\n                       \r\n and then will format your hard disk (first track -that is enough!).\r\n*A very nasty virus which has caused much trouble and panic all over the world.\r\n\r\nThe Syslock (COM) (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 3551 virus.\r\n*Infects COM files.\r\n*The size of the virus is 3551 (+0-15 paragraph alignment) bytes.\r\n*This virus is encrypted, it will stick to any executable COM file (including \r\n COMMAND.COM).\r\n*It will not load into the memory.\r\n*It will infect files on the default drive only, other drives are safe.\r\n*Every time an infected file is executed, the virus will look through all the\r\n directories for clean files in the default drive and will infect a clean COM\r\n file, at random.\r\n*When the virus infects a file it will perform a paragraph alignment - leaving\r\n garbage at the end of the file.\r\n*At random it will cause a DOS error alarm: \r\n\r\n Error writing to device AUX \r\n                   \r\nThe MachoSoft virus (COM) (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects COM files.\r\n*The size of the virus is 3551 (+0-15 paragraph alignment) bytes.\r\n*This virus is encrypted, it will stick to any executable COM file (including \r\n COMMAND.COM).\r\n*The structure and encryption method are the same as in the Syslock virus.\r\n*It will not load into the memory.\r\n*It will infect files on the default drive only, other drives are safe.\r\n*Executing the command VIRUS=OFF will stop the virus action and infection \r\n unless the COMMAND.COM file is infected. In this case every time the system\r\n boots and loads COMMAND.COM another file will be infected.\r\n*Every time an infected file is executed, the virus will look through all the\r\n directories for clean files in the default drive, and will infect a clean COM\r\n file at random.\r\n*When the virus infects a file it performs a paragraph alignment - leaving\r\n garbage at the end of the file.\r\n*The virus will create a \"hidden/read only\" file which is called IBMIONET.SYS.\r\n*When an infection takes place, the virus reads 20 sectors (using int 25) and\r\n stores the number of the last sector in the file.\r\n*Then it looks for the string \"Microsoft\" inside the sectors and changes the\r\n \"Microsoft\" into \"Machosoft\". After that it writes the 20 sectors back with the\r\n changes.\r\n*This virus has big problems with DOS 4.\r\n\r\nThe Ghost File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the 2351 virus.\r\n*Infects COM files only.\r\n*The size of the virus is 2351 bytes.\r\n*This virus  will stick to any executable COM file (excluding COMMAND.COM).\r\n*The seconds in the time field of the file are changed to 62 as in the Vienna\r\n viruses.\r\n*Every 8th file will be permanently damaged. \r\n*Every time an infected file is executed, the virus will look for clean files in\r\n the default directory and will infect a clean COM file.\r\n*When an infected file is executed the virus will look for a 360K floppy in \r\n drive A and will infect the boot sector of this disk with a Boot virus which\r\n is very similar to the Ping-Pong virus but does not have an infection routine.\r\n\r\nThe 1260 File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects COM files only.\r\n*The size of this virus is 1260 bytes.\r\n*This virus is a variety of the Vienna (62 Seconds) virus.\r\n*It changes the seconds in the directory to 31 (instead of 62), in order to\r\n identify an infected file. Every file with 31 seconds in the directory time\r\n field will not become infected.\r\n*The virus looks for clean files to infect through the DOS PATH.\r\n*This virus does not remain in the memory.\r\n*This virus  will stick to any executable COM file (excluding COMMAND.COM).\r\n*It is encrypted and the description routine is changed at random in order to\r\n confuse the search routines. (It didn't have any success with us,but it\r\n certainly gave us a good fight.  We consider it the hardest virus to search\r\n for, since there is nothing constant in the virus code).\r\n*Simple Anti-Debugging tricks can be found but not as clever as we found in\r\n the 100 Years virus.\r\n\r\nThe 2930 File virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the Spanish virus.\r\n*Infects COM & EXE files including COMMAND.COM.\r\n*The size of the virus is 2930 bytes.\r\n*Steals INT 24H in order to avoid READ\\WRITE error reports.\r\n*Looks for one executable file, infects it and then remains in the memory using\r\n INT21H function 31H.\r\n*While in the memory it will infect any file being executed.\r\n*Uses simple Anti-Debugging tricks.\r\n\r\nThe Traceback File virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the 3066.\r\n*Infects COM & EXE files including COMMAND.COM.\r\n*The size of the virus is 3066 bytes.\r\n*This virus is almost identical to the 2930 virus and one of them was probably \r\n based on the other.\r\n*It steals INT 24H in order to avoid Read \\ Write error reports.\r\n*It looks for one executable file, infects it and then remains resident using\r\n INT 21H function 31H.\r\n*While in the memory, it will infect any file which is executed.\r\n*Uses simple Anti-Debugging tricks.\r\n\r\nThe 1720 File virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the Spanish II virus.\r\n*Infects COM & EXE files excluding COMMAND.COM.\r\n*The size of the virus is 1720 bytes including a 5 byte signature.\r\n*Signature at the end of the file is: \"=PSQR\" \r\n*When the signature is present - file will not be infected.\r\n*It looks for one executable file, infects it and then remains resident using\r\n INT 21H function 31H.\r\n*While in the memory, it will infect any file which is executed.\r\n*EXE files may be damaged immediately after infection - last 30 bytes are\r\n totaly destroyed.\r\n\r\nThe ZeroBug File virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the Pallete and the 1536 virus.\r\n*Infects COM & EXE files excluding COMMAND.COM.\r\n*The size of the virus is 1536 bytes.\r\n*While in the memory, it will infect any file which is executed.\r\n*While in memory - infected files size is shown to be 1536 bytes less -  as \r\n it was before the infection.\r\n*After a while - a bug will apear on the screen and will start eating all the\r\n zero characters.\r\n Very funny...\r\n\r\nThe JOJO File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Infects COM files only including COMMAND.COM.\r\n* The size of the virus is 1701 bytes.\r\n* This virus  will stick to any executable COM file (including COMMAND.COM) which\r\n  is smaller than 63800 bytes. \r\n* This virus randomly destroys the first tracks of every drive which it infects.\r\n* The virus remains in the memory by using memory control blocks.\r\n* Inside the virus the following strings can be found:\r\n\r\n  Welcome to the JOJO virus. \r\n  and\r\n  Fuck the system (c) - 1990 \r\n\r\n* This virus was sent to us by Eran Livne from Israel who won a Regsitered \r\n  version of Turbo Anti-Virus.\r\n  Thank you Eran...\r\n\r\nThe 1701 File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Falling tears, Herbist, Autumn leaves virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1701 bytes.\r\n*This virus  will stick to any executable COM file (including COMMAND.COM) which\r\n is smaller than 63800 bytes.\r\n*This virus was designed to operste on IBM PC clones only and on IBM PC original\r\n systems.\r\n*However there is a bug in the program which causes the virus to be activated\r\n on any system.\r\n*The virus remains in the memory by using memory control blocks.\r\n*It is activated randomly and only in the years 1980 and 1988 in September,\r\n October, November and December (Autumn).\r\n*When the virus is activated - the letters start falling to the bottom of the\r\n screen (CGA, EGA, VGA cards & monitors only).\r\n*The virus is encrypted.\r\n\r\n*This virus was sent to us by Yuval Tal from Israel who won a Regsitered \r\n version of Turbo Anti-Virus.\r\n Thank you Yuval...\r\n\r\nThe 1704-A File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Blackjack ,Falling tears, Autumn leaves  virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1704 bytes.\r\n*This virus  will stick to any executable COM file (including COMMAND.COM) which\r\n is smaller than 63800 bytes.\r\n*The bug in the virus program (which causes it to be activated on any system)\r\n has been fixed.\r\n*The virus remains in the memory by using memory control blocks.\r\n*It is activated randomly and only in the years 1980 and 1988 in September,\r\n October, November and December (Autumn).\r\n*When the virus is activated - the letters start falling to the bottom of the\r\n screen (CGA, EGA, VGA cards & monitors only).\r\n*The virus is encrypted.\r\n\r\nThe 1704-B File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Falling tears, Autumn leaves virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1704 bytes.\r\n*This virus  will stick to any executable COM file (including COMMAND.COM) which\r\n is smaller than 63800 bytes.\r\n*The bug in the virus program (which causes it to be activated on any system)\r\n has been fixed.\r\n*The virus remains in the memory by using memory control blocks.\r\n*It is activated randomly and only in the years 1980 and 1988 in September,\r\n October, November and December (Autumn).\r\n*When it is activated - the letters start falling to the bottom of the screen\r\n (CGA, EGA, VGA cards & monitors only).\r\n*The virus is encrypted.\r\n\r\nThe 1704-C File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Falling tears, Autumn leaves virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1704 bytes.\r\n*Almost the same as the 1704-A.\r\n\r\nThe 1704-Format File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Falling tears, Autumn leaves virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1704 bytes.\r\n*Almost the same as the 1704-A.\r\n*This virus will also format hard disks - be careful.\r\n*The virus is encrypted.\r\n\r\nThe 17Y4 File virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Cascade, Falling tears, Autumn leaves virus.\r\n*Infects COM files only.\r\n*The size of the virus is 1704 bytes.\r\n*Almost the same as the 1704-A.\r\n\r\nThe Dark Avenger virus (COM & EXE) (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects COM & EXE files.\r\n*The size of the virus is 1805 bytes (+0-15 bytes for paragraph alignment).\r\n*It loads itself into the memory with MCB's.\r\n*The virus writes to the boot sector and does other bad things with the FAT.\r\n*Uses simple Anti-Debbuging tricks.\r\n*The virus contains the message: \r\n\r\n Eddie lives somewhere in time.\r\n                       \r\nThe FU-Manchu A  virus (COM & EXE) (2 varieties)\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also called the 2086 virus.\r\n*Infects COM & EXE files.\r\n*The size of the virus is 2086 bytes.\r\n*It loads itself into the memory with MCB's.\r\n*The funniest virus we have ever received.\r\n*It steals interrupts 21 (DOS), 9 (Keyboard), and 16 (Keybard).\r\n*Int 16 will be installed only after August 1989.\r\n*This virus will do the following things:\r\n\r\n  -When CTRL+ALT+DEL are pressed it will write the message:\r\n  \r\n  The World will hear from me again !!! \r\n                   \r\n  -When you type : 'fuck'     it will be erased.\r\n  -When you type : 'waldheim' it will continue - 'is a nazi.'\r\n  -When you type : 'thacher'  it will continue - 'is a cunt.'\r\n  -When you type : 'reagen'   it will continue - 'is an arshole.'\r\n  -When you type : 'FuManchu' it will continue - 'virus date:' etc...\r\n\r\n*As you can see, the author of the virus didn't know English very well. \r\n\r\nThe Icelandic  viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects EXE files only.\r\n*The size of the virus is 652 bytes (+0-15 bytes for paragraph alignment).\r\n*It loads itself into the memory with MCB's.\r\n*The virus infection system is very much like the MIXER's viruses and probably\r\n the MIXER's author copied it from this virus since it is older.\r\n*It will copy itself at the end of the memory and lower the amount of memory \r\n reported by DOS by 2K (CHKDSK).\r\n*The first version of this virus will infect every 10th file executed which is\r\n the reason why it is not very popular; the second version will infect any file,\r\n but this is the only difference between them.\r\n*The virus will mark one bad cluster in the FAT of the infected disk.\r\n\r\nThe Icelandic II  viruses (1 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects EXE files only.\r\n*The size of the virus is 632 bytes (+0-15 bytes for paragraph alignment).\r\n*It loads itself into the memory with MCB's.\r\n*The virus infection system is very much like the MIXER's viruses and probably\r\n the MIXER's author copied it from this virus since it is older.\r\n*It will copy itself at the end of the memory and lower the amount of memory \r\n reported by DOS by 2K (CHKDSK).\r\n*The first version of this virus will infect every 10th file executed which is\r\n the reason why it is not very popular; the second version will infect any file,\r\n but this is the only difference between them.\r\n*The virus will mark one bad cluster in the FAT of the infected disk.\r\n\r\nThe Saratoga virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects EXE files only.\r\n*The size of the virus is 640 bytes (+0-15 bytes for paragraph alignment).\r\n*It loads itself into the memory with MCB's.\r\n*This virus is almost identical to the Icelandic virus.\r\n*It will copy itself at the end of the memory and lower the amount of memory\r\n reported by DOS by 2K (CHKDSK).\r\n*This version of the virus will infect every 2nd file executed.\r\n*The virus will mark one bad cluster in the FAT of the infected disk.\r\n\r\nThe 405 virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects / Overwrites COM files only.\r\n*This virus will destroy the infected file and will replace it by 405 bytes of\r\n code.\r\n*More of a Trojan horse than a virus...\r\n\r\nThe 512 virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Infects / Destroys COM files only.\r\n*The size of the virus is 512 bytes (the file size will not grow).\r\n*Remains in the memory.\r\n*This virus will overwrite itself (512 bytes) at the beginning of the file, \r\n destroying the previous code which was there.\r\n*More of a Trojan horse than a virus... \r\n\r\nThe Aids virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Hahaha and Taunt virus.\r\n*Infects / Overwrites COM and EXE files.\r\n*When activated the virus displays the message: \r\n\r\n Your computer now has AIDS, \r\n                       \r\n and hangs the computer. (That's it, stuck dead.)\r\n*The virus overwrites the first 13K of the infected file - destroying the\r\n original data with no way to rebuild the file.\r\n\r\nThe Perfume virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nSize: 768 bytes.\r\nIt infects only COM files (excluding COMMAND.COM).\r\nStays resident by replicating itself to the end of memory (1024 bytes).\r\nWhile in memory - infects every file which is being executed.\r\nThis virus was sent to us by Mr. Arieh Goretsky from MacAffe Co USA.\r\n\r\nThe Yankee Doodle 1 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 2890 (+0-15 bytes for paragraph alignement) bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's .\r\n* While in memory - infects every file which is being executed.\r\n* At 17:00, if the virus is in memory - It will start playing the Yankee Doodle\r\n  melody.\r\n* Staels interrupts 1,3,1CH,21H and 24H (during infection only).\r\n* Virus uses Sinlge step in order to locate the original INT 21H address.\r\n* Virus can repair it self if it finds that an Anti-Virus tried to disable\r\n  it in memory (Didn't help it self much when we aliminated it).\r\n* This virus is a part of the family of other Doodles and Vacisnas viruses\r\n  which are capable of identifing each other and remove an older version\r\n  of the virus before infecting it with a new version.\r\n  the number of version cam be seen at the end of the file.\r\n* This virus was delivered to us at the CeBIT 90' fair by Pavel Baudis from\r\n  CZECHOSLOVAKIA who won a Registered version of Turbo Anti-Virus.\r\n  Thank you Pavel...\r\n\r\nThe Yankee Doodle 2 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 2940 (+0-15 bytes for paragraph alignement) bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's .\r\n* While in memory - infects every file which is being executed.\r\n* At 17:00, if the virus is in memory - It will start playing the Yankee Doodle\r\n  melody.\r\n* Almost the same as the other Yankee Doodle viruses.\r\n\r\nThe Yankee Doodle 3 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 2772 (+0-15 bytes for paragraph alignement) bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's .\r\n* While in memory - infects every file which is being executed.\r\n* At 16:59:57, if the virus is in memory - It will start playing the \r\n  Yankee Doodle melody.\r\n* Almost the same as the other Yankee Doodle viruses.\r\n* This virus was delivered to us at the CeBIT 90' fair by users from East \r\n  Europe.\r\n\r\nThe Haloechen virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 2011 (+0-15 bytes for paragraph alignement) bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's (not with  Int 21H or 27H).\r\n* While in memory - infects every file which is being executed.\r\n\r\nThe Vacsina v5 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 1217 bytes ,EXE file - 132 additional bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's .\r\n* While in memory - infects every file which is being executed.\r\n* Infects EXE files with Entry point of 0000:0000.\r\n* It infects EXE files in 2 stages: 132 bytes and than 1217 bytes.\r\n* EXE file are infected by placing a jump at the head of the file instead of\r\n  the 'MZ' EXE file identifier.\r\n* At the end of the virus there is a number which indicates the version \r\n  of the virus.\r\n* New versions wii identify old versions and will replace them instead of\r\n  infecting the file again.\r\n* This virus is a part of the family of other Doodles and Vacisnas viruses\r\n  which are capable of identifing each other and remove an older version\r\n  of the virus before infecting it with a new version.\r\n  the number of version cam be seen at the end of the file.\r\n* This virus was delivered to us at the CeBIT 90' fair by users from East \r\n  Europe.\r\n\r\nThe Vacsina v16 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 1350 bytes, EXE file - 132 additional bytes.\r\n* Almost the same as Vacsina v5.\r\n\r\nThe Vacsina v24 virus (2 varieties EXE & COM).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Size: 1760 bytes bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident in memory using MCB's .\r\n* While in memory - infects every file which is being executed.\r\n* EXE files larger than 62K will not be infected.\r\n* EXE file are infected by placing a jump at the head of the file instead of\r\n  the 'MZ' EXE file identifier.\r\n* At the end of the virus there is a number which indicates the version \r\n  of the virus.\r\n* New versions will identify old versions and will replace them instead of\r\n  infecting the file again.\r\n* This virus is a part of the family of other Doodles and Vacisnas viruses\r\n  which are capable of identifing each other and remove an older version\r\n  of the virus before infecting it with a new version.\r\n  the number of version cam be seen at the end of the file.\r\n* This version of vacsina steals INT 9 (keyboard) and when the ALT-CTRL-DEL\r\n  combination is pressed - it plays the Yankee Doodle melody.\r\n\r\n* This virus was sent to us by the virus hunter Mr. Szegedi Imre from Budapest,\r\n  Hungary.\r\n\r\nThe Aids Information Trojan (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n* This hard disk \"eater\" is not a virus but a Trojan.\r\n\r\n* It was released on December 1989 and was spread by an unknown company named\r\n  Cyborg from Panama.\r\n  This company invested 150,000 U.S.$. in order to send thousands copies of the\r\n  disk which contained the Trojan.\r\n\r\n* The disk contains two files. The first one is the file AIDS.EXE which is a \r\n  big database of information about the Aids virus (not the computer virus).\r\n  The other file is an INSTALL utility which must be executed to install the\r\n  AIDS file on a computer system which includes a Hard-Disk, otherwise the\r\n  AIDS file will not run.\r\n* During the installation, the AUTOEXEC.BAT file is changed to AUTO.BAT file\r\n  and a new AUTOEXEC.BAT file is written by the INSTALL utility.\r\n* After 90 reboots of the system - the disk is reformated by the program.\r\n\r\nThe Taiwan virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the sunny virus.\r\n* Infects COM files only, including COMMAND.COM.\r\n* Size: 743 bytes.\r\n* This virus will not load itself into memory.\r\n  When an infected file is being executed - the virus searches in C drive\r\n  a clean file and then infects it.\r\n* It will place itself instead of the 743 first bytes of the file and the \r\n  code which was there before will be transfered to the end of the file.\r\n\r\nThe DBASE virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nSize: 768 bytes.\r\nIt infects only COM files (excluding COMMAND.COM).\r\nStays resident by replicating itself to the end of memory (1024 bytes).\r\nWhile in memory - infects every file which is being executed.\r\nThis virus was sent to us by Mr. Arieh Goretsky from MacAffe Co USA.\r\n\r\nThe V2000 virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nSize: 2000 bytes.\r\nIt infects COM & EXE files (excluding COMMAND.COM).\r\nStays resident by replicating itself to memory without using INT 21H.\r\nWhile in memory - infects every file which is being executed.\r\nThis virus was sent to us by the virus hunter Mr. Szegedi Imre from Budapest,\r\nHungary.\r\n\r\nThe Victor virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also called the Ivan virus.\r\n* Size: 2442 bytes.\r\n* It infects COM & EXE files (excluding COMMAND.COM).\r\n* Stays resident by replicating itself to memory without using INT 21H.\r\n* While in memory - infects every file which is being executed.\r\n* This virus was sent to us by the virus hunter Mr. Szegedi Imre from Budapest,\r\n  Hungary.\r\n\r\nThe Friday 13th 1 COM virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the South Africa 2 and virus-B.\r\n* Infects COM files only, including COMMAND.COM and even IBMBIO.COM.\r\n* The size of this virus is 425 bytes.\r\n* It will not load itself into the memory.\r\n* Infects all clean files in the current directory.\r\n\r\nThe Friday 13th 2 COM virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also known as the South Africa 2 and virus-B.\r\n* Infects COM files only, including COMMAND.COM and even IBMBIO.COM.\r\n* The size of this virus is 549 bytes.\r\n* It will not load itself into the memory.\r\n* Infects all clean files in the current directory.\r\n\r\nThe VP virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Infects COM files only, including COMMAND.COM and even IBMBIO.COM.\r\n* The size of this virus is 904 bytes.\r\n* It will not load itself into the memory.\r\n* In the first 16 bytes of the infected file - the 2 letters VP can be found.\r\n* The virus writes to the boot sector of every drive in the system thses \r\n  2 bytes (VP).\r\n\r\nThe Barcelona virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Infects EXE files only. \r\n* The size of this virus is 1157 (+0-15 bytes for paragraph alignement).\r\n* It will not load itself into the memory.\r\n* Infects one clean file in the current directory.\r\n* If infection fails - the virus will delete the file.\r\n* The virus is encrypted.\r\n* The word Barcelona can be found after the decription.\r\n\r\nThe Lehigh viruses (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* One of the first viruses for PC computers working under DOS.\r\n* Detected for the first time at the Lehigh University.\r\n* Infects only, COMMAND.COM.\r\n* COMMAND.COM file will not grow.\r\n* Virus locate the stack area inside the COMMAND.COM and put itself\r\n  inside avoiding by this the growing of the file.\r\n* Load itself into the memory and steals INT 21 (using INT 44 instead).\r\n* Will look for the COMMAND.COM file at the current drive ROOR directory.\r\n* Version #2 of this virus is known as a DISK formatter.\r\n\r\nThe 5120 virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Also called the BASIC virus.\r\n* Infects COM & EXE files  - excluding COMMAND.COM. \r\n* The size of this virus is 5120 (+0-15 bytes for paragraph alignement).\r\n* It will not load itself into the memory.\r\n* Infects all clean file in the current directory and looks for clean \r\n  files on drive C through all directories.\r\n  This action takes a lot of time.\r\n* From April 1st 1992 - All infected files will stop running and the \r\n  message : \"Access Denied\"  will be displayed.\r\n* Inside the virus code - the word BASRUN can be found.\r\n* This virus was sent to us by Alfred Manthy Rojan from West Germany, who\r\n  got a registered Turbo Anti-Virus package free of any charge.\r\n  Thank you Alfred...\r\n\r\nThe 8 Tunes virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n* Infects COM & EXE files  - excluding COMMAND.COM. \r\n* The size of this virus is 1971 (+0-15 bytes for paragraph alignement).\r\n* It willload itself into the memory.\r\n* Infects every clean file which is being executed.\r\n* When the day comes it will play one of the 8 Tunes which it \"knows\"\r\n\r\n\r\n\r\n\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nThese are the 108 types of file viruses (identification and safe elimination).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n\r\n\r\n\r\n\r\n\r\n                             Boot Infecting Viruses\r\n                            哪哪哪哪哪哪哪哪哪哪哪哪\r\n                         \r\n\r\nThe Ping-Pong virus (A, B, C, D) (4 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The first Boot Sector virus to be discovered in Israel.\r\n*It is also called the Bouncing Ball, and the Italian virus.\r\n*This is a \"nice\" virus (in comparison with the others), which infects the DOS\r\n boot sector of floppy and hard disks.\r\n*Every time the computer is booted from an infected diskette the memory will\r\n retain the virus.\r\n*While booting, the virus loads itself at the end of the memory (as reported\r\n by BIOS) and lowers the amount of reported memory by 2K.\r\n*After a while, a bouncing ball will appear on the screen and will not stop\r\n until the computer is rebooted.\r\n*The infection is very quick and by simply executing a DIR command on a clean\r\n diskette it will become infected.\r\n*When mapping an infected disk (e.g. with PCTOOLS) one cluster is marked as bad\r\n whereas actually the original boot sector was placed there by the virus\r\n program.\r\n*A new variety of the Ping-Pong virus was identified in March 1990.\r\n*This variety will not lower the memory size (BIOS) by 2K but will set the size\r\n to a constant value.\r\n\r\nThe MisSpeller virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Typo virus.\r\n*The MisSpeller virus is an Israeli mutation of the Ping-Pong virus.\r\n*90% of the boot system is exactly the same as the Ping-Pong, which caused some\r\n Anti-Virus programs to destroy disks because they identified the virus as the\r\n Ping- Pong.\r\n*However, Turbo Anti-Virus(tm) recognized that it was a new virus and did not\r\n destroy the disk, due to smart and careful virus elimination and data\r\n recovery techniques.\r\n*The MisSpeller also infects the DOS Boot sector and loads itself at the end of\r\n the memory during booting.\r\n*The amount of memory is lowered by 2K exactly as with the Ping-Pong virus.\r\n*This virus, however, will not simply bounce a \"nice\" ball on your screen.\r\n*The minute it loads itself, it will start mixing the data which is being\r\n transferred through the parallel port.\r\n*English, Hebrew and digits are mixed up in order to cause great confusion (V is\r\n mixed with W, C with K, J with G, � with �, � with �, etc..).\r\n\r\nThe Disk Killer virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nAlso known as the Ogre virus.\r\nThe Disk Killer infects the DOS Boot sector and loads itself to the end of \r\nmemory during boot.\r\nThe amount of memory is lowered by 8K.\r\nThe virus size is 3 clusters which are marked as BAD in the FAT.\r\nDue to a BUG in the virus code other clusters are incorrectly marked as BAD\r\ninstead of the right ones.\r\nThe virus may also put himself on top of a file - destroying it while it does\r\nso.\r\nA counter inside the virus checks for the number of disks which it has \r\ninfected and than formats the Hard-Disk.\r\n\r\nA very destructive virus. \r\n\r\n\r\nThe Stoned virus (version A and B) (3 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The stoned virus was discovered in Israel by CARMEL Software Engineering in\r\n September 1989.\r\n*Also known as the Marijuana virus and the New-Zealand virus.\r\n*It is a very destructive virus which infects the Boot Sector.\r\n*No bad clusters are marked when this virus infects a disk.\r\n*When booting from an infected disk - it will sometimes display the message:\r\n\r\n Your PC is Stoned - LEGALIZE MARIJUANA.\r\n                     \r\n*This little virus loads itself, while booting, at the end of the memory and\r\n lowers the amount of memory reported by  BIOS by 2K (like the PING-PONG and\r\n MisSpeller viruses).\r\n*It will save the original boot sector in TRACK 0, SIDE 1, SECTOR 3 on floppies,\r\n and in TRACK 0, SIDE 0, SECTOR 7 on hard disks.\r\n*This virus will not save the data which was in that sector before the\r\n infection, causing great damage to the directory and FAT.\r\n*There are at least 5 versions of the Marijuana\\Stoned virus.\r\n\r\n\r\nThe Yale virus (2 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*Also known as the Alameda and Merritt virus.\r\n*This virus will infect 360K floppy disks only (not hard disks).\r\n*When a clean diskette is inserted in the drive and the computer is booted using\r\n CTRL+ALT+DEL the virus will infect it.\r\n*The virus stores the original boot sector at track 39 sector 8 head 0,\r\n destroying the data which was there before the infection occurred.\r\n*The virus will not cause any other damage.\r\n\r\n\r\nThe Ghost Boot virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*This virus is not a regular one. Actually it is not a virus at all.\r\n*The Ghost Boot virus is planted by the Ghost file virus on a 360K floppy disk\r\n which is situated in drive A at the time of execution.\r\n*It is very much like the ping-pong virus but it does not have an infection\r\n routine and therefore it will only load into the memory and will not infect\r\n other disks.\r\n*This virus can be found in 360K floppies only (not in hard disks).\r\n*The virus stores the original boot sector at track 39 sector 9 head 1,\r\n destroying the data which was there before infection occurred.\r\n*The virus will not cause any other damage.\r\n\r\n\r\nThe Den-Zuk virus (1 variety).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*The Den-Zuk virus infects 360K floppy disks only. \r\n*It loads itself at the end of the memory and lowers the amount of memory\r\n reported by BIOS by 7K.\r\n*The virus stores the original boot sector at track 40 head 0, which it formats\r\n in a non-standard format (sectors 33-42 instead of 1-9).\r\n*This virus looks for the Brain virus in the boot sector before infection takes\r\n place. If it finds the Brain virus - it will save the Boot sector which was\r\n saved by the Brain virus and not the current boot sector.\r\n*When the virus is in the memory - any clean floppy disk which is inserted in\r\n disk drive A or B will become infected.\r\n*The virus steals interrupts 13 (DISK I/O) and 9 (Keyboard).\r\n*When the ALT-CTRL-DEL keys are used to boot the system,the virus will show the\r\n Den-Zuk logo, on a graphic screen only (a nice picture!).\r\n*The virus will not cause any other damage.\r\n\r\nThe Pakistani Brain viruses (regular, version 9.00 and Ashar) (3 varieties).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n*This virus  was  the  second  boot-sector  virus  discovered in Israel (after\r\n the Ping-Pong virus). It is a little bigger, and uses some smart tricks.\r\n*Like  all  boot-sector  viruses,  the  Brain  virus infects a disk by changing\r\n the boot-sector, so that when the system is booted from an infected  diskette,\r\n the virus is loaded into the memory, even before the system is operated. The\r\n virus itself is located in sectors marked as \"bad  sectors\"  on  the disk,\r\n which take 3K bytes from the free sectors of the disk.\r\n*The  Brain  virus can be easily recognized because the boot-sector of an\r\n infected disk contains a message dedicating it to \"all the viruses  which  are\r\n no longer with us\". Some versions of the Brain  virus  even  contain the\r\n address and phone number of the authors who wrote the virus!\r\n*One  of  the  easiest  ways  to  recognize  this  virus  is that on an infected\r\n system disk, the volume label is changed to \"Brain\". (You can see it with a\r\n simple 'dir' command on the infected disk).\r\n*To make it harder to destroy the Brain virus uses a very smart trick - If the\r\n virus is in the computer's memory (after being booted from an infected disk),\r\n each time the computer tries to read  or  write to the boot sector - the virus\r\n uses the original boot sector!  This  means  that you cannot just write a\r\n normal boot-sector on the infected disk in order to destroy the virus, because\r\n the virus will not allow this! (This method will work on the Ping- Pong virus,\r\n but then the bad sectors on the disk will be lost, so it is not recommended).\r\n*In  order  for the computer's memory to become infected, it has to be booted\r\n from an infected disk. However once the virus is in the memory -any  diskette\r\n that is inserted in the disk drive will become infected!  It  is  enough  to\r\n type \"A:\" or \"DIR A:\" to infect the diskette in drive A.\r\n \r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nThese are the 16 types of Boot Sector / Partition table viruses.\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n   Turbo Anti-Virus will also detect the following file viruses:\r\n\r\n * Doodle B\r\n * Kennedy\r\n * AIDS II\r\n * Amoeba 1392\r\n * Agiplan\r\n * Eddie 2 (Dark Avenger 2)\r\n * Pixel 1\r\n * Pixel 2\r\n * Polish virus\r\n * 1210 virus\r\n * 1559 virus\r\n * VComm virus\r\n * ItaVir\r\n * Solano\r\n * 12 Tricks Trojan A\r\n * 12 Tricks Trojan B\r\n * Joker\r\n * Icelandic 3\r\n * Virus-90\r\n * Jerusalem 1 (Friday 13th variety).\r\n * Jerusalem 2 (Friday 13th variety).\r\n * Vacsina X.\r\n * Devil's Dance \r\n * DataCrime D COM (DataCrime II-B)\r\n\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nThese are the 24 FILE-Infecting viruses (identification  -  no elimination).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n\r\n Turbo Anti-Virus will also detect the following boot viruses:\r\n\r\n * Korea\r\n * EDV\r\n * Pentagon.\r\n * Ohio.\r\n * Falling letters / Israeli BOOT.\r\n * Chaos\r\n\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\nThese are the 6 BOOT viruses (identification  -  no elimination).\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n            谀哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪目\r\n            � Send us new viruses (including those viruses which     �\r\n            � are only identified) and win a FREE registered version �\r\n            � of Turbo Anti- Virus with 12 months guarantee.         �\r\n            滥哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪馁\r\n\r\n\r\n                                Total Viruses\r\n\r\n                 108  File viruses Identification & Elimination.\r\n                  16  Boot viruses Identification & Elimination.\r\n                  24  File viruses Identification.\r\n                   6  Boot viruses Identification.\r\n\r\n\r\n                              Total of 154 viruses\r\n\r\n\r\n\r\n哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪哪\r\n\r\n\r\n For more details, or to place an order, please ask your \r\n local software dealer about Turbo Anti-Virus(tm).\r\n\r\n or\r\n\r\n Contact us directly.\r\n\r\n\r\n USA Main Office:\r\n                          \r\n CARMEL Software Engineering\r\n 177  Palisade Av.  \r\n Cliffside Park.          \r\n New-Jersey 07010         \r\n USA.                     \r\n                          \r\n TEL: 201-945-5751      \r\n FAX: 201-945-9029      \r\n                          \r\n     \r\n                                                \r\n                                                \r\n Eli Shapira & Yuval Sherman\r\n CARMEL Software Engineering\r\n                                        \r\n\r\n\r\n\r\n                                  - END -"
}