R
Robert Green
Windows 2000 or >Windows XP and NTFS on a single bootNope, can't get a boot sector virus that way with a
system.
Of course you can. The fact that HDD boot priority can avoid
infection from floppy doesn't mean it can't happen. Not all
systems are configured that way.
Windows XP or >Windows 2000, which can't be booted from aIf the BIOS not set to
boot from floppy disk first (and why would it be with
floppy disk) then the floppy >drive will not be accessed on
boot up.
Most systems I see these days have CDROM, A, C boot
priority.
And NT *can* be booted from floppy, though that fact is
irrelevant to this discussion (for a free DOS/NT dual boot
floppy go here: http://download.filerecovery.biz).
infect the >system.Once Windows 2000 or XP takes
control, then a boot sector virus on a floppy disk cannot
True but irrelevant.
Kindly refrain from top posting, please.
Bob
--
Robert Green
BootMaster Partition Recovery
http://bootmaster.filerecovery.biz
bob[dot]green[at]filerecovery[dot]biz
--
Phil Weldon, pweldonatmindjumpdotcom
For communication,
replace "at" with the 'at sign'
replace "mindjump" with "mindspring."
replace "dot" with "."
news:[email protected]...news:[email protected]...aTell us, how does one even GET a boot sector virus on
single-boot Windows2000 or Windows XP using NTFS on a single boot system?
By starting up with an infected floppy in drive A. BSV hard
drive infection exploits the BIOS and has nothing to do with
the operating system or file system in use.
Bob
--
Robert Green
BootMaster Partition Recovery
http://bootmaster.filerecovery.biz
bob[dot]green[at]filerecovery[dot]biz
(and--
Phil Weldon, pweldonatmindjumpdotcom
For communication,
replace "at" with the 'at sign'
replace "mindjump" with "mindspring."
replace "dot" with "."
Zvi Netiv wrote:
Boot viruses is where AV software always did a lousy job. Lots of
false alarms,
misidentification of the virus, and the worst - high percentage of
unsuccessful
"disinfection" that ended in loss of access to partition(s), or loss
of self
boot ability.
and yet the google archives of alt.comp.virus
to a lesser extentofalt.comp.anti-virus) are chock full of examples
peoplemy*successfully* removing boot infectors with anti-virus products...
Wrong keywords for the search. ;-)
i wasn't doing a keyword search, i was working off
memory from the 9sourceyears i've spent in alt.comp.virus and 3 years in alt.comp.anti-virus...
The victims of unsuccessful BSI disinfection aren't limited to acv /
aca-v.
Obviously, your selective memory isn't the best
for reference.failed'There are more hits for failed disinfection
by AV than successful ones,
on going back and actually trying to get the statistics using google i
find something quite different, 'boot infector
gives about anhaveorder of magnitude fewer hits than 'boot infector cleaned' for the
group alt.comp.virus...
maybe you've got some better keywords but quite frankly using raw hits
as a measure is misleading as initial failures
often been a casethatuser error (which, on consultation with the group, gets corrected) or
an issue with an individual av product failing (a phenomenon that is
not constrained to boot sector disinfection and
subsequent use ofanda different av fixes)...
especially if you limit the search to the last few
years.
are you suggesting that boot infector detection
removal has gottentheworse during a period when practically no new boot infectors have been
created?
Your simplistic and purely formalistic knowledge on
issue reallylargeamazes me.
The change in the last years had to do with the
number of users thatDOS,shifted from early Windows, that was still based on
to NT based OSAV(W2K and
XP). This shift had a pronounced effect on BSI and
related issues.BSIFirst, AV do false alarms much more on boot viruses under the newer OS, to
the
point that it's safe to say that the majority of BSI alerts under W2K and
XP are
false alarms. Next, attempting the disinfection of
on such drives bylossaid of
AV, ends more often in ruining self-boot ability or
of access to theitdrive's partition(s).
Nobody would dare having a hernia operation if
had similarothermortality
rates to AV disinfection of BSI!
i don't dispute that there have been cases where a particular av
product has failed to do it's job properly with respect to boot sector
viruses just as particular av's have failed on
types of viruses -badthat doesn't mean that av products in general are
at dealing withcleaningboot infectors,
Wrong. AV products are unmistakably worse in
BSI than in dealingeitherwith
other types of malware. There is no difference
in failure/successFDISKratio
in that particular area between the various AV brands.
[snip]
If you suggested FDISK /STATUS before running
/MBR, instead ofwouldsending the
poster on a wild goose chase, then the "rule"
now be commontheknowledge.
except it's not that simple... your 'rules' assume
user knew whattheypartitions they were supposed to have and how big
were supposed tousersbe (which has usually not been the case as most
don't even knownot onwhat a partition is)...
You obviously haven't tried FDISK /STATUS, surely
a drive on which/STATUSyou
shouldn't (or can't) run FDISK /MBR. Because if you did, then you would
learn
that FDISK /STATUS returns no partitions at all (for anything that isn't
FAT or
FAT-32), or senseless data. The return of FDISK
leaves no doubtthewhatsoever, no guess work is needed to interpret the results, nor a
university
degree.
What should really amaze is why that simple and safe solution (FDISK /MBR,
preceded by FDISK /STATUS for verification) didn't surface earlier in the
virus/AV discussions. Could it be connected with
preserving of somerules,ones'
profit?
of course some people can make good use of your
but i tend towww.ivi.co.il (Hebrew)think those would be in the minority...
... and a defeatist too, on top of the rest.
Regards, ZviInVircible Virus Defense Solutions, ResQ and Data Recovery Utilities