Amiga Animation Volume 8 Issue 7

Amiga Artificial Intelligence, Imagine Staging Language, Splatterpaint, ProTitler, Wallpaper & Raytrace Textures

Lots of Sound, in a Little RAM

PROBLEM: You want to play a song or sound, but you don't have enough RAM to hold the whole sound file.
SOLUTION: Aload! This program will actually play a sound file from your hard drive in real time! That means that the length of the recording is only limited by the amount of hard drive space you have. Aload has a GUI interface, kind of like a CD player. Aload will play any raw data, 8SVX, or IFF format file.

You ARE What You EAT!

PROBLEM: Did you know that your body's cells are constantly dying and being replaced with new cells? Did you know that every six months, every cell in your body has been replaced by newly manufactured cells? So the quality of the food you eat determines the quality of the manufacturing materials your body uses to create new cells. Hey, who wants a body made out of Doritos, even if they come in a fancy new bag?
SOLUTION: Be aware of what you put in your body! PINO is a program that will allow you to determine the nutritional quality of the foods you eat. There is no need to be a dietician or an expert of any kind (a knowledge of decimal numbers would help). PINO is very easy to use. It was designed for high school nutrition classes, and the students usually start using it avidly within five minutes.

Keeping Track of Things

PROBLEM: If your home or office is robbed, your insurance company will only replace items that have been properly recorded. If you don't have records of something, it won't be replaced. If you run a business, keeping track of inventory can be critical. Monitoring inventory size is an absolutely critical indicator of business trouble, long before you get into a crunch!
SOLUTION: MIP was developed to handle the inventory of a business. While it can easily be used for any inventory purpose, including household items and equipment, the features are endless, and this program can handle just about any type of items.

Just Where Was That File Anyway?

PROBLEM: You've got a hard drive, a collection of floppies, backed-up files, maybe even a removable hard drive, SyQuest, and even a CD-ROM. And mixed somewhere in the whole mess are the files you want. Sometimes it can get difficult, if not maddening, to keep track of all your files, especially the single one that you want... NOW!
SOLUTION: Gcat is here to watch over, remember, track, and sort all your files. This program is completely idiot-proof, so even when you are tired or distracted, you cannot input or destroy data that you don't want. And all along, it will remember where every single one of your files and programs is located. Just pop in a disk, and Gcat will analyze and remember everything on it. Easy tracking, easy finding—no more bald spots from pulling out your hair looking for lost programs or files.

An Experiment in Artificial Intelligence

Have you ever wondered just how intelligent your Amiga can get? Can it really make sense out of data and learn as it goes? Now you can find out for yourself. Deduce is an experiment in artificial intelligence. It attempts to simulate deductive reasoning. Consider the following example: Spot is a dog. A dog is an animal. Therefore, Spot is an animal. Deduce will accept input in the form of English sentences and, upon request, will answer yes/no questions about what it has been taught.

Antimatter

There is a collection of atoms lost in a holding chamber. Your job is to locate all the atoms. You do this by firing a plasma beam into the chamber from different positions. As the plasma beams interact with the atoms, the beams get bent and reflected in different directions. By watching how the beams hit, this mind bender begins to take shape. Can you find the solution? This version of the game features four-channel stereo sound that follows the action. The player can choose how large a chamber to use (6x6 through 14x14) as well as how many atoms will be hidden (3 through 8). There are also animations and graphics to enhance the gameplay.

Imagine Staging Language

PROBLEM: Working with Imagine's Action Editor has you frustrated? Some things are easy, and other things can be a pain. If you have ever used the Action Editor in earnest, you know that certain types of operations are easy (such as adding a single light) while others are not (such as adding more frames and causing your existing objects to appear in them).
SOLUTION: ISL, the Imagine Staging Language, is a language created to make the generation and manipulation of Imagine 3.0 staging files a whole lot easier. If you have ever used the Action Editor in earnest, you know that certain types of operations are easy (such as adding a single light) while others are not (such as adding more frames and causing your existing objects to appear in them). ISL provides an alternative interface to the Action Editor. With ISL, you can create your stage using the Stage and Action Editors as needed, then convert it to a fairly straightforward ASCII format, edit it as desired using your favorite text editor, and then put it back! This is, of course, the simplest way of using ISL—you could also create stages programmatically.

Easy Viewing

PROBLEM: You've got a picture, but you aren't sure what format it is, and you want an easy and quick way to view it without loading a large program. And no matter what format it is, you want to be able to see it with one program.
SOLUTION: JIV is a picture viewer. I can imagine that you're wondering—why yet another one? Well, here's a list of features that should answer your question: JIV supports many different file formats, including GIF (full GIF87a standard plus a subset of GIF89a), BMP (MS-Windows and OS/2 variants, currently only uncompressed), IFF-ILBM (including HAM6, EHB, and 24-bit formats, but currently not HAMB format), PNM pictures (PBM, PGM, and PPM in both binary and ASCII format), and JPEG/JFIF if the JPEG codec is installed. In addition, JIV supports several types of display hardware, including all native graphics chipsets (OCS, ECS, and AGA), A2024, and Picasso-II. Generic mode should work with every graphics board that emulates Workbench/Intuition, tested with the Picasso-II emulation. JIV supports displaying oversized images using autoscroll. JIV supports multiple filenames and AmigaDOS pattern matching. JIV can dither pictures that use more colors than your display hardware supports. JIV offers an endless/slideshow mode that can be used for (non-interactive) advertising, for example, in a shop window.

GfxCon

PROBLEM: OK, so now you can view just about any image with JIV. But what if you want to convert it into a format that works with your software?
SOLUTION: In steps GfxCon. This program makes it possible to convert images to the most popular image formats in a user-friendly way. Simplicity of usage and high quality have been the primary goals while developing GfxCon. Besides conversion, it is also possible to modify the image in many ways, such as changing the resolution, contrast of the image, or applying numerous color effects. So you can make the image ready for whatever format and size you need.

Invoice

PROBLEM: If you have a business, from the smallest lawn care service all the way through complicated business, invoicing is where the money comes from. The more professionally this is handled, the better off you will be.
SOLUTION: Invoicer is a program that will allow you to enter and print invoices. It is geared mainly for regular customers and regular jobs, etc. It is, however, still quite easy to issue an invoice on a one-off basis. It will also save all the invoices that you print to disk, enabling you to print or edit any invoice that you have issued.

Wallpaper and Raytrace Textures

This is a set of color images that are perfect for Workbench backdrops and ray tracing textures. This collection ranges from photographic images to color textures.

Add Some Panache to Your Backgrounds

Tired of that old gray background? BackPack is a collection of nice backdrops to brighten up your Workbench. As a bonus, also included is a high-resolution mouse pointer and a startup picture to be used with BootPic, BootLogo, or some similar utility.

Virus Killers

In each issue, we always include the latest virus killers and detectors. As you know, the best protection is prevention. The included utilities can help you detect and destroy that virus on one of your disks before it has a chance to infiltrate your entire disk collection. Add these utilities to your collection or update your collection with the latest versions and keep it safe. Prevention is always the best medicine.

Hot Soundtrack & Instruments (Deluxe Music & MED)

I've heard people claim that with new soundboards, the IBM can play some really good music. Well, they just haven't heard the Amiga yet. That's all there is to it. Crank up this tune, turn up your monitor volume, and invite all your PC friends over to have a listen. This will be sure to convince them. We have also included some of the instruments that were used to create the soundtrack. You can use these instruments with the new Deluxe Music Construction Set or MED or other Soundtracker music programs.

ClipArt & Fonts

PROBLEM: You have a letter, presentation, or report to produce, and you know it is going to look drab and boring. SOLUTION: This issue we have included a collection of clipart and a CGFont to dress up even the driest of text. With a new interesting Font, and a nice clipart image, you can attract the eye of your reader, and hold their attention! 

Gallery

a94f8f1bf34fb17db48ac42b9443b183.jpg
f1e8bf287c89637c470ba5b01313d339.jpg
52af62a40187ce1aad2e67fed22244fb.jpg

Disk Preview

BackDrops
BackGround9.info
06/14/1995 01:00
1216
Background6
09/15/1994 13:00
16204
Background6
Background6.info
06/14/1995 01:00
1216
Background9
09/15/1994 13:00
14850
Background9
Borders
Columbus
04/17/1994 10:00
21300
Columbus
Columbus.info
06/14/1995 03:00
1216
Diamonds2
04/17/1994 10:00
10126
Diamonds2
Diamonds2.info
06/14/1995 03:00
1216
Easter
04/17/1994 10:00
12016
Easter
Easter.info
06/14/1995 03:00
1216
CGFonts
HowToDecompress
01/17/1995 11:00
629
How To Decompress Files
~~~~~~~~~~~~~~~~~~~~~~~
The files contained on this disk are compressed so that we can bring
you more per issue.  Decompressing them is simple.

1. Create a separate directory on your harddisk, or format a blank floppy.

2. Copy two (2) icons to that source:
                a. The Program Object Icon (ie. File.Run.Exe)
                b. The Compressed Icon
 
3. Double click the Amiga Compressed icon, and watch as the file
   decompresses into sometimes three times the size!

5. Read the instruction file that comes with the program you decompressed
   with your favorite wordprocessor.

And enjoy!

HowToDecompress.info
06/14/1995 07:00
1496
Matrix
06/13/1995 01:00
12
matrix.run

Matrix.Run.info
06/14/1995 07:00
3702
Matrix.info
06/14/1995 07:00
976
matrix.run
06/13/1995 00:00
28518
ClipArt
BabyPoliceman
07/12/1991 21:00
6488
BabyPoliceman
BabyPoliceman.info
06/14/1995 06:00
1216
DancingPoliceman
07/12/1991 21:00
5096
DancingPoliceman
DancingPoliceman.info
06/14/1995 06:00
1216
DogSigningPaper
07/12/1991 13:00
6266
DogSigningPaper
DogSigningPaper.info
06/14/1995 06:00
1216
EmbarrassedBear
07/12/1991 09:00
3732
EmbarrassedBear
EmbarrassedBear.info
06/14/1995 06:00
1216
FishOnHeadOfManInWater.info
06/14/1995 06:00
1216
FishOnHeadofManinWater
07/12/1991 14:00
5592
FishOnHeadofManinWater
Lovers
07/12/1991 02:00
13790
Lovers
Lovers.info
06/14/1995 06:00
1216
LatestVirusX4.01
.info
03/23/1993 22:00
152
VirusX.Docs
03/23/1993 22:00
24155




















                                VirusX 4.0

                                    by

                        Steve Tibbett and Dan James


                               Documentation

                                    by

                        Steve Tibbett and Jim Meyer





































                             Table of Contents








Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2

How To Use VirusX  . . . . . . . . . . . . . . . . . . . . . . . . . .    2

VirusX Options . . . . . . . . . . . . . . . . . . . . . . . . . . . .    3
     Command Line Options  . . . . . . . . . . . . . . . . . . . . . .    3
     Active Window Options . . . . . . . . . . . . . . . . . . . . . .    3

General Notes  . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4
     Mail  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4
     Nut Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4
     Distribution Notice . . . . . . . . . . . . . . . . . . . . . . .    4

A Tale of Two Viruses  . . . . . . . . . . . . . . . . . . . . . . . .    5
     The Byte Bandit Virus . . . . . . . . . . . . . . . . . . . . . .    5
     The IRQ Virus . . . . . . . . . . . . . . . . . . . . . . . . . .    5

Technical and Developmental Notes  . . . . . . . . . . . . . . . . . .    8
     SCA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     Byte Bandit . . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     Revenge . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     Byte Warrior  . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     North Star  . . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     Obelisk Softworks Crew  . . . . . . . . . . . . . . . . . . . . .    8
     IRQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8
     Pentagon Circle . . . . . . . . . . . . . . . . . . . . . . . . .    8
     SystemZ Virus Protector . . . . . . . . . . . . . . . . . . . . .    8
     Lamer Exterminator  . . . . . . . . . . . . . . . . . . . . . . .    8
     Graffiti  . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9
     Old Northstar . . . . . . . . . . . . . . . . . . . . . . . . . .    9
     16 Bit Crew . . . . . . . . . . . . . . . . . . . . . . . . . . .    9
     DiskDoktor  . . . . . . . . . . . . . . . . . . . . . . . . . . .    9
     Australian Parasite . . . . . . . . . . . . . . . . . . . . . . .   10

Virus Notes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   11

















                                     1



                               - Overview -

    Viruses are a nasty fact of life for computer users, and Amiga users
are not immune.  VirusX was created to give Amiga owners a simple and
effective defense against these creatures.

     Viruses fall into two categories:  boot-block and other.  Boot-block
viruses are so named because they live on the first two sectors of a disk,
the boot-block.  When a disk is bootable (like Workbench), these sectors
tell the operating system where to go to load AmigaDOS code.  A boot-block
virus, however, points to its own code.  It makes sure that the virus is
activated before the AmigaDOS code is loaded.  Even if this code is not
malicious, this type of virus can still do damage.  Many game programs use
the boot-block for their own code.  If a virus happens to over-write this
code, the game will no longer work.  Most of the viruses found so far have
been of the boot-block variety.

     The "other" viruses are relatively new, and are tricky to find. 
These kinds of viruses attach themselves to programs, in some cases
replacing them, and wedge their way into the system.

     VirusX is the best defense against these creatures.  I encourage you
to give VirusX to anyone who might need it.  In particular, dealers and
user groups should use VirusX.  These folks, with the amount of disk
copying they do, are particularly vulnerable to viruses.

                             How To Use VirusX

     VirusX should be run as part of the Startup-Sequence.  To do this,
simply use a text editor to modify your startup-sequence.  Add a line that
simply says "VirusX", and make sure that VirusX is in your c: directory. 
VirusX will open a small window to let you know it is there, and will
automatically check any disk inserted into one of the 3.5" drives.

    (The startup-sequence is found in the S: directory of any
AmigaDOS-standard boot disk, like Workbench.  If you don't know how to edit
this file, refer to your Amiga manual, the AmigaDOS manual, or Rob Peck's
book "The Amiga Companion.")

     If VirusX finds something suspicious, it will post a requestor
warning the user of either a specific virus or a non-standard boot-block. 
The user will be given the option to Remove or Ignore the potential virus. 
WARNING:  A NON-STANDARD BOOT-BLOCK MAY NOT BE A VIRUS!  This may either be
a virus that VirusX doesn't know about, or it may be a custom boot-block
for a commercial program.  Make SURE that you know that the program is not
using the boot-block for its own purposes before you re-write it.  VirusX
will ask you if you are sure before it does anything.  (Programs which give
you an AmigaDOS window are always safe to repair.)














                                     2




                            - VirusX Options -


                           Command Line Options

     When you first run VirusX, you have the following command-line
options:

     -a   Make virusx window active when run
     -c   Don't check the CoolCapture vectors
     -k   Enable KickTagPtr checking 
     -q   Check all floppies, then quit immediately
     -r   Use this if you've 1 meg Chip RAM and using SetPatch -r
     -x## Set window X position
     -y## Set window Y position

     These commands are all given as arguments.  For example:

VIRUSX -a -x100 -y100

     These commands would run VirusX, make the window active, and put it at
position 100,100 (on the left-and side, halfway down) of the Workbench
screen.


                           Active Window Options

     While VirusX is running, you may click on its titlebar with the left
mouse-button and type the following commands:


     I    Open the Info Window
     C    Check all mounted floppies for viruses
     ESC  Quit VirusX
     #    Show bootblock in drive # (ie, 0 shows DF0:, 1 DF1: etc)

     Example:  Click in the VirusX window and type the number "1" - VirusX
will examine the disk in DF1: and will display the contents of the boot-
block.  This is not very useful any more, since most viruses do not contain
any unencrypted text.  Repeating the command, changing the disk in the
drive just checked, or clicking in the window with the right mouse-button
will cause VirusX to shrink back to "titlebar" size.

     You can get VirusX to display information about how many disks it has
checked and what it has found by clicking on the VirusX titlebar with the
right mouse-button.  Clicking again will close the window.















                                     3




                             - General Notes -

                                   Mail

     The best way to contact me is through the electronic network     
services listed below.  I've gotten far more VirusX-related mail than 
I thought possible, making it impossible for me to respond to "regular" mail.


                                 Nut Alert

There will be people who are thinking that I am some nut case trying to
spread my own virus hidden under the guise of a virus checker.  Well, just
for you, I've included the C source code.  Please, if you don't trust me,
don't brand a useful utility as untrustworthy for no reason, CHECK THE
SOURCE!  Recompile it if you think I'm trying to slip a fast one by you.  I
just want to see viruses out of all our lives.

                            Distribution Notice

     This program is Copyrighted, but is freely redistributable (It's NOT
Shareware).  Do what you want with it, but  Please don't use it for evil
purposes. That's what I'm trying to prevent.  

     If you are not sure that this is the most current version of VirusX,
you should check with the following sources:  The AmigaZone (American
People/Link Network), BIX, Compuserve, and/or AmigaWorld.  The latest
version of VirusX is available for downloading from the aforementioned
networks, or from AmigaWorld for the price of $5.00, for shipping and 
handling.



     I can be reached on BIX as "s.tibbett" and on People/Link as "SteveX". 
I'm also on Compuserve, but with their dumb numbering system, I can never
remember who I am.

























                                     4




                         - A Tale of Two Viruses -



                           The Byte Bandit Virus

    The Byte Bandit virus, once in memory, copies itself to a point just
above the high memory pointer on the first hunk of RAM it can find. This
means that it's not always in the same place.  It then wedges itself into
the Interrupt Server chain, into the vectors of  Trackdisk.device, and
creates a Resident structure for itself so it can hang around after reboot.

     It watches EVERY disk inserted, and will write itself to ANY bootable
disk that is inserted!

     Also, if you Install a disk while this virus is active, it will copy
itself back to the disk.  This is why it has to be wiped out from memory.

     When VirusX finds this virus on a disk, it will also display a "Copy
Count." This represents the number of disks which have been infected by
that "Branch" on the "Tree" that the virus is on.  If you infect a disk
with your copy, and your copy is number 300, then that copy will be #301. 
If that copy infects somebody, that will be #302, but on YOUR copy, two
infections down the line, there will be another #302.  The copy count on MY
Byte Bandit virus was #879.

     Note that VirusX will check RAM for this virus as well as the disk. 
This was necessary, as you can tell from the description above.

     Special thanks must go here to Dave Hewett, who, 2 days after I gave
him a copy of the virus, gave me a printed, commented disassembly of the
virus with meaningful labels and everything I needed to stomp it - Thanks
Dave!

     Thanks must also go to Bruce Dawson of CygnusSoft Software, (author of
that great program, CygnusEd), who went to the trouble of being the First
person to send me this Virus.


                               The IRQ Virus

     The IRQ Virus is a recent Amiga Virus.  This one stands out from the
crowd: it is NOT found in the boot block.

     This Virus attaches itself to executable programs.  It's prime target
is the C:DIR command, but it will also look at your startup sequence and
attach itself to the first executable program found in the startup-
sequence.

A sample chain of events:

   - You download or otherwise acquire a new program.  This program
     happens to be infected.
   - You execute this program.
   - The Virus then attaches itself to memory (by taking over the
     OldOpenLibrary() vector) and adds a KickTagPtr (for no apparent
     reason).
   - Now, you're on DF0: and you run a program that uses the 
     OldOpenLibrary() vector (hard to predict which ones do...).




                                     5



     The Virus will open your startup sequence and pick the first
     filename it sees.  If this file is executable it will write 
     itself into that file.  IF it's not executable, it will try to
     write to the DIR command on that disk.

     As you can see, this virus will only effect the first file mentioned
in the startup sequence or the DIR command.  The only way this Virus could
possibly spread via modem is through deliberate sabotage, unless the
uploader actually DID have the program as the first thing in his startup
sequence before sending it to you.


WHAT IT DOES

     This Virus is mostly a harmless joke.  It does not appear to kill
commercial programs or do anything malicious.  It's not nice to have
around, but it's certainly better than a malicious virus!

     It changes the title bar of the Initial CLI window when you boot, and
it will try to write to any disk inserted - thus bringing up the "Volume
whatever is write protected" requester whenever you insert a write
protected disk.  

     It will write itself to any disk from which you execute a file,
overwriting either the DIR command or the first thing in the startup
sequence.

     When this virus first installs itself (after reboot), it changes the
title bar of the current window (usually the initial CLI window, since it
IS the first thing in your startup sequence) to say something like
"AmigaDOS Presents:  The IRQ Virus, V41.0".  This is a dead giveaway.

     This virus will not work under Kickstart 1.3 - you will get Software
Error requesters whenever you run an infected program.  I'm not sure why,
but this is probably good.

HOW TO KNOW IF YOU HAVE THIS VIRUS

     You cannot identify a file that has this virus in it just by looking
at it.  The virus encrypts the text parts of itself, and encrypts it
differently on each copy, making it impossible to recognize.  

     You can tell your system is infected if you put in a write protected
workbench disk (or any disk that has a startup sequence), and the system
brings up a "Volume  is write protected" requester.   This

















                                     6







indicates that this virus is in RAM attempting to infect your disk.

     Running VirusX 4.0 will tell you if this virus is in RAM, and VirusX
will remove it from RAM.
HOW TO GET RID OF THIS VIRUS

     To get the virus out of RAM, run VirusX 4.0.  It will tell you if it 
found it, and that it removed it if it did.  VirusX will check disks the
same way that the Virus does - it will look at the startup sequence,
determine if the first file found (or the DIR command) is infected, and
give you the option of repairing the the damage.  

     You can also get rid of this virus simply by deleting all infected
programs and rebooting.  This virus will not hang around after a reboot. 
Because this virus can hit a number of files, not all of which VirusX will
find, I have included a small program by Dan James called KV - "KillVirus." 
This program will check an entire directory's worth of files for this
specific virus.  

     VirusX 4.0 will look in the same places as the Virus for infected
programs.  If it finds one, it will pop up a window, tell you where it
found it, and ask if it's OK to remove it.

HOW TO MAKE SURE YOU DON'T GET THIS VIRUS

     Keep VirusX 4.0 running when you test new programs.  VirusX will
alert you as soon as it sees this virus appear in memory.  If VirusX finds
this virus, it probably came from the last program you ran.


























                                     7









                   - Technical and Developmental Notes -

SCA  - The SCA is the simplest virus to deal with, as it's not actually
DOING anything except hiding in memory until you reboot.  We just look at
CoolCapture and fix it to get it out of RAM.

BYTE BANDIT - The Byte Bandit virus takes the DoIO() vector and redirects
it through itself.  Thus, any attempt to read or write the boot block (ie,
AmigaDOS trying to figure out what kind of disk it is) results in Byte
Bandit writing itself onto that disk.  VirusX couldn't just rewrite the
boot block; it has to get Byte Bandit out of RAM first.  This virus also
has an interrupt that crashes the machine every 5 minutes or so after it's
infected a few of your disks.  Ow.  It stays in memory not via the Capture
vectors, but by a Resident module.

REVENGE - Basically, this is a Byte Bandit clone which brings up an
obscene pointer a few minutes after you reboot.  We treat it much like the
byte bandit.

BYTE WARRIOR - Jumps right into 1.2 Kickstart.  Won't work under 1.3. 
Hangs around via Resident struct, and doesn't do any damage.       

NORTH STAR - Like SCA, hangs around via CoolCapture.  Killing CoolCapture
kills the North Star.

OBELISK SOFTWORKS CREW - Hangs around via CoolCapture, also watches reads
of DoIO().  It doesn't infect EVERY disk - only the ones you boot from.    

IRQ - This is the FIRST Non-Bootblock Virus.  It copies itself from place
to place via the first executable program found in your startup-sequence. 
It SetFunction's OldOpenLibrary(), has a KickTagPtr, and lives in the first
hunk of an infected program.  Thanks go to Gary Duncan and Henrik Clausen
for being the first to send this one to me!

PENTAGON CIRCLE - This one looks at the DoIO vector, and has a CoolCapture
vector.  It will write itself over any virus inserted, but not onto
anything else.  (Neat idea!).  No danger, easy to eliminate.  Holding left
button while booting with this one shows different screen colour, but
doesn't get rid of it.  Thanks go to Bill Seymour (CMIBILL on Plink) for
sending me this one!

SYSTEMZ VIRUS PROTECTOR - I took this one out.  It's not really a 'Virus',
in that it won't overwrite a disk without asking you first.  Besides, it
seems a lot of people LIKE the SystemZ Virus Protector (though it isn't
perfect).

LAMER EXTERMINATOR - THIS one was a bugger.  Yet another virus       
aimed at hurting people.  Y'see, a Lamer is apparently the worst kind of
pirate - one who doesn't crack software, doesn't write software, just
collects names and addresses and collects and spreads software.   Lamers
don't do anybody any good, and the guy behind this Virus took it upon
himself to make their (and our) lives miserable.  This virus loads into RAM




                                     8







at a random location each time.  It is encrypted on the disk so you can't
SEE the name of it, and it never actually SHOWS the name, but it's
definitely there.  It changes the encryption key used each time it is
written back to disk.
     It has a counter and will wait until the machine has been reset 2
times OR until 3 disks have been infected, and will then pick a DATA block
(Only a DATA block - FFS disks are safe, I guess), randomly, and will write
the word 'LAMER!' all through it.  This is obviously not good, and will
cause  random disk errors.  This is the worst kind of havoc to wreak on the
new user - and this virus is EVERYWHERE!  I've gotten it from 5 people in
the last week alone (all from different countries!  Ack!).  Anyway, credit
for being the first with this one goes to Christian Schneider.  Thanks,
Christian!
     This virus sets up a Resident structure, but never sets the Match Word.
Either this means we don't need the MatchWord or it means his
SumKickData() is doing the recovery job - either way, it's  new!  3 points
for originality.      

GRAFFITI - The first virus to come with rotating 3-d graphics!  It's neat -
you might want to trigger it, though I'm not sure how, before nuking it. 
This one just sets CoolCapture(), does something with DoIO() during the
reboot, and sets it back to normal before anybody gets to look at it. 
Lots of code is taken by the graphics stuff.  I just clear the CoolCapture
vector.  [yawn]

OLD NORTHSTAR - Poof.

16 BIT CREW - Well, I didn't actually have to DO anything to get   VirusX
to recognize it, because it seems to operate like the Graffiti Virus.  If
the 16 bit crew is in RAM, VirusX will say it removed the Graffiti virus. 

DISKDOKTOR - I spent more time on this one than on any other.  Y'see, this
virus does lots of things.  The first one, for some reason, was quite funny
to me.  It waits until you have rebooted 5 times.  Each time you reboot
after that, the virus eats 10K times the total number of reboots.  After
rebooting 10 times, you would be short about 100K.  This virus also starts
up another TASK.  I'm not exactly sure when it happens, but another task
named 'clipboard.device' will appear at a priority of -120, and will
continually bash the Virus' vectors into the Coldcapture, Coolcapture,
Warmcapture (which it sets to $ff000000 just to annoy), and the DoIO()
vector. 
     When I was working on this one, I figured I just had to restore the
old values to the DoIO() vector, but as soon as I did so, the Virus
restored them.  Since I hadn't disassembled the entire thing, I didn't
realize this until I wasted time looking for other faults.  This one also
allocates some memory, copies some code out of Exec into this memory, and
executes it.  I never bothered to figure out why - Once it's gone, it's
gone.











                                     9







AUSTRALIAN PARASITE -  Hey - I like this one!  It says it will not destroy
game bootsectors or corrupt disks, but it's still a Virus.  What makes this
one unique is the way it lets itself be known.  After so many disk accesses
(something like 600 blocks read off of a floppy), it turns your screen
Upside Down!  Nifty.  You can still USE the screen upside down - it just
looks a bit weird.  It uses the DoIO() vector, the TD Read vector, starts
at SysStkLower, and that's about it.  It stays around via CoolCapture. 
Thanks to Martyn at 17Bit Software in England for being the first to send
this to me.

Thanks also to Robb Walton for being the first to send one of the other
ones.














































                                     10





                              - Virus Notes -

These are things that you probably should know, but may not, about
what can happen with Viruses.

           - If you are trying to format a disk, and you always get a
          message that Cylinder #0 of the disk is bad, it's quite
          possible you have a virus in RAM (or a bad disk).  This is
          because when the Formatter writes to block 0, some viruses
          will prevent this (trying to save themselves).  When the
          formatter reads the block back to verify, it's not the same
          and it panics.

           - Some commercial programs will not work with some viruses
          in RAM.

           - Not all computer failures are caused by viruses!  If you
          are having problems, and you have checked your disks with
          VirusX (and it reports them as clean), try looking elsewhere
          for the problem.

           - There is at least one virus that can (more or less
          accidentally) hit hard disks.  Some of the viruses use the
          DoIO() vector to watch for any read (or write) attempts at
          block 0.  Unfortunately, they do not always make sure that
          it is block 0 of the Floppy drive.  If someone is writing to
          block 0 of the hard disk, and the virus intercepts this, it
          can write itself to the hard disk.  The virus CANNOT load
          from hard disk - the hard disk's boot block is never
          executed.  However, if your hard disk is an FFS volume, then
          writing the virus to it will have the effect of changing it
          to an OFS volume, making what's on it unusable.  You can fix
          this with DiskDoctor (I believe), or using DiskX.

           - VirusX may NOT find some viruses if you run it after the
          virus is already loaded.  In some cases - like the Lamer
          Exterminator virus - VirusX is sees what the virus wants it
          to see, not what's really there.  Run VirusX BEFORE you run
          anything else, or BEFORE you load any suspicious disks.

Version Notes have been moved from the documentation file to the source
code file.  Please read VirusX.C for the version history of VirusX.

I'd like to thank Lars Wilklund, Jason Allen Smith, Bruce Dawson,
Robb Walton, Pete Foley, and all the others whose names I've forgotten who
have sent me disks (And the many people who have written to me, but
whom I have not been able to answer!  I do read your letters!)

Mucho thanks also to Dan James, who's been helping me all along,
and who did a lot of the finding out about the IRQ Virus.

(And to Ian Sewell, for 2 million points worth of MUD treasure which
I never got...)

    ...Steve





                                     11


VirusX.Docs.info
03/23/1993 22:00
1496
VirusX401.info
03/23/1993 22:00
386
kv
03/23/1993 22:00
13472
kv.doc
03/23/1993 22:00
3517
KV - KillVirus  V2.1                                               11/26/89

	KV will detect and remove three non-boot block viruses, the IRQ Ver 41.0
	the Lamer Exterminator and the Bundesgrenzschutz Sektion 9 (BGS) virus.

	KV will also detect and disable the XENO virus in executable files.

	The Lamer virus will be removed from memory and any infected disks in
	the drives.

	Usage: kv -LIBA { filename ... }

		-L or -l       check for Lamer virus on all floppies
		-B or -b       check for BGS-9 virus on all floppies
		-I or -i NAME  check for IRQ and XENO virus on NAME
		-A or -a       do all of the above

		`*' (unix style) wildcards allowed
		ex. kv -i C:*  or  kv -i C:  will check all files in C:
			for the IRQ and XENO virus
			kv DF0:C/ will check all files in DF0:C

	The XENO virus while `harmless' attaches itself to almost any file that
	is opened for either reading or writing while the virus is active.  This
	nasty can spread rather rapidly over a hard disk before it is detected.

	KV will detect the infected files and `disable' the virus.  By disable
	I mean that the infectious portion of the virus will be neutralized but
	not removed from the file.  Unfortunetly, the XENO virus merges his
	code with the existing code found in the first code hunk.  Removal
	requires excising the virus code and adjusting the relocation
	information found in the RELOC_32 hunk.  Rather than delay KV until it
	can properly remove the infection, I decided to release this version
	that will at least keep the virus from spreading.  A future version
	of KV will (hopefully) be able to remove the virus code - even the
	disabled version.

	KV will look on all floppy drives in the system for the Lamer and BGS
	viruses.

    Be aware that the IRQ virus attacks the file C:dir as well as the
    first executable file that it finds listed in your startup-sequence
    files.  It is to your advantage to check all your disks startup files
    and the first executable file referenced once infected with the IRQ
    virus.

	Also note that the new Lamer virus attaches itself to a disk as an
	invisible file located in the root directory.  It modifies the first
	line of your Startup-Sequence file placing it's invisible name there.
	KV will not modify your startup file.  You must delete any blank lines
	at the beginning of the file.  If KV finds the Lamer virus on a disk
	it will rename the invisible file to `DANGERVIRUS'.  The virus won't
	be automatically executed under that name - you may delete it at your
	leisure.

	The BGS virus finds the name of the first executable file in the
	Startup-Sequence file and renames it to an invisible file in the
	DEVS: directory.  It then replaces the first file with the virus code
	which will be executed on startup.  During its execution it will
	LoadSeg the invisible file and execute it.

===============
Ver 1.01														1/15/89
	Minor changes:
		Added more info on usage.
		Now allow multiple filenames on the command line.
		Appended `*' to filename if it ended with ':' or '/' this allows one
			to check an entire directory such as KV C:
		Changed message output format slightly.  Virus found message is in
			inverse video.
		Used DisplayBeep() to flash screen if IRQ virus is found

Ver 2.0															9/1/89
	Added tests for Lamer Exterminator and BGS viruses.
	Added AutoRequest() for more positive indication of KV results.

Ver 2.1															11/26/89
	Added test for XENO virus.
	Added code to disable the XENO virus infection code.
kv.doc.info
03/23/1993 22:00
1496
kv.info
03/23/1993 22:00
3702
virusx401
03/23/1993 22:00
20892
Music
ChordHit.DMCS.info
06/13/1995 23:00
941
ChordHit.MED.info
06/13/1995 23:00
941
Klang.DMCS
06/13/1995 09:00
11320
Klang.DMCS.info
06/13/1995 23:00
941
Klang.MED.info
06/13/1995 23:00
941
Klang.med
06/13/1995 08:00
11216
MOD.SD10.info
06/13/1995 23:00
941
Record.DMCS.info
06/13/1995 23:00
941
Record.MED.info
06/13/1995 23:00
941
chordhit.DMCS
06/13/1995 09:00
4242
chordhit.med
06/13/1995 08:00
4138
mod.Sd10
06/13/1995 07:00
109944
record.DMCS
06/13/1995 09:00
11986
record.med
06/13/1995 07:00
11882
SoundBox
catalogs
deutsch
SoundBox.catalog
03/27/1995 17:00
6854
libs
provision.library
02/08/1995 05:00
29556
reqtools.library
09/06/1994 23:00
43628
Install
02/11/1995 16:00
1920
Install.info
06/14/1995 01:00
1268
SoundBox
03/27/1995 18:00
77608
SoundBox.guide
02/06/1995 19:00
77663
SoundBox.guide.info
06/14/1995 01:00
557
SoundBox.info
06/14/1995 01:00
841
BackDrops.info
06/14/1995 01:00
2616
Borders.info
06/14/1995 03:00
2616
CGFonts.info
06/14/1995 07:00
2616
ClipArt.info
06/14/1995 06:00
2616
Disk.info
06/13/1995 20:00
2964
Information
11/20/1994 15:00
717


                        AmigaAnimation Magazine

           NOTE:  AmigaAnimation, Inc.'s products are produced
       exclusively on Double Sided, Double Density disks for
       steadfast reliability and quality.  Even though numerous
       steps are taken to insure the quality of our disks, occasionally
       a bad disk appears.  If you encounter a bad disk, please send it
       in to the address below for a prompt replacement.

       If you have a problem with your disk or subscription, please
       refer to:

                     Attention: BAD DISKS URGENT
                         AmigaAnimation, Inc.
                             PO Box 1247
                       Cape Coral, FL 33910-1247

    
Information.info
06/13/1995 20:00
14768
LatestVirusX4.01.info
06/13/1995 20:00
2100
MEDPlayer
03/23/1993 12:00
16532
Music.info
06/13/1995 23:00
988
SoundBox.info
06/14/1995 01:00
2616
more
01/04/1993 07:00
19644
playsound
03/23/1993 00:00
8088
sv
03/23/1993 00:00
9508