The Disaster Center Virus Antivirus Page


Virus and Anti-virus Information
  Y2K History -- Free Anti-Virus Downloads and Links -- Y2K Bug-Fix Downloads and Links


Amazing Media: Web Advertising YOU Control!
National Infrastructure Protection Center
DOS Anti-virus packages 
Mac Anti-virus packages 
Virus Bulletin Home Page 
Anti-virus Comparative Review 
Doug Muth's Anti-Virus Help
ZDNet Software Library - Windows Utilities 
Courtney Identifies the use of SATAN 
NIST/CSL 
IBM AntiVirus Hype Alert 
How to Spot a Virus Hoax 
IBM Emergency Response Service 
Virus History 
Dr. Solomon's Virus Central 
Network Associates McAfee and More 
Symantec Norton AntiVirus and More  
Panda Software Anti - Virus  
AVP Software Anti - Virus  
Rob's 'Computer Virus Myths' page 
NH&: A Software Anti - Virus
Aladdin Knowledge Systems. E-Safe
The Virus Bulletin 
Sandrin Anti-Virus Connection 
Virus Information Center  
Joe Well's Wild Lists - Viruses in the wild. 
Open University Anti-Virus Information: 
Henri Delger's Virus Help and Information 
Thomas Jefferson U's Virus Information: 
NIST Virus Information Page 
Willems Free Anti-Virus Consultancy 
J and A Virus Info 
ICSA consortia. Anti-Virus Pages 
Alt.Comp.Virus Newsgroup 
Alt.Comp.Virus.Sourcecode Newsgroup 
Computer Associates: Virus Information Center
MS-DOS Anti-virus Tools 
NT bug exploit 
AVP Virus Encyclopedia 
Computer Virus Information 
FAQs on VIRUS-L/comp.virus 
Virus Library -- Hoaxes
Safetynet Security and Anti-Virus Cafe' 
Threat Assessment 
NIST virus information 
IBM AntiVirus 
Microsoft two ActiveX controls security vulnerabilities  
Microsoft Security Advisor Program 
Disinfectant 
TruSecure AntiVirus Policy Guide 

Computer Virus Bulletin Board: For the latest Emergency related news and notices
Around the period of the Year 2000 transition it is expected that computer viruses will be spread by people seeking to destabilize the Internet.

  Nov. 11, 1999
Patch Available for "scriptlet.typelib/Eyedog" Vulnerability
Microsoft has released a patch that eliminates security vulnerabilities in two ActiveX controls. The net effect of the vulnerabilities is that a web page could take unauthorized action against a person who visited it. Specifically, the web page would be able to do anything on the computer that the user could do.

Frequently asked questions regarding this vulnerability
 

Business Continuity Planning and Preparation for Disasters


About the CIH Virus

Yesterday and today April 26, 1999 we have received a number of requests for information about the virus for this reason we are posting the information below

Once the virus is triggered the first 2048 sectors of each hard drive in the computer are overwritten with random data. This area of the hard drive contains important information about the files on the computer. Without this file information the computer will think the hard drive is empty. The virus will also write one byte of data to the BIOS boot block which is critical for booting a computer. Writing to the system BIOS can be prevented by setting a jumper on most motherboards. Contact the computer vendor or motherboard vendor for assistance with their product. If the virus succeeds in reprogramming the flash BIOS ROM, there is no software remedy for it: your PC will no longer be bootable and the flash BIOS will need to be replaced or re-programmed in a special EEPROM programming device. Where the flash BIOS ROM is permanently attached to the motherboard, the entire motherboard will need replacing. The damage caused to the information on the hard disk is possibly recoverable by using data recovery services, and the success depends on the disk size, format, fragmentation etc.
Volunteer opportunities through the Disaster Center
Disaster Center Bulletin Board Directory

webmaster@disastercenter.com
Back to the Disaster Center
About the Disaster Center
Advertising at the Disaster Center