- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
While Google wasn't yet a thing, the Web was. Depending on your definition of "mid"-90s, Yahoo! may have already (1994 as "Jerry and David's guide to the World Wide Web; 1995 as Yahoo!) been a thing. Usenet had been around for about 15 years, and fairly accessible to the general public since 1993, so even he couldn't find the answer on a silver platter on the Web, he probably could have asked about it and gotten an answer.
Not that I'm knocking figuring it out on his own from the manual; that was probably a better learning experience, anyway. Perhaps @Remy, personally, wasn't able to go online for some reason, but it wasn't because going online to get an answer was impossible in the mid-90s.
Admin
That is more the point of the line, yes.
Admin
You poor
depraveddeprived kid. Get off my lawn! ;PAdmin
No transcription? :/
Admin
I thought, perhaps, the computer was going to let the smoke out when he put the screwdriver in or that he was going to use something other than the screwdriver (paperclip?!). I've used that method several times when resetting BIOS, if the screwdriver was handy but the jumper was not.
Admin
TRWTF: A 30 second story that consumes 7 minutes.
Admin
Updated with a transcript, thanks to Ellis Morning.
Admin
Not enough typos in the summary. I am disappoint! (She did misspell Duke Nukem's name, though ...)
Admin
WHAT?
/me grabs his pitchfork
No, wait... Wrong game... Can anyone spare a shrink gun?
Admin
OPPRESSION! (synonymous with "objection!")
Admin
I'm not sure if I believe this. First, AntiCMOS is a typical boot sector virus, but the payload affects the CMOS. Clearing CMOS just does the virus' job for it. Second, a true CMOS resident virus would live in the code area, not the data area. The "clear CMOS" jumper only clears the data area. If it cleared the code area, it would be a "make my computer a paperweight" jumper.
Admin
Gently putting things together with a tool was violent?
Most software companies beyond a certain size have soccer field(s). Don't go near that.
Admin
Yes, from Wiki, seems the virus never success in writing anything to CMOS due to a bug. Booting from clean floppy and run "fdisk /mbr" seems to be enough to fix it.
Of course, we don't have internet access at the time.
Admin
That reminds me of my own story, how I "Killed the Virus". I don't remember the details but in the early 90's I figured out that my IBM PC XT (yes I couldn't afford a newer one at the time...) got infected by the "Parity B" boot sector virus. This virus had a neat "stealth" mechanism: it overwrote interrupt 0x13 to intercept reads to sector 0, so that it could present the original bootsektor to the caller.
I didn't had many tools available but I had dos "debug". So I thought of a way how to somehow restore the original boot sector by figuring out it's location and writing it back to sector 0. Then genius struck me:
Yes, that's right: it reads from sector 0 and then just writes the result back to sector 0. The Parity B virus didn't bother to also intercept write calls, so it basically helped in his own destruction by delivering the original sector. I found that kind of ironic.
After that I could just execute
KillB
followed by an immediate reboot and the virus was gone. I even could use my "virus killer" later when I already upgraded to an 486 SX 25 (the Parity B and its brothers were quite widespread in germany at that time...). I probably also could have just usedfdisk /mbr
, but I didn't know that at that time (and it wouldn't have been half the fun...).I still remember how I learned x86 assembler just by trying out different opcodes in "debug". Fun times...
Admin
Which is absolute proof that the virus was in the boot sector, not in CMOS. He didn't "kill the virus" with a screwdriver, he cleaned up after it.
Admin
If a friend of mine had let me install a game and only afterwards tell me their computer had a virus, I would be pissed.
Admin
So am I the only one who's read in my motherboard manual that I could use a screwdriver to close my CLR_CMOS pins' circuit (when there wasn't a jumper included), but who's misplaced my only wide entity flathead screwdriver and ended up using my house key?
Admin
Most likely "yes".
I would use a Mk.II shorting tool though.
Admin
Yes.
I don't need to see the rest of the post.