Old Malware Tricks Still Defeat Most AV Scanners 122
SkiifGeek writes "A year ago Didier Stevens discovered that padding IE malware with 0x00 bytes would happily slip past most of the scanners in use at VirusTotal.com. Revisiting his earlier discovery, Didier found that detection on his initial samples had improved, but not by much. For all the talk of AV companies moving away from signature based detection to heuristics, it is painfully obvious that not many of the tested engines can successfully handle such a simple and well known obfuscation method and the best of those that can detect the obfuscation can only detect it as a generic malware type. At least the scanning engines that can detect the presence of malware with the obfuscation aren't trying to claim each differential as a new variant."
Fir0x00st! (Score:5, Funny)
Re: (Score:1, Offtopic)
That is the first time I actually enjoyed a "first" post. I guess there is a "first" time for everything.
Re:Fir0x00st! (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
Padding with 0x00 bytes? (Score:5, Funny)
So padding it with nothing makes it undetectable? I never thought of that!
Re: (Score:1)
Re:Padding with 0x00 bytes? (Score:4, Insightful)
Since this is viruses evading detection, wouldn't this be "Insecurity through obscurity"?
Re: (Score:1)
Re:Padding with 0x00 bytes? (Score:5, Interesting)
Man, Let me tell you, Viruses have evolved. Really evolved. I don't run a anti-virus at home, don't like them.
In a moment of weekness I started watching a downloaded version of stargate, missed it on friday :( the WMV movie asked for a "codec" to be installed, guess what... (I know I should have know better)
Its been 4 weeks and I am still struggling with this virus. Most virus scanners detect this beast, however in my last 4 weeks, none can properly clean it. This has become somewhat of a challenge.
I have discovered so far, that
- it is installed as windows driver,
- this driver gets notified at winlogon
- the driver creates a exe
- the exe executes and stays in memory
- the virus driver file then mutates and goes elsewhere, again to come back at the next logon, this mutation is what virus scanners can't work with.
- Spreads via Windows networking to other computers on the network, this however only if the other computers have any shared writable folders.
Yesterday, I discovered, the crappy thing downloads and installs stuff off the internet.
Fortunately I have all data backed up.
I can re-install my XP anytime, but this has become too challanging to let go.
Here is a kicker, I tried infecting a qemu emulated XP VM, guess what, there is a newer version of the virus, somewhat different than 4 weeks ago. The new codec that downloaded wasn't the same that got downloaded to my machine.
So it seems these virus/trojan developers are well funded and doing this as a day job. Hoping this trojan shares some mp3s so RIAA can go after them, they seem to be more effective than FBI in tracking this kind of a thing.
Here to some good news, my dad's Vista PC is immune to this virus, so Microsoft may have done something right, or maybe the virus/trojan developers are not targeting Vista.
Re: (Score:3, Informative)
Re:Padding with 0x00 bytes? (Score:4, Informative)
If it's the one I saw the driver even gets loaded in safe mode.
You have to boot onto a rescue DVD and find the driver file, delete that and it'll stop the driver loading. Then boot into safe mode (if you boot into normal mode the user mode code will reinstall the driver) and find every copy of the executable and nuke it.
If you miss one it's back to square one.
Personally I'd just reinstall...
Re:Padding with 0x00 bytes? (Score:5, Insightful)
K. Start using Mplayer [1] and VLC [2] NOW. They ignore the executable parts of MSFT's multimedia formats.
[1] Grab the "Windows GUI" and the "Windows X86 codec package" from here: http://www.mplayerhq.hu/design7/dload.html [mplayerhq.hu]
[2] http://www.videolan.org/vlc/ [videolan.org]
Re: (Score:3, Informative)
Re: (Score:2)
personally, i use BS.Player PRO (there's also a free version), which loads quite fast, has a very small memory footprint, and also has some nice looking skins. it plays .avi, .wmv, and .mkv, and most .mov files i've encountered.
i also have VLC player installed, which i use to open .mov files that BS.Player won't play for whatever reasons, but the interface is kinda crappy; it opens two player windows; and it crashes whenever i try to close the inactive player window or just the whole program. maybe i have a
Re: (Score:2)
Short answer:
I don't know if Mplayer will play that audio track on the QuickTime video in question. I've not had trouble with the QT movie files that I've run into. However, QuickTime is always a little iffy on OSS video players. It seems that there's always some new version out in the wild.
Details:
I've installed the complete codec packages with every mplayer install that I have. [1]
(I'm not gonna link to them here. I bet that you can suss out the link from the mplayer download page.)
I've had trouble with n
Re: (Score:2)
Re:Padding with 0x00 bytes? (Score:4, Informative)
I am not overly fond of most AV software either, but I like an infected machine even less.
Re: (Score:2)
Re: (Score:1)
Yah I don't have to run A-squared anti virus, spybot S&D, Ad-aware or any of the other stuff that I used to have to run with XP.
I don't understand why they wouldn't want to attack Vista?
For now it is a huge leap from XP in security, but eventually things get exploited and it is only a matter of time. Although with Vista I think we can avoid those drive by downloads a lot more and it will come down to once again the user clicking 'Yes/Allow' which will be the kicker. Some of the worst ones are the cracks
That is to teach people (Score:2)
RECOVERY CONSOLE COMMAND DISABLE STOP DRIVER (Score:3, Informative)
"I have discovered so far, that
- it is installed as windows driver,
- this driver gets notified at winlogon
- the driver creates a exe
- the exe executes and stays in memory
- the virus driver file then mutates and goes elsewhere, again to come back at the next logon, this mutation is what virus scanners can't work with.
- Spreads via Windows networking to other computers on the network, this however only if the other computers have any shared writable folders. - by mrops (927562) on Friday November 07, @01:40PM (#25678439)
Install RECOVERY CONSOLE as a bootup option
(Its installer alters boot.ini for this as it installs & it adds a bootup menu choice/option for using it once you reboot after installation of it)
To install it, that is done from your OS installation media's I386 Folder, via the commandline ->
winnt32.exe /cmdcons
Once it is in place?
You can issue the LISTSVC command there, & it will show this trojan/virus' name once you scan the list of drivers &/or services it presents (look carefully, & odds a
The WinLogon section: Stop the 'phalanx' driver! (Score:2, Informative)
In addition to what I posted originally here (thanks for the "modded up" status too, whoever did so):
http://it.slashdot.org/comments.pl?sid=1021873&cid=25681261 [slashdot.org]
?
To access & stop the "backup" of this trojan's driver, since it apparently is using a form of "phalanx-like" backup of itself & its constituent part? Well, go here, using REGEDIT.EXE, once you reboot (after using RECOVERY CONSOLE's LISTSVC, + DISABLE comamnds to stall the driver itself) because this 'backup' portion you're seeing @ WinLo
Re: (Score:2)
I had a Virtumondo virus that did the same thing. I wrote up procedures for removing this. Maybe this will help:
So I attemped a manual removal of the virus yesterday, and succeded. However, the process was so messy and time consuming, it probably would have taken less time to reimage. First thing is to go in and manually delete the trash files. Look in the program files directory. The one I noticed yesterday was called GameVance, which advertises itself as a free online gaming site. You can simplify this ma
Re:Padding with 0x00 bytes? (Score:5, Insightful)
Might be time to start running your machine as a non-admin user. I'd be willing to bet that's what the difference between your Dad's Vista PC and yours is.
Re: (Score:1)
Free, and it works.
http://www.bleepingcomputer.com/combofix/how-to-use-combofix [bleepingcomputer.com]
Re: (Score:2)
Re: (Score:2, Interesting)
Re: (Score:2, Funny)
Re: (Score:2)
It's the equivalent of Clark Kent taking off his glasses so that nobody recognizes who he is when he's flying around in spandex.
Re: (Score:2, Funny)
Aye (Score:1)
uh oh (Score:5, Funny)
Don't give the guys in marketing any ideas. "New and Improved! FoobarAV now detects an infinite number of viruses! Compare that with Norton's piddly 30,000."
Re:uh oh (Score:4, Interesting)
Re:uh oh (Score:5, Funny)
Detects 70%* of viruses, 60%** of malware, 20% of trojans***, and 1% of rootkits****!
*Includes false positives
**Includes tracking cookies
***Any generic threat found is counted as a virus and a trojan
****Removal of rootkits is not supported in AV Total Security Home 2008 + Firewall. To remove rootkits, you must purchase the value-add Anti-Rootkit Pro module.
Re:uh oh (Score:5, Funny)
Pardon me young man. You do work here, don't you?
Well, yes, you can help me. I was just wondering if you can explain the differences between the Value-add Anti-Rootkit Pro module and the Value-add Anti-Rootkit Amateur module.
You see, my wife doesn't think I should be messing with anything for professionals, so I need to know the differences.
Re: (Score:3, Informative)
Detects 70%* of viruses, 60%** of malware, 20% of trojans***, and 1% of rootkits****!
*Includes false positives
**Includes tracking cookies
***Any generic threat found is counted as a virus and a trojan
****Removal of rootkits is not supported in AV Total Security Home 2008 + Firewall. To remove rootkits, you must purchase the value-add Anti-Rootkit Pro module.
Just had a virus hit at work.
Symantec 'detected' it but didnt stop it at all, within minutes we had ~60 computers infected.
Thank god the other 1200 computers we have where running linux.
Re: (Score:2)
You think that's bad? I had a machine here running Symantec Endpoint 11 detect some sort of worm via the auto-protect bullshit.
It gave two notifications:
It found it, and failed to fix it.
It found it, and fixed it.
Ok, sure, it tried to clean it couldn't, then decided to just delete it. Fine.
So I run a full scan just to make sure it's gone. Nothing shows up in the scan. Great. But during the scan the auto protect popped up with the same notifications.
Anti virus software is pretty much the worst thing you
Re: (Score:2)
Next to an actual virus....
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
You're not taking if far enough.
All virus scanners are band aids for design flaws in the Windows* that allow the things in the first place - such as running as an admin. And they're all imperfect at best since none of them can stop 0 day attacks. Which is when you need them to work the most.
Think about that for a second. The time when you're most vulnerable is precisely the same time when your virus scanner is least effective.
It's ok, you can uninstall all the "always running" components now, never look b
Relativity? Hmmm. (Score:2)
"Our anti-virus kit moves over files so quickly, the virus shrinks to zero length and has infinite mass!"
"The new herustic bends space-time, causing malware to fall off the edge!"
"AVSoft's new scanner sends you backwards in time, so you were never infected in the first place!"
Re: (Score:1)
Whereas I agree that some sort of relevance in advertising would be nice, as to how up to date their latest improvements are, I do think it's a good selling point to state that you can handle previous viruses as well. If an anti-virus software can't handle a virus from 10 years ago then it's like a parent that doesn't get their kid vaccinated for measles because they haven't had a big outbreak recently. It just takes one instance of the virus to totally wreck your day.
Just my two cents.
Re:uh oh (Score:5, Insightful)
and both foobar and norton will suck. It's not the numbers it *can* detect, it's about how *well* it detects them and how little resources it takes.
What they lied about using heuristics? NEVER! (Score:4, Interesting)
Considering the arguments I got in between the word 'Signatures' and 'Heuristics' when it came to anti-virus I'm not surprised.
They think heuristics are BLAH.*BLAH instead of BLAH...BLAH.
And even then, they don't get it right.
Re: (Score:2)
Imagine what the malware people would be able to do with stuff like perl. Polymorphic? No problem, heck it might even be able to use search engines to look for "updates" and check to see if the update code runs OK.
Perl is installed by default on popular Linux distros, and some BSD - so it can be cross platform.
If you had millions of the typical windows users using Ubuntu, there'll be a lot more zombies and they'd be really cap
Re: (Score:2)
If you had millions of the typical windows users using Ubuntu [...]
if? I thought that's a given.
Re: (Score:3, Informative)
Why would it need to run as root ? Running as a regular user, it can:
Re: (Score:1)
Of course they do ... (Score:1, Insightful)
Of course they still fool AV scanners. If they didn't how would they be able to sell you a malware scanner on top of your AV scanner?
It's worse than we suspected... (Score:2, Informative)
...and this [xkcd.com] pretty much says it all. Even for Windows.
We are in serious trouble, and have been for a while now. And nowhere to migrate to.
Applied AI (Score:3, Interesting)
Re: (Score:3, Informative)
http://en.wikipedia.org/wiki/Halting_problem
Re: (Score:2)
What does the halting problem have to do with this?
The halting problem might be relevant if you absolutely needed a provably (in the mathematical sense) perfect analysis of the algorithm that a binary implements. But any practical implementation of mawlare detection wouldn't need to be perfect: it would just have to disassemble the binary and pull out algorithmic motifs, and check these against a database (where the motif "loop over values and store to single file" is okay but "loop over all files on disk a
Re: (Score:2)
Then you run into the obfuscation problem again. And polymorphic code is used heavily in DRM and anti-cheat software now, so that in itself would not fit a negative signature. At that point you either have to know in advance how to unpack the meaningful code (back to our signature problem) or run the thing (back to the halting problem).
Credit Card Companies (Score:5, Insightful)
You know how you charge something, sign for it and no one looks at or cares about the signiture. There's a reason for that. Credit Card companies have figured out that verifying identity is impossible. Instead they try to verify by transaction by looking at the recent pattern of purchases for signs of theft.
Instead of trying to identify incoming virusses, they should be focusing on removal tools and monitoring. Watch the processes for unnusual behavior and flag the user if something is detected, then actually get rid of the virus if the user agrees with the analysis. Granted, unusual behavior is a pretty vaguely defined concept, but that seems a lot more adaptable to new threats than the current methods.
Re:Credit Card Companies (Score:5, Insightful)
Problem being, with lots of machines, they become infected on such a regular basis that your "unusual behaviour" is common enough that it becomes usual behaviour!
Re:Credit Card Companies (Score:5, Interesting)
while you are correct, the problem lies with the OS that needs the most AV support. Windows itself acts like a virus to change memory locations when certian apps are run. Thisis to ensure compatibility. With Vista msft has been trying to change such behaviour, but it took 6years for msft to notice the problem and at least until win7 until things start working better. Linux and OSX don't suffer from such things as badly as they depracrate old buggy features ona regular basis.
Re: (Score:2)
And *nix and BSD have been doing this for *ages*. : D
Re:Credit Card Companies (Score:5, Insightful)
Re: (Score:1, Interesting)
Re:Credit Card Companies (Score:5, Interesting)
The thing about anti-virus software is that is stupidly tries not to be intrusive. AV software could be pretty much 100% effective with a few tiny changes, but those changes will make it more visible and annoying.
This won't protect against scripting language malware and exploits of ActiveX (or other in-process DLL code), but it will tend to stop what they can do in the long run. Exploit code can create an executable in some directory, but it won't be able to be run without a warning, even if that code contains no known virus.
Re: (Score:2)
Any other attempt to execute a file results in a full scan of the file using the virus signatures, and the user is then given a warning about running non-trusted executable and analysis of the scan.
Would any system file updates from {insert OS company here} automatically be added to the checksum list, or would this need to be done manually? Could the update process itself be exploited if the former applies?
Re: (Score:2)
My preference would be to do things completely manually, requiring the user to approve everything.
With a PE component to the AV software, only the most critical files (kernel, some device drivers, etc.) would have to be "auto-approved". Also, I suppose that anything that runs before the AV runs would be an issue, but that's the case now, too.
Re: (Score:2)
It would just be easier to whitelist applications. Create checksums of the 20 or so programs that your normally run and check each of those at boot time. Allow the user, at boot time, to specify any other programs he'd like to run.
Re: (Score:2)
This has two problems.
First, DLLs and other shared code are missed by your idea. These are one of the worst infection vectors in Windows.
Second, the average user doesn't know what has to run to keep the system doing the right things, and getting dozens of popups would result in the same thing that is happening with UAC...people would be conditioned to just click "Yes" to get rid of the box. You want these boxes to be rare enough that they mean something to the user.
Plus, if you have verified from essentia
Re: (Score:2)
Getting a bit OT here, but signatures aren't so much a proof of identity anymore as they are proof of consciously committing fraud. It's one thing for a crook with a stolen card to say "Huh, I thought it was mine, I've got another card that looks just like it, I must have found that one on the floor, forgot about it, and accidentally used it." It's another thing to tell that same story with "and then I must've accidentally signed someone else's name, too" at the end.
On a related note, I've got a friend that
Re: (Score:2)
Re: (Score:2)
UAC is a perfectly fine idea. Linux/Unix have been doing much the same with sudo (+its various GUI wrappers) for years. UAC is just a lousy implementation, which can (hopefully) be rectified.
IDW (Score:2, Funny)
This is the dirty secret of desktop / on-access antivirus scanners; they don't work.
F.D., I work in the industry, and the sole exception from this rule is my own employer's product, xxxxxxxxxxxx, of course.
so what? (Score:4, Insightful)
If your scanner doesn't say program X is malware, does that mean you should run program X?
Of course not. Quit downloading and running random programs, and your results will be the same whether scanners work, don't work, or you don't have one at all.
Re: (Score:2, Insightful)
So your advising that everyone disable javascript, flash, etc in their browsers?
spybot (Score:2)
I run spybot around twice a week and mine hsn't found anything for months, except my 'Registryfix' which it thinks is malware...strange.
Re: (Score:2)
How's 1995 treating you? Animated GIF's still everywhere?
I have no problem with a sitemap, something more compatible with screen readers, but seriously... JavaScript exists, and is quite good at making websites and web apps interactive. That's what it's for. Denying reality is pointless, and even though you claim that any site that requires Javascript as broken, that doesn't make it so. Google Maps, gmail, many other sites that are very useful a
Re: (Score:2)
Do you understand what Noscript actually does? It allows you to very easily whitelist which sites you trust to run javascript/flash. After about a week of enabling sites you frequent (e.g. banking, google maps etc), there is very little upkeep involved, while preventing sundry sites you google from executing code. The effort compared to a full reinstall every 6 months is minuscule, which is why Noscript is so popular.
As the practice of disabling ja
Re: (Score:3, Interesting)
I am a web developer, quite proficient in javascript, and agree with the GP. No site should *require* js for navigation. There are established ways to mark up your menus, no matter how complex they may be, so that they may be navigated with js turned off while perhaps having enhanced usability or attractiveness for those who allow it to run. This is absolutely essential in the modern web: your most important visitor, the googlebot, doesn't run javascript - and obviously you want it to be able to follow link
Re: (Score:2)
Having an OS with
(Stupid) Useful Malaware Tricks? (Score:3, Interesting)
..a bit OT, but sometimes I wonder when will be the year of malaware on Linux or OS X.
Re: (Score:2)
Hey, you've just been hit with a random Linux virus! Change to /etc and using sudo or su (your choice) please delete 3 random files or directories. Thanks!
Re: (Score:2)
malaware
Malaria kills. You should use a mosquito net when surfing the Web. Take care.
Ugh! Scanners! (Score:4, Interesting)
This scanning aspect grows even more germane as we ascend into the commonality of terabyte drives.
We need better approaches to checking files for infections or payloads -- like checking them thoroughly once and then checking any newly created or altered ones at the time of alteration. But even there you take a performance hit, and I know most AV systems already does this to some extent (but will rescan all the drives periodically).
Ah, gotta love Windows. I much prefer to have a clean system and avoid any operations that might introduce a payload -- like running IE, for example.
Google's attempts to flag questionable sites is half-baked, and depends on GoogleBots catching the vulnerabilities before your browser does. And for the poor site owner that's been compromised, Google fails to provide enough details for the site owner to eliminate the potential problems.
Well, I don't use Windows as my primary platform for a number of reasons, virus vulnerabilities being one of them. Not to say Linux doesn't have its share, but they are far less common and if you keep up with the latest upgrades, you'll do OK for the most part.
I think we need to go in a direction of relying on hypervisor-wrapped OSes that can do selective rollbacks to the points before infection. This way, you eliminate the need for scanning everything all the time and better yet, you might put some of the malware protection in the hypervisor itself, at a level the guest OS or the malware could never detect nor evade.
Just a thought for free for some enterprising individual to go make $$$$ from!
Re: (Score:2)
"One thing I absolutely despise with the AV scanners is just that -- the scanning, that eats up performance both disk-wise and cpu-wise, and always seem to run at the wrong times -- when I am using the machine!"
Funny, isn't it? Windows Defender takes eight and a half hours to scan my 2.5 terabytes of disks, and if I haven't run it for a few days it will start an automatic scan a few minutes after I boot up the PC.
Surely that's the absolutley stupidest possible time for a scanner to run? If I've just booted
Re:Ugh! Scanners! (Score:4, Insightful)
What I don't understand is how I run NO A/V software (no, really) - I just run Sygate, a software firewall - and I have not gotten any trojans or viruses in the last... 10 years? Yeah I guess I could have one and not know about it, but I doubt it, disk activity and network activity seems normal (except when Skype decides to route a call thru me, why can't people get their own IPv6 IPs damnit??), and I occasionally run a virus/rootkit scanner over my machine and they come up clean.
A/V is probably unnecessary, if you have a reasonably knowledge of how to use a computer. Yeah most don't, but you're posting Slashdot so you probably do. Why do you use one at all?
Re:Ugh! Scanners! (Score:4, Interesting)
What I don't understand is how I run NO A/V software (no, really) - I just run Sygate, a software firewall - and I have not gotten any trojans or viruses in the last... 10 years? Yeah I guess I could have one and not know about it, but I doubt it, disk activity and network activity seems normal (except when Skype decides to route a call thru me, why can't people get their own IPv6 IPs damnit??), and I occasionally run a virus/rootkit scanner over my machine and they come up clean.
A/V is probably unnecessary, if you have a reasonably knowledge of how to use a computer. Yeah most don't, but you're posting Slashdot so you probably do. Why do you use one at all?
One reason: Kids.
One kid uses Linux as much as he uses Windows, and understands how to avoid malware. Alas, he has a lot of friends over that have not learned these important lessons.
Not to mention my other -- younger -- kid, who insists of downloading malware from Disney and other sites that *insists* on using IE to run at all.
Re: (Score:2)
If he insists on using IE, run Windows in a virtual machine with snapshots under Linux. Anything not 3D will run fine, and you'll be able to undo crapware installs in Windows very easily.
And honestly? I'd just block all of disney.com. They've proven through their legislation sponsoring and quadruple-charging0 that they view you as nothing more than a bag of money.
BTW, I just checked out Disney.com... most of their flash games and stuff seem to run fine under Linux, and I'm running 64bit Ubuntu with Flash
Re: (Score:1)
Re: (Score:2)
Symantec's Norton 2009 line actually tries to increase performance, by keeping a white-list of "good" programs based on data from both Symantec and all it's users (based on automatic submission of the CRC checks of running programs). On
Their next move... (Score:2)
...will be to invest money in marketing to find some way in which this study is not "fair"; in other words, how it doesn't align with limited and unrealistic testing methodology that only focuses on very specific ways their tools succeed in detecting malware.
They've done (Skoudis) [sans.org] it before (Secunia) [theregister.co.uk].
Didn't Consumer Reports say this years ago? (Score:5, Interesting)
A few years back, Consumer Reports took some malware and made some trivial changes and almost all the AV vendors failed that simple test.
If you recall the AV vendors criticized Consumer Reports because they claimed it was the equivalent of producing new malware and that it was irresponsible.
Bottom line... this pretty much proves that AV has little or no value. You use it because everybody tells you that you have to use it, not because it provides any sort of comprehensive security (it doesn't even come close).
Antivirus/Antispyware 2009 (Score:4, Interesting)
Re: (Score:3, Funny)
ultimately running any AV software is a joke if you know how to use your computer correctly and don't download goat pr0n and warez
I've been downloading goat pr0n and warez for years, and I'm OK. well, my computers are.
Re: (Score:2)
We use Symantec Antivirus 10 and SEP11 here. We've gotten computers infected with variants of that. Seems to slip right past the real-time protection, but if you tell SAV to run a system scan it will find it. Very odd.
Re: (Score:2)
I download goat pr0n and warez just to watch it throw up all over itself when run under Wine. The message logs are amusing ;)
Well...then...what would YOU use? (Score:1)
If asked (or arm-twisted), which AV vendor would you recommend?
At some point in time, each seems to move to the "front of the line" in terms of quality and performance...then some update comes along and...boom...either or both go into the crapper.
Suggestions?
Re: (Score:1)
I tell them all to run spybot-sd and avg8. Spybot because it's free, it detects heaps of stuff (that is still relevant) and removes it. Been using it for years and it has detected *some* issue on every system I have ever installed it on (assuming no other anti-spyware had been running).
I use AVG8 because it's free and it can be made to work with the proxy server at our university.
Fr
Re: (Score:2)
What the AV engine and detection rates are concerned I strongly suggest either Kaspersky or F-Secure. I don't know how those are like from an endpoint usability standpoint though.
Old Jedi Malware Tricks (Score:5, Funny)
Virus scanners don't stop malware? really... (Score:3, Funny)
Open Source OSs are the one true answer (Score:2)
The good thing about open source operating systems is that you can pad the OS with extra zero bytes too so that the viruses cannot recognise the OS and don't know how to infect it.