 Leider  enthllt  dieses  LIESMICH  file  einige   letzte-minute 
additionen  vom  mir,  den Programmautor.  Leider kenn  ich  kein 
Deutsch (jedenfalls nicht gut genug). Vermtlich wird dieses file 
bersetzt  so da im nchste Version dieses in Deutsch sein  wird 
und nur die zuknftig aktuelle daten in Englisch.

 Tur mir leit, wirklich, aber mein Deutsch ist sehr schlecht.

 Also.

 Letzte nderung: 29. Mrz 1992.

 Some notes on the UVK:

 Please   note   that,     whenever   sending   in   unrecognised 
bootfiles   on  disk  or  when requesting  an  answer   back   to 
ANYTHING you write, I need INTERNATIONAL REPLY COUPONS to be able 
to answer!  Packages that do NOT send any of these or  who supply 
stamps that are non-Dutch, will NOT not be answered!

 This program is NOT Public Domain!

--- Addenda to Manual Appendix A (Anhang A) ---------------------

*  The programme mentions that it is a DEMO version after  having 
started  it  through  another  programme  (e.g.   "Hotwire"   and 
similar    other   programmes  that  allow  you  to   start    up 
applications through key presses).
 These programmes have not been properly programmed!   When   the 
"Ultimate Virus Killer" starts,   it inquires with GEM what   the 
current file name is (i.e.  that of itself) and then checks  that 
file  name (i.e.   itself) for link-viruses.   If something  goes 
wrong there,  it will assume something went wrong and enter  demo 
mode.

--- Addenda to Manual Appendix B (Angang B) ---------------------

Virus #58

Name: Joe Virus
Discovery date: November 25th 1991 (ACN Software)
Virus can copy to drive(s): Current floppy drive (A or B)
Virus attaches itself to: Hdv_bpb vector
Disks can be immunized against it: Yes (0.W $4E71)
Immunizable with UVK: No
What  can happen:  When it finds itself with a specific value  in 
 the  fourth  and  fifth byte,  it  will  execute  itself  again, 
 probably cluttering up the system
When  does  that happen:  When it finds itself  again,  and  then 
 every second time
Resetproof: No
Can copy to harddisk: No
Remark:  As this virus has no particular characteristics,  it was 
 called "Joe Virus" as I was listening to Jimi Hendrix' "Hey Joe" 
 when I disassembled it

Virus #59

Name: Directory Waster Virus
Discovery date: Unknown (Michael Schussler)
Virus can copy to drive(s): Current floppy drive (A or B)
Virus  attaches  itself  to:   Hdv_bpb  vector,  resvector;  also 
 undocumented reset-resistant
Disks can be immunized against it: No
Immunizable with UVK: No
What can happen:  First twenty tracks of your disk get  destroyed 
 (both side 0 and side 1!) 
When  does  that happen:  After each twentieth copy  it  made  of 
 itself
Resetproof: Yes
Can copy to harddisk: No
Remark: The name is quite improper, as it destroys about 25% of a 
 disk  and not just the directory.  Initially,  this  virus  only 
 installs  itself on the standard reset vector.  After the  first 
 reset,  it bends the hdv_bpb vector and becomes  reset-resistant 
 in the undocumented way

Virus #60

Name: Merlin's Mad Virus
Discovery date: Unknown (Mike Mee)
Virus can copy to drive(s): Not at all
Virus attaches itself to: Nowhere
Disks can be immunized against it: No need to immunize
Immunizable with UVK: Not applicable
What can happen: See the Mad Virus - it does the same things with 
 the screen and/or makes a sound 
When does that happen:  When booting with a disk containing  this 
 'virus'
Resetproof: Not applicable (i.e. "no")
Can copy to harddisk: Not applicable
Remark:  This is no virus at all, but it has been classified here 
 as  Mike Mee sent it to me who classifies it as a virus  in  his 
 "Professional Virus Killer".  It was written by Merlin the Welsh 
 Wizard,  and it's TOTALLY HARMLESS.  It can not copy itself, and 
 only fiddles around with the screen

Virus #61

Name: Wolf Virus
Discovery date: February 4th 1991 (Carsten Frischkorn)
Virus can copy to drive(s): Current floppy drive (A or B)
Virus attaches itself to: Bios vector
Disks can be immunized against it: Yes (0.W $EB34)
Immunizable with UVK: No
What can happen: RAM memory amount it halved (this does not imply 
 you actually LOSE RAM,  it just means that it makes the computer 
 THINK it has less RAM!)
When does that happen: After the eighth generation is found
Resetproof: No
Can copy to harddisk: No
Remark:  A rather nasty virus.  For starters,  it starts off with 
 the bytes you'd normally find on an MS-DOS disk,  i.e. all virus 
 killers think it's an MS-DOS bootsectors.  Second,  it fools the 
 user  by putting the message "Kein Virus im bootsector!" on  the 
 screen  at booting.  This is the boot message of the  virus-free 
 bootsector of the German virus killer "Sagrotan". It de-installs 
 itself  after three infections (i.e.  your computer  will  think 
 you've got 1/8th of your true RAM memory by then!)

Virus #62

Name: Ghost virus I
Discovery date: October 5th 1991 (Frank Jonkers)
Symptoms:  See virus #12 (Ghost Virus),  Unfortunately,  there is 
 some  corrupted  code in the virus copy routine so that  it  can 
 cause  a  disk to be corrupted (the bootsector  can  be  written 
 wrongly,   not   corrupting  the  actual  data  but  making   it 
 inaccessible).

--- Addenda to Manual Appendix C (Anhang C) ---------------------

76: Accent (Program by Markus The)
77: ICD Harddisk Driver
78: Drive B Simulator (Public Domain program by George Greve)
79: Let 'Em Fly (Shareware alert box enhance prog by O. Scheele)
80: Sector Display (Resident program by Red Egg Software)
81: Standard ST Book built-in ROM drive utilities by Atari
82: Mousetricks (Mouse button etc. prog by Jonathan Lawrence)

--- And what's new in this version as opposed to version 5.3 ----

 Some  last little bugs (mostly cosmetic ones with screen  redraw 
and alert box handling) were corrected.  The bootsector scan code 
was  optimised to gain yet another speed percentage.  A  possible 
85%  speed  gain  in the link  virus  partition  scan  department 
through the possibility of selecting 'scan executable files only' 
(as link virus practically never spread to non-executable files). 
'Now  checking  for bootsector viruses' message  included  during 
bootsector scan that's automatically performed before scanning  a 
floppy disk for link viruses.  'Repair BPB' routine now  supports 
High  Density (HD) and Extra High Density  (ED)  disks.  Inverted 
values  in  system status screen are more extensively  checked  - 
"ALERT!!" will appear if a significant chance at virus  infection 
exists  whereas  all other (most probably  harmless)  cases  will 
remain like they were before (i.e.  just inverted).  All text put 
together   in  clusters  so  as  to  enable  instant  and   quick 
translation  of  the  program  into  any  language  (contact  the 
feedback address for translation requests).  On the system status 
screen,  suspicious  system variables can be checked deeper  (the 
values  of  which  should then be written down  and  sent  to  us 
instead  of the actual AUTO folder programs and accessories  that 
bend  them - please mention which program did it).  This  can  be 
done by clicking the mouse pointer on the system variable name or 
the address behind it.  Link viruses 'entire partition' check may 
now  be interrupted with UNDO and ESCAPE instead of only  ESCAPE. 
Program  now fully ST Book (ST in notebook form) compatible  with 
full recognition of the ST Book's internal ROM-disk software. C'T 
Virus recognition improved.
 Its main statistics:  1045 recognized bootsectors, 62 recognized 
bootsector viruses, 5 recognized linkviruses, 32 recognized anti-
viruses  and  81  recognized  special  applications.  Up  to  506 
bootsectors can be repaired.

 Thanks for reading this.

 End of file.
