O p @`  @`! #@%`')+-/1 3@5`79;=?A C@E`GIKMOQ S@U`WY[]_a c@e`gikmoq s@u`wy{} D@`  @`! #@%`')+-/1 3@5`79;=?A C@E`GIKMOQ S@U`WY[]_a c@e`gikmoq s@u`wy{}AQVKILLER RSC PDȕVKILLER PRG PD([VKILLER DOC PDn@ uJqqmjm>$ ZVR Desk File Options Testing About Vkiller -123456 File Selector Quit Quiet  System Info Load Virus File L - Write Boot Sector File W - Virus Table Generator V Generate Booter Table T - Create Boot Sector C Simulate Disk I/O Execute Disk Accesses Click here for details.Click here for details.Click here for details.Click here for details.Click here for details.Click here for details.ST Virus KillerVersion 3.11 February, 1990Copyright c 1988, 1989, 1990byGeorge R. Woodside5219 San Feliciano DriveWoodland Hills, Ca. 91364 USA(Shareware contributions cheerfully accepted!)GEnie: G.WoodsideCompuserve: 76537,1342USENET: woodside@ttidca or: {philabs|csun|psivax}!ttidca!woodsideIf you think you've located a virus this programdoesn't recognize, please send a copy of the diskor the data file to one of the addresses above.If you wish your disk returned, please enclose astamped, self addressed mailer.OKI/O Error Executable Dirty Boot Sector Dirty FATDirty Directory Hidden Sectors System Booter Benign Anti VirusInfecting Anti VirusKEYOKOK000Access cycles to execute: ___999Drive to access: B A Clear boot sector each time? No Yes Cancel OK This program contains a built-in enhancedfile selector. You may wish to use thestandard selector instead, or if you havea replacement selector installed in yoursystem. Standard TOS 1.4 Built-In Name: _X -Comment: _-X-000Pattern Start: ___999Siren TRUE FALSE Icon None Happy Quiz Devil Box None System Quiz Known Desktop Message Safe System Quiz Virus Anti Highlight message TRUE FALSE Generate text TRUE FALSE 000Pattern Length: ___999 Cancel Done OK Name: _X -Comment: _-X- Cancel OK Create a boot sector:Drive: A B Data: Non Exec Exec Buffer Status: Non Exec Exec Cancel OK There appears to be a virus active in this computer right now.The disk you just executed a Kill on was immediately re-infected.That disk has been Killed again, and should still be virus free.Turn off your system, and wait 10 seconds. Put the disk justkilled in Drive A, and then power on. That should get you upand running without the virus. Then, you'll have to go throughall you disks, cleaning off the virus.DO NOT PRESS RESET! Power off, wait ten seconds, then re-runthis program to insure that you have removed the virus.Drive ?:.OS ID: _X0Serial Number: _9xxFormat ID: __XX0Reserved Sectors: _90Hidden Sectors: _90Sides on Disk: _90Tracks on Disk: _90Sectors Per Track: _90Sectors Per FAT: _90Directory Sectors: _9 Scan Disk Cancel Set Defaults Rewrite Scanning a floppy disk:If you know any of the parameters of the disk, select them.Leave unselected those you want figured out. If you don'tknow the number of tracks on the disk, but want to prevent thedrive head from being stepped too far, select the track wheretesting should stop, and select the Limit box.Sides:12Tracks:Limit40808182838485Sectors: 91011CancelOKWhich type of 'Guard' boot sector do you want to install:Display Type: a display is posted at boot up and reset, indicatingthat the disk does not contain a virus.Monitor Type: displays a signon message, then remains active untila reset. If a disk with an executable boot sector is detected at anytime, the screen will flash and a tone will be sounded.Cancel[3][Please change to|Medium Resolution][ Cancel ][3][Insufficient memory|available for that much data.][ Cancel ][3][File Selector Error][ Cancel ][3][File Open Error][ Cancel ][3][File Read Error][ Cancel ][3][File Write Error][ Cancel ][2][This disk is unreadable.][ Cancel ][2][Write boot sector|to which drive?][ Cancel | Drive A | Drive B ][0][Print all data, or just|the boot sector?][ Cancel | All Data | Boot Sector ][0][Printer Open Error][ Cancel ][1][*** WARNING! ***|This disk matches the tests for|more than one type. Identity|is uncertain. Be careful.][Button]?````````aaaaaa`?pb'"/!Hp 1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`1`999999999999090909090909999V"p""p?````````aaaaaa`?999999999999090909090909999VxD8@D|D @@x80       0 '??0*I-@Ֆ@@|@t@_p@@o@@mT @X@e@E@D%,>A tJ]N*gnR*n `@@@@@@8p??>80P >`?~h~WX<\$\~_\$$\!\|_'\\$"\~k_)"\(\$\~_\'\\}!_$%\\'\~_<\XX~w~o/ovb۠_vcݠݠcvwvWڠzbv  (p( ( ǜ`8yp|@x` <|||<< qhJ (B AEx'x /yx 9<800x0 00 0000`x00`0`0a0000 00 0 <0l00?00 0a 0 0 0 ?0 000 0`0`x0`008ax >"  ?? ??? 999999?999999999999999V'?? ? 4 4  @Fd@Fd@D@D@@@ @t@J@JF%F5++@4@4@ @ @@@J@Y@J _ G @ @  @ `@ @ px<>@@   gg33yy(("HrHڐ#c``PP  @ @ @@  @ @` ??::5U5U::5U5U???U?U33>33>5U\:5U\?*W*k*V*j*V*j*V*j*V*j*W<*kx?\*5U]:~|xp`@0000000000000000000????00*@*@*@@@@0300>c33c33k333>36 UW UW  W> < UWx??(P(P:p:p+P*P9Up:p*P*P:p:p+P*P9mp;p+kP)kP:p8pu\7_yy  UUU00p000000xUpꪰUp_XX[X_UsપUw꪿<0a !`?``?? 0p0p0x000000xxxUXpHpXpHpYIYIYIYIYIYIYIYIYIYIYIXHXHXHXHXH?X8>H|>X|>I|7cVUUU@UUUUX X X X @X `UX UVUUUU3 6 < 8 < 6 3͜ B( \Hd'" 88?*?(!"!"G G!``f<|>nfffff>`ffff`f>>>`>??     @~ @:``*5`G*5kU   Ѐ@  ?5`jUPj_jup*? @@ xxx?<<<<?yy<???<yxxy '?<<?<<<xxx~xx<<<<xxxx??~<<<<?<<?xxxx?# ?a  @ a Ls? #L&@!a!"!L$ @  !!"!L$>s2L$2`!!2!!L$ 2@!!!!L$2L!!>! J$2L#1>#1A$ D 2@"bd& F2`b??@:``*5`G*5kU   Ѐ@  ?5`jUPj_jup*? @@ "<xx<<<?<?<<<<<<<??<xxxxxxxxxy<<x??-?|p~ppppw?>w;pw>~wp;pw~p8pw?8p~>w~~?8p|>~s ~?xa  HLs? cOL&@!a!"!LL$>s2ID$ 2`!!!!CI$2L#1>c1Id&F2`bL?????<<<<xxgxx<???<~~xx~~<<<<<<<<<<<xxxxxxxp8  0 01p1` `@`@`````@`0@`p`0 0 <p  xx>  A@@ ?@@?@@ |>>>>?"  ? p      < ? ?aa303330000?<<303330000?<<`ga`f``ga`f`0 ? 0 ? C  A@@ ?@@?@@ |>>>>?"  ? p      <>8;?88;;;;;8??;>;8s?s>?;?| 0;`;@@``@0@`0 |<????|?|?UXpHpXpHpYIYIYIYIYIYIYIYIYIYIYIXHXHXHXHXH?X8>H|>X|>I|7cVUUU@UUUUX X X X @X `UX UVUUUU <<<<<<<<<<<<<<<<????<UUWUUW 88 ?>>`? ;;;;{{Ç~x<p  ``8E@ Y !#2L"yD RL2J I % #@A@aX `       @ @@@ @  ``ppx66 0bM$`s)ֹ@y߾0I @ i`0< ?? tl00 &<xx<<<?<?<<<<<<<??<xxxxxxxxxy<<x??"xxx?<<<<?yy<???<yxxy '?<<?<<<xxx~xx<<<<xxxx??~<<<<?<<?xxxx?#  @ @ @<x>?? ? 4 4  @Fd@Fd@D@D@@@ @t@J@JF%F5++@4@4@ @ @@@J@Y@J _ G @ @  @ `@ @ px<>@@   gg33yy(("HrHڐ#c``PP  @ @ @@  @ @`5Xw#t -!:$Z %!$%*z%r)",N)  &!6*!"%"##-$.%*&&'( .( %*f%++,-Z-8.e0c36[5XZ6X8X:0X<@X=X?XAXC XE0XG@YIVIJJ~:KfM^OP~:Qf S Tf U,V,WXHXY ZZzZ[F [\B\N^&_ _``~+abJb dfhejc./0HIJbcd|}~78!9hi/j2" K.7y}dh|  .7    ;  D G f i p      $ C J Q p w ~  ZZ  $ + 2  <  P  F [ p rtvxz|! <\| !  ZrL#mjmxmmm mm m mm m n nn n.n<nJ#nXnfnt*nnn/nnn4nn n?oo!oI#""o*=  !o8 %$$oF5 #oT '&&ob %op )((o~  'o *o +o ,o -o# .o* /o/ 201oI1o/p 3pH 544p&3p4867p 7q5pB9pPH:p^=;<p  <r:pl >?@AB CDEFGJHIIrGpzMKLp Lr:JpNpQOPpHPpNpTRSSrVQpWUVpHVpTpZXYYrrWq [[q Z q"r5q0 q>qLqZ qh-    r r r  r.r s s6 sR 101Q/0'* 0    + ; M b%f rPiLjLkLlLmLnLoL pL q L r L s L t Lu LvLwLxLyLzL{L'|E 4 sn!!  !  '). )"'I)s(  '! & C ss7s$ 4    $,4$,<$,4 $&8?# " $!G "U\$s%9&9'9 ;st7 L' U1 :  Z6 p w"  {,   6      "  ,  6   "   ,   ' 0  Er<qvqqq  < qq q  q   >   A I@ < = > C& j=  =$ t2tNtjttt t  t  u  u.      '   B  ;&;`>>=   %      >  #%(+ .147 *:CF I%L'S7 LV9GBEG  GB >D7 G'GuJxzZzrj":u8xhHh`Xxp(8`V80 *o"m ~#~.I+I/ BBBg/ / Bg?<JNA N T ?N?<LNA#:-);-)8-)e:\progress\vkiller\vkiller.prg\1990\1\22\17\50#(-8(-;(-:NV-|2Bn-|ByByByByBy#j nf,BgBg <0?B@H@?p??9N p` nf BgBg <@`& nf BgBg <J` nf&BgBg <h?B@H@?p??9N Na=@0gp3#j29!!09!y!A=@09!!=@09!Hй-@0.g ng -Hn `?./.N`\O0gp3#jBn0.y!l2!09!y!A=@!=@ 9/0.Hї -@09!V@=@H=@ n-H09!!=@0.n?./N`\O0gp3#jRn`R/9N`FXO=@ @4fp3#<j n g^/9/Na^PO0gD yf0.f n/NXOp=@p3#jj"n yj!QX` nX-Pgf/9 n/(Na^PO0g yf0.f/.NXOp=@p3#j n hf p=3`p<`B@N^NuNV/9@p?N|\ON^NuNV/9@p?N|\ON^NuNVB!B!B! l\ 9g/pI?NA\OBHypH?NA\O## f/9!p?N|\Op`,#p?BgBg??.B/9p?NN=@0g/9t`/9Hy!NPO09!!=@09!n09!nXn n op =@ nlp =@0.!H-@ 9l@ 9g/pI?NA\OB/.pH?NA\O# f B`#?.N|>Bg?./9Bgp?NM=@#!#0N^NuNV"n n"n niBn nl0.T@0@"n Rn` n (HH-@( HHሀ-@( HHሀ-@ n!n n (HA(H@HA n1@ nh n0(H1@ n ( HA( H@HA n1@ n ( H@ n1@ n (HA(H@HA n1@ n (HA(H@HA n1@ n (H@ n1@ n (HA(H@HA n1@ n (HA(H@HA n1@ n (HA(H@HA n1@ n (H@ n1@" n hop1@ n hlp1@ n hop1@ n hlp1@ n h op1@ n hlp1@ n hop1@ n hlp1@ n hop1@ n0(lBh n h o1| n h l1| n hop1@ n0(lBh n hop1@ n hlp1@ n h op1@ n hlp1@ n h op1@ n hlp1@ n (HA(H@HA=@"n I2(H1@ n0(n0(n0(n"H0(n0.H1@ /. N`FXO n1@$N^NuNV"n n "n n iBn nl n 0.T@2@QRn` n-h .B@H@ n @ . n @ . n @ n0(H=@@ n @0.@@ n @ n0( @ n @ n0( @@ n @ n0(@ n @ n0(@ n @ n0(@@ n @ n0(@ n @ n0(@@ n @ n0(@ n @ n0(@ n @ n0(@@ n @ n0(@ n @ n0(@@ n @ n0(@ n @ n0(@@ n @ n0("@ n @$n"J I0(=@@ n @0.@@ n @N^NuNV lX 9g/pI?NA\OBHypH?NA\O## f/9!p?N|`#?.N|TOp?BgBg??.B/9p?NN=@0g/9t`p?Bg/9NPO y?<Bg yHhN/yXON`XOp?BgBg??.B/9p ?NN=@0f0.fp`p?N TO=@ yjf0`p3j?.N|>Bgp?/9Bgp?NM=@0f* yB@ @gp=@p? yHhN`\On?< yHhN`\On0.fB@`?.N|TOp?Bg/9NPO y?<Bg yHhN/yXON`XOp?BgBg??.B/9p ?NN=@NzBg/9!NPOByh nfp=`p>=@HnHnHnHn?/9 N 3!3!3!3! y g,p???.?.?.?.Bg?./9 N3 nf0B!#!B!/9Hy!NPOBn`( nf BgNTO` nfp?`p=@ nf$#jp3p 3p3`@?.NTOp ?N,HTOp 3?9?9?9?9NPOp?Bg?.?.?.?.Bg?./9 NBBgN\O0.N^NuNV ygHnHnHnHnp??/9 N 3!3!3!3! y g,p???.?.?.?.Bgp??/9 Np!3p 3p?Bg?.?.?.?.Bgp??/9 NN^NuNV ygBp?N\OHnHnHnHnp@?/9 N 3!3!3!3! y g,p???.?.?.?.Bgp@?/9 N/9 p?N|\O=@ @fBg` nf p?NTTO y g,p?Bg?.?.?.?.Bgp@?/9 NBBgN\ON^NuNV ygHnHnHnHnpA?/9 N 3!3!3!3! y g,p???.?.?.?.BgpA?/9 NHybHy4HyBHypHy! HyN"=@0f/9HyNvPO y g,p?Bg?.?.?.?.BgpA?/9 NN^NuNV yfBnBp?N\OHnHnHnHnpB?/9 N 3!3!3!3! y g,p???.?.?.?.BgpB?/9 N?.N TO y g,p?Bg?.?.?.?.BgpB?/9 NBBgN\OB@`@ yf p=@` yf /9Zp?N|\O=@ @gS@`pN^NuNV yfNBnHnHnHnHnpD?/9 N 3!3!3!3! y g,p???.?.?.?.BgpD?/9 NBg/9N(\O=@?/9NT\O n g\Bp?N\O nfp?Bg?Hy` n fp?Bg?Hy?.Ng ?9N TO=@ y g,p?Bg?.?.?.?.BgpD?/9 NBBgN\OB@` yf p=@`pN^NuNV yfZBnHnHnHnHnpE?/9 N 3!3!3!3! y g,p???.?.?.?.BgpE?/9 N?.Nb@TO=@ @ f?.NKDTO=@0fp`p =@ n g nf nfB?<Bg/9N/y.!N pPOBgBgBg/9?.Ng ?9N TO=@ y g,p?Bg?.?.?.?.BgpE?/9 NB@` yf p=@`pN^NuNVp @B.Bn nl.0.йf-@  n!@ Rn` yj-hBn n g*0.Rnйf-@"HX @!Q ` yj Pf< yfP0.Rnйf-@ @!|ɀ 0.Rnйf-@ @!| Rn yfv0.Rnйf-@ @!| 0.Rnйf-@ @!| 0.Rnйf-@ @!|Z Rn yg yfL0.Rnйf-@ @!|ʖ 0.Rnйf-@ @!| Bg/9fN(\O=@?/9fNT\ON^NuNVzBp?N\OBg/.p?NABBgN\O . g/9`B@N^NuNVBBgN/n TO/.N@/nXONPXOHЮ-@ @ (\gRp\/./.N@PO yI`f /./.Hn/./.Ni`< yH`f/.Hn/./.N`Hn/./.Nj =@0f/9 p?N|\Op`t0.g/././.N{ p\?/.N\O-@ g.R nH=@B/./. N@PO0. n`/./. N@POB@N^NuNV09jRyj0fB?<N\ON^NuNVSyjfB?<N\O09jlByjN^NuNVBn n l0.HAbp0Rn`09!T@33bp3vHyxHy HybNZ N^NuNV3H3 J0. n3L0.n 3NHyHp??9 N8PON^NuNV?9 ?9!?9"?9!?<N 3N^NuNV=n=n =n =nNzHnHnHnHnp ??9NH0.gL0.gFHnHnN6PO0g?.?.?.?.N2PON+HnHnHnHnp `NN^NuNV0.  n-Hh N^NuNV0. Ю-@ @h 0.gvHnHn?. /.N0.  @=h0.  @=hSnSnTnTn?.?.?.?.p?Bg/.NpN^NuNV0. Ю-@ @h 0.gvHnHn?. /.N0.  @=h0.  @=hSnSnTnTn?.?.?.?.p?Bg/.NpN^NuNV?.?. ?. ?.BgBgBgBgp?NN^NuNV0.  @h0.gvHnHn?. /.N0.  @=h0.  @=hSnSnTnTn?.?.?.?.p?Bg/.NpN^NuNV0.  @h0.gvHnHn?. /.N0.  @=h0.  @=hSnSnTnTn?.?.?.?.p?Bg/.NpN^NuNV/./.?. /.N0.  n-H"H n0"n n0N^NuNVN~By p?NNTO3!HybHyHyXHy N3 Hy Hy!Hy"Hy!p?BgNHNN~N>@=@09!f/9p?N|\ON~p``0.fBgBg 9 ?B@H@?p?BgN p?/9!NL\Op?/9!NL\Op?/9!NL\Op?/9!NL\Op?/9!NL\Op ?/9!NL\Op!?/9!NL\Op?/9!NL?y ?y!>"?9!NPON(rN'2=@0fBBgN\ON"`N($N( ynf?9NTO?9N> NBWBgBgBgp?BgN N~B@N^NuNVp=@Bylp=@ y  g09yg ?N,HTO y=f09fHyp ?NN\Op<3 yj09hg*?N7>TO yj?(N7TO yj3 yj09hg*?N7>TO yj?(N7TO yj309 fp3 HnHnHnHnHnHnBgBgHnBgBgBgBgBgBgBgBgBgBg?.p???.N~<=@p?NTO09 fp3 0.@gj0.@ @bZH0@ PN`H?.?.N)XO`4?.?.?.?.NPO`BgBgBgBgp ??9N `Hy!0.H/NY`0. @bH0@`zHy!NZ\`Hy!NZ`rHy!N[`bHy!N\`R y fB yg yg yf`?9NTOp ?N,HTOp 3`>N7>TOp3p(3p23#j0.@g00.f p=@` Bn?.?.N$XO=@0f0.y!o.0.y!o"0.y ydf2 yff Byf`p3f`0. @g @g~` yFfBgp?/9!Nr`Bgp?/9!NPOBg/9!N(\O=@?/9!NT\O nf pG3`` nfpH`pI`p 3 `x0. @g @g4`f yfByBgp?/9!N`@p3p?`p ?N,HTOp3?9?9?9?9NPOp??./9!NPON^NuNVp??9 NXOBg?9 NXO3H3J09yS@3L09yS@3NHyH?9 Nj\O09@ @b3p3rHyHyHyHy?9!?9n?9r?9p?<p?N>09nfb?9!?9n?9r?9p?9N =@0fHyİp?N|\Op 3 `3 p3n`,?9!?9n?9r?9pp??9N n!gJ?9\N1z>!N1z>!N1z>!N2J>N2J>N2JTON^NuNV09pyn=@09"yD=@09!n=@09"y n=@09!й -@ @0(H=@0.й -@ @0.h=@H=@ny!1@ n2.h0.A=@H=@ny"1@N^NuNV09pyn=@09"yD=@09!n=@09"y n=@0.й -@ @0.h=@H=@ny!1@ n2(I0.A=@ny"1@ n0(y!S@3!0(y"S@3!09!hT@3 <09!hT@3 N^NuNVHnHnNaPO n hn hlHyHnNbPO` n?(HyHnNb HnHn?.N8V n hn hlHy HnNbPO` n?(Hy&HnNb HnHn?.N8V n h n hl n?(HyB` n?(Hy_HnNb HnHn?.N8V n h n0(l n?(Hy{` n?(HyŘHnNb HnHn?.N8V n h n0(l n?(HyŴ` n?(HyHnNb HnHn?.N8V n h n0(lHyHnNbPO` n?(Hy HnNb HnHn?.N8V n h n0(lHy&HnNbPO` n?(HyCHnNb HnHn?.N8V n/(Hy_HnNb HnHn?.N8V 09f@HyxHn?.N8V yfHyƍ`HyƥHn?.N8V`HyƹHn?.N8 09!y! @oHyHn?.N8 09f09fHyHn?.N8V`HyHn?.N8 yj hf/( Hn?.N8` yj/( Hn?.N8V B!09H#!B!09H#!09H#"p#"Hy!?9N^\ON^NuNV n)f p??9\`b n*f p??9!`N n+f p??9!`: n3f p??9!`& n4f p??9` n5fp??9/9 NPON^NuNV n)f p??9\`b n*f p??9!`N n+f p??9!`: n3f p??9!`& n4f p??9` n5fp??9/9 NrPON^NuNVp??9 N.XOp??9 N. n ??.?9 N n 09XPN^NuNVp??9 N.XO y!gp??9 NXO/. n ??.?9 N p??9 N.XO y!gp??9 NXO n 09XPN^NuNVPBp ?NA\O-@-x.-x6-x2-xN-x-x/p ?NA\OBgBg <T?B@H@?p??9N SS09P@@=@09yXS@=@?9HyHnPNb HnP?.?.?9 N 09Xnp0?NATO=@?Hy;HnPNb HnP?.?.?9 N 09Xn-nT-n n=P?.HyWHnPNb HnP?.?.?9 N 09Xn-n n-P/.HysHnPNb HnP?.?.?9 N 09Xn/.HynjHnPNb HnP?.?.?9 N 09Xn/.HyǥHnPNb HnP?.?.?9 N 09Xn/.HyǾHnPNb HnP?.?.?9 N 09Xn/.HyHnPNb HnP?.?.?9 N 09Xn-nP-n n/HyHnPNb HnP?.?.?9 N 09Xn/.Hy HnPNb HnP?.?.?9 N 09Xnp/pH?NA\O-@/Hy"HnPNb HnP?.?.?9 N 09XnB@N^NuNV n?(?(?(?(N2PO y!fp?`Bg?9 NXOp??9 NXO n3 H3 J"H0( iS@3L0( iS@3NHyH?9 Nj\O y!fp??9 N.XOBg`p??9 N.XOp??9 NXO n0( yX=@0( @@=@-h n g*X/?.?.?9 N 09Xn`p??9 N.XOp??9 NXO n0(@N^NuNVlHyxNXO=@0f0HyxHyĄHnpNb Hnpp?N|\Op` Hy!BgBgN/| XOp?BgN/| 4XOp?BgN/|xXOp?BgN/|fXOp?BgN/|^XOp?BgN/|!XOp?BgN/|!XOp?BgN/| 8XOp?BgN/|TXOp ?BgN/|<XOp ?BgN/|!XOp ?BgN/|^XOp ?BgN/|XOp ?BgN/|XOBgp?N/|!XOp?p?N/| XOp?p?N/|PXOp?p?N/|" XOp?p?N/|XOp??N/|tXOp?p?N/|ZXOp?p?N/| XOp?p?N/||XOp ?p?N/|@XOp ?p?NPO-y n1y! n1y" n1y! n1y  y!fB n -y 4 n -yf n 9 x`* 9 4x-@ @Sh nSh 9 -@ @-h 3 2 n0(R@3D09!y H=@09!y =@ y!f?p?p'?NJX Hn?.p??p?p)?NJX Hn?.p@?p ?p*?NJX Hn?.pA?p?p+?NJX Hn?.pB?p?p,?NJX Hn?.pD?p?p.?NJX Hn?.pE?p?p#?NJX Hn?.pC?p?p-?NJX Bgp9?/9 NPOBgpN?/9 NPOBgpT?/9 NPOBgp?/9?p'?p?NJX Hn?.p??p)?p?NJX Hn?.p@?p*?p ?NJX Hn?.pA?p+?p?NJX Hn?.pB?p,?p?NJX Hn?.pD?p.?p?NJX Hn?.pE?p#?p?NJX Hn?.pC?p-?p?NJX Bgp3?/9 NPOBgp2?/9 NPOBgp8?/9 NPOBgp?/9BBgN/ytTOp?N|/y^TON)x.pI?NA\O`bp?p?/9^NtPOp?p?/9^NPOp?BgpO?p??.B/.p?NN=@0gDpN=@0.g40.g.p?Bg?.??.B/.p?NN=@0gSn`Rn0.fpP=@Bn0.f0.nnp?0.@A?/9^NtPOp?0.@@?/9^NPOp?Bg0.S@?p??.B/.p?NN=@0fRn`p?0.@@?/9^NtPOp?0.@A?/9^NPOSn`Bp=@=n`20.g@ y^0(J@gp =@ y^0(b@gp =@ y^0(z@gp =@0.fZp?p?/9^NPOp?BgBgp ??.B/.p?NN=@0fp?p?/9^NtPOp?p?/9^NPOp?BgBgp ??.B/.p?NN=@0g2p?p?/9^NtPOp?p?/9^NPOp =@0.fp?p?/9^NtPOp?p?/9^NPOp?BgBgp ??.B/.p?NN=@0g0p?p?/9^NtPOp?p?/9^NPOp `p =@BBgN\O3!3!3!/9^N)x.pI?NA\OB@N^NuNVHnHnNaPO=y0.ynUn0.HX=@09U@HXH#!p#"Hy!/NDPO#" 9!@#!Hy!?9N^\O09!=@09"=@0.g,??.Hn?./. /.NX =@n`N^NuNVd/p?p!?NNXO=@@gHyAHy<` HyHHyCNPO-@ f/9|p?N|\Op`Bp?N\O-yhBn nPl Np @tRn`Bn nf 09=@`=y!0.g0.H!H@0fh0.H!=@Hy!?HntNV HntNaXOHntHyJ/.N Bn nPl Np @tRn`?.HyNHntNb Ay-HpA-HlnBn nl nhRh npRpH@@2@ npRpH@2@ npRpp  nf npRpp H @oH @l nlRlH` nlRlp.Rn`b npp  nlRlp  nlBHnt/.NPOn`z/.NBBgN\OB@.N^NuNVBn0. l nB` n0. hl40fHyU/.NbPO` n?(0. R@?Hya` n0(n n0.Rnhl80. hl$?(R@??.Hy{/.Nb` n0(` n0. hl?(R@?HyȘ`N n0(n $H"J0(=@0(n0(n0(n?.0. R@?Hyȳ/.Nb N^NuNVt n -H n0.H H@0fb0.H =@/?HntNV HntNaXOHnt n??.?9 N n09XPSnfB@`?.HyHntNb Ay-HA-HBn nl n R P nR.H@@2@ nR.H@2@ nRp  nf nRp .g nR` nRp.Rn`j nRp  np  nBHnt n??.?9 N n09XP0.S@N^NuNV .f n (g f$n "J I (Щl~HyHn"n I (/ND/@XONPO n !@$n "J I (Щm (!@?9?9?9?9N2PON+N^NuNV n (g< ( n (lB?9?9?9?9N2PON+N^NuNV$n"J I (ЩlP (Ѩ$n"J I (Щm (!@?9?9?9?9N2PON+N^NuNV/ n (g ( n (fp`p=@HnHnNaPO09Xn3H3J09 nU@3L69JH09XH/ n ( /0.H /NLPOЃ3N3HP0.XyJ3R3LT0.XyN3VBB?9?9?9?9N2PONzHnHnHyHp??9 N09Xn?. n0( ?Hn?./9Hy!NX =@N/.?9N^\O&N^NuNV/$n"J I (Щl (gp`p=@HnHnNaPO09XS@n3H0.Xn3J09 nU@3L69JH09XH/ n ( /0.H /NLPOЃ3N3P3R3LTyX3VBB?9?909R@??9N2PONzHnHnHyHp??9 N09NS@=@"n I (Щ=@"(@H@B@H@g0.@g0(n nf09Xn n0(n0.@f$"n I0.HgRn09Xn0.g6??.Hn?./9Hy!NX =@ n0(n`N n (Ѩ/.?9N^\O&N^NuNV"n I (l!Q$n "J I (Щm (-@` n -h n HhHy/.NL/@XONPO-@ o-|HnHnHnHnp??.NH2.0.AgBgBgBg0?p??.N n .l@ (-@"H (-@Hy/NLPO-@Hn/NPO-@`BHnHnHnHnp ??.NH2.0.AgBgBgBg0?p ??.N N^NuNVH><|0SG0g nT0@`0LN^NuNVH><|0SG0g nT0@`0<4F< n0LN^NuNVH><|0SG0g nT0@`B@F< n0LN^NuNVH *n>. |0SG0gBAA`0L N^NuNVH 9*@~<< ygB@ @gB@`0SF0g]`0L N^NuNV .fB@`X n0g nT=Pg@ nT0H@B@H@Ю -@0.Sn0g nRBA nT0Ag`pN^NuNV09@@ n009yXR@ n 0N^NuNV=y ng0.g SnR`0.Sn0g nRp ` nBN^NuNV y!-h$0.@A?Hy/.Nb y!-h< n-PBn nl0n2n!Rn` n/NPXOR@ n1@ y!-hT n-P/9!Hy/.Nb n/NPXOR@ n1@ y!-hl n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@ y!-h n-P?9!Hy/.Nb n/NPXOR@ n1@p?/9!N(\O=@?/9!NT\O ng n fBn nl0n!2nRn`Hy!Hy/.N|/|!/|.N|/|!/|.N|/|!/| .N|/|!/| .N|/|!/|.N|/|!/|.N|/|!/|.N|/|!/|.N| nf!p=@ nl0n!BRn`N@49PhH#!NH!3!p3!p3!By!p3!p3!p3!p 3!p3!pP3!3!3!By! n gb09!!!3!09!y!09!y!09!y!09!!y!09!H!3!0.N^NuNV0.g @gp` n f mBp?N/|TOpH?NA\O-@ f*BBgN/y!TOp?N|\Op3` nf$p?BgBg??.B/.p?NN=@`p?/. /.N Bn0.g2BBgN/ytTOp?N|/nTOpI?NA\O`p?/. /.N?|PO n Hh nHhN 0.g& nB(0.@ n@ 0.@ n@ nf /.N`t` /.N`XOp?BgBg??.B/.p ?NN=@0g/9p?N|\O/.pI?NA?nXON|TOBBgN\O0.N^NuNV/. /.N(PON^NuNVd/p/?NATO#Hyp?NA\O yf NyBy~ Gll0й-@h nh ( H@H=@ nH0.@Af0@?/9NxB`0@?/9Nxx\ORG` .g nf-|/.NPXOR@?/.p?/9Nx HyNPXOR@?Hyp+?/9Nx /.HyN@PO/. NPXO0gp?/. HyNv `B9B9 B9B9rByp3Nx~ Gl0@  @!| RG`HyHyHyHy/9N?9?9?9?9BgBgBgBgBgN?9?9?9?9p?Bg/9Npp3 yfHy HyN(PO0gp309@g"Nrp3HyHy N@PO09@gNxNs 309@g$Nx n0g n3 nBPNu09@gNw409@gNrbByp?/9NF\O>gGp3`By0[@ @)bH0@R PN`NxHyNrXONyl`NxB90й-@h nh ( H@H=@0.@HyHyN@PO`9H@A?p ?NMXO gL09gJSyy`89H@A?p ?NMXO g09@ylRy`9H@A?p ?NMXO gHnHnHnHnN=y y0(rn y0(n y0(n0.nl y`y09@yo09@309lBy`9H@A?p ?NMXO g"y y0(igp?p?p?/9N@ =@0.H =@09@Hd3`H09G@ =@0.HA fPNxp?0.H /Hn|Nv Hn|HyNPOHyHyN`p?0.H /HyNv y yf p3Nrb`p3p.?/9Nxx\O`Byp-`p+?/9Nxx\OHyHn|N@POHyHyN@POHn|HyN@PONyly?9?9?9?9p?p+?/9Np`Fp,?/9Nxx\OHyHnlN{HPOHnlNPXO0gHyHnlN(PO0g|HnlHyHn|Nb Hn|p?N|\O @fNHyHn|N@POHyHn|NPOHnlHn|NPOHn|NXOB9p3?9?9?9?9p?p,`?9?9?9?9BgBgBgBgp?NHy/.N@POp?Hy/. Nv /9p?NA\O n0 n009.N^NuNVNxNylp'?Hyp?/9Nx ?9?9?9?9Bgp?/9NpN^NuNVp ?Hyp?/9Nx ?9?9?9?9Bgp?/9NpN^NuNVH0*np\?/ N\O(@-L .fB`Bp\?/ N\O(@-L .fB`B,L0N^NuNVxH~ByHyHnN@POHyHnNPOHyHnNPOBp?N\Op?HnpN?NAPO<0f9gx9H @.gj GlJ0HA p0HA p p?Hy0RGH /Nv ` GfHyp? yN\OpO?NATO`lBgHypN?NAPO<0f9f~9H @.gpRy GlJ0HA p 0HA p p?Hy0RGH /Nv ` GfHyp? yN\OpO?NATO`f09fHyHyrNbPO`d yf?9Hy`< y l?9Hy`$ ydl?9Hy` ?9HyHyrNb HyrNPXOR@?Hyrp ?/9Nx ?9?9?9?9Bgp ?/9Np3ByHyip??Hy N| BBgN\OpLN^NuNVH 09@yo" yo09@3`By~ GlF0yyl09GH *@`K0@  @!M RG`?9?9?9?9p?p ?/9NpL N^NuNVH0*n(n >.| Fl0gH @.gH @ gRH` Rgp RF` .fRg  g gp.| Fl,gRH @ gH`g `gp RF`BL0N^NuNVH 9*@<- 9*@>-:- yn Bm;F`d0:0H:RE0H:09@ym0E`"0HR@>0H>0H>;G;E?9?9?9?9p?p?/9NpL N^NuNV0.  @-h n  n1nN^NuNV/0.  @>( 0.  @0@1@ .N^NuNV/0.  @>( 0.  @0@1@ .N^NuNV/~ Gl0@ ?/9Nxx\ORG`.N^NuNVH8IG ,:fp\B \fR` \fBp\?/ N\O*@-M .gHm`/ HyN@POG-M .g g`p\BL8N^NuNVHyHyN@POHyHyNPOHyHyNPON^NuNVH0|#K~ G/lh?/9N\O0-@ @ bBH0@ PN`2*- p//NLPO+@ `*- A+P RG`I~ Gl@* A(*, A)P*, A)PRG`p ?NMTO*~ GlJg:0@AH( H@B@(0RFй*@"- +D *RG` Fl&0RFй*@m `p?NNTO @g yp K(0-H;@L0N^NuNVp=@ n g( n  g0.g nR"n R Sn` n  fR ` n gBp=@ nRp. n g( n  g0.g nR"n R Sn` nBN^NuNV-n n g nR"n R ` nB ngT nc$ :fR np\` n \gS` ngR n"nR`R nB ng ?fp` nR *f`B@N^Nu0/3<A*B?< NA\O/?< #r#v#~#}Nr#}v#}~?</<*?<=NAPOJk ??<>NAXO~ }Nrf ~#r#v#~NA\O Nu09of#r#v#~ yN09ofpNu yN09ofpNu yNNV30.@ H-@p=@ nl$0.HC nRB@2Rn`/9NXO09 N^NuNV### # # #!#p ?N}TO3  09 N^NuNVp?N}TOpN^NuNV3 3  3  3 3 3 3 3 3 3 3 3 3  3" #$ 3( 3* p?N}TO n,0 " n00 $ n40 & n80 ( n<0 * n@0 ,09 N^NuNV3 #  p4?N}TON^NuNV# p6?N}TO n 0 " n0 $ n0 & n0 (09 N^NuNV3 3  3  3 3 3 3 3 3 p3?N}TON^NuNV# 3  p2?N}TON^NuNV# #  pZ?N}TO n0 "09 N^NuNVpM?N}TO n0 " n 0 $ n0 & n0 (09 N^NuNVpO?N}TO n0 " n 0 $ n0 & n0 (N^NuNV3 #  pN?N}TON^NuNV# 3  3 3 pL?N}TON^NuNV# 3  p?N}TON^NuNV# 3  3 p?N}TON^NuNV# 3  3 p!?N}TON^NuNV# 3  3 3 3 3 3 3 3 p/?N}TON^NuNV# 3  p)?N}TON^NuNV# 3  3 3 3 3 3 p*?N}TON^NuNV# 3  3 3 3 p+?N}TON^NuNV# 3  p,?N}TO n0 " n0 $09 N^NuNVH0*n(n 0m?0l?NPXO:0-m?0,l?NPXO8??N6XO>?-?,N6XO<89F0G9@0F9@GoFop`B@L0N^NuNV3 3  pp?N}TO n !09 N^NuNV# pn?N}TON^NuNV# 3  pr?N}TON^NuNV3 3  3  3 3 3 pl?N}TO n0 " n0 $ n0 & n 0 (09 N^NuNV3 pf?N}TON^NuNV3 3  3  3 3 pd?N}TON^NuNV3 pg?N}TON^NuNV3 3  pj?N}TON^NuNV3 3  ph?N}TO n 0 " n0 $ n0 & n0 (09 N^NuNV3 3  3  3 3 pe?N}TON^NuNV3 3  3  3 3 3 pi?N}TON^NuNV3 pk?N}TON^NuNV0.n o0`0. N^NuNV0.n l0`0. N^NuNV# p 3!p3!By! p3!3!N#N^NuNVpe3!By!By! 3!NN^Nu#!"< <sNBNuNVH *n3 3 ~0RGHA\B@0fp3!p3!SG03! 3!NL N^NuNV## .Z#pd3!By!p 3! n 3!N n 0!#\#b##N^NuNV3 \/.Nh.NrXO# pm3!p3!p3! 3!N#N^NuNV# 3 \3!p3!p3! 3!N#N^NuNV3 \p3!By!p3! 3!N09bN^NuNV3 \p3!By!p3! 3!N09bN^NuNV3 \p3!By!p3! 3!N09bN^NuNV3 \p 3!By!p3! 3!N09bN^Nu#!Nu#!NuNVH8*n(M0. H@B@H@Ѝ&@ n d" n c/.?.?. / NR`?. ?.Bg/0. HH@B@H@Ќ// /.N// N ?.Bg // nNPOJ@me/ ?.Bg / nNPOJ@mbd?./ `?./ / N /.?. ?/ N| /.?." 0. A?/ N| L8N^NuNVH0*n(n >.JGgH=@0.SGfL0N^NuNVH0/./. nNPOJ@l *n (n`*n(n /./ nNPOJ@l `/./ nNPOJ@l .` L0N^NuNVH0>. SG=G*n ?.BgП(@/ / nNPOJ@l*L?.BgSnf?././ N ?.Bg n-HSGfL0N^NuNVp0.#HN^NuNV/<f /9HNLPO6b#H 9HN^Nu"o o JfSfNu"o ofJfHHNu"o o fNu o"Jf S@NuNVHn?</.Nv Hn HnNPOHnBg nN\ON^NuNVHn /.NPON^NuNVH0-n n(PXH> @%g0gP/.? n hN\O`p =@p=@p=@H> G-fp=@H>`Bn G0f p0=@H> G*f& nT=Plp=@0.D@=@H>`*Bn G0m G9n0. G@0=@H>` G.fJH> G*f nT=PH>`*Bn G0m G9n0. G@0=@H>` Glf&H> Gdg Gog Gug Gxf0@> `-@*@p=@0 |02<`XHXW PN`4 nT=P0.l0.D@=@p-p ??./ N6PO*@`p ? nT?`p`p` n-PX .l .D-@p-p ?/./ N `p ? n// N *@X`p`p`/ ?./.?N *@P`fBn n-Pf-|LX .-@*@g0.m noS`(Bn nT0` n//.NPO`n ./0.Hї =@lBn0.fL0.g0 n0f( n -f/. nRH? n hN\O0.Sn0g /.?.` nd /. nRH? n hN\O`0.g0.Sn0g/.?. n hN\O`L0N^NuNVH >. *NB%0<g"0H@H@B@H@ @>`?Bg _g nR` .L N^NuNVH0*n>.IB$p0//. NPO-@g$p0//. NPOA-n ` n g` L0N^NuNVpL?HyTp?NPOp?NTON^NuNVNN^NuNVHnHyNPON^NuNVHn /.NPON^NuNVHn/.NPXO?/.Nv Hn HnNPON^NuNVH Bn n X -P nRH> |2<`XHXW PN`Z/./.NXO<?N\O Ff`4/. n hNXO<Gg/.?N\O` nRH> @*fp`B@=@0.g nRH>Bn G0m( G9n"0. G@0=@ nRH>` Glfp`B@=@ Ghfp`B@=@0.f0.g nRH>0 |2<`XHXW`HyHyNxPON(`6Rnp `Rnp`RnBn` Rnp=@Hn?.?./.Nt -@0.g0.fb0.g n X P `0. n X P0.0Rn`0RnHn?./.N -@-A0.g0.f0.g n X P .". !A` n X P .". `A-H nRH> @^fp`B@=@0.g nRH>0g G]g nR` nBA-H/. n hNXO<`D0.fp=@/. n hNXO<-|`/.NXO<-|p=@0.f n X *PBn FgH?/.N\O fp`B@nf*Rn0.fSnf|`/. n hNXO<` Fg/.?N\O0.g0.f GcgPB`J0.f n(H@gp`0.L N^NuNVH>. <.B0o F o| nBP/.NXO: E-fp`B@=@f E+f/. n hNXO: nRP n0FnP0fL E0g~ `B/. n hNXO: nRP0Fn$ Exg~`~/. n hNXO: nRP n0Flf0@W8 @ l0@78 @ l0@08m D nGm Gf0 .f*0@x8f 6HHn0H/NDPO-@`z/.?N\O0.g .` .DLN^NuNVH |K0. o n op =@ nBP n0n l/. n hNXO> |*2<`XHXW PN`|0fx nSP nRP`0g Ff`RF` Fn(|`0g Fg Ff|` Fm6 Fn0|` F` Fg Fg Ff|` Fg Ff|`/.?N\OBHnNnXOL N^NuNV//. n hNXO> @ g G g G g0.N^NuNV/ *n f&+||+|JBm -;n0.`> f +|` f +|` f +|`p*_N^NuNV/ *n+|+|:Bm -0-*_N^NuNV/ *n+|+|. ;@ o -;@ -0-*_N^NuNV/ *n+|+|Bm -0-*_N^NuNV/ *n+| /NPXOD@;@ 0-*_N^NuNVH >.*n / mNXO/ ? mN\OL N^NuNVH0*n(n g/ H? lN\OR`L0N^NuNV/ KXd. g U(fp?//. /.N*`X`B*_N^NuNVH *n-fp`-H?N,TO -g-f /-NjXOB-0L N^NuNVH *nBm -ff >o?/--H?NPOGf$0m mAf -*+@`+UB@` 09H fBy`-pL N^NuNVH *n>.|BnBnp=@ n R pr@H @rf|pw@ n g,H @bf"BnR n gH @bf$Bn0l0.f?/.N"\O>0l@0.f0.g4?</.Nx\O>m Fg?N,TO?/.N"\O>0m0.gp?B?NPO-M .fp?NRTO*@ f ?N,TO`|p@0.g- p+@*+@Bm +|+|:G `DH @wfRn`H @af&Rn`H @+g.HHAf|`BL N^NuNV/ *n .*+@+| B-0. D@;@ m l;| +|`+| *_N^NuNV/ *n Sm lBm p` UR0.*_N^NuNV/ *n UR0.*_N^NuNV/ *nRm oBm p` URB@*_N^NuNV/ *n -f,-f?<NRTO+@f+|+|`j-f2-H?NTO0gf+|+|6 -`&+|+|.-H?NTOHЭ*+@Bm *_N^NuNV/p?B?.NPO. fB@`0H@.N^NuNV/ *n/ N0XO/ mNXO*_N^NuNVH >.*n / N0XO/ ? mN\OL N^NuNV/ KXY Me g/NXO`*_N^NuNVNh?.NTON^NuNVH *nRm o/ NNXO0f 6fHyNNXO -?/--H?NPOD@;@ @fZ09H fBy`-Bm `B0- Rm m+H URB@>-g G gP Gg 0`0- f-pL N^NuNV/ *n 6fHyNNXOBm p?Hn-H?NPO @g,J@gH .f-f8 . f-fB@.`(09H fBy`-`-p*_N^NuNVH >.*n G f -g/ p ?N.\O @fp`0Sm l"/ NXO0f -S@;@ UR0L N^NuNVH >.*n G G f-g/ p ?N\O @gZBm -fN/ NXO0f@p?Hn-H?NPO @f0` 09H fBy`-pL N^NuNVH >.*n G f -g/ p ?N6\O @fp`?NAXO/NLXO`B@N^NuNV/Bg/.pB@9H*@SnmSGl^pQB9Hyp ?NA\O>mp ?p?p?NM\OpB@9>B@9H*@0Gp H< Ff~` n R RE F ft Bz0`0/. 0.H/?.p??NA >Bz0H/NLXOL N^NuNV/.pA?NA\O/NLXON^NuNV/A#z/9zNXO0gBzp 3p`,/. 0.H/?.p@?NA .Bz/NLXO.N^NuNVH >.0V@ @bH0@ PN`*pP`&pA`"pC`0m*yXSGmfp`gHL N^NuNVH >.0m*yXSGmfp` g0. L N^NuNVH >.0V@ @bHH0@ PN*yXHGg fp`&R` X?NTO`~C`~A`~P`pL N^NuNV .l .D3p` .N^NuNVH *nA-H-nHnNfXOBnBnp@=@ +g -fnRH> @.g G0m G9n G.f0.@fn`B@.@gRn`jHnNXOHnHnN@POHnNXOHnNXOHnHnNPOHnNfXO0@0@HnHnNPO0.@gDSn`< Geg GEfZ +g -fnRBnH> @0m G9n0. G@0=@`0.@g 0.D@=@0.nBn nl N(fRn` nf HnBgBg`0.oHnHnN@POHnNXO0f:HnNXO0f*HnHnNPO0fHnHnN@PORn`VHnHnN@POBgHnNd\OBgHnNd\OHnHnNPO>gRn?HnNd\OVnSnfJ`0.l.fHnNXOSn`BgHnNd\OHnHnN@POBn n lJ0.@gBgHnNd\OBgHnNd\OBgHnNd\OHnHnNPORn`WnRnfhSnHnNXO0gHnNfXOp@HnHnNPO0gRnBgHnNd\OHn0.@?0.@?/.N n "(L N^NuNV/~ G lBg/.Nd\ORG`0.@@ n0.H@ n(0. g n/./.N@PO.N^NuNVH| Fl4>. nB@@=@ n0g nRF`0. LN^NuNVH|z0m*>| ng| n nŏSE`0LN^NuNVH|~0m. n BA nB@A@ n0@@<SG`0LN^NuNV/~ Gl n"n RG`.N^NuNV/~ Gl nBRG`.N^Nu"o`C"/jD$jDA`|J/jDJk`JjDNu$/` o$"/A`NNu"o`C$j6D"/jDA`, gJ/jDNu$/` o$"/A` NupJfpN∲cd⒒d҂dFN o"`"/ jD$/jDD$@A`" jDNu o"`"/ _$0"@0HAHBЁH@B@ЉN o "o2/ gm H` QNu!QNuNVH >. <.*n0SF0g` .L N^NuNVH0*n>. (Mfc%H0HHAf `BL0N^NuNVH ..|Jg 0F "@SF`|0FJg 0RF0@H?p?p?NM\O`p?NTOLN^Nu o0/BAgJfBNu NuNVH8..P bd.9/N,XO*@ Mg`Jf&M ##`& yбf QP&m`(yQ L&h)M Q@* Ѝ#(@Q LB)KL8N^NuNVH0~ .\S@,dB`ƙ*y gr .gH g @є .*L(Mc2  d @*`* Ѝ# y X`dJg @Ѝ*@`*mf g#Ry09 @e Sy`X/NXO/.NbXO*@Sy L0N^NuNVp0./NbXON^NuNVH .Y*@Jf4~0GJg 0RG0@H?p?p?NM\O`NL N^Nu O$X"XHB@Nu o0/L.NuNV/?.pE?NAXO>l0H/NLXO`"?.NXTO=@m?.?NXO0.N^NuNVH.. l <`0 f 9`$R @./pH?NA\O,g Ї# LN^NuNV0.H/N,XON^NuNV# #  # p[?N}TO n0 "09 N^Nu"/0<NBNu$d$r$$#%*%*%*%*%*%*%*%*%*#$$%*$J%*$4%*%*$&&&&"&*&2&J&:&B&d&d&d&d&T&d&d&d&d&d&d&T&A&B&D&F&G&K&P'Q'R'S'a&b&d&f&g&k&p'q'r's'' )*V*,B,,B,&,<,x/ -.//F/lmdmnmkkooooooooooooookmmmmmmmmmmmmmmmmppoozzz2z2z2zz2zzzz2zX:\XDOUXcDd:efgorVsurxD0123456789ABCDEFN%DEFN*O"X4[cxdefn.o&sx8N %D , , ,+>->.N0X1X2X3X4X5X6X7X8X9XElel ~>:6` H?<NNT/ W`g?<+NAX?<-` H 8Lg Bg/<NN\?<p/` HBxDLNu)` H xHhBgHz?<=NAPa >Hx` HPLNu)` HBx LNu)` HLXNu)` HC xJ(gCF2LNu` /?<NNT/ W`g?<+NAX?<-NA` / 8Lg Bg/<NN\?<p//` / xHhBgHz?<=NAPa 2p/` /BxDP Nu)` /BxDBx Nu)` /BxDX Nu)` /C x hmCF2BxD ` /C x hmCF2 xHh` /PBx Nu)` /PX Nu)` /C x hmCF2P ` /Bx X Nu)` /C x hmCF2Bx ` /C x hmCF2X ` /PBx X Nu!` /C x hmCF2PBx` /C x hmCF2Bx X` /C x hmCF2BxDP` /BxDPX Nu!` /C x hmCF2BxDBx`8 :3?9F?<NMXOJg*@A ZJ:*zj ZJ:*z*.*[2][File create error:|%s][Cancel]Image file to loadImage file to saveTable file to generateIwpwU33BT!7w <(2 "" J 0123456789ABCDEF`p ?<NNT>?<NNT @A9JGgQCpEtpgb@@@G(Hpt @JGfSFS`FFFQJGf89C`()CP)C)CI@QJGfP`X`Nu   f<0 |v```ffn;>`<|> >ff:flxl6`p Hz?< NAOA"xC$I0<2S@jA CNA rA!rNuNV?. zNTH x2<pXQ|4f^ xACZ2<z f Q`@"|@ Qw |    prQQ QwLN^NuThis Guard remains active until a reset. If it detects an executable boot sector, it will beep and flash the screen. f> VVVV? Virus Killer Drive A Drive B System Statistics VKILLER.RSC[3][Error reading resource file:|%s][ABORT][3][Window Open Failure][Abort]Sides on disk: ?Sides on disk: %4dTracks on disk: ?Tracks on disk: %4dSectors per track: ?Sectors per track: %4dReserved sectors: ?Reserved sectors: %4dSectors per FAT: ?Sectors per FAT: %4dCopies of FAT: ?Copies of FAT: %4dDirectory sectors: ?Directory sectors: %4dSerial number: %8ldBoot not executable.Boot sector not zeroed.Boot sector zeroed.BOOT SECTOR EXECUTABLE.DISK CONTAINS HIDDEN SECTORS!Extra sectors zeroed.EXTRA SECTORS NOT ZEROED.AES version: %4xGEMDOS version: %4xTOS version: %4xTOS date: %8lxEnd of memory: %8lxStart of free RAM: %8lxEnd of free RAM: %8lxScreen RAM: %8lxO/S start: %8lxTPA start: %8lxFree memory: %8lxaux:wprn:w%s %04x Boot SectorReserved, Sector %d of %dFAT Copy %d, Sector %d of %dDirectory, Sector %d of %dData, Sector %d of %d%04x Drive %c:%8ld%2x%6d%6d%6d%6d%6d%6d%6d%ld%x%d%d%d%d%d%d%dDisk is safe.Disk very suspicious.Disk has system boot.Disk has an anti-virus.DISK HAS A VIRUS.The as-of-yet unused area of the directory, which should all be zeroes,is not.The File Allocation Table on this disk is larger than it has to be,which is normal. The unused portion of it, however, should be zeroes.The excess portion on this disk contains unrecognized data.This is not the result of deleted files, but is either the trailof a sloppy disk formatter, or the work of an unrecognized virus. This virus checks disk boot sectors to determine if each disk has anexecutable boot before deciding if it should reproduce. It hooks itselfinto the ST operating system and writes a copy of itself onto every diskthe ST reads or writes, if that disk did not already have an executableboot sector.The virus acts by counting how many copies of itself it has written.This virus does not check boot sectors to determine if they are alreadyexecutable. It hooks itself into the ST operating system and writes acopy of itself onto every disk the ST reads or writes. It will overwriteany boot sector, rendering other self booting disks useless.َhڲ9ۂۼ۾ (2)2 )2 .WYܟ-J*4*Lprݣ)3@R`!w@?<NNT35| e߫)3V΀ΰ`8by This Anti-Virus beeps and fHzOb˪<b(+5VJ`8:A"yC$I7b˪<xP+5VϤ`?<NNT>?<NN$&m]2)3V2b`Hz?< NAOADJ<)3VФ`A&m.G$Kb˪<J0o+5nF`AC y$HCb˪<J'e+,+5nјL*_ zlN/0/ @Kxz@+5n H` f8(xb˪< N!e+5n~Ү` "x./ Ab˪<AWX+5n8`Az r,y.'(vb˪<J@+5nӊ`8:A"yi̐hf +5nD`89WY*rC+5nԒԢ``4,_&xrGJxRg _vxG+5n`"x.$IA̐hJL+5nRՂ` "x.A:<b˪<JP+5n`A"xN}$I0<R̐hj9+5nFz`&<C@E$j̐hJx+5n`8f -tgVE"JA̐ha+5n6j`:<!*H1g̐h Q@+5n׬`$mNE}A"J*** '̐hL3K+5n"b` fL(xcb˪<JwE+5nذώЎт ht|<ծ0֪ ז ؚIt is not possible to absolutely distinguish between a virus, and a diskwhich is supposed to be self booting. If you execute a virus kill on aprogram disk which must be self booting, such as many games are, you willhave a useless disk. The simplest way to make the distinction is that, ifyou are directed to press the reset button, or power your computer off andon to use a piece of software, then DO NOT ALTER THAT DISK!Also, do not attempt to use this program on disks which use non-standardformats, such as MAGIC-SAC, or many copy protected disks. Any other disk which this program identifies as having an executableboot should be considered very suspicious.The status of this disk is questionable. The boot sector contains executable code, which will be executed eachtime the system is powered up, or reset, and this disk is in Drive A. The code in the boot sector is not recognized as any known virus, or standard system initializer. This disk does not contain a virus. It contains a recognized system boot-up program.It provides some utility function at power up and reset, but does notpresent a threat, nor does it spread itself.The 'Mark Powell' Anti Virus This is not a virus, but simply an executable boot sector. The programin the boot sector is designed to provide a confirmation that the diskcontains no virus. The program acts only when the ST is booted up or reset. It flashes thescreen colors briefly, and sounds a tone, to let you know that it ispresent, rather than a destructive virus. It has no other effect, andrepresents no threat to your system or disks. It does not spreaditself.The 'ANTI' Virus: This virus refers to itself as an 'anti-virus', but it spreads just asfast as any other virus. It does not, however, destroy anything.The anti-virus displays a signon message when the ST is booted up orreset. Then, as the ST runs, it checks each disk for an executable bootsector. When it finds one, it flashes the screen colors briefly, andgenerates a warning tone. It has no other effect, but it will spreaditself as rapidly as any other virus.The 'Simeon Pashley' Anti - Virus:This virus refers to itself as an 'anti-virus', but it spreads just asfast as any other virus. It does not, however, destroy anything.This anti virus is designed to provide a confirmation that the diskcontains no other virus. The program acts only when the ST is booted up orreset. It flashes the screen colors briefly to let you know that it is present, rather than a destructive virus. It has no other effect, andrepresents no real threat to your system or disks. It does, however,spread as rapidly as any real virus.The VKILLER Display Type Anti Virus This is not a virus, but simply an executable boot sector. The programin the boot sector is designed to provide a confirmation that the diskcontains no virus. The program acts only when the ST is booted up or reset. It displays themessage 'Virus free disk', to let you know that it is present, rather thana destructive virus. It has no other effect, and represents no threat toyour system or disks. It does not spread itself.The VKILLER Monitor Type Anti Virus This is not a virus, but simply an executable boot sector. The programin the boot sector is designed to warn you if a disk with an executableboot sector is inserted in either drive. This monitor displays a signon message when the ST is booted up or reset.Then, as the ST runs, it checks each disk for an executable boot sector.When it finds one, it flashes the screen colors briefly, and generates awarning tone. It has no other effect, and does not spread itself.The '5th Generation' Virus:After five copies are made, it starts attacking. It attacks bycompletely destroying the boot sector, File Access Tables, anddirectories of every disk inserted into the ST. The destruction iscomplete, leaving it almost impossible to recover anything from thedisk once the virus has struck.The 'ACA' Virus:After ten copies are made, it starts attacking. It attacks bycompletely destroying the boot sector, File Access Tables, anddirectories of every disk inserted into the ST. The destruction iscomplete, leaving it almost impossible to recover anything from thedisk once the virus has struck.The 'BHP' or 'Bayerische Hacker Post' Virus: Not much is known about this virus. No complete copy of it isavailable. It appears to do a thorough job of destroying disks when itattacks. If you have detected the presence of this virus, pleasepreserve the disk, and contact the author of this program, at theaddress in the 'About' dialog box.The 'BLOT', 'SWISS', or 'FAT' Virus:The virus is too big to fit into the boot sector. It hides theremainder of the virus program in the last FAT sector on an infecteddisk. It uses time delays to make itself more difficult to detect. Whenit becomes active, it does randomly timed accesses to either the screenmemory, or memory above the screen address. That will either causeblots to appear on the screen, or (if the system has 4 megabytes ofmemory) memory access errors (two bombs). It looks like an ST thatdevelops memory errors after it has been running for a while.The 'Freeze' Virus:The virus attacks by setting up a timer routine. Each time it elapses,the virus makes a random decision to see if it should act. It acts byfreezing the system briefly. Each time it acts it makes the duration ofthe freeze a little longer. This virus does not directly destroy disksor files, but will continue to cause longer and longer delays towhatever program is executing.The 'Green Goblin' Virus:Every sixteen times the boot sector of a disk is read, the virusinverts a small portion of the screen. Every 128 times a boot sector isread, the virus displays this message:'The Little Green Goblins Strike Again'.The 'KEY', 'Signum/BPL', or 'Type 1' VirusIt is waiting for a special disk to come along with a 'KEY' value inthat boot sector. When it finds one, it will execute the code on that'KEY' disk immediately. This disk does not have the 'KEY' value, so itis not an immediate threat. However, this virus will reproduce itselfonto every disk used in your system. Then, when the 'KEY' disk comesalong, you will be a victim of whatever it instructs your system to do.KEY Disk for the 'KEY' Virus: This disk contains the key value for a virus, and represents a veryreal danger. It works in conjunction with the 'KEY' virus. It is notknown what this disk contains. Before you destroy it, send a copy of itto the author of this program (use the address on the 'About' box). Thegeneral version of the 'KEY' virus waits for another disk, with a keyvalue, to come along. This disk has that key value, so it can causevery real damage. It is important that you send a copy of this disk tothe author of this program.The 'Kobold II' Virus: This is the most complex ST virus detected to date. It takes over somany system vectors and functions that it is not yet fully understood.It is extremely sophisticated, however, and quite dangerous. It isreported to have wiped out entire libraries of disks when it hasstruck.The 'Label' Virus:After ten copies are made, it strikes by periodically wiping the screencompletely black.The 'MAD' Virus:After five copies are made, it starts attacking. When it acts, itrandomly selects one of eight different routines. Seven of them arescreen display sabotage routines, while the eighth is a sound effect.This virus does not destroy disks or files, but will destroy screendisplays and cause delays to whatever is executing.The 'Maulwurf I' Virus:The virus acts by using a system timer. It sets the timer to a randomvalue, attacks when the timer elapses, then resets the timer to anotherrandom value. When the virus it attacks, it displays the message'Maulwurf I - SSG (Subversive Software Group )'.The 'Mouse Inversion' or 'Ghost' Virus:After five copies are made, it starts attacking. Every five times theboot sector of either floppy disk is accessed, the virus reverses thevertical orientation of the mouse.The 'Old Nick' or 'Evil' Virus:The virus acts by counting accesses to either floppy disk. After 100disk accesses, it starts reversing the screen colors on each subsequentdisk access.The 'OLI' Virus:The virus attacks as soon as it is installed, but is very subtle. Itintroduces delays of increasing duration to all disk I/O activity. Whenit is active in a system, it is extremely difficult to detect, becauseit masks it own presence anytime an infected disk boot sector is read.The 'Pirate Trap' or 'P.M.S.' Virus:It runs a counter from some starting value, down to zero. Each time itcopies itself, the copy's counter gets a lower starting value. When thecounter gets to zero, the virus starts displaying this message:*** The Pirate Trap **** Youre being watched **** [C] P.M.S. 1987 ***The 'Screen' Virus:This virus executes only on ST's with ROMs dated 02061986. The virusworks by installing a timer routine. After 30 minutes, it startsattacking. Each time after that when the timer elapses, the virus stepson two words in the screen. It keeps changing which screen words itwill step on. This virus does not directly attack files or disks.@efghijklmnopqrstuvw?%% .B&$ $$ p@@ @ @ @  p Q Q Q Q Q YQQQQ Q Q Q  Q ABCD! E!F"G#H!$I %J &K 'L! (M )N *O +P! ,-.'  _.___File Selector*.* [1][Delete %s?][No|Yes]Item Selector_$_$P$_.___F *.*DeleteCancelOK:\\@*.* No files %d file %d files %d files %d files     - u{NULL} You must compile with the -f option to include printf() floating point! Bad format in scanf :!:!:#E\CCAP?0123456789ABCDEFUser abort at 0 Bad pointer in free.  0H$S8( T    0  $      .  J    &      * $ & $ $ " $ " $ $  $ $ $ "" $  $" $8 $@ *        "  *,  *"  &\\@\.<\<\":                 H &      .    ( 8" (,,&.$                       "              &.  &"       & $ $                 P     &  $               (    6         **,         "0 & 6& 2 (,:>             $ 2&H$6 J(&:88 $    &6 2   , L : > .P H Jxb 2.NF        J      P:d 4(8*(H ,         *           ( $ @&B .  8                    $  0                            .   "               2*N6&p                          *<            F      H4Z$*0v&vFP( LD" 2$ .>` .NtjL  &>& |$4F0",p$  .6*"  "$j:BX<$<H846  & 6& " &(2> 00v   ,$"$0DB  @J$  $N,$ ,5 * , ( 4 X44 4 4 : ,44 @ 4  <4 4 8 4 8 4 D 4 $HVKILLER Version 3.11 February, 1990 This Archive contains the most recent version of VKILLER, the virus detect-and-kill utility for the Atari ST. The program works in medium or high resolution, and is completely mouse/icon driven. The program may also be controlled by the keyboard. In this document, all the keyboard commands are indicated as capital letters, but that is not mandatory. Lower case letters will provide the same functions. In most cases, the first letter of the label under an icon is the key that will accomplish the same function of as a click on the icon. Click on the FLOPPY A icon, or press the "A" key, to check the disk in drive A for a virus. Click on the FLOPPY B icon, or press the "B" key, to check the disk in drive B for a virus. When you access a disk, the program reads in the boot sector, both copies of the File Allocation Table (FAT), the disk's root directory, and the first few data sectors. Once you have accessed a disk to check it for a virus, you can write the data from the disk into a file, print it, or show it on the screen. To write the disk data into a file, click on the "FILE" icon, or press the "F" key. A file selector will appear. Use it to designate the file you wish to write. The resulting file is not executable, even if the boot sector of the floppy was an executable one. It is a data file with an image of the significant portions of the disk. To print the data, click on the PRINT icon, or press the "P" key. An alert box will appear. You may choose to print either the same data that is available in the "SHOW" window, or only the boot sector. To show the data on the screen, click on the SHOW icon, or press the "S" key. The window will expand to nearly the full screen, and display all the data read from the disk. Use the window's scroll bar to move back and forth through the data. Close the data window, by clicking on the close box, to return to the main screen. Pressing any of the active keyboard keys will also close the data window and return to the main screen. If the disk contains a virus, or garbage in the boot sector, you can clean it up by clicking on the KILL icon, or pressing the "K" key. When the program executes a "KILL", it writes zeroes into all the non critical bytes in the boot sector. No other portion of the disk is altered, and any files on the disk are left intact. The resulting boot sector provides a disk readable by both ST's and MS-DOS systems. It is not necessary to display a disk's data before executing a kill on it. You can insert a disk and press "K", or click on the Kill icon, immediately. The disk's boot sector will be read, the critical portions preserved, and the non critical portions zeroed out. If you wish to install a "Guard" boot sector on a disk, click on the guard icon, or press the "G" key. A dialog box will appear, offering a choice of two types of guard boot sectors. The first guard boot sector is the "Display" type. It contains a simple program which will display the message "Virus free disk" when the system is powered up or reset with that disk in drive A. Once the message has been displayed, the program returns to the operating system to continue with the power up sequence. It does not remain in memory. If you reset the system with that disk in drive A, and the message does not appear, you should immediately check that disk for a virus. The only reason why the message would not appear is if the boot sector has been altered, possibly by a spreading virus. This guard boot sector is an adaptation of one originally written by Mark S. Powell. The second guard boot sector is the monitoring type. This one also displays a message at power up and reset. Unlike the display version, however, this guard remains active in memory until the system is reset again. Of course, if the disk in drive A at the next reset contains the guard boot, it will be reloaded again. Otherwise, it is removed from the system. While the monitor is active, it checks the boot sector of every disk that is accessed by the ST. If it detects an executable boot sector on any disk, it will flash the screen colors, and sound a warning tone. If the disk just accessed was not one that should have an executable boot sector, you should become suspicious. The monitor will not issue a warning for disks which contain copies of itself. Vkiller now contains a feature for repairing the boot sector of a damaged disk. Activate it by clicking on the repair icon, or pressing the "R" key. It will not re-create executable boot sectors, such as those required for self booting games. When a disk boot sector is damaged, the disk will be deemed unreadable by the ST's operating system. If only the boot sector is damaged, repairing it may allow the data on the disk to be recovered. When you activate the repair function, a dialog box appears. It contains all the data that can vary in a disk's boot sector. The individual entries are each editable. They will originally contain whatever value was read from the disk. This may not be reasonable or valid if the boot sector was corrupted. The actual data that is in the boot sector is a bit more obscure than what the dialog presents, but the needed data can be calculated from what is presented in the dialog. OS ID: This is an ASCII data string. It is designed to provide the identity of the operating system under which the disk was formatted. It can contain anything. It is not used by the ST operating system in the current version, but is supplied for MS-DOS compatibility. Serial Number: This number is used to tell disks from each other. The number should be different on every disk. This box will originally contain the number that came from the disk. You can enter any value you wish, if you so desire. The legal range of entries is from 0 - 16,777,215. It should be stated here that the three bytes in which this number is stored are also used for the operating system ID on MS-DOS systems, and will usually have the version number of the formatter. If you regularly move disks back and forth with MS-DOS systems, you may encounter problems using them in your ST, since many will appear have the same serial numbers. You shoud, therefore, avoid the numbers which correspond to the MS-DOS versions: 1.0 - 3,223,088 through 1.9 - 3,223,097 2.0 - 3,288,624 through 2.9 - 3,288,633 3.0 - 3,354,160 through 3.9 - 3,354,169 4.0 - 3,419,696 through 4.9 - 3,419,705 Format ID - Also for MS-DOS compatibility, and not used by the ST. The normal ID value is F9. Reserved Sectors - The number of sectors at the beginning of the disk which are not used for the FATs, Directory, or data. Unless you are attempting to something very unusual, this should always be 1 (for the boot sector). Hidden Sectors - Sectors at the beginning of the disk which should not be accessed. This should be zero. Sides on Disk - Either 1 or 2. If you come up with a three sided disk, I'd be very interested in seeing it. Tracks on Disk - The standard format for an ST is 80. Extended formatters may provide 81 or 82, if your drive can strp in that far. Some 5.25" disk drives have 40 tracks. Sectors per Track - The standard for the ST (and MS-DOS) is 9. Some extended formatters, including "TWISTER", use 10, while others will go to 11. The ST's desktop formatter always uses 9. Sectors per FAT - The FAT is the File Allocation Table. It is a map of how the folders and files are positioned on the disk. The ST standard is 5. This is more than adequate, since the capacity of the disk only requires 3. A disk formatted in an MS-DOS system will have 3. When viewed as data, a FAT looks like a bunch of garbage. There will always be two copies of it, at the start of a disk. You can use the "Show" feature of Vkiller to look at the disk. If sectors 1 and 4 look the same, and the directory starts at sector 7, the disk has a 3 sector FAT. If sectors 1 and 6 look the same, and the directory starts in sector 11, the disk has a 5 sector FAT. Directory Sectors - The number of disk sectors provided for the disk directory. The ST standard is 7. If the data in the dialog appears to be nonsense, the disk's boot sector has been corrupted. This may be due to a wide range of reasons, not just a virus. To set the values to the ST standards, you can enter the appropriate values for each item, or select the "Set Defaults" button. It will set the normal values for most of the entries, and generate a random serial number. You should, however, insure that the number of tracks, sectors, and sides on the disk are correct for that particular disk. If you aren't certain, you can use the "Scan Disk" function. When you select the scan disk function, a dialog with a number of selectable boxes appears. To repair a damaged disk, the program must know the number of tracks, sectors per track, and sides on the disk. If you know any of those facts, enter them in the dialog by clicking on the appropriate boxes. If you don't know, leave the boxes unselected. The program will attempt to determine the disk's configuration by reading different areas, to establish any of the entries that you do not provide. You can also have a set of default values inserted by clicking on the "Default" button. Since the number of tracks on a disk may vary, the program will attempt to determine how many tracks were originally on the disk by stepping the disk head in and reading data, until it reaches an unreadable area. It will not continue stepping in past an unreadable track, but it will continue stepping in until it does reach an unreadable track. This, of course, will be one track further than the the disk's formatting originally extended. While it is extremely unlikely, it is possible that repeated execution of this stepping in operation, which could extend beyond the range of the drive, could cause the disk's head to become mis-aligned. It has not occurred through weeks of testing, and would probably require thousands of such operations, but it is possible. If you wish to prevent the head from stepping in past some specific track, click on the last track you wish the disk to access, and select the "Limit" box. The head will not be stepped in beyond the track you select, even if that track does contain readable data. Of course, if an unreadable track is detected before that limit is reached, no further stepping will occur. After all the physical configuration parameters have been entered or determined, the original dialog box will re-appear. The values determined by scanning the disk will have been updated. You may edit them again, if you wish, before writing the disk's boot sector. After the disk has been updated, the program returns to the familiar disk data window. Since this boot sector rebuilding function starts with the data currently on the disk, it can also be used as a means of altering the data on a non-infected disk, such as setting serial numbers. The Menu offers two features under the "Options" title. The first option, "Quiet", will turn off the warning siren that sounds when a virus is detected. Clicking on "Quiet" again will turn the siren back on. Since some viruses check system data, such as ROM dates, to determine if they can execute, a second "Option" is provided. Clicking on "System Info" will cause the data window to display information about the system parameters. Exit the program by clicking on the "QUIT" icon, or pressing the "Q" key. When the program detects a virus present on a disk, it will sound a warning tone, and place a new button on the desktop. To see the details about the particular virus located, click on the new "Known Virus" box, or press the "D" key. If you find a lot of disks infected by a virus, and want to stop the warning tone from sounding on each disk, select the "QUIET" item from the "OPTIONS" menu. If the disk contains an executable boot sector, but one that is recognized as a standard system boot, it will be identified as a "System Disk". Due to the way ST disks are layed out, and used, there are extra portions of the FAT which are not normally accessed. There are also more directory sectors than are typically used. In a freshly formatted disk, these areas should contain only zeroes. There is a fairly reliable method for determining when the unused portions of the disk have been altered. A warning will appear in the disk data window when this situation is detected. If the disk does not contain an executable boot sector, there is no harm in this data area not being zeroed. Even if the disk has an unexpected executable boot sector, this additional data area may not be significant. The warning is provided for informational purposes only. Since the areas being scanned for this situation may actually contain important data, the program will not attempt to alter the data found in those areas. If the data in this additional area is part of a virus, executing a kill on the boot sector will render the data in this area harmless. There are two real problems to keep in mind when dealing with viruses, and disk boot sectors. The first is that not all executable boot sectors are viruses. There are times when a boot sector is supposed to be executable. Executing a KILL on such a boot sector will destroy whatever code was in the boot sector, and may render the software on the disk useless. Generally speaking, if the proper use of the software on the disk required you to reset your ST, or power it off and on to start the program, t hen the boot sector was supposed to be executable, and you should not execute a virus kill on it. Any program which can be executed by clicking on it does not require an executable boot sector. Consequently, disks used to store such programs should not contain executable boot sectors. The second problem is attempting to use VKILLER in a system which has been infected by a virus, and the virus is executing (attempting to spread) while VKILLER is attempting to clean it off disks. With all known ST viruses as of this release (February, 1990), VKILLER will detect this situation. It will provide instructions on the screen, informing you that there is an active virus in the system at the time, the exact steps on how to get rid of it, and how to start cleaning up your disks. This version of VKILLER can recognize and eliminate 18 different ST viruses. This is possible only because people who have encountered viruses that earlier versions of the program did not recognize sent me copies of the new viruses. If you encounter a virus that the program does recognize, there is no need to contact me. Just eliminate the virus, and let anyone else you have given a disk to know that their system may be infected. Give them a copy of this program if you wish, it is free to anyone who would like it. If, however, you encounter executable boot sectors spreading through your library, and this version of VKILLER can't identify it, please contact me at any of the addresses below. Keep one infected disk, and either send me the disk, or the file generated by VKILLER's file function. Use the Kill function to clean up the rest of the disks in your library. As of this writing, I am investigating about 40 disks each month for new viruses. If you mail me a disk, or a request for a disk copy of the latest version, please include a stamped, self addressed return mailer. VKILLER does not require any "license", "registration", or "shareware" contributions. Of course, all such contributions are gratefully accepted, but none are solicited. Circulate the program in any manner you wish. It may be copied, and distributed freely, but it may not be sold. Reasonable (and hopefully modest) charges for media, copying, or downloading are acceptable. George R. Woodside  Voice: (818) 348-9174 Compuserve: 76537,1342 GEnie: G.WOODSIDE USENET: woodside@ttidca or: ..!{philabs|csun|psivax}!ttidca!woodside US MAIL: 5219 San Felicaino Drive Woodland Hills, CA 91364 USA