PCHS.RVW 950910 Comparison Review Company and product: Company: Stroem System Soft Address: Husebyveien 58c, 7078 Saupstad, Trondheim, Norway Contact: Henrik Stroem Email: hstroem@ed.unit.no, hstroem@pvv.unit.no Product: HS 3.58 Summary: boot virus change detection Cost $15, licensing available, free for non-commercial use Rating (1-4, 1 = poor, 4 = very good) "Friendliness" Installation 2 Ease of use 2 Help systems 2 Compatibility 3 Company Stability 2 Support 2 Documentation 2 Hardware required 3 Performance 3 Availability 1 Local Support 1 General Description: HS is a change detection system specifically targeted at boot sector infectors and other boot sequence corruption problems. It can be installed in either the CONFIG.SYS (by preference) or AUTOEXEC.BAT files to check the system at boot time. Comparison of features and specifications User Friendliness Installation The package is distributed as shareware, and must be installed manually. The instructions are clear, but require a first run to produce a "clean state" data base, and then modification of the CONFIG.SYS or AUTOEXEC.BAT files for automated checking. (HS can be run from the command line for manual checking.) The installation instructions assume a clean machine. Ease of use Once installation is complete, protection should be automatic. Help systems The command line program has a "/?" switch for a brief help message. Compatibility The program is targeted at boot sector infectors only. Compatibility problems with Novell/DR-DOS and QEMM are address in the documentation. Company Stability The program has been developed over a period of some time. It has been quite stable over the past year. Company Support Support is available only by post or Internet email. Documentation The documentation is quite brief, but clear enough in regard to program operation. System Requirements DOS 3.2 or higher. HS will only run under DOS, but it can be installed on OS/2 and Windows NT multi-boot systems. Performance HS will automatically detect and remove boot sector infectors. The invocation of the program in the CONFIG.SYS or AUTOEXEC.BAT files is fairly late in the boot sequence, and therefore potentially subject to stealth avoidance. HS has, however, attempted to address a number of stealth technologies. Local Support None provided. Support Requirements Novice users would likely require some help with the program. copyright Robert M. Slade, 1995 PCHS.RVW 950910 ====================== roberts@decus.ca rslade@freenet.vancouver.bc.ca rslade@cyberstore.ca I do not feel obliged to believe that the same God who has endowed us with sense, reason and intellect has intended us to forgo their use - Galileo Author "Robert Slade's Guide to Computer Viruses" 0-387-94311-0/3-540-94311-0