KrNews #00
09 января 1998

STORY - Science fiction dilogy "worm." Book One: The Prince of Darkness (Chapter 1-3).

<b>STORY</b> - Science fiction dilogy
               STORY



  In this section we will print
Various raskazy etc. Yeru ..
Ops. What am I doing? Ah yes, some
osobointeresny stories we
converted from other platforms, but
if you write your product then we
happy to publish it. Write to us
zhdem's.

  Well, allow me to begin to appear
You the first part of the science-fiction
story "Worm: Prince of Darkness."


---------------------------------------

          Alexander Lazarevic



                 WORM.


     Science fiction duologue.


  Volume One - 1992: Prince of Darkness.



                   1.

  Beginning his story, I hope
that you will not believe any of my
word. I do not want to drive you into shock, and
disbelief - it's the only thing that can
protect you from shock. Consider this
history of anything weird
story, legend, fairy tale, but only
do not let the thought that all this
actually happened. I will try
help you with this - somewhere privru,
'll put in incredible detail ...
However, I do not particularly try to
have to - this story is enough
mind boggling in itself.

  Cast doubt on its validity
very easy - a source of information
unreliable and can not be verified.
It is possible that all this is just
drunken delirium. Told me this story
A friend who visited recently
Symposium on System
programming. There he became friends with
known foreign programmer and
treated him in his room so that
He was with them. After the third glass of
distinguished foreigner undone language and
he was elated, laying out my
Friend muchivshuyu his secret.

  The narrator gave the impression
man, tormented by a heavy burden
unbearably bitter truth, which opened
from all the people in the world to him alone, and
doomed him to loneliness among
many people who live to themselves or
about anything without knowing it. Maybe so,
and perhaps because this
time friend of mine, too, was no longer
absolutely sober, listening to the story, he did
for a moment doubted his
truth. Only one thought spun at
in his mind - it would be good tomorrow
wake up and do not remember.
Because it is possible to live on, knowing
all of this? For what? Why?

  In the morning he awoke with a terrible
headache. But despite the
amount drunk, the story yesterday
guest sat down in my head tormenting
thorn.

  The telephone rang: "Sorry I
think you said yesterday, a few
more than it should. I want to ask
You a favor. I understand that
I can not expect you to silence. You do not
be able to live a long time alone with those
what you've learned - sooner or later you
need to someone to share. I
I ask only one thing - not to disclose
my real name. Assign me
pseudonym of John Hacker. "

  - "Hacker?" I think in America hacker
called programmers who like you
in his youth ... "

  - "Yes. But do not remind me more about
this case. "In the tube sounded sirens ...



                   2.


  In 1982, John Hacker was 18 years old and
he really was zapravskim hackers.
Computers in the world was not so much as
now, but they have already begun to unite in
a single information network. Even then,
having a house only inferior consumer
computer connected via modem to
ordinary telephone line, could
Contact supercomputer
located at the other end of the
ball. Of course, computers containing
sensitive information protected from
intrusion
different passwords and protection systems
data, very witty and
ingeniously made the best
programmers in the world. This something is
greatest temptation and challenge young minds.
Outwit the world's best programmers -
What could be more tempting
for young men, eager to assert itself?
So on this hacker - box or Sony
fans, sit up nights and days in
displays in the hope to pick up the key to
to some particularly cunning electronic
castle.

  Hacker invented the "worm" - programmkivzlomschiki picking 
their way along the lines of communication in other people's 
protected computers, breeding in them, and departing

wander along the lines of communication further,
search of new victims. It is the victims,
because the worms are often built
of Computer viruses are worms,
grave-yards, left in memory prigrevshim
their hosts.

  In 1982, John Hacker completed
on his masterpiece by the worm, which received from
its creator intimidating name of "Prince
Darkness. "It was not just a worm. It was
supercherv! It was founded
ability to excel.

  John remembers the day he
insert a floppy disk with the finished worm into the crack
drive. Two years, he agonized in their
small ah-bi-emovskoy "pisishke with
paltry 128 kilobytes of collecting
close this patch program
which was to conquer the oceans
Memory giant supercomputers only
world. He put the phone on
modem type on the keyboard: "PRNCDKNS"
that meant - Prince of Darkness -
Prince of Darkness. An old drive is issued
terrible grinding and slowly
read a program from a floppy disk. Here
squeaked the acoustic modem worm until
still sitting in the home computer and began to
pick up the phone keys to its first
victim. Hacker gave him "on track"
list of a dozen phone numbers are not
too well-protected databases.
At first, it should now
enough, and then let razdobyvaet
number itself, intercepting appeal to
other subscribers.

  Suddenly stopped squeaking - pass
through the protection failed. After a half-second sound 
resumed - Worm moved to the next number - and suddenly

again fell silent. "Another failure?" - With
sinking at the heart of John thought, but
that moment they heard screeching
drive that could only mean
one thing: the "head" worm has passed through the protection of
and now there, on the other end
wire podzagruzhaet floppy John
its "tail." Another ten seconds to
drive shone a red light and
were heard muffled clicks of moving
magnetic heads. Then drive
stopped, but a couple of seconds were
audible beeps as a modem. Then he
silent. The worm was gone.

  Goosebumps ran back to John,
whenever he imagined
further. Somewhere, on the other end
wires are machines with a huge
memory, and inconceivable
roomy hard drives. Cables
incredible bandwidth and
satellite channels svyaei connect them with
other such large machines,
scattered throughout the world. All together
they form the information
space, infinite as space, and
dangerous as the jungle. In this jungle
now it will live worm. For him
will hunt antivirus software
and he will have to wade through
numerous protective "fence" and
"Wall" dividing the space
apart.

  To survive, he must actively
proliferate, taking up a copy of their
free memory in the next captured
computer. But the whole "highlight" of the program
written by John Hackers was
that many of these copies will be
differ slightly from the original. and
each time differently and randomly
manner. Some of them may
be more adaptable to
Survival in the computer "jungle".
It is these copies will be able to get through the new
data banks, where will find "life
space "for further
reproduction. Thus, survive
the fittest, in full
According to Darwinian theory
evolution, which asserts that
acquired useful traits must
accumulate and lead to the emergence of all
more advanced organisms.

  The original worm, launched
John Hackers, as a true worm was
not very strong - other hackers, who had
more sophisticated computers at home,
wrote worms can break to
more cunning "electronic locks, but
They had not been incorporated the ability to
self-improvement, and so John
hoped that eventually, after much
travels over computer networks, it
worm (or worms - evolution is likely
go directly to many paths)
surpass all others. And when
Finally they take over computer networks
around the world, John Hacker enters kakuyulibo of networks and 
dials on the keypad password is "Prince of Darkness." Work

specifically protected from the "mutations"
routine worm resident sitting in a
central computer of the network. She
quickly establish contact with the worms
get to the other networks, and
Displays users around the globe
simultaneously displays the message:
John Hacker - the most brilliant
programmer in the world! "

  That was the plan of John Hacker, but he did not
come true. During
the next three years, John many times
typed a password, but the worm did not respond.
The network, which left John, he was not
was. After an unsuccessful three-year
"Aukaniya in computer-" Jungle "John
was forced to admit: the worm died,
obviously eaten antivirus
program. John tried to forget about
this story ...


                   3.


  Ten years have passed. In early 1992,
on a military base there PE:
computer guided missiles with
nuclear warheads, has suddenly started
prelaunch countdown. During
three minutes of nuclear war seemed
inevitable, but two seconds before the start
counting stopped as suddenly as
begun. Military specialists have
thorough investigation revealed no
no defects either in the computer
nor in the software. Was
decided to apply for
advice from independent experts.


  ... Wake of the War Department found
John Hacker, a well-known consultant
System Programming, in
supermarket when he shopped for
week. John pulled out his pipe
radiotelephone. - "We just got rid of
by telephone at your home computer
one little thing. "- Came a voice from the tube -
"Take a look and tell me your opinion.
Desirable as soon as possible. This is a very
is important. "

  - "Okay. Immediately go home." But
Before getting into the car, John got
your home telephone number, and then
a few more numbers - the team home
PC warmed dinner. Already
a second handle on the gas stove in the house
John Hacker automatically turned
and in a second electric spark
lighted the gas. When John came home
Dinner was ready. A hasty supper, he sat
for display ...


  ... Looking at the printout of the source
program text, John immediately
felt that something was wrong here.
That is, from a purely logical point of view
everything was in perfect order:
compiled program worked
absolutely flawless. But the position of
Text on the screen! The text was clearly written
someone who has not seen that from him
turns on the display.

  "Blind programmer?" - John thought
dnako he quickly dropped the idea. ADO
it has a truly superhuman
ability to write such
the entire program "in mind". Likely
this text was the result of
program full of even higher
level. John tried to imagine
how difficult was to be
system, so that she could say:
"Rewrite the program so that new
option allows you at any time
interfere with the computer through
communication channels, but in all other
relationship was indistinguishable from the old
option. "It would have to be very
complex system. Programmers would
easier to solve this problem themselves, but not
create a special system for its
solutions. Consequently, this system
if it really exists, not
aimed at solving specific problems, and
is universal. But then
it turns out that this system has
level close to human thinking.

  "Absurd!" - John thought - "so
to implement a human machine
thinking, even at the present level
microminiaturization need a computer
the size of a skyscraper. Such large
machines simply do not exist! "

  And then suddenly came to him in the head
completely wild, crazy idea.
Grin, as if in self-justification:
say, "all this bullshit of course, but
for fun you can try, "he went
the network, and scored on the keyboard two already
half-forgotten words: "Prince of Darkness." He did not
very much hoped that in response to the screen
there will be two letters - "OK", which
should have signaled that the
worm heard it. Most likely, the thought
John, the screen remains blank.

  So he winced when the screen
Still the letters began to appear. One,
two, three ... Letters were unexpectedly large
is something that struck him in the first
a moment, before he had time to understand
the meaning of the inscription that appears. But when to
He walked sense, his head
spinning and he felt that
falls into some abyss.

  On the screen were the words: "Who is calling
I ?"...





Other articles:

ALEX - Create a dial-up network in Krasnodar.

Ferrum! - How do you know some secrets that are trying to hide from you.

Maxx - New Krasnodar modem newspaper.

STORY - Science fiction dilogy "worm." Book One: The Prince of Darkness (Chapter 1-3).

VTS - Modems in Krasnodar.

News - New software: Mirror-demo, 12 secret book-demo, Fizzy, Kalah, Judge Dredd, Run for Glog, Pro Sound Creator v1.3, DASM v1.0. News from different cities.

Advertising - Advertisements and announcements ...


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
Congratulations - Congratulations to the newspaper.
Ottyag - Test "Formatsevt, check for authenticity."
Mosaic - The publication of poll results is postponed .. In the game "The Last Battle" built a virus!

В этот день...   4 May