KrNews #00
09 января 1998 |
|
STORY - Science fiction dilogy "worm." Book One: The Prince of Darkness (Chapter 1-3).
STORY In this section we will print Various raskazy etc. Yeru .. Ops. What am I doing? Ah yes, some osobointeresny stories we converted from other platforms, but if you write your product then we happy to publish it. Write to us zhdem's. Well, allow me to begin to appear You the first part of the science-fiction story "Worm: Prince of Darkness." --------------------------------------- Alexander Lazarevic WORM. Science fiction duologue. Volume One - 1992: Prince of Darkness. 1. Beginning his story, I hope that you will not believe any of my word. I do not want to drive you into shock, and disbelief - it's the only thing that can protect you from shock. Consider this history of anything weird story, legend, fairy tale, but only do not let the thought that all this actually happened. I will try help you with this - somewhere privru, 'll put in incredible detail ... However, I do not particularly try to have to - this story is enough mind boggling in itself. Cast doubt on its validity very easy - a source of information unreliable and can not be verified. It is possible that all this is just drunken delirium. Told me this story A friend who visited recently Symposium on System programming. There he became friends with known foreign programmer and treated him in his room so that He was with them. After the third glass of distinguished foreigner undone language and he was elated, laying out my Friend muchivshuyu his secret. The narrator gave the impression man, tormented by a heavy burden unbearably bitter truth, which opened from all the people in the world to him alone, and doomed him to loneliness among many people who live to themselves or about anything without knowing it. Maybe so, and perhaps because this time friend of mine, too, was no longer absolutely sober, listening to the story, he did for a moment doubted his truth. Only one thought spun at in his mind - it would be good tomorrow wake up and do not remember. Because it is possible to live on, knowing all of this? For what? Why? In the morning he awoke with a terrible headache. But despite the amount drunk, the story yesterday guest sat down in my head tormenting thorn. The telephone rang: "Sorry I think you said yesterday, a few more than it should. I want to ask You a favor. I understand that I can not expect you to silence. You do not be able to live a long time alone with those what you've learned - sooner or later you need to someone to share. I I ask only one thing - not to disclose my real name. Assign me pseudonym of John Hacker. " - "Hacker?" I think in America hacker called programmers who like you in his youth ... " - "Yes. But do not remind me more about this case. "In the tube sounded sirens ... 2. In 1982, John Hacker was 18 years old and he really was zapravskim hackers. Computers in the world was not so much as now, but they have already begun to unite in a single information network. Even then, having a house only inferior consumer computer connected via modem to ordinary telephone line, could Contact supercomputer located at the other end of the ball. Of course, computers containing sensitive information protected from intrusion different passwords and protection systems data, very witty and ingeniously made the best programmers in the world. This something is greatest temptation and challenge young minds. Outwit the world's best programmers - What could be more tempting for young men, eager to assert itself? So on this hacker - box or Sony fans, sit up nights and days in displays in the hope to pick up the key to to some particularly cunning electronic castle. Hacker invented the "worm" - programmkivzlomschiki picking their way along the lines of communication in other people's protected computers, breeding in them, and departing wander along the lines of communication further, search of new victims. It is the victims, because the worms are often built of Computer viruses are worms, grave-yards, left in memory prigrevshim their hosts. In 1982, John Hacker completed on his masterpiece by the worm, which received from its creator intimidating name of "Prince Darkness. "It was not just a worm. It was supercherv! It was founded ability to excel. John remembers the day he insert a floppy disk with the finished worm into the crack drive. Two years, he agonized in their small ah-bi-emovskoy "pisishke with paltry 128 kilobytes of collecting close this patch program which was to conquer the oceans Memory giant supercomputers only world. He put the phone on modem type on the keyboard: "PRNCDKNS" that meant - Prince of Darkness - Prince of Darkness. An old drive is issued terrible grinding and slowly read a program from a floppy disk. Here squeaked the acoustic modem worm until still sitting in the home computer and began to pick up the phone keys to its first victim. Hacker gave him "on track" list of a dozen phone numbers are not too well-protected databases. At first, it should now enough, and then let razdobyvaet number itself, intercepting appeal to other subscribers. Suddenly stopped squeaking - pass through the protection failed. After a half-second sound resumed - Worm moved to the next number - and suddenly again fell silent. "Another failure?" - With sinking at the heart of John thought, but that moment they heard screeching drive that could only mean one thing: the "head" worm has passed through the protection of and now there, on the other end wire podzagruzhaet floppy John its "tail." Another ten seconds to drive shone a red light and were heard muffled clicks of moving magnetic heads. Then drive stopped, but a couple of seconds were audible beeps as a modem. Then he silent. The worm was gone. Goosebumps ran back to John, whenever he imagined further. Somewhere, on the other end wires are machines with a huge memory, and inconceivable roomy hard drives. Cables incredible bandwidth and satellite channels svyaei connect them with other such large machines, scattered throughout the world. All together they form the information space, infinite as space, and dangerous as the jungle. In this jungle now it will live worm. For him will hunt antivirus software and he will have to wade through numerous protective "fence" and "Wall" dividing the space apart. To survive, he must actively proliferate, taking up a copy of their free memory in the next captured computer. But the whole "highlight" of the program written by John Hackers was that many of these copies will be differ slightly from the original. and each time differently and randomly manner. Some of them may be more adaptable to Survival in the computer "jungle". It is these copies will be able to get through the new data banks, where will find "life space "for further reproduction. Thus, survive the fittest, in full According to Darwinian theory evolution, which asserts that acquired useful traits must accumulate and lead to the emergence of all more advanced organisms. The original worm, launched John Hackers, as a true worm was not very strong - other hackers, who had more sophisticated computers at home, wrote worms can break to more cunning "electronic locks, but They had not been incorporated the ability to self-improvement, and so John hoped that eventually, after much travels over computer networks, it worm (or worms - evolution is likely go directly to many paths) surpass all others. And when Finally they take over computer networks around the world, John Hacker enters kakuyulibo of networks and dials on the keypad password is "Prince of Darkness." Work specifically protected from the "mutations" routine worm resident sitting in a central computer of the network. She quickly establish contact with the worms get to the other networks, and Displays users around the globe simultaneously displays the message: John Hacker - the most brilliant programmer in the world! " That was the plan of John Hacker, but he did not come true. During the next three years, John many times typed a password, but the worm did not respond. The network, which left John, he was not was. After an unsuccessful three-year "Aukaniya in computer-" Jungle "John was forced to admit: the worm died, obviously eaten antivirus program. John tried to forget about this story ... 3. Ten years have passed. In early 1992, on a military base there PE: computer guided missiles with nuclear warheads, has suddenly started prelaunch countdown. During three minutes of nuclear war seemed inevitable, but two seconds before the start counting stopped as suddenly as begun. Military specialists have thorough investigation revealed no no defects either in the computer nor in the software. Was decided to apply for advice from independent experts. ... Wake of the War Department found John Hacker, a well-known consultant System Programming, in supermarket when he shopped for week. John pulled out his pipe radiotelephone. - "We just got rid of by telephone at your home computer one little thing. "- Came a voice from the tube - "Take a look and tell me your opinion. Desirable as soon as possible. This is a very is important. " - "Okay. Immediately go home." But Before getting into the car, John got your home telephone number, and then a few more numbers - the team home PC warmed dinner. Already a second handle on the gas stove in the house John Hacker automatically turned and in a second electric spark lighted the gas. When John came home Dinner was ready. A hasty supper, he sat for display ... ... Looking at the printout of the source program text, John immediately felt that something was wrong here. That is, from a purely logical point of view everything was in perfect order: compiled program worked absolutely flawless. But the position of Text on the screen! The text was clearly written someone who has not seen that from him turns on the display. "Blind programmer?" - John thought dnako he quickly dropped the idea. ADO it has a truly superhuman ability to write such the entire program "in mind". Likely this text was the result of program full of even higher level. John tried to imagine how difficult was to be system, so that she could say: "Rewrite the program so that new option allows you at any time interfere with the computer through communication channels, but in all other relationship was indistinguishable from the old option. "It would have to be very complex system. Programmers would easier to solve this problem themselves, but not create a special system for its solutions. Consequently, this system if it really exists, not aimed at solving specific problems, and is universal. But then it turns out that this system has level close to human thinking. "Absurd!" - John thought - "so to implement a human machine thinking, even at the present level microminiaturization need a computer the size of a skyscraper. Such large machines simply do not exist! " And then suddenly came to him in the head completely wild, crazy idea. Grin, as if in self-justification: say, "all this bullshit of course, but for fun you can try, "he went the network, and scored on the keyboard two already half-forgotten words: "Prince of Darkness." He did not very much hoped that in response to the screen there will be two letters - "OK", which should have signaled that the worm heard it. Most likely, the thought John, the screen remains blank. So he winced when the screen Still the letters began to appear. One, two, three ... Letters were unexpectedly large is something that struck him in the first a moment, before he had time to understand the meaning of the inscription that appears. But when to He walked sense, his head spinning and he felt that falls into some abyss. On the screen were the words: "Who is calling I ?"...
Other articles:
Similar articles:
В этот день... 23 November