ZX Power #02
24 мая 1997

Miscellaneous - Entertaining Virology.

<b>Miscellaneous</b> - Entertaining Virology.
       If you suddenly opened the door,
       Do not be afraid, it is - a glitch.

       If the hump at Dizzy's grown,
       Be sure it is - a virus.


    Entertaining VIROLOGY.


          Alexander Desyatnichenko

             Sumy 15/01/1997.

           Special for ZX POWER.
________________________________


   After reading the nonsense written in
epigraph, someone will laugh and
say that about any Speccy
Viruses can be no question that
bacteria crawl modem only wires and feed hard drive. Frankly, 
when one year ago, I was first exposed to the virus, then I is 
also strongly razsmeshilo. Perhaps I would even

has already and will soon forget about
this story, if not note "These are the times!" in the first 
issue ZX Power, which convinced me

that I have not had a virus and
not "vyglyukovalsya" from muzykalki,
it's really not a one-time joke from the "black" humor, and 
especially echidna develop something directed

to develop a sense of vigilance
each sinklerista.

   It was in early 1996
year. I was browsing through new programs on floppy disks that 
came with the Vinnitsa - ran on stage and toys muzykalki, 
choosing which of them to keep and what erase. When it came to 
copy, then I, to my horror, I saw that the directories on the 
two diskettes somewhat modified, and copied the program 
stopped, although as is normal, and started working. All BASIC 
files are the same length (something about 4kBt), and code 
blocks renamed under the name of the main BASIC loader and 
changed their style to the figure. Feverishly downloading 
diskdoktor, I began to manually restore the most interesting 
program, but then, after looking closer to what's left of the 
catalog, I saw that in It left all the old data

as BASIC, and about code
files, but they are marked as
udalennye.Vosstanoviv Directory
them and removing all the tumors,
managed to return the disk to its original state. We can say 
that the virus was harmless, since no port the data itself - 
only a walk catalog. It now remains

only to find out what kind of program he built. Similarly, 
already I do not remember, but I found it in

bootloaders some toys and
muzykalki FUCK to MUDAK DEMO. K
Unfortunately, the virus itself, I did not preserve for 
history, since it is not thought that this might be of interest 
and that in general a virus on Speccy

can be taken seriously. Could
I then suggest that,
a year later, this issue will be
such important ...

   Based on the fact that the virus, I have described, differs 
from the virus, as described in the previous issue magazine, 
and from what was promised to describe yet another virus, it 
can be assumed that with the development dial-up networking on 
the ZX-Spectrum and connecting the IDE-propeller Number of 
viruses to increase significantly, because their writing fairly 
minimal knowledge. Concoct such a program from any hacker who 
knows how to deal with CALL 15635 to at CD disembarked zeros or 
abuse on all known and unknown

languages. Besides, probably, this
Exotic industry koderstva
will always be improved and, given that hakerkoder-sinklerist 
by their ingenuity and professionalism is an order of magnitude 
higher than any IBM-sysop-native, it can

lead to the most unpredictable
posledstviyam.Kak and conventional medicine, the most effective 
method of combating bacteria, is the prevention of diseases. 
Let's try together with you present the evolution of the virus

technologies to fully prepared
meet this obsession.

   So, first of all, I think that this type of virus will be 
incorporated in boot'y. Why? Because any boot is usually at the 
beginning of the disk and in any reads zero track. Thus, no one

seem strange that he
refers to the zero track.
Immediately after the reading will be able to boot without the 
user make changes to the directory, overwriting it. Of course, 
if the program will no longer boot after that, the user 
immediately throw this boot.Poetomu such

programs are likely to be
make changes only in the catalog, making the disc uncopyable 
whereas for ordinary user. Of course, that more experienced 
users will immediately notice the changes in the directory 
structure and will appropriate mery.Znachit, the next step will 
not viruses immediate action and "wait" viruses. How will this

look like? I think so:
virus is organized by the counter
read from disk, and each time will be made read-directory, the 
virus will read untapped sector of track zero, change 
validation bytes in it (for example, increasing its

value) and when this value
will be equal to, for example, 50 readings, the virus 
zaparyvaet several tracks on the disc, or rename the file names 
on a hi familiar to hackers again clears

Counter ... Thus, the very
boot as it drops out of suspicion - Georgia currently program
a week, and then deteriorated
("... Probably got a floppy disk
Khrenova "), overwriting boot'a
to another drive, he, like, does not spoil anything ... Of 
course, he virus will stay in the program

well hidden, for example,
pereksorennym, in the form of tablets
movement of sprites or characters
font'a ... How could protect against
such a calamity? Well, obviously, as well
as a woman is protected from unwanted pregnancy - stick up! In 
other words, the motto of the day should be: "Save floppy - 
cover the window! " 

   Well, predicts next?
Imagine - you're playing
loadable game, pass it
to the end, it will ship FINAL CUT and
immediately overwrites several tracks after it. Or
you have loaded on the disc table
records and, if your name is in it
is higher than the authors' names, the directory of the drive 
to be format ... Or you ships deferred status, copy

files of the operating envelope, perform any other action with
using a program that engages
write to disk ... How not sealed, but something to write
have razkleivatsya. I have already
completely silent on the methods of direct
Programming VeGeshki by which the virus can organize counter 
hits disk generally somewhere between sectors, in addition, not 
every even a very experienced hacker can find a virus in your 
system program where all procedures are built on this metode.A 
even rumors that are going experiments records on disk glued ...


   Of course, all of the above examples can hardly be 
considered real virus, as they can not reproduce.

After all, for the reproduction of the virus is necessary, as 
at IBM, to join file and then burn to disc

with him, but on this Srectrum'e
will be immediately zametnym.Chto can think of in this area?
Well, for example, the virus can adhere only to the last
file, or if the virus itself is shorter than 255 bytes, it can 
enroll in the free space on the last sector now is fayla.A 
cool, from what I would like to caution - you can become author 
virusonosnoy program without even realizing it! Imagine - you 
write a program in assembly language with a built-author of the 
virus assembly and fills this line:

CALL 15635. During the broadcast
also, unknown to you, CALL 15635
zamenivaetsya on CALL addr, where
addr - address of the subroutine, connected by the translator, 
in which the virus Pooshan "all registers get up with your 
drive everything he likes again "remembers"

register values, making your
15635 CALL and RET. Thus,
if you do not see the compiled code in a disassembler, and 
immediately release it, then then try to prove that

it's not you write a virus. More
nightmares will run the virus,
Attached to debuggere - you
debug a program, and the debugger
introduced it in their changes, and recorded on the disc. When 
you return upload it the same, but

an infected program, then he
determines on its label that
here already visited, removes all
their tracks and zamylivaet your eyes unspoiled program, and
before recording again makes his
business ... What do the authors
software programs - to display on
screen tablet with an inscription about this content: "The 
author program ensures that its

product is absolutely free from
viruses and is ready to pay compensation in case of ... "etc. 
Yes, think that my article I

many coders do not give easy
sleep - some are at night to write these viruses, the other - 
their seek, and others - to produce all

and more new antivirusy.Poistine endless possibilities 
ingenious invention K. Sinclair! Although, I confess, we are in 
blame, because this Lord even could not imagine that vzbredet 
someone in the head connected to Spectrum'u Winchester, modem 
and download viruses. 

   But not all as bad as I nafantaziroval, because all the 
Spectrum IBM did not, and even the epidemic

steep virus, I think we do not
faces. Instead, I eventually want to appeal to all users
wish - if someone finds themselves in such a virus, then
Let him not with his razpostranyaet
all the inherent malevolence, and tells his brothers about the 
programs it contains. I want to wish success to you and the 
magazine ZX Power, which first took

for coverage of this new issue.

From the Editor:

   Unfortunately for technical
reasons we could not perform
promise the last time
but vow to return to this issue in the following
issues of our magazine with you. A
You, dear readers, help me
us in this: write about your
encounters with viruses, both old and new, and steadfast send 
"infected" drives to address our editorial staff indicated

in "Authors" for more
detailed study and possible
finding a vaccine! Drives will
returned to their owners.


    We will wait for your letters!
________________________________







Other articles:

Iron - Microprocessors Zilog: Z80, 1980, Z8000, Z80000.

Iron - Modem: Myths and Realities.

Iron - On AY-mouse (FAQ).

Iron - Serial-VCOM-for Spectrum.

Iron - Advanced screen.

Gambling - Description of the game Ghost Busters 2.

Gambling - Game description Satan 2.

Gambling - Game Description Zombi.

Interview - VIC (X-Project) - How do I start?

Interview - An Interview with Joker'om (Mafia).

TO OUR READERS - "Time for a Change"

Likbez - Fighting controllers, or about how I played the 800K floppy.

Likbez - Recovery Programs (On the causes of recovery, characterized by acteristic multifeysnogo hacking types multifeysnyh hacks recovery method of searching for old bootloader).

Likbez - The structure of MS-DOS disk.

Review - Gateway produces remnants Amiga.

Review - O computer "Silicon Graphics" (continued).

From the authors - a description of the shell, greetings and thanks, addresses and contact information.

a rest - 60 American jokes.

a rest - Bessoznanka in the army.

a rest - The Kremlin Trouble.

a rest - Minutes of the meeting for the elections chief doctor at the mental hospital N15.

first pancake - Description of the RAM-TEST v1.0.

first pancake - The path to fame ...

Perspective - Preview STS v6.0.

Perspective - Novella to play WORDS.

Perspective - On the game 3D Killer (demo version - Doommania).

Perspective - Preface to the game STALKER.

Desktop - How to work with the programs: Cache File Manager 512k.

Desktop - How to work with the programs: Corrector v2.0.

Desktop - How to work with the programs: Melon Terminal.

Desktop - How to work with the programs: Symed v1.1

Desktop - How to work with the programs: ZX-Turbo Disassembler.

Miscellaneous - Entertaining Virology.

Miscellaneous - News from the Progress, Dream Team, Rush, Phantasy, Copper Feet, etc.

Miscellaneous - On the ZX networks and not only ...

Miscellaneous - letter-carrier - a review letters from readers.

Advertising - Advertising and announcements.

Fantasy - Winnie the Pooh - 10 years later.

Fantasy - G. Garison (continued, part 4-6).

Fantasy - The story EG Nesterenko, "The Crown and the Ring" (Part 1)

Fantasy - a fantastic story theater.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
FIDO novice - Modem. First steps. - Work with the BBS.
Graphics - kartinka ANSI graphics.

В этот день...   21 November