ZX Pilot #21
08 марта 1998
  Вирусы  

about different - Viruses on the IBM PC & ZX-SPECTRUM-e.

<b>about different</b> - Viruses on the IBM PC & ZX-SPECTRUM-e.
    About MISC



     SUPERNATURAL WORLD


   Anyone who even slightly familiar with these creations
human, it is difficult to get rid of the idea that computer
viruses - is not just a small program, and most real
creatures that do not differ from their more
material counterparts, leading to continuous war
humanity. And as one might think otherwise, if these programs
able to move independently, maskirivatsya,
proliferate, and finally cause devastating attacks, despite
national boundaries and geographic distances,
while remaining invisible to humans.

(C) EUGENE Golomolzin



    I - KRIPPER. Catch Me If You Can.

On the warpath.


   As in the case of live virus in the computer world has
its own science - computer virology, has its
academics, virologists, there are programs for the 
neutralization of vaccine viruses, there are specific rules for 
"hygiene" to prevent infection and spread of epidemics. Viruses 
are constantly evolve, adapting to the antivirus programs and

becoming resistant to them. For this we have
continuously improve the arsenal of antiviral drugs.
There are new strains with new properties, to neutralize
which must first "catch" a new virus, and then
develop a vaccine against it. The nature of epidemics caused by
computer and live virus, is strikingly similar, and the possible
damage and both, in some cases may
be comparable. In general, everything just like in a living, 
but not in virtual world.


   Historically, the emergence of viruses associated with 
kompyuternuh the idea of ​​self-replicating mechanisms and 
programs that were popular at the early 50's. First, these 
programs were created from Scientific or just human curiosity, 
which can be characterize the type of question: "What happens 
if ?..". This was the period of early childhood computer 
viruses. 

   Thus, in the early 60's was invented game called Darwin, in
which several programs are loaded into memory and
should capture the living space, destroying
opponent. He won the player, whose program captured
more memory.

   In the early 70's was created self-replicating programs
for one of the first computer networks. The program was called
"Kripper, she traveled across the network, sometimes telling 
crazed Operator: "I - Kripper. Catch Me If You Can." To

destruction devised the "Ripper", who also
surf and destroy all copies of the encountered
"Krippera.

   The highest peak in the development of computer viruses has 
fallen to 80 years, when widespread personal computers and

as a result of greatly expanded information environment
habitat viruses. Viruses, in turn, began
evolve to meet the needs and
possibilities of new technology. By "degree of hazard" viruses
divided into two groups conditional - "Illusionist" and 
"vandals". "Illusionist" only hinder the work from time to time 
uttering any exotic audio signal or showing

visual effects that "vandals" is from the early days of his 
life came to warpath with the person and immediately provided a 
significant threat. On the nature and habits of such viruses 
can be judged by their titles - "Zabaldevshy", "Dushmanskie 
brains", "Carbuncle" "Invader", "Killer", "Chaos", "Black 
Avenger," "Bastard child "," disgusting "and others.


   By the "Illusionist" is possible, for example, include virus 
"Bebe" manifested as follows. While working on the screen

screen appears, please: Tell Bebe! ". When the keyboard
introduced the word "Bebe", a virus with great satisfaction 
responds: "Figure you!".


   To this group belongs virus Pechenevy monster. " As in
previous case appears on the screen asked: "I want cookie!".
Work can be extended only if the keyboard
type the word "cookie". All the trouble was that, at least
"Feeding" the virus "cookies", his appetite is growing, and
After all requests becomes continuous and blocked
computer work.

   Another representative of the "magicians" virus "Bukvopad"
works less intrusive, but plainly and deliberately. In one
wonderful time computer keyboard is locked, and the letters 
already typed text with a soft rustle slowly begin to crumble in

bottom of the screen.

   "Digger" flips the screen upside down.
"Ekaterinburg" - August 19, shows a white-blue-red
Russian flag. Virus, "Commune," while the output at
screen image of a locomotive, which moves to station
called "Commune". "Vienna-757 states:" Harmless virus:
Down Kuzmich. "" Yankee Doodle "perform at a certain time
song of the same name popular American songs.

   All of the above viruses are fairly harmless and will
resemble jokes programmers over their colleagues. But there is
"Illusionist", which focuses quite toothy and bites
quite painful.

Vampire bite.


   Thus, the virus "Sunday" carefully protects the health of
computer users who are trying to work on weekends.
On Sunday, he gives the message: "Today is Sunday, why
you are so seriously got down to business? Only work and no 
games make you gloomy idiot! Come on! Come here and

have fun! "and then destroys all the startup programs.

   Virus, "Anthem" has infected a computer erases important
system information, the lack of which paralyzes
machine, and then solemnly sings a hymn of the Soviet Union.

   Virus "Tyumen" after losing vital information in
computer, a warning: "Caution! time hackers - evening.
Hackers of all countries, unite! ". By the way, hackers - a
hacking software.

   Very dangerous to the 13th of any month, if that day -
Friday. This date is the favorite business day of virus
"Black Friday", which can make a real pogrom in
your computer.

   All these viruses are quite dangerous, but because they
loud enough to come forward, their easy to detect and, having
special means to defuse. The real threat is
viruses, acting completely hidden, as if this
saboteurs who are able to mutate constantly,
possessing the most advanced means of concealment.
Opportunity to evolve greatly increases the
invulnerability of the virus, since the mutation rate exceeds 
the rate of creating new programs that can locate

virus and destroy it.

   The most effective such viruses operate in the presence of
computer networks, allowing the virus to rapidly
spread throughout the world, causing tremendous damage and
presenting a real danger to people's lives.

   So widely known case where the summer of 1988 the virus
infected three computers at Michigan hospital, which
process information about patients. It was discovered by chance
when physicians have surprised a few diagnostic information,
issued by the machine. It was found that the virus is mixed up 
names patients in the database. Fortunately, none of the 
patients had time to put an erroneous diagnosis and incorrect

treatment. However, it was a matter of time and could easily 
cost someone's life. It was the first time that a computer virus

manipulate human lives.

   Another example of damage by computer viruses
dates back to 1989 when the virus was created by Donald
Gin Burleson, destroyed at $ 200.000 commission records
prenadlezhavshih one of the U.S. firms that specialize in
trade of security, former employer Byrlesona.
The author of the virus was said to a 7-year suspended sentence 
and a fine of $ 11.800.


   The virus is written in Burleson, is a type of "min
delayed action. "This virus is getting into the computer
first pretends that performs some desired function, but
actually produces destructive actions.

   But the loudest viral thing took place in November 1988,
when she was infected with the largest U.S. computer network
Internet.

   The virus that hit the net, was written and implemented a 
student Cornell University Robert Morris, and belonged to the 
category Worms. This type of virus does not destroy data, but

spreads so rapidly that it overwhelms a number of networks 
across country for a few hours, causing them to become 
paralyzed. Given what a huge role played by computers in 
management, you can imagine the level of danger caused by

vital functions of this virus, because within
distance are nuclear power plants, military centers
government agencies, hospitals and other facilities,
incorrect operation of which can lead to disaster.

   For clarity, you can specify that the "worm" is actually 
Maurice brought down 6.000 computers in 700 universities,

laboratories, businesses and federal agencies. Damage to
virus, was $ 100.000.000, and the costs of responding to
impact exceeded $ 250.000. Research Center NASA
accounted for 2 days to close its network to recover
normal maintenance of 52.000 users.

   One can cite many examples, revealing the essence of
viruses "vandals," but I think that what has been said quite
enough to conclude that the insecurity for
Rights of representatives of virtual worlds. We are not talking 
about elementary data loss that cause these "little animals"

Although losses are quite serious and costly. More
dangerous virus infection of computer programs that manage
become major objects as a complex of nuclear missiles or
nuclear power plant. Yes, of course, such objects as
protected from virus attacks, but we all know that the ideal
protection does not happen, and confirmation that we find in
numerous examples.

According to program a bee hive.


   While viruses are only blocking the work of a program,
but, as I see it, there are no fundamental obstacles to creating
self-organizing "smart" computer viruses. Yes, it is
sounds fantastic. But if a computer program capable of
some extent, manage the work of other programs, why
You can not create a program that completely takes control of
their "hands" (run a couple or two missiles at a "liked" her
purposes), and then purposefully begin to form their own
living environment like an anthill or the bee
hive. Most likely place where a person no longer exists. Engine
riots have long been the focus of science fiction, but if
before it was really a flight of fancy, it is now beginning
emerge for something specific and ominous.

   And finally, there is another subtle point. Known as
called suggestologicheskie tutorials. When
Using this method, learning while working with any
program on the screen simultaneously displays a certain
training information that the user does not see, but
takes on a subconscious level. If this program
Learning a foreign language, the derivation of the word to 
remember. Now imagine that same way running some virus

a program that displays instructions: "Kill the neighbor!". 
After working month or two with such a background, a man really 
kill a neighbor. 

   In conclusion I wish to confirm that I am wholly in favor of 
development computer equipment, but otherwise it can not be, 
because to the naked eye can see, that mankind is entering a 
new phase development - the information, and without further 
development of computers civilization is impossible. I just for 
the fact that as soon as possible zhelatalno they are still 
nascent, to notice and eliminate those reasons, development of 
which can affect the lamentable well-being of mankind. But for 
this reason they need to know face.



    According to the newspaper
"It can not be."


° ° ° ° °




Other articles:

Our news - On the Periodicity out of the newspaper.

TOP TEN - Desyatochka best games.

We will understand? - Game Description ADDAMS FAMALY.

about different - Viruses on the IBM PC & ZX-SPECTRUM-e.

about different - Just jokes.

Advertising - Advertisements and announcements ...


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
Contacts - addresses of the publisher.
Guide - Game Lords of Midnights (Lords of Midnight)
Introduction - Third number Cheboksary irregular almost modem independent newspaper.

В этот день...   29 April