ZX Pilot #21
08 марта 1998 |
|
about different - Viruses on the IBM PC & ZX-SPECTRUM-e.
About MISC SUPERNATURAL WORLD Anyone who even slightly familiar with these creations human, it is difficult to get rid of the idea that computer viruses - is not just a small program, and most real creatures that do not differ from their more material counterparts, leading to continuous war humanity. And as one might think otherwise, if these programs able to move independently, maskirivatsya, proliferate, and finally cause devastating attacks, despite national boundaries and geographic distances, while remaining invisible to humans. (C) EUGENE Golomolzin I - KRIPPER. Catch Me If You Can. On the warpath. As in the case of live virus in the computer world has its own science - computer virology, has its academics, virologists, there are programs for the neutralization of vaccine viruses, there are specific rules for "hygiene" to prevent infection and spread of epidemics. Viruses are constantly evolve, adapting to the antivirus programs and becoming resistant to them. For this we have continuously improve the arsenal of antiviral drugs. There are new strains with new properties, to neutralize which must first "catch" a new virus, and then develop a vaccine against it. The nature of epidemics caused by computer and live virus, is strikingly similar, and the possible damage and both, in some cases may be comparable. In general, everything just like in a living, but not in virtual world. Historically, the emergence of viruses associated with kompyuternuh the idea of self-replicating mechanisms and programs that were popular at the early 50's. First, these programs were created from Scientific or just human curiosity, which can be characterize the type of question: "What happens if ?..". This was the period of early childhood computer viruses. Thus, in the early 60's was invented game called Darwin, in which several programs are loaded into memory and should capture the living space, destroying opponent. He won the player, whose program captured more memory. In the early 70's was created self-replicating programs for one of the first computer networks. The program was called "Kripper, she traveled across the network, sometimes telling crazed Operator: "I - Kripper. Catch Me If You Can." To destruction devised the "Ripper", who also surf and destroy all copies of the encountered "Krippera. The highest peak in the development of computer viruses has fallen to 80 years, when widespread personal computers and as a result of greatly expanded information environment habitat viruses. Viruses, in turn, began evolve to meet the needs and possibilities of new technology. By "degree of hazard" viruses divided into two groups conditional - "Illusionist" and "vandals". "Illusionist" only hinder the work from time to time uttering any exotic audio signal or showing visual effects that "vandals" is from the early days of his life came to warpath with the person and immediately provided a significant threat. On the nature and habits of such viruses can be judged by their titles - "Zabaldevshy", "Dushmanskie brains", "Carbuncle" "Invader", "Killer", "Chaos", "Black Avenger," "Bastard child "," disgusting "and others. By the "Illusionist" is possible, for example, include virus "Bebe" manifested as follows. While working on the screen screen appears, please: Tell Bebe! ". When the keyboard introduced the word "Bebe", a virus with great satisfaction responds: "Figure you!". To this group belongs virus Pechenevy monster. " As in previous case appears on the screen asked: "I want cookie!". Work can be extended only if the keyboard type the word "cookie". All the trouble was that, at least "Feeding" the virus "cookies", his appetite is growing, and After all requests becomes continuous and blocked computer work. Another representative of the "magicians" virus "Bukvopad" works less intrusive, but plainly and deliberately. In one wonderful time computer keyboard is locked, and the letters already typed text with a soft rustle slowly begin to crumble in bottom of the screen. "Digger" flips the screen upside down. "Ekaterinburg" - August 19, shows a white-blue-red Russian flag. Virus, "Commune," while the output at screen image of a locomotive, which moves to station called "Commune". "Vienna-757 states:" Harmless virus: Down Kuzmich. "" Yankee Doodle "perform at a certain time song of the same name popular American songs. All of the above viruses are fairly harmless and will resemble jokes programmers over their colleagues. But there is "Illusionist", which focuses quite toothy and bites quite painful. Vampire bite. Thus, the virus "Sunday" carefully protects the health of computer users who are trying to work on weekends. On Sunday, he gives the message: "Today is Sunday, why you are so seriously got down to business? Only work and no games make you gloomy idiot! Come on! Come here and have fun! "and then destroys all the startup programs. Virus, "Anthem" has infected a computer erases important system information, the lack of which paralyzes machine, and then solemnly sings a hymn of the Soviet Union. Virus "Tyumen" after losing vital information in computer, a warning: "Caution! time hackers - evening. Hackers of all countries, unite! ". By the way, hackers - a hacking software. Very dangerous to the 13th of any month, if that day - Friday. This date is the favorite business day of virus "Black Friday", which can make a real pogrom in your computer. All these viruses are quite dangerous, but because they loud enough to come forward, their easy to detect and, having special means to defuse. The real threat is viruses, acting completely hidden, as if this saboteurs who are able to mutate constantly, possessing the most advanced means of concealment. Opportunity to evolve greatly increases the invulnerability of the virus, since the mutation rate exceeds the rate of creating new programs that can locate virus and destroy it. The most effective such viruses operate in the presence of computer networks, allowing the virus to rapidly spread throughout the world, causing tremendous damage and presenting a real danger to people's lives. So widely known case where the summer of 1988 the virus infected three computers at Michigan hospital, which process information about patients. It was discovered by chance when physicians have surprised a few diagnostic information, issued by the machine. It was found that the virus is mixed up names patients in the database. Fortunately, none of the patients had time to put an erroneous diagnosis and incorrect treatment. However, it was a matter of time and could easily cost someone's life. It was the first time that a computer virus manipulate human lives. Another example of damage by computer viruses dates back to 1989 when the virus was created by Donald Gin Burleson, destroyed at $ 200.000 commission records prenadlezhavshih one of the U.S. firms that specialize in trade of security, former employer Byrlesona. The author of the virus was said to a 7-year suspended sentence and a fine of $ 11.800. The virus is written in Burleson, is a type of "min delayed action. "This virus is getting into the computer first pretends that performs some desired function, but actually produces destructive actions. But the loudest viral thing took place in November 1988, when she was infected with the largest U.S. computer network Internet. The virus that hit the net, was written and implemented a student Cornell University Robert Morris, and belonged to the category Worms. This type of virus does not destroy data, but spreads so rapidly that it overwhelms a number of networks across country for a few hours, causing them to become paralyzed. Given what a huge role played by computers in management, you can imagine the level of danger caused by vital functions of this virus, because within distance are nuclear power plants, military centers government agencies, hospitals and other facilities, incorrect operation of which can lead to disaster. For clarity, you can specify that the "worm" is actually Maurice brought down 6.000 computers in 700 universities, laboratories, businesses and federal agencies. Damage to virus, was $ 100.000.000, and the costs of responding to impact exceeded $ 250.000. Research Center NASA accounted for 2 days to close its network to recover normal maintenance of 52.000 users. One can cite many examples, revealing the essence of viruses "vandals," but I think that what has been said quite enough to conclude that the insecurity for Rights of representatives of virtual worlds. We are not talking about elementary data loss that cause these "little animals" Although losses are quite serious and costly. More dangerous virus infection of computer programs that manage become major objects as a complex of nuclear missiles or nuclear power plant. Yes, of course, such objects as protected from virus attacks, but we all know that the ideal protection does not happen, and confirmation that we find in numerous examples. According to program a bee hive. While viruses are only blocking the work of a program, but, as I see it, there are no fundamental obstacles to creating self-organizing "smart" computer viruses. Yes, it is sounds fantastic. But if a computer program capable of some extent, manage the work of other programs, why You can not create a program that completely takes control of their "hands" (run a couple or two missiles at a "liked" her purposes), and then purposefully begin to form their own living environment like an anthill or the bee hive. Most likely place where a person no longer exists. Engine riots have long been the focus of science fiction, but if before it was really a flight of fancy, it is now beginning emerge for something specific and ominous. And finally, there is another subtle point. Known as called suggestologicheskie tutorials. When Using this method, learning while working with any program on the screen simultaneously displays a certain training information that the user does not see, but takes on a subconscious level. If this program Learning a foreign language, the derivation of the word to remember. Now imagine that same way running some virus a program that displays instructions: "Kill the neighbor!". After working month or two with such a background, a man really kill a neighbor. In conclusion I wish to confirm that I am wholly in favor of development computer equipment, but otherwise it can not be, because to the naked eye can see, that mankind is entering a new phase development - the information, and without further development of computers civilization is impossible. I just for the fact that as soon as possible zhelatalno they are still nascent, to notice and eliminate those reasons, development of which can affect the lamentable well-being of mankind. But for this reason they need to know face. According to the newspaper "It can not be." ° ° ° ° °
Other articles:
Our news - On the Periodicity out of the newspaper. |
TOP TEN - Desyatochka best games. |
We will understand? - Game Description ADDAMS FAMALY. |
about different - Viruses on the IBM PC & ZX-SPECTRUM-e. |
about different - Just jokes. |
Advertising - Advertisements and announcements ... |
Similar articles:
В этот день... 21 November