home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
VIRUS
/
CRPTLT.R11
< prev
next >
Wrap
Text File
|
1993-01-05
|
53KB
|
1,044 lines
▄▄▄ ▄▄▄▄▄▄▄▄ ▄▄▄ ▄▄▄▄▄▄ ▄▄ ▄▄ ▄▄▄ ▄▄▄▄▄ ▄▄▄▄▄▄▄ ▄▄▄▄▄
█▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒▒▒▒▒█ █▒▒▒▒█
█▒▒█ ▀▀▀▀▀▀▀▀ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▀▀▀█▒▒█ ▀▀▀█▒▒█ ▀▀▀▀▀
█▒▒█ █▒▒█ ▄▄▄▄█▒▒█ █▒▒█ █▒▒█ █▒▒█ ▄▄▄█▒▒█ █▒▒█
█▒▒█ █▒▒█ █▒▒▒▒▒█ ▀▀ █▒▒█ █▒▒█ █▒▒▒▒█ █▒▒█
█▒▒█ █▒▒█ ▀▀▀▀█▒▒█ █▒▒█ █▒▒█ ▀▀▀▀▀ █▒▒█
█▒▒█ ▄▄▄▄▄▄▄▄ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
█▒▒█ █▒▒▒▒▒▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█ █▒▒█
▀▀▀ ▀▀▀▀▀▀▀▀ ▀▀▀ ▀▀ ▀▀ ▀▀▀ ▀▀
NEWSLETTER NUMBER 11
**********************************************************************
Another festive, info-glutted, tongue-in-cheek training manual
provided solely for the entertainment of the virus programmer,
security specialist, casual bystander or PC hobbyist interested in
the particulars - technical or otherwise - of cybernetic data
replication and/or mutilation. Jargon free, too.
EDITED BY URNST KOUCH, late December 1992
**********************************************************************
TOP QUOTE: "God Bless America and cry 'freedom' as you punch
me on the nose."
--Harriet Timson in the December
1992 issue of Virus News Intn'l.
IN THIS ISSUE: NOOZ . . . product reviews: AVLAB 1.0 and
Victor Charlie 5.0 . . . FICTUAL FACT/FACTUAL FICTION . . .
IN THE READING ROOM: POPULAR SCIENCE SEARCHES FOR BATCHFILE
VIRUSES and "GATES" - A GOOD DOORSTOP . . . Leech-ZModem .
. . POPOOLAR SCIENCE virus . . . HITLER virus . . . NECRO
virus . . . LITTLE MESS virus . . . Edwin Cleton's software
psychobabble . . . DAVE BARRY v. MICHELANGELO virus . . . the
usual clever (or dumb - depending how you look at it) wit . . .
************************************************************
NOOZ: OUTGOING PREZ URGED TO LOOK TO INTEGRITY OF WHITE
HOUSE DATA
************************************************************
Reuters News Service reports that two U.S. senators, Democrats
John Glenn and David Pryor, have urged George Bush to prevent
destruction of White House computer records during the transition
to the Bill Clinton administration.
In a letter to the lame-duck, the senators claimed that sensitive
data faces "a significant risk of destruction."
The astute reader is encouraged to read between the lines
and jump to the conclusion that the Democrats are concerned
about the mutilation of electronic files generated by the
National Security Council during Iran-Contra.
In any case, worried Democrats are advised to be on the lookout
for unexplained junkets to Colombia and vieled references to the
"Ghost of la Catedral" during the waning days of the Bush
presidency.
***************************************************************
-*-
Page 1
*****************************************************************
CONSECRATED PSYCHOBABBLE: EDWIN CLETON's CODE EXECUTION SIMULATOR,
OR: HOW -*NOT*- TO WRITE A SOFTWARE MANUAL!
*****************************************************************
Last issue's readers may remember a passing infoblip concerning
the naming of one Edwin Cleton as the Fidonet Virus echo moderator.
In related news, a dedicated reader dug a Cleton/Saesoft shareware
anti-virus program known as the Code Execution Simulator (CES)
out of the trash and passed it on to the Crypt Newsletter.
From what we could tell, it was "supposed" to be a $40 cash money
heuristic scanner. In any case, CES refused to function at the Crypt
editorial offices in any logical manner. (Could be someone's
pulling our leg! Hah!) And the accompanying
documentation was, well . . . you can read it for yourself:
-=[ravings starts here]=-
CES (Tm) Code Execution Simulator.
=*===*===*===*===*===*===*===*===*===*===*===*===*===*===*===*==
"Gather enough information and the solution will be obvious."
S.B. 1988
"A virus can NOT be detected BEFORE execution, it can only be
detected AFTER or WHILE execution, which is at the moment to
late, however, to detect anything for that matter, you need to
execute it first before there will be *anything* to detect."
E.C. 1990
"Mate(s) it simply makes sense, make a backup..."
The stages of development;
=*===*===*===*===*===*===*===*===*===*===*===*===*===*===*===*==
The object is to create rules related behaviour, consistent to
such an instruction or event of instructions in order to deter-
mine if *something* is happening, the order of what this *some-
thing* is, is yet to be defined by the sub-rules who are (to be)
generated out of the strain that started the initial behaviour.
Consistent rule related behaviour is *never* predefined, thus
the object or statement 'will never work well enough' is irre-
levant to it's initial base, whether or not *a* rule 'works' is
of no concern to the CES model, for the intention is to create
such *working* rules related to any behaviour it will derive, if
not, the initial rule is dropped and this has yet to happen.
To create such rules, there base must be optained at the lowest
level and gradualy go upwards to become *ideal*, each rule and
the sub-rules related must be dedicated to one single predefined
*instuction* or event of such instructions.
The lowest level based rule *must* effect it's sub-rules or if
and when needed, create such, a sub-rule will and can eventually
link with other sub-rules, somewhat like a neural network, once
each level expands and thus also there related strains into the
*rule network*, some point must be given to hold it at a given
time, backtracking each level will then (and only then) result
in *a* logical deducting 'intelligent' rule based CES system.
Page 2
The CES model is not a debugger, if *a* program executes, it
will do the same inside CES's environment, undocumented instruc-
tions are of no concern, as they *are* documented somewhere and
can be included along the line they appear, if not, CES will
simply halt requesting manual instructions, which in turn can be
solved on the same line they appear.
The *model* should provide in it's own complexity to amphase the
creation of direct logic solutions to any given problem, or
abort complexity.
Scanning for prototype of code is a waste of time, recording and
detecting behaviour isn't, yet you have to define normal and
abnormal behaviour.
-=[ravings end here]=-
----------------------------------------------------------------
Hah??? "Amphase"? How about "aphasic"! Don't be frightened readers!
Yes, indeed, you are right! It IS impenetrable crap!
As a wise man from Holland once said, "Kannitverstann!"
_________________________________________________________________