The Hacker Project - a free online game

October 03, 2025, 06:31:57 PM
Welcome, Guest. Please login or register.

Login with username, password and session length











Down with the mega-corporations!
Pages: [1] 2
Print
Author Topic: logic atatchees and logic target  (Read 11735 times)
bontrose
Hero Member
*****
Posts: 1597



View Profile
« on: June 30, 2010, 04:21:21 PM »

how about logic atatchees and logic target

the atatchee sticks itself to one file , unnoticeable until the program is run, then it blows the program down 33.3% every 5 minutes.(found in download, attaches to a new program every 5 minute blow time when running)

 the target is a normal logic w/ 20% less power because you set it to attack a specific type of software
Logged

i win
you lose
get over it

NOW
ãłþħά-∆9
Hero Member
*****
Posts: 1235



View Profile
« Reply #1 on: June 30, 2010, 06:02:53 PM »

Sounds like an overkill confusing version of my two ideas combined, Mr.trose   bodyguard
Logged

Brok Ironfist
Hero Member
*****
Posts: 520



View Profile
« Reply #2 on: June 30, 2010, 07:45:51 PM »

How about something along the lines of you attach a virii to a program.  The next time the program is run the virii executes and deducts the virii version from the file version.  Active virii would have a fifty/fifty chance per day of having the virii execute.

This type of virii would be very deadly to Password Break, Process Trace and such.  It would also give a reason for us to kill processes, so they reload the program again.







Logged

ãłþħά-∆9
Hero Member
*****
Posts: 1235



View Profile
« Reply #3 on: June 30, 2010, 07:53:31 PM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^
Logged

GlitchH4xor
Sr. Member
****
Posts: 299



View Profile
« Reply #4 on: June 30, 2010, 09:22:03 PM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^

I do not like it makes little sense.
« Last Edit: July 03, 2010, 09:10:27 AM by GlitchH4xor » Logged

The level of tyranny that you will live under is the level of tyranny that you will tolerate.
Brok Ironfist
Hero Member
*****
Posts: 520



View Profile
« Reply #5 on: July 01, 2010, 07:16:53 AM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^

I do not it makes little sense.

Basically how a real virus works right now.  It embeds itself into an existing file.  Once that file executes it then does its magic.
Logged

bontrose
Hero Member
*****
Posts: 1597



View Profile
« Reply #6 on: July 01, 2010, 11:25:53 AM »

Logged

i win
you lose
get over it

NOW
GlitchH4xor
Sr. Member
****
Posts: 299



View Profile
« Reply #7 on: July 01, 2010, 06:12:18 PM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^

I do not it makes little sense.

Basically how a real virus works right now.  It embeds itself into an existing file.  Once that file executes it then does its magic.

No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification.
Logged

The level of tyranny that you will live under is the level of tyranny that you will tolerate.
ãłþħά-∆9
Hero Member
*****
Posts: 1235



View Profile
« Reply #8 on: July 02, 2010, 06:04:48 AM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^

I do not it makes little sense.

Basically how a real virus works right now.  It embeds itself into an existing file.  Once that file executes it then does its magic.

No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification.

Correcto-mundo!

"A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. ..."
Logged

bontrose
Hero Member
*****
Posts: 1597



View Profile
« Reply #9 on: July 02, 2010, 09:35:24 AM »

which is why it is called a virus after the many virri that infect us
Logged

i win
you lose
get over it

NOW
GlitchH4xor
Sr. Member
****
Posts: 299



View Profile
« Reply #10 on: July 02, 2010, 10:44:16 AM »

I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  13

I like it ^^

I do not it makes little sense.

Basically how a real virus works right now.  It embeds itself into an existing file.  Once that file executes it then does its magic.

No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification.

Correcto-mundo!

"A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. ..."

Ok course I was correct but it is nice for you say it.
Logged

The level of tyranny that you will live under is the level of tyranny that you will tolerate.
Brok Ironfist
Hero Member
*****
Posts: 520



View Profile
« Reply #11 on: July 02, 2010, 11:22:26 AM »

Well, if you really want to get technical.... A Trojan horse is a program all by itself.  It appears to be a valid program and once executed does its dirty work.  It does not attach itself to another program.

Whereas, many viruses attach themselves to executable files that may be part of legitimate programs.  If a user attempts to launch an infected program, the virus' code may be executed simultaneously.

Yes, a virus generally attempts to replicate itself and infect other programs and systems.

But I think we are getting to nit picky in our definition here.  The main argument is let's implement more viruses....

 

Logged

GlitchH4xor
Sr. Member
****
Posts: 299



View Profile
« Reply #12 on: July 02, 2010, 01:18:18 PM »

Well, if you really want to get technical.... A Trojan horse is a program all by itself.  It appears to be a valid program and once executed does its dirty work.  It does not attach itself to another program.

Whereas, many viruses attach themselves to executable files that may be part of legitimate programs.  If a user attempts to launch an infected program, the virus' code may be executed simultaneously.

Yes, a virus generally attempts to replicate itself and infect other programs and systems.

But I think we are getting to nit picky in our definition here.  The main argument is let's implement more viruses....


Yes if you really want to get technical a virus is basically a worm but does not try to spread to other computers on its own via e-mail or a buffer overflow or any other security vulnerability.

I want a virus that stays on a gateway after you change ip so even after you change ip the hacker can still find you.
Logged

The level of tyranny that you will live under is the level of tyranny that you will tolerate.
ãłþħά-∆9
Hero Member
*****
Posts: 1235



View Profile
« Reply #13 on: July 02, 2010, 06:47:37 PM »

IP Binder
"Binds you to the same IP address until it is disinfected"

 atention
Logged

bontrose
Hero Member
*****
Posts: 1597



View Profile
« Reply #14 on: July 02, 2010, 07:07:47 PM »

nice

(suggested before) bank freezer
Logged

i win
you lose
get over it

NOW
Pages: [1] 2
Print
Jump to: