bontrose
|
 |
« on: June 30, 2010, 04:21:21 PM » |
|
how about logic atatchees and logic target
the atatchee sticks itself to one file , unnoticeable until the program is run, then it blows the program down 33.3% every 5 minutes.(found in download, attaches to a new program every 5 minute blow time when running)
the target is a normal logic w/ 20% less power because you set it to attack a specific type of software
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
ãłþħά-∆9
|
 |
« Reply #1 on: June 30, 2010, 06:02:53 PM » |
|
Sounds like an overkill confusing version of my two ideas combined, Mr.trose 
|
|
|
Logged
|
|
|
|
Brok Ironfist
|
 |
« Reply #2 on: June 30, 2010, 07:45:51 PM » |
|
How about something along the lines of you attach a virii to a program. The next time the program is run the virii executes and deducts the virii version from the file version. Active virii would have a fifty/fifty chance per day of having the virii execute.
This type of virii would be very deadly to Password Break, Process Trace and such. It would also give a reason for us to kill processes, so they reload the program again.
|
|
|
Logged
|
|
|
|
ãłþħά-∆9
|
 |
« Reply #3 on: June 30, 2010, 07:53:31 PM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^
|
|
|
Logged
|
|
|
|
GlitchH4xor
|
 |
« Reply #4 on: June 30, 2010, 09:22:03 PM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^ I do not like it makes little sense.
|
|
« Last Edit: July 03, 2010, 09:10:27 AM by GlitchH4xor »
|
Logged
|
The level of tyranny that you will live under is the level of tyranny that you will tolerate.
|
|
|
Brok Ironfist
|
 |
« Reply #5 on: July 01, 2010, 07:16:53 AM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^ I do not it makes little sense. Basically how a real virus works right now. It embeds itself into an existing file. Once that file executes it then does its magic.
|
|
|
Logged
|
|
|
|
bontrose
|
 |
« Reply #6 on: July 01, 2010, 11:25:53 AM » |
|
sí
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
GlitchH4xor
|
 |
« Reply #7 on: July 01, 2010, 06:12:18 PM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^ I do not it makes little sense. Basically how a real virus works right now. It embeds itself into an existing file. Once that file executes it then does its magic. No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification.
|
|
|
Logged
|
The level of tyranny that you will live under is the level of tyranny that you will tolerate.
|
|
|
ãłþħά-∆9
|
 |
« Reply #8 on: July 02, 2010, 06:04:48 AM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^ I do not it makes little sense. Basically how a real virus works right now. It embeds itself into an existing file. Once that file executes it then does its magic. No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification. Correcto-mundo! "A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. ..."
|
|
|
Logged
|
|
|
|
bontrose
|
 |
« Reply #9 on: July 02, 2010, 09:35:24 AM » |
|
which is why it is called a virus after the many virri that infect us
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
GlitchH4xor
|
 |
« Reply #10 on: July 02, 2010, 10:44:16 AM » |
|
I kinda see what you're saying, so you hack somebody, attach viruses to their programs, then wait for them to run them and destory their own software  I like it ^^ I do not it makes little sense. Basically how a real virus works right now. It embeds itself into an existing file. Once that file executes it then does its magic. No that is a trojan horse. A virus is a program that replicates itself on a computer. If it was true virus it would replicate to all files on your gateway and copy itself to the software but it would be unable to run due to corruption caused my modifying the software so you would have to run anti-virus on all your software effected to remove the modification. Correcto-mundo! "A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. ..." Ok course I was correct but it is nice for you say it.
|
|
|
Logged
|
The level of tyranny that you will live under is the level of tyranny that you will tolerate.
|
|
|
Brok Ironfist
|
 |
« Reply #11 on: July 02, 2010, 11:22:26 AM » |
|
Well, if you really want to get technical.... A Trojan horse is a program all by itself. It appears to be a valid program and once executed does its dirty work. It does not attach itself to another program.
Whereas, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously.
Yes, a virus generally attempts to replicate itself and infect other programs and systems.
But I think we are getting to nit picky in our definition here. The main argument is let's implement more viruses....
|
|
|
Logged
|
|
|
|
GlitchH4xor
|
 |
« Reply #12 on: July 02, 2010, 01:18:18 PM » |
|
Well, if you really want to get technical.... A Trojan horse is a program all by itself. It appears to be a valid program and once executed does its dirty work. It does not attach itself to another program.
Whereas, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously.
Yes, a virus generally attempts to replicate itself and infect other programs and systems.
But I think we are getting to nit picky in our definition here. The main argument is let's implement more viruses....
Yes if you really want to get technical a virus is basically a worm but does not try to spread to other computers on its own via e-mail or a buffer overflow or any other security vulnerability. I want a virus that stays on a gateway after you change ip so even after you change ip the hacker can still find you.
|
|
|
Logged
|
The level of tyranny that you will live under is the level of tyranny that you will tolerate.
|
|
|
ãłþħά-∆9
|
 |
« Reply #13 on: July 02, 2010, 06:47:37 PM » |
|
IP Binder "Binds you to the same IP address until it is disinfected" 
|
|
|
Logged
|
|
|
|
bontrose
|
 |
« Reply #14 on: July 02, 2010, 07:07:47 PM » |
|
nice
(suggested before) bank freezer
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
|