💾 Archived View for spam.works › mirrors › textfiles › uploads › vosd.txt captured on 2023-11-14 at 12:48:01.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-




        [Future Viruses and Operating System Development]
        [Conceived  and  expressed  by  nucleii (c) 2001]



   [Abstract]

 "The best prophet of the future is the past."

 --unknown



      Since the beginning  of documented  times  man  has  been  trying to
 simplify things. This process  requires abstract thinking. Coming up with
 new ideas outside of the norms. 

 Creativity.

 This process has caused humanity to advance far beyond its roots of basic
 needs and survival.  Although living in a world based  on technology, new
 problems have arose.  The rate seems faster than our ability to solve and
 correct the obstacles.  Has the modern  society created a problem with no
 solution?  A world  of striving  towards perfecting a system  that should
 instead be torn down...


   [Introduction]


      The new millennium.  2001.  Space odyssey my ass.  None the less its
 been an interesting year for the modern world...

      Encryption, networking, theft, espionage, destruction, demonstration
 protest.  These are just a few of the topics i will explore here.  I will
 attempt to touch on what has been happening over  the past few years, and
 cover where i feel the trend  will take us.  The topics of the anti virus
 industry and the consumer are covered. I have also included several of my
 viral ideas  which i will never actually get around to  implementing. For
 all  you  programmers out there,  this is  an  open  invitation to  do so
 yourself.

 This paper is  not  meant to  be viewed as a  complete guide.  Its just a
 simple implementation of my personal ideas as theory.  This should not be
 taken as anything more or less.


  [A Brief Past]


      The 80's.  The turning point for computing.  This is  the decade the
 personal  computers  were  creeping  into  the  homes  of  america.   The
 commadore64, tandy machines with tandy dos,  ibm with their pc-dos, apple
 1 and 2 e's. The list goes on and on. In the early days of home computing
 there was much more variety. Nothing had really dominated the market like
 today.

      This was also the decade the first computer  viruses  were  found in
 the wild.  The technology  was simple.  Basic mbr/bs infection.  With the
 idea in the minds of computer users around the world,  programmers became
 interested.  The advancement of  the computer virus had grown from sector
 infection to  various file types and even directory infection.  Different
 schemes for spreading, stealth, encryption and  other self modifying code
 were implemented.  The virus and anti virus community grew together.  The
 virus programmers were, and still are, always a step ahead.

      Various dos distributions did what they thought was the right thing.
 Ibm  and  msdos  started  including  versions of  their  own  anti  virus
 software.  A good step, but in the wrong direction.  A way to boost a new
 industry? Whenever developers create software for an operating system, it
 increases the user base. I really hope this didnt play as a factor... and
 its far too late to ever know.

      Why not start enforcing a set of rules on the dos os. It was obvious
 that a read only attribute was not enough.  The systems allowed any piece
 of code to take  complete  control.  Seems  like it was  doomed  from the
 start.  Why  continue  development keeping the same base.  It was totally
 possible to  change the kernel to restrict what goes on.  They didnt have
 to change the file format.  They  didnt  have  to  change  the  interrupt
 system.  Only  the  way  the kernel executed software.  Why give complete
 control to something that  really  doesnt need it. Even more interesting,
 why not  fix  a problem that everyone  knew would continue to  affect the
 future.

      I could rant for 300 kb about the history of viruses...  but i wont.
 That would be way too much effort and a huge waste of  time.  If you want
 your history, go get it.  The  information  is freely  available via  the
 internet. Read up. Be aware of where your coming from.


  [The Present Virus Trend]


      Times are strange.  The microsoft os based virus writing movement is
 in a major change  for the first time  since the start of the game.  Over
 the past five years  we have seen a change in the trend  of 16 bit and 32
 bit  virus  production.  People who  are  new to the  scene  are  usually
 releasing win32 pe infectors  instead of dos com appenders as their first
 virus.  What was once saved as a  "later learning"  item  has  now become
 standard  in  the field.  Microsoft has been  working dos out, and  virus
 writers have been working win32 in.

      This 32 bit platform has opened up a whole new world of opportunity.
 Not only  did  it increase  the amount  of executable  formats  one could
 infect,  it also released more power.  Thirty  two bit  applications have
 allowed   more   effective  ways   of  encryption,  trapping   of   other
 applications,  effective tcp/ip packet building, so on and so forth.  The
 os is much more robust.  As an  expected result, except by microsoft, the
 virus technology is much more advanced.

      Just look at a wildlist ( www.wildlist.org ) from february  1997 and
 then take a glance  at the  august  2001  edition.  The first  thing  you
 should notice is the frequency of os specific code. In february 1997, two
 years  after the release of windows 95,  about 95 percent  of the viruses
 "reported" to be in the wild are dos based viruses. Of the 239 viruses on
 the  list, 28 are microsoft office based, and a  few others  are win16 ne
 infectors.  Notice  that  Dir_II.A  is  still on this list.  A virus that
 cannot spread on machines running anything above msdos  4.*. Now  go back
 to august 2001. Of the 208 viruses "reported" to be in the wild, about 15
 are dos based viruses.  That is a drastic change in a matter of  5  years
 when its compared to the change between 1995 and 1997. Not to mention the
 sharp  rise  in  the  amount of viruses that are software  dependent.  As
 stated before,  the count jumps from 28 in the wild in 1997, to about 155
 in 2001. So the technology has been around for a few years. It just takes
 a little while for it to be widely implemented.

      The  present  virus trend is  really  based around  what other virus
 writers are doing.  Just like a bad fashion.  A new  idea is implemented.
 If it gets enough attention, either by the media or other programmers, it
 will be used again. This is not really a bad thing,  but it does not give
 rise to originality.  The main problem  with this in the virus  world  is
 that most  programmers dont write code that even puts  a spin on  the old
 idea. Its just written in different style code and released again.
 

  [The Present OS Trend]


      Microsoft Windows based operating systems.  When i say windows based
 i mean everything from 95 to nt to win2k. Think generic for a while.

      Enterprise computing is the strong point of the current market. This
 has lead to need, of course, for enterprise software.  The business world
 has been backed by mainframe computing and different flavors of unix like
 operating  systems.  The windows  nt family  has been pushing  iis for  a
 while, but microsoft has  always been lacking  enterprise software.  Over
 the past few years there has been a strong  development of other services
 targeted to business,  not desktop,  computing on the windows platform. I
 feel the future is bleak  for variety in the business world.  Windows has
 had  a  stronghold on  the desktop  market for a  while  now.  Trading in
 stability  and  functionally  for ease of  use turned  out to be a  great
 marketing scheme.  I hope  that windows  doesnt take  hold of  the server
 market as well. That is not the direction i want to go in with this paper
 though so i just leave that topic alone.

      Linux  on  the desktop  has gained momentum.  Every day  we see some
 useful advance. There is also finally major backers of linux. Look around
 the subway flats in new york city.  IBM has ads  plastered everywhere  of
 their "peace, love, and linux"  campaign.  Not to mention its price.  Big
 business is starting  to look at linux for a free solution for their once
 expensive to replace servers.  We are also seeing FreeBSD and other major
 players in the unix and server  os world to slowly become more geared for
 desktop use.  There  have also been  twists on that  rule  like macintosh
 using a bsd like kernel as the base for their latest os release. I wish i
 could say  i knew  where all this was headed for better or for worse.  We
 will have to wait and see what the next move is.

      The buzz word has changed from "internet" to "multimedia" in the new
 millennium.  From web content,  to video on demand,  to old  technologies
 being  widely  implemented  such as  voice  over ip. Eye  and  ear candy.
 Everything  is  gui  and everything makes a stupid  bling noise  when you
 click on it.  Mention "real time" and its  all over.  I think its a shame
 that  its  so difficult  to get  people to develop  for operating systems
 other than windows. Think about what could have happened with BEos with a
 better  marketing campaign  and  contracted  software  development. Think
 about what could happen if it was shipped with any major pc manufactures.
 Everyone blames microsoft, including me, because its easy.  Im not saying
 they played well, or even fair, with others. I am saying its a world wide
 problem.  Its up  to software developers.  Its up  to home  and  business
 users. Its up to the people who are shipping their latest pc deal without
 any option of os. Rome could only last for so long...

      All in all,  its a safe bet to say  that windows will continue to be
 the industry standard for desktop computing over the next several  years.
 The current change only seems  to  be  what people are  doing  with their
 "desktop" computers.  With the availability of broad band growing, people
 are using their home computers to offer network services to the internet.
 Mainly  in the form  of web servers,  but many  home computers  are  also
 offering things like smtp,  nfs,  and other  hard disk and  file  sharing
 services. This has changed the way the internet functions. It has changed
 the way networking functions. It has changed the way viruses function.


  [Current Virus Technology]


      Now we have seen what has changed in  the virus and operating system
 world.  We have also reviewed the  software  thats currently being ran on
 these  systems.  Lets now look at the virus techniques that are currently
 being implemented. I will try and keep this generic and not sway too much
 into what  technologies  have  been  implemented  in what file  format or
 software package.  This will be brief and  will only  cover a few  of the
 basics.

      Encryption and polymorphism.  Household terms in  the virus  writing
 world.  No  virus seems to be complete without.  The MtE changed the  way
 anti virus  software  had to perform.  From  simple  scan  strings to the
 world of heuristic  and  emulation.  Protection from prying eyes.  I feel
 the use of strong cryptography is the future.  People like spanska took a
 step  when IDEA  was  implemented in  viral  code.  However, this has not
 become  standard practice.  The only real  problem  is  where to hide the
 key.  It doesnt matter  if its RSA or an 8 bit xor loop.  Both algorithms
 have become equal when there is a pointer directly to the key.  There are
 several  ways to  obscure  this, but  all  in all, its  a trivial task to
 decrypt  viruses  for that reason.  This is why other self modifying code
 techniques are so important.

      Polymorphism is a perfect example. Lets  say your  engine  writes  a
 different  style and size decrypter  for several different  algorithms it
 can choose from.  Lets also say that it retrieves its keys from different
 places  on disk.  That alone creates a  whole new world of  problems  for
 those that want to decrypt your code. Again, this will only delay someone
 who understands anything about current microsoft based operating systems.
 There is  still  nothing  keeping  someone from taking  a snapshot of the
 decrypted  virus  code  from  memory.  Another  massive weak point.  Even
 if the virus only decrypts instructions  a step before they are executed,
 they can still be copied. Not to say this isnt a good idea. Its been done
 in the  past  and  been proved  very effective.  A great way to  make  it
 difficult to examine a program, even after its discovery.

      Anti debugging,  anti heuristics,  anti emulation,  fooling with the
 stack,  attacking   common  disassemblers,   and  other  such  protection
 techniques will also only delay the process of effective detection. These
 are all  viable techniques,  but dont seem to be  implemented as  much as
 they  should. Its basic  protection.  I feel that stability and effective
 protection are the keys to a long life in the wild. Propagating is almost
 a secondary issue. 

      I have failed  to mention stealth methods for a good reason.  Almost
 all of the  well know  stealth technology  was for the  ms dos  operating
 system.  These  techniques no  long  work under windows.  The new  device
 drivers and  api system has taken priority away.  Im not saying there are
 not  ways  to stealth  things  under window  anymore,  just  that its not
 practical. Its the  same as master boot record and boot sector infection.
 The medium  these viruses used to spread is no longer  in widespread use.
 Think when the last time you gave a file to someone via floppy disk. Even
 better  is to think about the  last  time you tried to boot  off of a dos
 based  floppy,  or left one  in  your  machine.  I feel that boot  sector
 infection has almost  become another way of sustaining the existence of a
 discovered infection.

      Networking  enabled viruses have become a standard issue item.  What
 once  has  been saved for strictly  worm code has now been implemented as
 a basic component in viruses. Im sure i speak for all of us when i say if
 i see one more virus exploiting outlook  in the media im  going to vomit.
 This is a logical step though.  Nobody can deny that.  The growth of home
 networking  proves the point.  Long gone are  the days when people needed
 to pass files through physical means. Why wait when you dont have to. Why
 send text through the post office. It takes weeks for a response. Sending
 text and  other forms  of media  via electronic  methods can be done over
 tcp/ip in  a matter of seconds.  Not to  mention that  its much more cost
 efficient.

      Back to the subject,  its not just ms outlook thats being exploited.
 IRC clients have  also been  popular to  exploit.  Mirc and pirch are the
 main targets. There are many viruses that are aware of network drives and
 other  remote  devices.  Another  common attack  has been  to infect  web
 content.  Java class  files,  html,  and  other web  elements  have  been
 infected.  The  latest media blast was centered around the code red worm.
 This  piece of code used a  buffer overflow  in microsofts iis to  infect
 servers.  The threat of  network enabled viruses grows  every year and is
 only going to become a bigger problem. One of the more interesting things
 ive seen happen is the advent of what has been dubbed "espionage enabled"
 viruses.  I first saw this from a macro virus from opic that stole secret
 pgp keyrings and uploaded them to a web server. Similar practice has been
 used to steal unix passwd files, windows pwl files, and other such wanted
 material.

      The current virus glut is compiled of hybrids of the past. Using old
 techniques with cutting edge ideas.  There are a handful of thinkers that
 are on the forefront of the game. New infection routines bundled with new
 ways of obscurity.  However, most viruses are just recycled material from
 years ago.


  [The Future OS]


      The  future of  operating  systems has always been built around user
 demands. Most  commercial  developers are not interested in  the good  of
 mankind or  computing.  Programming  is a  paycheck.  It does not  really
 matter how well  the product is coded.  Its just a matter of meeting user
 needs.  To sell. To  keep  the boss  happy,  the  stocks  high,  and  the
 people buying. Once a user base is established the goals are limited. All
 that  is  needed  is to  keep  them  interested  in  buying  upgrades and
 marketing  to new users. Its a lot easier said than done,  but that's all
 that  really matters.  Getting new clients and keep the ones you  already
 have. It does not matter if you create  a  whole new set of problems when
 consumers feel like they  dont have another option.  This is not only  an
 issue with operating systems, but the software that runs on them as well.
 If  the  same commonly  used multimedia, word  processing,  and  database
 systems  were  offered  on non  windows systems, things  would change.  I
 dont  think  it would be  an  immediate change. Over time though,  people
 would  understand  that learning  operating  systems based  on the  linux
 kernel  is  just as  easy as  learning  to use  windows  based  operating
 systems. Its hard for people to let go of something  they are comfortable
 with  to use a  product  they  know  little  about  and  cannot  get  the
 software packages they know.

      I feel  that most  operating systems  are going to  lean  closer  to
 integrating the common forms  of digital  media. This  ranges from  basic
 audio and video,  to things like voice recognition software.  Windows has
 been working on  this for years.  Apple has continued to use this as  the
 majority of their marketing scheme. The integration of various multimedia
 packages in linux distributions plays huge factor. I feel that  linux  is
 going  to  be  a  major  player  in the  change  of  the  market. As more
 development is done to meet basic user needs,  the draw to the  operating
 system will grow. Cost alone is enough to hold me as a believer.  Success
 will be  determined by meeting the  home users needs.  As long as  strong
 kernel development is taking place,  larger range of hardware support  is
 added,  and developers continue to write  applications for the  platform,
 things can only grow. Once there is a large enough base of free equals to
 popular  products,  the market  will open up.  Nobody enjoys  paying  for
 something they can have for free.

      The  open source movement  will  grow to become the largest resource
 of software.  There will always  be people  around who are interested  in
 programming for  a hobby.  Most  of  those  people  in  the  open  source
 community have no desire  to make money off their work.  Development  can
 happen at a much faster rate when the code is made public,  and there are
 thousands of people world wide looking at your problems.  Others can pick
 up on  something  you have  overlooked.  Its not  even a matter of  being
 outsmarted.  Its just the result of  having a different perspective. Look
 at  all the hands that dig into the freebsd project. From my  experience,
 this is  the most  stable and best optimized  kernel  in the open  source
 software community.  This feat was  not achieved by holding tight to ones
 ideas. If such effort went into software to run on these free platforms..

      Windows must start over and change the way software is executed. Its
 obvious  that the file permissions are not working  out.  Microsoft  felt
 that  viruses  would not  survive in  the  win32  environment. This is  a
 problem that is  not  going away by  simple obscurities.  It will  take a
 total rework of  the system base to change anything.  Even if this  means
 they have to release an operating system that is not backwards compatible
 with  their existing products.  They do not seem to have a problem  doing
 this with software  packages.  The system could be released  parallel  to
 whatever technology is currently on the market. Push it as "the future of
 computing" or  some other gravely bold statement. Give  users the option.
 People  might not  grab it at first.  It  will  take  years  of  software
 development to really push the platform. Its not an impossible task.  You
 can move mountains.

      Eventually  there  is going to be more effort in kernel  protection.
 The linux  kernel patch  from the openwall project is a  perfect example.
 This  implements  such features as a non executable user stack, and  will
 not allow  shared memory segments that are not in use by  a process. This
 solves two major problems in the linux world. Both  would require a total
 reconstruction to implement on the windows platform. I think its sad that
 microsoft  left the brain of their  os bare.  There is no end to what you
 can do to kernel32.dll  after the system  boots. Yet again,  it would not
 be such  a large issue if  the  platform  restricted  what  the  software
 running under it could do.

      Local  and  network security will finally be looked on as a critical
 function  in  a systems performance.  This  is a field  that  was  hardly
 touched by  microsoft until  the  nt series  was  released. At least then
 basic user rights could begin to be enforced. Something the mainframe and
 unix systems have been doing for decades.  People are now using computers
 for one  other  major reason  besides  multimedia.  Communication. In any
 situation where people are connected, there are going to be problems.  Be
 it physical, or through distributed environments.  Most major systems are
 built to be connected to the internet. Everything can talk to everything.
 I feel this is great, but without proper security,  its just going to add
 to the  problem.  Any system  that is build with these two things in mind
 will do well.

      Processor architecture is  soon  to change.  Once the ia64 chips are
 really pushed,  they will take over the home computing market. The 64 bit
 memory  addressing will open up  new doors for speed and calculations per
 clock cycle.  The actual chip speed in megahertz  will mean less than  it
 does now.  This  also gives major software  developers a  chance to start
 over. New processor, new platform, and new software. Build again from the
 ground up. What if man had continued on trying to perfect the horse drawn
 buggy instead of  working on developing the internal combustion engine. I
 truly  hope  microsoft sees how important  and how big of a  chance  this
 really is.  When your software powers 90 percent of the worlds computers,
 its only ethical to start looking  out for the best interest of the user.
 Something that they have ignored for well over a decade.


  [The Future Virus]


      This is the  real  motivation for this paper.  The part i find to be
 most interesting.  Using the base i have just set,  i will go into detail
 of where i feel things should go.  Some of it can and will be implemented
 in the not so far future. The rest we will just have to wait and see. All
 in all, i have two main goals for this chapter.  First, i hope to open up
 writers to new programming techniques.  Second,  i hope to set in peoples
 minds that this  is a problem thats only  going to get bigger.  Until the
 populace takes action and rights years worth of wrong, these problems are
 not  going away.  To those who  think they  are in control,  hold on. Its
 going to be a wild ride. 

      Lets start with  what is  hot in  the media  right now.  Viruses and
 worms being used to exploit network services. This is a trend that i feel
 will  continue  for  years  to come. Im actually  surprised this  has not
 already been  a wide spread practice.  It just  makes sense.  Millions of
 people  connected together.  Its too easy.  The internet has  given virus
 writers one large petri dish.  The internet has replaced  physical media.
 The  original exchange  that gave  rise  to  widespread  viral infection.
 This comes back to darwin,  evolution,  and survival.  Nature will find a
 way.  Its proved itself over and over,  and now its  going to flex in the
 meta world. This can lead us down many different paths.

      The world is run on information exchange. The  biggest  activity  of
 the  united  states  secret  service  is intelligence gathering.  Viruses
 and worms that collect information.  Why isnt (or is it?) this being used
 by governments?  Im  sure  getting  a  file  into  a remote computer is a
 million times  easier  than recruiting a mole.  Not to mention the safety
 factor.  It would keep an agent out of risk,  and lets face it.  Computer
 crimes  are hard to track.  People make mistakes, people  make computers,
 computers  make  mistakes.  Using  various forms  of disinformation,  its
 trivial  to  point the finger to  someone else.  One can easily  create a
 front  and use it to exploit  any given target.  We all know  the  united
 states government is pretty lax when it comes to  network security.  Most
 other nations are  equally as poor.  Its only logical that  this  sort of
 attack will take place. Welcome to the age of the digital spy.

      The  espionage enabled virus.  Covert data theft.  We now live  in a
 world where  the computer virus can easily implement other  functions. In
 the past its been pretty bland.  We have seen  various forms of  graphics
 and sound,  simple messages,  and destructive activity  as the  norms  of
 virus payloads. I hope this is a trend of the past.  Networking now opens
 the door  to so much  more material.  Viruses that target the credit card
 databases of any given  windows based online  shopping  package.  All the
 little dot coms being  ran  from  home  iis servers  off cable modems are
 perfect  targets for such activity.  Next you must consider all the other
 software  packages that can be  exploited in such a fashion.  Data of all
 flavors can  be harvested. Dont forget the other  things  many home users
 have on  their machines.  I like the idea  of viruses that steal  dial up
 access information.  If you can get the login, password, and at least who
 the provider is, your fine.  Finding dns servers, phone numbers, and such
 is usually  public information.  Alot of smaller dial up  providers still
 offer  unix  shells  with the package which is an added bonus. 

      This practice isnt limited to public affairs.  What about viral code
 in the workplace? One can write code that will  only infect machines on a
 local  network.  This  way  you  could  perform  tasks  in  a  controlled
 environment.  Collect the  wanted  information and send  it  to  a remote
 source. One could avoid detection by such means as setting a date to scan
 available drives and remove your viral code. This wont help much with the
 backups, but most businesses back up once a week or so.  A week is a very
 large window to get what you need and clean up your tracks.

      The foundation of civilization is communication. Our day to day life
 can be throw upside down by even minor data flow disruptions. Think about
 how  much you are bothered when your cell phone drops a  call or your isp
 goes  down for routine maintenance.  These are not very critical examples
 but they are situations most of us have encountered.  Lets say you have a
 wide spread virus. Most of the machines infected will be home users. Most
 of those users access the internet. Most of those users will never have a
 clue if their pc  is attacking  various networks via  denial  of  service
 attacks. This technique has been used in the past on targets ranging from
 child pornography sites to the white house.  Programmers can now use code
 as a form of protest. Im sure that it will only get negative results like
 more  media hype for kiddies and crackers,  and  maybe jail time  for the
 programmer.  We all have  seen the  harm  done  by  webpage  defacing for
 "political" reasons.  I can never see denial of service attacks resulting
 in anything  positive.  I must say that this is a  problem  that  will be
 implemented more. There is no way around it. Im not so fond of this topic
 so im going to say, nuff said.

      I  would like now to touch on the  idea of plug-ins for  viruses. We
 can thank vecna for this (any many other) technique.  Start with a simple
 virus shell. Basic code for effective spreading, evasion, and networking.
 No big deal. Implement module support. Now stop laughing and shaking your
 head.  Imagine how things would have been  if CIH had some sort of module
 support.  The virus checking various servers for updates  to  perform all
 sorts of tasks.  Each client could not only receive updates for payloads,
 but for performance, bug fixes, alternate contact information, and so on.
 This would be very interesting if the project was open source and invited
 others to write their own modules.  Why not document what your engine can
 do,  and  release  simple examples to  get programmers  attention.  Set a
 standard protocol for virus modules. It could get quite messy.

      Every year  a  programmer infects  a file format that has  been long
 overlooked.  Various microsoft office documents,  data  files, and  other
 such media is exploited.  I cant help but wonder how far this can go.  An
 idea i  have always wanted to  implement is to infect  several files with
 different parts  of a virus.  Infect an executable file with just code to
 copy the virus body from a different file to memory and execute it. Store
 the virus body in a media file that is never scanned by default with most
 anti  virus products. The standard JPEG file format is usually overlooked
 because  its not  an executable  file. Its  a perfect target to hold such
 code.  You  can  leave the  JPEG  header  alone  and  tack  megs worth of
 information  to the end.  I have never seen this practice affect  the way
 any program views the picture.  Its much easier to tweak PE files to scan
 as clean when they do not contain actual viral code.

      There  has also been greater virus activity on various unix and free
 "unix like" platforms.  Much more on the latter.  There have been several
 papers published on infecting the elf format. Better documentation of the
 linux interrupt  system  has also been made available. This i  find  very
 interesting.  Not just because its new,  but because its taken  this long
 for  people to catch on that linux is not perfect either. Although it can
 still  be exploited,  the difference is the  default environment does not
 allow it. Simple things like limiting what an executable file can do, and
 restricting  what can take place in memory,  have curbed  this so it will
 never become a major problem.  It will most likely  always continue to be
 an issue, but i cannot see unix viruses propagating in the wild.

      On another note,  i see a problem with network enabled hardware. Its
 bad enough that people leave devices like printers and routers with their
 default  settings  or no password at all.  This has not been a problem as
 far as viruses go, but times are changing.  Video game consoles are being
 shipped  with hard  drives  and  pentium processors.  With the advent  of
 networked  games on these devices,  its just a matter  of time before its
 exploited. The xbox is based on x86, has a hard disk, ram, and a built in
 network support. After kritz being spread on a dreamcast cd,  i cant help
 but wonder when the console itself is going to be the host. 

      I think that the future virus will be molded around networks.  Virus
 code  will use more of the resources that have been available for  years.
 Programmers will  continue to exploit things that have been ignored.  The
 future virus  will be shaped by user ignorance. It will take advantage of
 a generation of point and clickers. Evolution. Growth. Survival.


 [Conclusion]


      A piece of art to show flaw. An exploit on the problems of its host.
 The industry  complains about  viruses  with  the argument  that "If kids
 wouldn't  code  them,  then it wouldn't be a problem". This is  only half
 true. The problem would still exist. Why?  Because its interesting. There
 will always  be people who  want to look into the matter,  to  figure out
 just how it works,  and  to implement the  idea themselves.  Once such an
 exploit is known, its not going away on it's own.  When such problems are
 found in the security industry, something is done about it.  People don't
 just say  "hey, we found a  root exploit  in (fill-in-the-blank),  but we
 will  just ignore  it and hope nobody uses it.  So why has microsoft  and
 other operating systems allowed such problems to continue?

      I  feel that virus programmers will always  look for new problems to
 exploit.  New places to hide.  New ways of giving operation systems  that
 have  chosen  to ignore  security the  finger.  The technology  that  has
 evolved  with viruses  is advancing  at an alarming rate. Until something
 drastic is done, this will be a issue that will continue to grow.

      Such  practice of  data collection,  disruption,  and disinformation
 can be used in so many different ways and motivations.  The possibilities
 are frightening.

      Things have changed.  The desktop operating system has changed.  The
 networks have changed. Business has changed. Right now things could go in
 any direction. The future is not yet written.  It is up to us to say what
 happens next... To write the next chapter.


 The power is in our hands.



  [Contact]


 Feel free to contact me.

 email nucleii@tfz.net
 irc   *.undernet.org
 http://www.coderz.net/nucleii

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP 6.5.8
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=xTBK
-----END PGP PUBLIC KEY BLOCK-----