---------------------------------------------------------------------- [1.2] Viruses- What, Where, Why, How If you are a beginner in this field, you may be curious to what a virus/trojan is. Perhaps you heard about it through some BBS, or known someone who had their system crashed by one. Well, this is for you. In the Trojan War, way back when, there existed the Trojan Horse, right? Well, nowadays, there is a modern version of the Trojan Horse existing is software. The modern, computer, Trojan horse is really simple, a psychedelic hacker implants destructive code into a normal (or fake) file. This modified/fake file, when executed will destroy or remove something from the host computer, usually format the hard drive, delete all files, or something similar. In order to distribute the corrupt phile, the hacker goes and does one or more of various things; depending on how deranged this individual is (hehe). These things are covered in the following section. A virus, in normal terms is an organism which spreads malign from one host to another, transmitting itself through biological lines so that both the previous host and the future host become infected with the virus. Today, there are computer viruses, and just like biological viruses, they spread from file to file, host to host, infecting everything it "sees." These computer viruses can either destroy the code it infects immediately, or over a period of time, corrupt or damage the host system it thrives upon. For example, a virus hidden in a file on a BBS could be downloaded to a host system. Then, the user who downloaded it executes the file, which executes normally (as seen by the operator), but at the same time, the virus attacks other files, and infects them, so that each file owned by the user becomes infected with the virus. Then, at a given time or when something is fulfilled by the host system, the virus becomes a trojan and destroys, encrypts, or damages everything available, infected or un-infected. In general, a virus is a timed trojan that duplicates itself to other files, which, in effect sustains the virus's life- span in the computer world, as more host systems are infiltrated by the disease. Now that I've given you a description of the computer virus and trojan, we can go onto more complex things... well, not really... Ok, now, let's trace the life of a virus. A virus/trojan is born in the mind of some hacker/programmer that decides to develop something out of the ordinary, not all viruses/trojans are destructive, often, some are amusing! Anyway, the hacker programs the code in his/her favorite language; viruses can be developed with virtually any language, BASIC, Pascal, C, Assembly, Machine Code, Batch files, and many more. Then, when the disease is complete and tested, the hacker intentionally infects or implants the code into a host file, a file that would be executed by another un-suspecting user, somewhere out there. Then, the hacker does one or more of many things to distribute his baby. The hacker can upload the infected file to a local BBS (or many local/LD BBS's), give the infected file to a computer enemy, upload the infected file to his/her workplace (if desired...hehe), or execute the phile on spot, on the host system. Then, the virus, gets downloaded or executed, it infiltrates the host system, and either infects other files, or trashes the system instantly. Eventually, the infected system's user gets smart and either trashes his system manually and starts fresh, or some mega- technical user attempts to recover and remove the virus from all of the infected files (a horrendous job). Then, the virus dies, or other host systems that were previously infected continue, and accidentally upload or hand out infected files, spreading the disease. Isn't that neat? Now, to answer your questions; I already explained what a virus/trojan is and how they are developed/destroyed. Now, where do these suckers come from? Why, some hacker's computer room, of course! All viruses and trojans begin at some computer where some maniacal hacker programs the code and implants it somewhere. Then, you ask, why do they do this? Why hack? Why phreak? Why make stupid pyro piles of shit? Think about it... This is an ART! Just like the rest. While Hacking delivers theft of services, Phreaking delivers theft of services, Cracking/Pirating delivers theft of software and copyright law breaks, Pyro delivers unlawful arson/explosives, Viruses and Trojans vandalize (yes, legally it is vandalism and destruction of property) computer systems and files. Also, these are great to get back at arch-computer enemies (for you computer nerds out there), and just wreak havoc among your computer community. Yeah, PHUN at it's best... ----------------------------------------------------------------------  Downloaded From P-80 International Information Systems 304-744-2253