
 Area: Nchat 
  Msg#: 104                                          Date:   
  From: -anonymous-                                  Read: Yes    Replied: No 
    To: All                                          Mark:                     
  Subj: Contest

 -=> -anonymous- was Babbling to All <=-Contest
 -a> 
 -a> _______________________________________________________________________
 -a> _______ *****       Phalcon/Skism Internet Headquarters     
 -a> ***** ***           Phalcon/Skism Canadian Divison        
 -a> *** *                                                    *
 -a> ***** *****        -= Virus Writting Contest =-      *****
 -a> ***** ***   ***                                            ***
 -a> *** *     *       September 1993 -> December 1st         * 
 -a> *
 -a> -!---------------------------------------------------------------------
 -a> ------- Due to the new formation of the Canadian division of
 -a> Phalcon/Skism, there will be a virus writing contest for the purpose of
 -a> recruitment. It will commence with the publication of this notice. The
 -a> contest is mainly oriented around Canadian writers, but EVERYONE is
 -a> welcome to participate. This new division needs fresh new blood in its
 -a> ranks. Already, a number of excellent writers have joined us. Expect
 -a> new viruses very soon, for it is only a matter of time. The awards for
 -a> this contest will be one of the following, or both: 
 -a> 1- Publications of the virus and it's author in 40HEX magazine
 -a> 2- If the person wishes to, a membership into Phalcon/Skism

 -a> All submissions must be transmitted to this internet site at
 -a> "virus-contest@skism.login.qc.ca" with compiled executable code AND
 -a> commented sources. NO Dissassemblies will be acceptable. If you wish to
 -a> send your file encrypted, a public key from PGP 2.3 is included at the
 -a> end of this file. Please send files uuencoded. After evaluation by two
 -a> different writers the winner will be published in every sub this
 -a> message was posted on along with notification in the 40HEX magazine..

 -a> These criterion by which these viruses will be judged, are as follows:
 -a> HANDLE        :
 -a> VIRUS NAME    :
 -a> FILES AFFECTED:   [ ]COM   [ ]EXE   [ ]SYS   [ ]OVR   [ ]DOC   [
 -a> ]OTHER Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> Description: I.   TYPE OF VIRUS
 -a> [ ]...Overwriting   [ ]...Appending   [ ]...Boot Sector
 -a> II.  INFECTION METHOD
 -a> [ ]...Direct Action
 -a> [ ]...Memory Resident
 -a> [ ]...Uses stealth routines
 -a> Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> [ ]...Uses tunneling routines Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> List interrupts that you hooked and how you achieved
 -a> this. Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> III. ENCRYPTION [ ]...Virus is not encrypted
 -a> [ ]...Virus is encrypted
 -a> [ ]...Uses external engine
 -a> [ ]...Routines are internal
 -a> Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> [ ]...Virus is polymorphic Possibilities of
 -a> reoccurrence: 1 to nTH _______________________ Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> IV.  PAYLOAD [ ]...Virus is non-destructive
 -a> [ ]...Virus is destructive
 -a> Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> V.   ANTI-VIRUS COUNTERACTIONS [ ]...Recursive looping
 -a> [ ]...Removes AV from memory
 -a> [ ]...Disinfection on the fly
 -a> [ ]...Eats AV data files
 -a> Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> VI. [ ]...Displays message
 -a> [ ]...Displays graphics
 -a> [ ]...Emits tones, music, or noise
 -a> Brief
 -a> Description:____________________________________________________
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> 
 -a> ______________________________________________________________________
 -a> To send files encrypted with PGP 2.3 use this public key. Please do
 -a> not forget to uu-encode it prior to sending it over the internet:
 -a> -!---BEGIN PGP PUBLIC KEY BLOCK-----
 -a> Version: 2.3

 -a> mQCNAix61ikAAAEEALnuRPd0h83IFHwxcMAngZe4boPIaNoXReAV0bafFPJpUQ5Q
 -a> I2xVj8uVUQN2lJBnR5zm6D02Zah8hf+2P6/aacgKWQuGeXHMQRO9mHjRX6zI1OqG
 -a> 2GY8DKSWmChjRkNMEE0iGAC3zkbAk0OGj1zAwlb+cvKhMoiENo1mPK2wr+2BAAUR
 -a> tAVpLW5ldA==
 -a> =K6Aq
 -a> -!---END PGP PUBLIC KEY BLOCK-----

 -a> -!- Renegade v07-17 Beta
 -a>  ! Origin: BLACK AXiS MX - 804.599.4152 - NUP: NEWLOZER (111:950/20)


