Chapter 44 ushered in a new era of hacking

(Ask for collections, ask for recommended votes, ask for clicks, please support you with a light smile, and sincerely thank you!) )

At present, the number of computers in China is quite scarce, and the vast majority of them are comparable to the configuration of this Apple computer. Pen % fun % Pavilion www.biquge.info

This Apple computer uses an Intel 286 chip, and it doesn't even have a mouse, so it can only be operated through DOS instructions.

None of this is the point, the point is that it only has 2M of RAM, and even if it is expanded, it can only reach a maximum of 4MB of RAM.

How many files can be stored in 4M RAM? Liu Fang feels that he can make a fuss in this regard.

After determining the general framework, Liu Fang began to build the main body of the virus, and his movements were very fast, and in less than an hour, this virus program was written by him.

Liu Fang rubbed his fingers that were a little numb, and said with an expectant expression: "It's finally done, let's check if there is any problem with this procedure first, and then proceed - well, I don't seem to be able to test it yet......"

How do you test for a computer virus? First of all, you need to have the conditions for testing, for example, you need to have a target to drop the virus. Liu Fang does not have the relevant conditions at present, and the computers he is using now are not his own, so how can he test them? What if the computer is broken during the test?

"Forget it, let's put the test first, let's do what we can do first."

After Liu Fang finished speaking, he began to conduct a detailed examination, and as the examination progressed, Liu Fang gradually discovered the shortcomings of this virus:

"The architecture of this virus program is a bit special, as long as you are a computer master, you can distinguish it from the system program at a glance, well, I have to find a way to improve its concealment."

"It's a bit bulky, so it takes more time to spread, and I have to condense it."

"It's a bit backward in the way it infects, and this needs to be strengthened."

After Liu Fang summarized the problem, he began to work on the modification of the virus, and it took another hour for Liu Fang to finish, he looked at the virus program with a capacity of less than 15K, and a satisfied smile appeared on his face.

After Liu Fang's modification, this virus has the following characteristics:

Its capacity is very small, less than 15K, which greatly enhances its propagation speed, and almost in the blink of an eye, it can travel from one computer to another;

Its concealment is extremely strong, and the arrangement of the code is very similar to the system program, even the most professional programmer, it is difficult to find its existence without careful inspection;

It is extremely infectious, and it can automatically disguise itself as an access application, sneak into the user's core folder, and infect the core program of the system without the need for the user of the computer to actively trigger it;

It is extremely difficult to be completely eliminated, as long as the computer user executes the removal command on it, it will trigger it, causing it to carry out a crazy sabotage operation, because some of its trigger instructions are associated with the computer's "clean" instructions, so it will have this passive triggering;

It destroys in a very special way, and it does it through foolish math, for example, when it is triggered, it automatically calculates a math problem -- how much is a billion of them? If you change this problem to a multiplication problem and enter it into any computer, you will get the result in an instant.

But Liu Fang obviously wouldn't set it up like this, he set this problem as a billion and gradually add it up, and through foolish calculations, the final result was obtained.

In this way, the computer needs to repeat the 1+1 operation, which will not only occupy a large amount of the processing efficiency of the computer chip, but also produce a large amount of operation code, because the computing speed of the computer is very fast, so this problem can produce a large number of operation code in a very short time, so as to occupy the computer's memory space, once the computer's memory is occupied, its storage hard disk will be overflowing with data, so that the computer will crash.

What's even more damaging is that Liu Fang also set a file replacement password in the virus, as long as it is the code generated by the computer in the process of calculation, it will automatically replace the files originally stored in the computer, so that the computer user will lose all the files saved in the computer.

Do you think that's all this is all there is to this virus? Then you are very wrong, when Liu Fang first conceived this virus, he set such a goal: this virus should have the ability to damage computer hardware, just like AIDS can destroy the most basic immunity of the human body.

How can this be achieved? Liu Fang thought of a very special solution, he set such an execution password: as long as the infected computer hard disk overflows, the virus will perform the last step - infiltrate the BIOS and subversively destroy it!

BIOS is an abbreviation for "Basic Input Output System".

In fact, it is a program installed in a chip on the computer motherboard, which is mainly responsible for saving the most important and most basic input and output programs of the computer, with system setting information, self-retrieval after booting, system automatic start, etc., providing the most basic and direct hardware settings and control for the computer.

Once there is a problem with the BIOS, it means that the computer will have a hardware failure, and the software problem is very easy to solve, and it is okay to reinstall a new set of software, but the hardware is not, at this time you can only replace this chip to fix your computer.

Liu Fang didn't know that the virus he developed had ushered in a new era of hackers, destroying the hardware of the computer through the virus, which would definitely make everyone fall out of sight!

-- I don't want people to live! No matter how much other hackers make a fuss, at most they will destroy the system program, and we will be able to reinstall the system, but what about you, but even the computer hardware has been damaged, isn't this too terrifying, too terrifying, too exaggerated, too excessive?!

This virus program is actually divided into two parts, the first part is a fool's operation instructions, and the second part is an instruction to invade and destroy the BIOS, and the two are added together to form the main framework of this virus.

Liu Fang was basically satisfied with his masterpiece, he kneaded his sour fingers, and said triumphantly: "This virus should be able to be used, compared with the characteristics of the virus I have heard of, it seems to be a little more advanced, but it can't be tested, this is a pity, forget it, I don't want to harm others, it doesn't matter if I test it or not, let's give it a name, what is it called?" ”

Liu Fang thought for a while, and finally had an idea, he smiled: "Just call you a fool virus, I hope you don't disappoint me, if you encounter hackers in the future, you must not drop the chain." ”