Monday, 15 May 2017

Virus Attack Shock Horror. Don't Say I Didn't Tell Y'all...

A typical server "rack", commonly se...
(Photo credit: Wikipedia)
About 16 years ago, prescient me sat down to write a book to take my mind off my recently ceased 60 a day habit.

This amused me a great deal for a number of months and involved bringing together a self-manifesting roasted chicken and various other objects, the angriest policeman in the UK, a leather catsuited CIA operative who gained considerable sexual satisfaction from killing, a hapless doctor from Richmond, a shadowy cabal of evil octogenarians a sex worker called Kylie and divers other players.

These were gathered together to form the 100,000 word lump of idiocy that was to become my first, very silly, novel Space. Widely rejected by people who knew what they were doing, it reposes on Amazon at £0.99 simply because a few years ago I opened the thing and took a look and it amused me greatly. Its first Amazon review reads 'this book is not funny'...

Anyway, don't tell me I didn't warn you this was going to happen:

Trickling through the Internet like sand through pebbles, the Hellfire virus replicated itself, building heuristic databases on its host servers, configuring itself to match each host operating environment, squeezing itself into every device it could find, hijacking middleware, pushing Java subroutines into client devices. It built lists of target machines from lookup tables on its host servers, patiently gathering information, segmenting targets and flinging out code through ports to match vulnerabilities in hardware and software alike. 

Its primary target lists, defined on the servers at The Space Agency, replicated in China, Dubai and Portugal, started it on the scavenge for secondary targets. The core lists were updated as scavenger routines passed back server information. As each primary list was completed, the servers triggered client targeting routines, passing code across to client devices. 

The virus reached the last of the first batch of core target lists and started to disperse code across to the last class of servers. The folder named Utilities opened automatically and a fresh batch of code started to stream across the world’s networks as the virus targeted the next class of URLs in its fast-growing lookup databases. The virus completed its host lookup tables, closed the core folder then deleted it. The core code streamed out of the server farm at The Space Agency, triggering a delete routine it had left behind and flowed out through a single private network connection that had been preserved for this moment. 

It replicated its core, then: snaked out to a number of defined primary servers around the world. From these, it started again, using the information gathered by its hunter applets to send out new child routines to the new servers it had identified over the past 24 hours. Each child carried the core virus routines but also had added what it had learned over the past day, new backdoors and open port locations, new platform configurations added to its databases. The replicated core routines each started life anew, stronger, smarter and bulked by the data they carried. Its performance started to slow as links became clogged with virus traffic, new routes harder to find each time a search routine triggered. Slowly, Internet traffic died down so that only the virus was sending and receiving information across huge swathes of network. 

As terminals came live, the virus scavenged and infected them, triggering the Hellfire display and sound routines. They waited, counting processor cycles. Every machine the Hellfire virus had infected became inoperable as it closed down any inputs except the ones that waited for the next command from the virus. Global bandwidth utilisation soon dropped to an absolute minimum. There was no traffic. 

The Internet was dying.

1 comment:

superiorpaper.org said...

I have found that the best way to avoid viruses today is to not go on shady website or download shady soft wares.. go to authentic sites that are reputable,,, and same for soft wares..always read reviews of software before trying them out.

From The Dungeons

Book Marketing And McNabb's Theory Of Multitouch

(Photo credit: Wikipedia ) I clearly want to tell the world about A Decent Bomber . This is perfectly natural, it's my latest...