473,396 Members | 1,713 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How viruses work:

I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system. Just by intentionally
writing a program that spills itself into the rest of memory. The
simplest kind will just start destroying a windows computer, but more
sophisticated programs will try to watch and understand what windows
is doing. As soon as windows starts shutting itself down, it will
write its loading program into the startup script, and once windows
starts up it will remove itself from the startup script, so you never
even see the program executing. And because the program is running
wild on the free store you never even notice it except for unsual
errors as it corrupts memory and slows down your machine. Eventually
it just hogs so much resources that it sends out bulk e-mail to
everyone online, and networks with all the other viruses behind your
back. It logs all your keystrokes and steals your passwords, putting
your identity into a hacker database. Almost every machine has the
virus, but no one can trace it down to the author who is probably
hiding in another country, especially because you get through a
network of spaghetti as all the viruses communicate with each other.
The unsecured free store in the computers memory is part of what C++
was built on, and windows was programmed up in the C++ programming
language. You can even write your own C++ operating systems and put
them on boot disks and cdroms. I think Bill Gates is really to blame
for all viruses because he doesn't have a way for windows to search
through its own memory and look for unusual activity. It doesn't even
know what it is doing itself.

Mar 30 '07 #1
21 1720
On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other program
in to memory on the free store, where it can run and play behind the
scenes of the operating system.
Wow, this day is full of brilliant ideas!

I think you've just invented the buffer overflow there, kiddo!
http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k
Mar 30 '07 #2
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other program
in to memory on the free store, where it can run and play behind the
scenes of the operating system.

Wow, this day is full of brilliant ideas!

I think you've just invented the buffer overflow there, kiddo!

http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k
The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends
computers with software they write themselves. The software just
contains in a string another program that is already compiled that
launches itself into memory. Then the origonal program finds a way to
execute that program in memory seperately, perhaps at boot time before
windows even loads. The computer hardware is configured to be multi-
tasking. So all the program needs is a way to execute itself outside
of windows memory, rewrite itself into the boot sector at shutdown,
and delete it self at startup. All the initial attack has to do is
write itself into the boot sector and freeze your computer forcing a
restart. The virus can then execute itself in memory outside of the
operating system, and spy on your every keystroke, even e-mailing you
activity back to an anonymous account with its own e-mail server. The
bootsector virus just loads up first and then terminates spilling
itself into the windows startup script, or even the imac startup. I
can tell imac's aren't secure, but if you were to build a machine that
could only boot its intended operating system and configure that code
into CMOS viruses wouldn't be a problem. You would also have to
permanently configure what applications could load up at boot time
inside of the operating system, because a virus can rewrite the
operating system to execute resident programs behind your back.

Mar 30 '07 #3
On Fri, 30 Mar 2007 15:06:46 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
>On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system.

Wow, this day is full of brilliant ideas!

I think you've just invented the buffer overflow there, kiddo!

http://en.wikipedia.org/wiki/Buffer_overflow

Congratulations!

--
k

The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends computers
with software they write themselves. The software just contains in a
string another program that is already compiled that launches itself
into memory. Then the origonal program finds a way to execute that
program in memory seperately, perhaps at boot time before windows even
loads.
Does Windows load on your computer? On mine, I find that hard to believe.

The computer hardware is configured to be multi- tasking.
How, exactly, did that happen? I've never heard of multi-tasking
hardware.

Does this mean that my hard drive can simultaneously act as a keyboard?

So
all the program needs is a way to execute itself outside of windows
memory,
That's easy! All my programs execute outside of Windows memory.
rewrite itself into the boot sector at shutdown, and delete it
self at startup. All the initial attack has to do is write itself into
the boot sector and freeze your computer forcing a restart. The virus
can then execute itself in memory outside of the operating system, and
spy on your every keystroke, even e-mailing you activity back to an
anonymous account with its own e-mail server. The bootsector virus just
loads up first and then terminates spilling itself into the windows
startup script, or even the imac startup. I can tell imac's aren't
secure, but if you were to build a machine that could only boot its
intended operating system and configure that code into CMOS viruses
wouldn't be a problem. You would also have to permanently configure
what applications could load up at boot time inside of the operating
system, because a virus can rewrite the operating system to execute
resident programs behind your back.
Oh, you're familiar with the TSx voting machines, then.

Maybe you're the one who rigged the election there in Ohio, then, eh?

--
k

a turn signal is a statement, not a request
Mar 30 '07 #4
On Mar 30, 6:28 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
On Fri, 30 Mar 2007 15:06:46 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system.
Wow, this day is full of brilliant ideas!
I think you've just invented the buffer overflow there, kiddo!
>http://en.wikipedia.org/wiki/Buffer_overflow
Congratulations!
--
k
The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends computers
with software they write themselves. The software just contains in a
string another program that is already compiled that launches itself
into memory. Then the origonal program finds a way to execute that
program in memory seperately, perhaps at boot time before windows even
loads.

Does Windows load on your computer? On mine, I find that hard to believe.
The computer hardware is configured to be multi- tasking.

How, exactly, did that happen? I've never heard of multi-tasking
hardware.

Does this mean that my hard drive can simultaneously act as a keyboard?
So
all the program needs is a way to execute itself outside of windows
memory,

That's easy! All my programs execute outside of Windows memory.
rewrite itself into the boot sector at shutdown, and delete it
self at startup. All the initial attack has to do is write itself into
the boot sector and freeze your computer forcing a restart. The virus
can then execute itself in memory outside of the operating system, and
spy on your every keystroke, even e-mailing you activity back to an
anonymous account with its own e-mail server. The bootsector virus just
loads up first and then terminates spilling itself into the windows
startup script, or even the imac startup. I can tell imac's aren't
secure, but if you were to build a machine that could only boot its
intended operating system and configure that code into CMOS viruses
wouldn't be a problem. You would also have to permanently configure
what applications could load up at boot time inside of the operating
system, because a virus can rewrite the operating system to execute
resident programs behind your back.

Oh, you're familiar with the TSx voting machines, then.

Maybe you're the one who rigged the election there in Ohio, then, eh?

--
k

a turn signal is a statement, not a request
I have a solution to the problem PR. We all use firewalls on low end
PC's that run through each of our machines connected to the internet.
I'm installing finnix on my PC that got shut down because of its
viruses. It is just a live CD iso image that I can boot right up
with, and then I can monitor my iMac traffic. Trouble is I can't be
sure if finnix is hacked either, unless I wrote my own firewall to
watch what it was doing too. I'm sure all the computers at my cable
company are hacked too, so I can't even trust what goes out on their
end, but it mostly gets lost in spaghetti I imagine. Rigging
elections is just the start of it, a secret group of hackers is going
to take over the world if we all don't unplug.

http://www.finnix.org/

Mar 30 '07 #5
On Mar 30, 6:40 pm, virtualade...@gmail.com wrote:
On Mar 30, 6:28 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
On Fri, 30 Mar 2007 15:06:46 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
On Mar 30, 5:32 pm, PerfectReign <perfectre...@xr4ti.cotse.netwrote:
>On Fri, 30 Mar 2007 14:27:02 -0700, a rock fell the sky, hitting
>virtualadepts on the head, and inspiring the following:
I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system.
>Wow, this day is full of brilliant ideas!
>I think you've just invented the buffer overflow there, kiddo!
>>http://en.wikipedia.org/wiki/Buffer_overflow
>Congratulations!
>--
>k
The buffer overflow is completely different. Virus writers can
litterally launch their own viruses by hands on their friends computers
with software they write themselves. The software just contains in a
string another program that is already compiled that launches itself
into memory. Then the origonal program finds a way to execute that
program in memory seperately, perhaps at boot time before windows even
loads.
Does Windows load on your computer? On mine, I find that hard to believe.
The computer hardware is configured to be multi- tasking.
How, exactly, did that happen? I've never heard of multi-tasking
hardware.
Does this mean that my hard drive can simultaneously act as a keyboard?
So
all the program needs is a way to execute itself outside of windows
memory,
That's easy! All my programs execute outside of Windows memory.
rewrite itself into the boot sector at shutdown, and delete it
self at startup. All the initial attack has to do is write itself into
the boot sector and freeze your computer forcing a restart. The virus
can then execute itself in memory outside of the operating system, and
spy on your every keystroke, even e-mailing you activity back to an
anonymous account with its own e-mail server. The bootsector virus just
loads up first and then terminates spilling itself into the windows
startup script, or even the imac startup. I can tell imac's aren't
secure, but if you were to build a machine that could only boot its
intended operating system and configure that code into CMOS viruses
wouldn't be a problem. You would also have to permanently configure
what applications could load up at boot time inside of the operating
system, because a virus can rewrite the operating system to execute
resident programs behind your back.
Oh, you're familiar with the TSx voting machines, then.
Maybe you're the one who rigged the election there in Ohio, then, eh?
--
k
a turn signal is a statement, not a request

I have a solution to the problem PR. We all use firewalls on low end
PC's that run through each of our machines connected to the internet.
I'm installing finnix on my PC that got shut down because of its
viruses. It is just a live CD iso image that I can boot right up
with, and then I can monitor my iMac traffic. Trouble is I can't be
sure if finnix is hacked either, unless I wrote my own firewall to
watch what it was doing too. I'm sure all the computers at my cable
company are hacked too, so I can't even trust what goes out on their
end, but it mostly gets lost in spaghetti I imagine. Rigging
elections is just the start of it, a secret group of hackers is going
to take over the world if we all don't unplug.

http://www.finnix.org/
Maybe I don't need an extra firewall. I'm reading about the iMac
startup system and it seems secure.

This page briefly describes the sequence of events that happen when
Mac OS X boots.

Some details of the boot process from power-on until the kernel is up
and running are covered in Booting Mac OS X and XNU: The Kernel. To
recapitulate:

* Power is turned on.
* Open Firmware code is executed.
* Hardware information is collected and hardware is initialized.
* Something (usually the OS, but also things like the Apple
Hardware Test, etc.) is selected to boot. The user may be prompted to
select what to boot.
* Control passes to /System/Library/CoreServices/BootX, the boot
loader. BootX loads the kernel and also draws the OS badges, if any.
* BootX tries to load a previously cached list of device drivers
(created/updated by /usr/sbin/kextcache). Such a cache is of the type
mkext and contains the info dictionaries and binary files for multiple
kernel extensions. Note that if the mkext cache is corrupt or missing,
BootX would look in /System/Library/Extensions for extensions that are
needed in the current scenario (as determined by the value of the
OSBundleRequired property in the Info.plist file of the extension's
bundle.
* The init routine of the kernel is executed. The root device of
the booting system is determined. At this point, Open Firmware is not
accessible any more.
* Various Mach/BSD data structures are initialized by the kernel.
* The I/O Kit is initialized.
* The kernel starts /sbin/mach_init, the Mach service naming
(bootstrap) daemon. mach_init maintains mappings between service names
and the Mach ports that provide access to those services.

Mar 30 '07 #6
Dnia Fri, 30 Mar 2007 14:27:02 -0700, virtualadepts napisa³(a):

Removed follow-ups to groups other than comp.lang.c++
Don't cross-post!
I have a theory how viruses work.
[...]
it can launch the other program in to memory on the
free store, where it can run and play behind the scenes
of the operating system.
Not behind the scenes. If a program want to allocate some
memory from a free store, it has to ask OS for it. Only
the kernel routines could allocate a memory to it and
realize mapping virtual addresses to physical adresses.
Also, the sub-process launched by some process is running
in an address space of that parent process, so it can be
under full control of the OS and the parent process.
The simplest kind will just start destroying a windows
computer, but more sophisticated programs will try to
watch and understand what windows is doing.
Yeah, that's exactly what I've suspected ;)
Your theory is strongly biased by the One True Platform ;P
Bear in mind that there are other platforms than Windows,
that are not hatcheries of viruses [like M$'s OS'es are].
Today's memory protection mechanisms are enough for
protecting from viruses, if they're used properly.
Eventually it just hogs so much resources that it sends
out bulk e-mail to everyone online
Only if you're running a bad protected M$ crap and don't
block incoming connections to SMTP ports - what machine
on local network really needs to behave like an SMTP server
if not a virussed zombie computer? :P
It logs all your keystrokes and steals your passwords,
So it still needs to hook on system procedures and it could
be detected.
putting your identity into a hacker database.
:D give me one address of that kind of "hacker database" ;)
[one is enough i think ;)]
Almost every machine has the virus
Don't generalize. You're projecting your particular experiences
on the rest of the world.
The unsecured free store in the computers memory is part of
what C++ was built on
What do U mean by that C++ free store is "unsecured"? C++ standard
doesn't define anything about free store security, because it's
the OS-dependant matter. So U may say about "unsecured OS memory
management mechanisms", but not "unsecured C++ free store" :P
and windows was programmed up in the C++ programming language.
Where do U know that from? Do U have access to Windows's source code? :)
I think Bill Gates is really to blame for all viruses
Not only him [he didn't code all the Windows ;P], but the Microsoft
could be blamed for viruses, sure as Sun :)
because he doesn't have a way for windows to search through
its own memory and look for unusual activity.
He has, but not always use it.
It doesn't even know what it is doing itself.
Yeah :)

--
SasQ
Mar 31 '07 #7
jk
On 30 Mar 2007 14:27:02 -0700, vi***********@gmail.com wrote:
>I have a theory how viruses work. My theory is you need one computer
program to host another computer program, and once the program is
hosted, and that program gets executed, it can launch the other
program in to memory on the free store, where it can run and play
behind the scenes of the operating system. Just by intentionally
writing a program that spills itself into the rest of memory. The
simplest kind will just start destroying a windows computer, but more
sophisticated programs will try to watch and understand what windows
is doing. As soon as windows starts shutting itself down, it will
write its loading program into the startup script, and once windows
starts up it will remove itself from the startup script, so you never
even see the program executing. And because the program is running
wild on the free store you never even notice it except for unsual
errors as it corrupts memory and slows down your machine. Eventually
it just hogs so much resources that it sends out bulk e-mail to
everyone online, and networks with all the other viruses behind your
back. It logs all your keystrokes and steals your passwords, putting
your identity into a hacker database. Almost every machine has the
virus, but no one can trace it down to the author who is probably
hiding in another country, especially because you get through a
network of spaghetti as all the viruses communicate with each other.
The unsecured free store in the computers memory is part of what C++
was built on, and windows was programmed up in the C++ programming
language. You can even write your own C++ operating systems and put
them on boot disks and cdroms. I think Bill Gates is really to blame
for all viruses because he doesn't have a way for windows to search
through its own memory and look for unusual activity. It doesn't even
know what it is doing itself.
ask her at http://invisiblethings.org/ she knows more about such
things than many other.

Mar 31 '07 #8
On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
Rigging elections is just the
start of it, a secret group of hackers is going to take over the world
if we all don't unplug.

http://www.finnix.org/

Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.
--
k
Mar 31 '07 #9
PerfectReign wrote:
On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
> Rigging elections is just the
start of it, a secret group of hackers is going to take over the world
if we all don't unplug.

http://www.finnix.org/


Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.

Bite me!

--
I got a fever and the only prescription is more cowbell!
-Christopher Walken SNL ð
Mar 31 '07 #10
On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
> Rigging elections is just the
start of it, a secret group of hackers is going to take over the world
if we all don't unplug.

http://www.finnix.org/


Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.

LOL. Were your parents cousins?
Apr 5 '07 #11
On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
> Rigging elections is just the
start of it, a secret group of hackers is going to take over the world
if we all don't unplug.

http://www.finnix.org/


Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.

OOOPS, I meant to say were your parents cousins or are you that lost? And
seriously if your that lost take the bad vista tag off sheesh.
Apr 5 '07 #12
On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
>> Rigging elections is just the
start of it, a secret group of hackers is going to take over the world
if we all don't unplug.

http://www.finnix.org/


Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.

OOOPS, I meant to say were your parents cousins or are you that lost?
And seriously if your that lost take the bad vista tag off sheesh.
/me shakes head...

--
k
Apr 5 '07 #13
On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:
On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

Rigging elections is just the
start of it, a secret group of hackers is going to take over the
world if we all don't unplug.

http://www.finnix.org/
Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.

OOOPS, I meant to say were your parents cousins or are you that lost?
And seriously if your that lost take the bad vista tag off sheesh.

/me shakes head...
Learn2Unix kk thnx.
Apr 5 '07 #14
On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:
>On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>>On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:

On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:

Rigging elections is just the
start of it, a secret group of hackers is going to take over the
world if we all don't unplug.
>
http://www.finnix.org/
Yes, I see.
I imagine you have your house wallpapered with aluminum foil, eh?

I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.
OOOPS, I meant to say were your parents cousins or are you that lost?
And seriously if your that lost take the bad vista tag off sheesh.

/me shakes head...
Learn2Unix kk thnx.
Um, is school out? Oh yeah, it is Easter break. That explains this one.

If you think I should "learn to use Unix," then fine. I suppose that
using the school's BSD system in college, maintaining several Xenix
systems and working on developing software for SPARC stations doesn't
count, eh?

Oh, and then there's this computer. Of course it has NOTHING to do with
Unix whatsoever.

So, mr ubergeek, please enlighten us on your OS of choice. I see you at
least use a very current version of Pan.

--
k
Apr 6 '07 #15
On Fri, 06 Apr 2007 02:17:55 +0000, PerfectReign wrote:
On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:
>>On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:

On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:

On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
virtualadepts on the head, and inspiring the following:
>
> Rigging elections is just the
>start of it, a secret group of hackers is going to take over the
>world if we all don't unplug.
>>
>http://www.finnix.org/
>
>
Yes, I see.
>
>
I imagine you have your house wallpapered with aluminum foil, eh?
>
I see you're using Macintosh. I didn't know Macs could get on the
internet. Cool.
>
>
OOOPS, I meant to say were your parents cousins or are you that lost?
And seriously if your that lost take the bad vista tag off sheesh.

/me shakes head...
Learn2Unix kk thnx.

Um, is school out? Oh yeah, it is Easter break. That explains this one.

If you think I should "learn to use Unix," then fine. I suppose that
using the school's BSD system in college, maintaining several Xenix
systems and working on developing software for SPARC stations doesn't
count, eh?

Oh, and then there's this computer. Of course it has NOTHING to do with
Unix whatsoever.

So, mr ubergeek, please enlighten us on your OS of choice. I see you at
least use a very current version of Pan.
Nah man just giving you a hard time about your mac on the net comment.
But i run Gentoo, fedora core 6, Redhat 9, Debian 3.1 Sarge, Solaris 10,
and how could i forget Openbsd 4.0. Mac OsX is based off of a Unix
Variant NextCube Os. Hence why i said the Learn2Unix comment. Granted you
are on Usenet which is better than the 400,000+ people that still try to
find information and informative talks via web forums.
Apr 6 '07 #16
On Fri, 06 Apr 2007 04:31:25 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
On Fri, 06 Apr 2007 02:17:55 +0000, PerfectReign wrote:
>On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>>On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:

On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:

On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>
>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
>virtualadepts on the head, and inspiring the following:
>>
>> Rigging elections is just the
>>start of it, a secret group of hackers is going to take over the
>>world if we all don't unplug.
>>>
>>http://www.finnix.org/
>>
>>
>Yes, I see.
>>
>>
>I imagine you have your house wallpapered with aluminum foil, eh?
>>
>I see you're using Macintosh. I didn't know Macs could get on the
>internet. Cool.
>>
>>
OOOPS, I meant to say were your parents cousins or are you that
lost? And seriously if your that lost take the bad vista tag off
sheesh.

/me shakes head...

Learn2Unix kk thnx.

Um, is school out? Oh yeah, it is Easter break. That explains this one.

If you think I should "learn to use Unix," then fine. I suppose that
using the school's BSD system in college, maintaining several Xenix
systems and working on developing software for SPARC stations doesn't
count, eh?

Oh, and then there's this computer. Of course it has NOTHING to do with
Unix whatsoever.

So, mr ubergeek, please enlighten us on your OS of choice. I see you at
least use a very current version of Pan.

Nah man just giving you a hard time about your mac on the net comment.
Ahh...

....that was directed solely at a few of the regs in a2600. My Mac - a
'80s-era SE/30 - doesn't do the internet and has no browser. (It is
system 6.0.7, IIRC.) My wife had a mac in the mid-90s, an LC, I think.
I remember we gave that to one of our friend's daughters some years back.

I really haven't used a mac much since then. My father-in-law does use a
mac, and I'm familiar with it's *nix origins.

But i run Gentoo, fedora core 6, Redhat 9, Debian 3.1 Sarge, Solaris 10,
and how could i forget Openbsd 4.0.
Fukk! I just run SUSE. No time for anything else.
Mac OsX is based off of a Unix
Variant NextCube Os. Hence why i said the Learn2Unix comment. Granted
you are on Usenet which is better than the 400,000+ people that still
try to find information and informative talks via web forums.k
Heh! I run one and am on several of those, too. I think there are plusses
and minuses to both.

--
kai
www.perfectreign.com || www.4thedadz.com
www.filesite.org || www.donutmonster.com

closing the doors that surround me
so no one will ever penetrate
complete my retreat just to wait for the day
that never comes so i will laugh alone
Apr 6 '07 #17
On Fri, 06 Apr 2007 05:25:30 +0000, PerfectReign wrote:
On Fri, 06 Apr 2007 04:31:25 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>On Fri, 06 Apr 2007 02:17:55 +0000, PerfectReign wrote:
>>On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:

On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:

On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky,
hitting <ph3tamin3on the head, and inspiring the following:
>
>On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>>
>>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
>>virtualadepts on the head, and inspiring the following:
>>>
>>> Rigging elections is just the
>>>start of it, a secret group of hackers is going to take over the
>>>world if we all don't unplug.
>>>>
>>>http://www.finnix.org/
>>>
>>>
>>Yes, I see.
>>>
>>>
>>I imagine you have your house wallpapered with aluminum foil, eh?
>>>
>>I see you're using Macintosh. I didn't know Macs could get on the
>>internet. Cool.
>>>
>>>
>OOOPS, I meant to say were your parents cousins or are you that
>lost? And seriously if your that lost take the bad vista tag off
>sheesh.
>
/me shakes head...
>
Learn2Unix kk thnx.

Um, is school out? Oh yeah, it is Easter break. That explains this
one.

If you think I should "learn to use Unix," then fine. I suppose that
using the school's BSD system in college, maintaining several Xenix
systems and working on developing software for SPARC stations doesn't
count, eh?

Oh, and then there's this computer. Of course it has NOTHING to do
with Unix whatsoever.

So, mr ubergeek, please enlighten us on your OS of choice. I see you
at least use a very current version of Pan.

Nah man just giving you a hard time about your mac on the net comment.

Ahh...

...that was directed solely at a few of the regs in a2600. My Mac - a
'80s-era SE/30 - doesn't do the internet and has no browser. (It is
system 6.0.7, IIRC.) My wife had a mac in the mid-90s, an LC, I think.
I remember we gave that to one of our friend's daughters some years
back.

I really haven't used a mac much since then. My father-in-law does use a
mac, and I'm familiar with it's *nix origins.

>But i run Gentoo, fedora core 6, Redhat 9, Debian 3.1 Sarge, Solaris
10, and how could i forget Openbsd 4.0.

Fukk! I just run SUSE. No time for anything else.
>Mac OsX is based off of a Unix
Variant NextCube Os. Hence why i said the Learn2Unix comment. Granted
you are on Usenet which is better than the 400,000+ people that still
try to find information and informative talks via web forums.k

Heh! I run one and am on several of those, too. I think there are
plusses and minuses to both.
I used to be regular reader here until about 5 years ago when i got into
a wee bit of trouble. But yeah the companies that i deal with run all of
those platforms it gets annoying but none of them want to change hehe. Oh
and the old macs sheesh i feel your pain on those mang. Rough Stuff.Yeah
i still like seeing people use the far corners of the net and i like
seeing there is a little bit of interest still in the BBS and in usenet.
Last time I was here the big conversations was about xp coming out and
red hat releasing fedora core hehe.So yeah it has been a while since i
been on here but i read this group every day from 1995-2002.
Apr 6 '07 #18
On 06 Apr 2007 I stormed the castle called alt.2600 and heard
<ph3tamin3cry out in news:pa*********************@gmail.com...
On Fri, 06 Apr 2007 05:25:30 +0000, PerfectReign wrote:
>On Fri, 06 Apr 2007 04:31:25 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:
>>On Fri, 06 Apr 2007 02:17:55 +0000, PerfectReign wrote:

On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky,
hitting <ph3tamin3on the head, and inspiring the following:

On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:
>
>On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky,
>hitting <ph3tamin3on the head, and inspiring the following:
>>
>>On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>>>
>>>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky,
>>>hitting virtualadepts on the head, and inspiring the following:
>>>>
>>>> Rigging elections is just the
>>>>start of it, a secret group of hackers is going to take over
>>>>the world if we all don't unplug.
>>>>>
>>>>http://www.finnix.org/
>>>>
>>>>
>>>Yes, I see.
>>>>
>>>>
>>>I imagine you have your house wallpapered with aluminum foil,
>>>eh?
>>>>
>>>I see you're using Macintosh. I didn't know Macs could get on
>>>the internet. Cool.
>>>>
>>>>
>>OOOPS, I meant to say were your parents cousins or are you that
>>lost? And seriously if your that lost take the bad vista tag off
>>sheesh.
>>
>/me shakes head...
>>
Learn2Unix kk thnx.

Um, is school out? Oh yeah, it is Easter break. That explains this
one.

If you think I should "learn to use Unix," then fine. I suppose
that using the school's BSD system in college, maintaining several
Xenix systems and working on developing software for SPARC stations
doesn't count, eh?

Oh, and then there's this computer. Of course it has NOTHING to do
with Unix whatsoever.

So, mr ubergeek, please enlighten us on your OS of choice. I see
you at least use a very current version of Pan.
Nah man just giving you a hard time about your mac on the net
comment.

Ahh...

...that was directed solely at a few of the regs in a2600. My Mac - a
'80s-era SE/30 - doesn't do the internet and has no browser. (It is
system 6.0.7, IIRC.) My wife had a mac in the mid-90s, an LC, I
think. I remember we gave that to one of our friend's daughters some
years back.

I really haven't used a mac much since then. My father-in-law does
use a mac, and I'm familiar with it's *nix origins.

>>But i run Gentoo, fedora core 6, Redhat 9, Debian 3.1 Sarge, Solaris
10, and how could i forget Openbsd 4.0.

Fukk! I just run SUSE. No time for anything else.
>>Mac OsX is based off of a Unix
Variant NextCube Os. Hence why i said the Learn2Unix comment.
Granted you are on Usenet which is better than the 400,000+ people
that still try to find information and informative talks via web
forums.k

Heh! I run one and am on several of those, too. I think there are
plusses and minuses to both.

I used to be regular reader here until about 5 years ago when i got
into a wee bit of trouble. But yeah the companies that i deal with run
all of those platforms it gets annoying but none of them want to
change hehe. Oh and the old macs sheesh i feel your pain on those
mang. Rough Stuff.Yeah i still like seeing people use the far corners
of the net and i like seeing there is a little bit of interest still
in the BBS and in usenet. Last time I was here the big conversations
was about xp coming out and red hat releasing fedora core hehe.So yeah
it has been a while since i been on here but i read this group every
day from 1995-2002.
OMG IT"S POLICESTOLEMYCAR!!!

--
ThePsyko
Public Enemy #7

**Pissing off the planet, one person at a time**

Apr 6 '07 #19
On Fri, 06 Apr 2007 15:53:33 +0000, ThePsyko wrote:
On 06 Apr 2007 I stormed the castle called alt.2600 and heard
<ph3tamin3cry out in news:pa*********************@gmail.com...
>On Fri, 06 Apr 2007 05:25:30 +0000, PerfectReign wrote:
>>On Fri, 06 Apr 2007 04:31:25 +0200, a rock fell from the sky, hitting
<ph3tamin3on the head, and inspiring the following:

On Fri, 06 Apr 2007 02:17:55 +0000, PerfectReign wrote:

On Thu, 05 Apr 2007 21:22:15 +0200, a rock fell from the sky,
hitting <ph3tamin3on the head, and inspiring the following:
>
>On Thu, 05 Apr 2007 18:56:03 +0000, PerfectReign wrote:
>>
>>On Thu, 05 Apr 2007 20:08:59 +0200, a rock fell from the sky,
>>hitting <ph3tamin3on the head, and inspiring the following:
>>>
>>>On Sat, 31 Mar 2007 15:53:40 +0000, PerfectReign wrote:
>>>>
>>>>On Fri, 30 Mar 2007 15:40:42 -0700, a rock fell the sky, hitting
>>>>virtualadepts on the head, and inspiring the following:
>>>>>
>>>>> Rigging elections is just the
>>>>>start of it, a secret group of hackers is going to take over
>>>>>the world if we all don't unplug.
>>>>>>
>>>>>http://www.finnix.org/
>>>>>
>>>>>
>>>>Yes, I see.
>>>>>
>>>>>
>>>>I imagine you have your house wallpapered with aluminum foil,
>>>>eh?
>>>>>
>>>>I see you're using Macintosh. I didn't know Macs could get on
>>>>the internet. Cool.
>>>>>
>>>>>
>>>OOOPS, I meant to say were your parents cousins or are you that
>>>lost? And seriously if your that lost take the bad vista tag off
>>>sheesh.
>>>
>>/me shakes head...
>>>
>Learn2Unix kk thnx.
>
Um, is school out? Oh yeah, it is Easter break. That explains this
one.
>
If you think I should "learn to use Unix," then fine. I suppose that
using the school's BSD system in college, maintaining several Xenix
systems and working on developing software for SPARC stations
doesn't count, eh?
>
Oh, and then there's this computer. Of course it has NOTHING to do
with Unix whatsoever.
>
So, mr ubergeek, please enlighten us on your OS of choice. I see you
at least use a very current version of Pan.
>
>
Nah man just giving you a hard time about your mac on the net
comment.

Ahh...

...that was directed solely at a few of the regs in a2600. My Mac - a
'80s-era SE/30 - doesn't do the internet and has no browser. (It is
system 6.0.7, IIRC.) My wife had a mac in the mid-90s, an LC, I
think. I remember we gave that to one of our friend's daughters some
years back.

I really haven't used a mac much since then. My father-in-law does use
a mac, and I'm familiar with it's *nix origins.
But i run Gentoo, fedora core 6, Redhat 9, Debian 3.1 Sarge, Solaris
10, and how could i forget Openbsd 4.0.

Fukk! I just run SUSE. No time for anything else.

Mac OsX is based off of a Unix
Variant NextCube Os. Hence why i said the Learn2Unix comment. Granted
you are on Usenet which is better than the 400,000+ people that still
try to find information and informative talks via web forums.k

Heh! I run one and am on several of those, too. I think there are
plusses and minuses to both.

I used to be regular reader here until about 5 years ago when i got
into a wee bit of trouble. But yeah the companies that i deal with run
all of those platforms it gets annoying but none of them want to change
hehe. Oh and the old macs sheesh i feel your pain on those mang. Rough
Stuff.Yeah i still like seeing people use the far corners of the net
and i like seeing there is a little bit of interest still in the BBS
and in usenet. Last time I was here the big conversations was about xp
coming out and red hat releasing fedora core hehe.So yeah it has been a
while since i been on here but i read this group every day from
1995-2002.

OMG IT"S POLICESTOLEMYCAR!!!

LOL, Fuck the cops seriously.
>
Apr 6 '07 #20
ThePsyko <th******@itookmyprozac.comdelighted us to no end by
taking a lime green crayon and scribbling in
news:Xn************************@nntp.petitmorte.ne t, on the
hallowed day of Fri 06 Apr 2007 08:53:33a:
OMG IT"S POLICESTOLEMYCAR!!!
That was LOW.

Funny....but low :)
--
-=Mara=-

Help Heather kick cancer's ass! http://www.limeproject.org
Mara's Promo Photo: http://www.limeproject.org/promos/mara.jpg
Apr 6 '07 #21
On 06 Apr 2007 in alt.2600, "-=Biscuit=-" <be**@no-address.commade
their contribution to mankind by stating in
news:Xns990A7E3C9BF3Bno.one@foo_blah_bar.com:
ThePsyko <th******@itookmyprozac.comdelighted us to no end by
taking a lime green crayon and scribbling in
news:Xn************************@nntp.petitmorte.ne t, on the
hallowed day of Fri 06 Apr 2007 08:53:33a:
>OMG IT"S POLICESTOLEMYCAR!!!

That was LOW.

Funny....but low :)

was just checking to see if he remembered... I think everybody that was
here for that would remember :)

--
/(bb|[^b]{2})/ that is the Question

ThePsyko
Public Enemy #7

Apr 7 '07 #22

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: Jonas | last post by:
This works fine in Win XP but does not work at all in Win 98. Private WithEvents objIExplorer As InternetExplorer I have to do it like this to get it to work in Win 98 Dim objIExplorer As...
3
by: Douglas Buchanan | last post by:
Buttons don't work if form is opened on startup A2k If 'frmMain' is set to open by default at startup none of the buttons work. If 'frmMain' is opened from the database window then all the...
4
by: Paul T. RONG | last post by:
Dear All, I add two new tables to the database and then the disable shift key codes don't work. These two new tables are actually created by two queries, and only these two are in the front end,...
15
by: Brett | last post by:
I'd like to know what management and the work environment are like where you work. I need something relative to compare my current work environment. Here's a few questions I have: 1.) Is it...
2
by: Holysmoke | last post by:
Hi, I have a asp.net form with a button in it. In the onlclick event of button I want to write a function which does some a bit of work with a timespan of 15 seconds. So I want to show a image...
33
by: bonk | last post by:
I have an application that needs to perform some background work, i.e. Logging, wich must not block the main thread. How would I basically design such a scenario? It is obvious that I should do...
5
by: Firecore | last post by:
Hi. My brother is an expert at C & C++ He is always making small annoying programs similar to Worms and Viruses. I have learnt VB and some C. Anyone got any ideas as to how I can stop him short...
11
Niheel
by: Niheel | last post by:
http://bytes.com/images/howtos/information_overloaded.jpgPaul Graham wrote an interesting article a few months back about how the internet is leading to information overload for information workers...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.