Posted 25 June 2012 - 12:53 PM
I was looking around and i see a lot of "viruses" that only rewrite the startup file or copy itself to the floppy, and I think: ¿It is possible create a real CC virus?
With real virus I mean a program that can spread itself over rednet API or HTML API, attach to files, execute the payload, etc.
The real question is: ¿I can run a program or execute commands over rednet without permission from the other computer?
Edit: Whoa!, thanks for the quick response :P/>/>
The first problem I see about a real large scale worm is that there aren't an unified rednet protocol (there aren't DNS or TCP/IP), instead of this there are tons of rednet systems (FTP servers, web servers, etc), so if you want to create a virus you need to create a lot of different viruses, one for every rednet system.
So It's "easy" create a trojan horse (the difficult think it's run the virus in the target), and also "easy " create a virus, but I think it's nearly impossible create a worm that copies itself without user's action.
With real virus I mean a program that can spread itself over rednet API or HTML API, attach to files, execute the payload, etc.
The real question is: ¿I can run a program or execute commands over rednet without permission from the other computer?
Edit: Whoa!, thanks for the quick response :P/>/>
The first problem I see about a real large scale worm is that there aren't an unified rednet protocol (there aren't DNS or TCP/IP), instead of this there are tons of rednet systems (FTP servers, web servers, etc), so if you want to create a virus you need to create a lot of different viruses, one for every rednet system.
So It's "easy" create a trojan horse (the difficult think it's run the virus in the target), and also "easy " create a virus, but I think it's nearly impossible create a worm that copies itself without user's action.