Computer Virus ancestor-core competition

Source: Internet
Author: User

The core wars are played as follows: How do the two sides write a program to input the two programs on the same computer? In the memory system, they chase each other.
The next level sometimes stops to repair (re-write) several lines of commands destroyed by the other party; when it is trapped, it can also copy itself once and escape from danger because they both
In the middle of the computer's memory core, the core game was named.
This game features that people playing games on both sides will only be able to watch the game on the screen after the program enters the computer, without making any changes until a certain
Party A's program is completely [eaten] by the other party. The magnetic core war is a general name. In fact, it can also be divided into several programs written by Yao Lai, called [dal
This includes the meaning of [Survival of the fittest]. Its game rules are the closest to the one described above in Assembly Language)
Each program is called organism. The two computers compete until one party kills the other and replaces the other.
At that time, Morris often beat his opponent.

In addition, each time a Creeper reads it, it copies a copy. In addition, it also [crawls] from one computer to another.
Connected computers. Soon the original information on the computer was squeezed out by the crawlers. The crawlers were born in a breeding place.

In order to deal with [crawler], someone wrote a [Receiver] (Reaper). Its only survival goal is to find the crawler and destroy it. When all the crawlers are
After being harvested, the receiver executes the last command in the program: destroys himself from the computer.

[Dwarf] (Dwarf) is not as clever as Darwin, but an extremely dangerous character. It moves into the memory system every 5 [address] (address)
Turning everything stored there into zero will stop the original program.

The most strange thing is that a war program called [impu] (Imp) has only one line of command, that is, MOV 01. MOV indicates the meaning of [MOVE.
It writes (shifts) the [0] contained in the address to the next address. When the inpu expands, all the original commands on the computer are changed to [MOV 01]. change sentence
In other words, there are a lot of [MOV 01]. [Gemini] (Germini) on the fluorescent screen, which is also an interesting guy. It has only one function: copy yourself to the next one hundred
The address is discarded.

A series of programs are derived from Gemini. [victims] (Juggeraut) copy the program and send it to the next 10 addresses, while [Bigfoot] (Bigfoot) copy the original program.
The address between the replica and the replica is set to a large prime number. It is very difficult to catch the snowman. In addition, there is John suo of the Xerox site
The [Worm] (Worm) written by John F. Shoch aims to control the computers that intrude.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.