Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
F
The anti-viral industries are engaged in a battle against the natural. Self reproduction is ree software exposes code and illuminates At the same time, viral technologies
context, shedding a wide light on technologies could readily be explored and
embedded deep within the technology of computation and by default its history and culture. and extruded economies, rewriting histories and exploited within an open context and
creating a meaningful culture. In the field of the under the heading of a new notion of
Martin Howse sieves out the viral seed under both open and closed coding models viral episodes such as the Bliss affair, in which free promiscuous computing. One
software rubbed shoulders with the anti-viral industry, example within contemporary
exposing hype and deception, prove particularly illuminating. aesthetics is the project ‘Life Sharing’
Free software also provides a handy lens with which to from 0100101110101101.ORG which
view both code and its culture as inherently viral. And of opens up all the artist’s machines for
course the GPL as virus is a common theme kicked off by free access. Parallels abound with the
Microsoft and subsequently embraced by both the Free totally open and password free ITS or
Software movement and its opponents, yet there can Incompatible Time Sharing system
little doubt of its concrete viral nature in which pioneer hackers such as Richard
reproducing a license text file across thousands of Stallman used back in the day at MIT.
software directories and which implicates The link to free software is both
subsequent code releases. historic and essential.
Though implying damaged nature, with roots in Computer viruses can readily be
Latin referring to poison and venom, the viral can well viewed in this openly reproductive
be viewed as benign in this light - and the evolution of the light, with contemporary networked
computer virus does show that healthy experiment and fears reflecting nothing more than an
the same prankster spirit that is embedded within the age-old recurring panic over
hacker ethic so dear to the free software community promiscuity. It’s now a question of
lie at the origins of the computer virus. electronics, of the free exchange and
Such histories need to be teased out and contrasted flow of information, and it’s
against the tedious contemporary machinations of script interesting to note that headline
kiddies and the like unknowingly implicated within vast searches under google for the term
machinations set in motion by morphing executables and promiscuous reveal no salacious
resulting in escalating security measures eroding the details, rather affording somewhat dry
freedoms of the user. After all, DRM and trusted coverage of a mode for wireless
AGAINST NATURE
the computer virus has exploded to embrace hardcore talk of segregation. And Robert Slade
scientific research, forensics, serious networked security traces the roots of the term worm to
issues and an expanding and highly questionable the wormhole like debugging traces of
underground movement with increasingly rogue programs which had escaped
opaque motivations. The symbiotic from within their boundaries or
relationship between the virus detection, and partitions. Sacrificing banal
was also thus started with subsequent Robert Slade community in lumbering into what in response to this one lone
Creeper stalking Reaper code. traces the it simply saw as a new field ripe for sighting, McAfee, leading vendor of
And within the pages of a trilogy of roots of the exploitation. The story of Bliss also anti-virus software, released a
articles published in Scientific term worm proves interesting within the lengthy press release, boasting of
American in the early 70s discussing to the somewhat comical frame of an open their quick response to this major
the hacker pursuit Core Wars, under wormhole source, community developed virus. threat. Bliss, in their own words the
which sandboxed code segments like Indeed Bliss was much praised at first virus for Linux, could now be
battle for CPU supremacy, we can see
debugging the time in both showing that GNU/ detected and treated by McAfee’s
traces of
how readers responded to the Linux was now a popular platform, a own VirusScan for LINUX software.
rogue
challenge of the viral, transposing the programs false argument always given for the And again within such an extreme
game into the real machine world. which had prevalence of Microsoft-targeted realm of the absurd, it’s too
The virus was born from a software escaped viruses, and for demonstrating that tempting not to repeat gems such
fiction. from within it’s wrong to run untrusted binaries as the following:
And it’s easy to see how such early their as root. “McAfee researchers believe that
experiments within a closed domain, boundaries Bliss was first released, as an alpha one reason this virus has begun to
and more functional and necessary or partitions version, in 1996 and infection of a spread is because Linux users who
code, the early Rabbits and other random machine was reported on are playing computer games over
animals which made sure of a clean the linux-security list in early 97. the Internet, such as DOOM, must
slate for code on early mainframes by Major GNU player Alan Cox play the game in the Linux’s
copying a singular instruction across responded intelligently as follows, administrator mode, which is called
memory, were all to eager to expand “In theory you can write a virus for ‘root.’” - a response to arguments
as computing accrued the any OS if the owner is dumb enough that Unix systems are difficult to
encrustations of both physical and to install unchecked binaries as infect because the virus must run as
social networks. Distribution is central root.” The finger is very much privileged.
to the viral and it’s an easy route from pointed at the binary. Yet on the The community responded
floppy to network. The computer same day, the Bliss author, posted to adequately to what now appears a
virus changes in connotation and the comp.security.unix newsgroup, well played out farce which easily
meaning as the context shifts from exhibiting great concern that an demonstrates both the anti-virus
academic experiment or prank to the alpha version of his code had been protective racket, reliant on fear and
World Wide Web where it now released the year before, though ignorance, and the foundation of
accrues criminal intent, with Morris thankfully it had gone largely such an industry on poor practise
worm as transition point; the worm unnoticed. He attached an encoded and poor software, aside from any
unleashed by student Robert Morris Jr. binary 0.4.0 release, helpfully questions of property, of doors open
straight out of academia. The history compiled with full “debugging or doors closed. The exquisitely well
of this viral expansion is well repeated verbosity on,” after issuing profuse documented Bliss episode
elsewhere and does make for descriptions of what the code illuminates a misjudged symbiosis
interesting reading with repeated, actually does, and warning any between viral subculture and
fugal characters and themes; a family reader not to run this tough to antiviral software industry in relation
tree of virus methodologies for unscramble binary. A new version, to free software as open code.
example with comebacks such as which further commentators
Linux/ADM repeating the Morris speculated may be under a GPL
worm of ten years previous. license, was mooted and the
SISTER BLISS
Bliss, picked up way back in 97,
conceptual nature of the exercise
can well be gleaned from the
author’s assertion that little if
Key Links
Life Sharing
wasn’t the first virus targeting the anything is Linux-specific in the www.0100101110101101.org/home/life_
GNU/Linux platform, that dubious code, which can and has been sharing
position is reserved for Staog, but it ported to a range of other OSes. The Robert Slade
sun.soci.niu.edu/~rslade/rms.htm
was the most well commentated point heftily underlined here being Fred Cohen
and first to receive the attentions of that the viral is deeply intrinsic to www.all.net/books/virus/part5.html
Morris Worm:
industry, making visible the differing computation, before we even throw world.std.com/~franl/worm.html
cultural conditions and economies networks into the equation, and that Tierra
which condition the viral under viral efficacy or magnitude is purely www.his.atr.jp/~ray/tierra
Reflections on Trusting Trust
open as opposed to proprietary a matter of culture. Bliss makes such www.acm.org/classics/sep95
systems. The story is well related apparent. Far from malignant in Core Wars
online with full correspondence both description and traced www.koth.org
Unix Virus Bibliography
between Alan Cox and others on dissection, and even including a www.users.qwest.net/~eballen1/virefs.html
various kernel and security disinfection command line option, Bliss
math-www.uni-paderborn.de/~axel/bliss
newsgroups dissecting the virus and Bliss has an altogether different Neoism
arguing over terminology as to agenda than digital tagging. www.neoism.net
whether it is truly viral or rather a Biennale.py
www.0100101110101101.org/home/biennale_
Trojan. Some of this history is well HELP HELP? HAH! READ py/index.html
worth repeating as a demonstration THE SOURCE! MacMag
of how the anti-viral industry simply Enter McAfee. Again, on the very www.neoism.net/macmag_virus_-_history_
of_computer_viruses_1.html
mis-judged the free software same day, the 5th of February, and