NOW
PAST
MAIL
DIARYLAND
HOME

2007-02-16 - 8:40 p.m.

Probably someone already thought about this: Linux* as an Internet worm.

Imagine, you build a nice stable little distribution, with the capacity to, once installed, add onto, and update with standard linux packaging tools. *KOFF-KOFF*ubuntu*KOFF-KOFF*

Then you throw the distro in some encapsulating compression format, add some worm code, and have it attack and install itself on machines, copies all the users' data and Linux* equivalent settings into accounts on the Linux* box.

End result, the next time the user is allowed (locked out until install and conversion are complete, including hibernation on power-offs) to login, they log into an "equivalent" system. They could just continue their work where they left off. E-mail is copied and configured. Business documents open as expected, edit, save, and convert to other formats. Printers and faxes work as expected.

Advanced editors for audio, video, graphic and other media are available, and easily installable via various Linux* package managers through ftp & http.

Of course you'd only want your worm code to attack "vulnerable" systems.

Do I need to place a disclaimer here? Well, these days it's prudent to cover one's ass. So here goes: I don't condone the use of the aforementioned "internet worm" as a means to distribute anything. Furthermore, I would not sully the good reputation of any of the *nixes in some misguided attempt to "help" people.

Just, like, a thought exercise... or something.

* Or if you prefer: GNU/Linux. Or BSD, FreeBSD, OpenBSD, netBSD, BEOS, blah, blah, blah.

***************

So, how do you like them apples?

previous - next