|
|
The Robot Gene: a Hacker D.
Lite Dream Sequence
[Author's note: any chance similarity in the names of
computer programs or operating systems, living or dead, is sheer
coincidence.]
A story of a hacker who invents a replicating heuristic.
Oh, it's sad, it's a dreadful horror story.
Hacker wanted a smaller Windows. She didn't want to give
up its newest functionality, she just didn't want it to take up
so much room, so she could collect more pictures without buying a
new drive. She wrote a program she called Similar, to learn
the places she could squeeze the system code together. She
had to kill the run because the output got too big. She hooked
her code into a compression program, so the program could squeeze
together the similar parts without bothering her with it. Out
came one huge file in her System directory, but it was a lot
smaller than the sum of all the other files, that she had used
for input into it. Also, it was even smaller than the zip of all
the files, she checked. She knew she had found something
important. She knew Windows wouldn't work out of her super-
compressed file, any more than it would out of the zip file,
because it went by filenames. But Hacker was stubborn. She didn't
know what it was good for, but she had found something of her
own, and she meant to thrash on it until she had beat it into
the shape of something useful, or at least meaningful. So she
rewrote the code to eat up everything on the drive, just to see
how much smaller she could make everything and still be able to
unfold it all later. Maybe she could use it for backup or
something. Because the runs took so long, she found out how
to make her squeezer run in the background, by launching threads.
So she turned it loose to eat up her whole system, except for the
pictures she had collected, and then she guess what forgot
about it. No, really, something came up, and she was preoccupied,
and her computer was working fine. The upshot was, that her
program ran for three days straight before she thought to check
on it. It had produced a monster file, that it was
constantly rewriting. Evidently her program had been merrily
launching threads the whole time. She watched the file size inch
downward, as her program gradually found more similarities
to generalize. The file was much smaller than the files it had
used for input. OK, she had an automatic system squeezer.
What was it good for? She had to download a hex editor that
wouldn't blow up when it saw the file size, but she was able to
see that the first part of the file started out like her
partition table and boot track at the start of her disk!
She had gone ahead and bought a new disk. What would
happen if she wrote that monster file over to the new disk as a
disk image? Would it boot? It couldn't possibly, with only one
file on the disk, and no directories. But it did.
Hacker was now really sure she had found out something important.
Booting just from the new disk, the computer behaved exactly like
her old one! It couldn't, with just one file on the whole
disk, a fraction of the size of her old system. But Windows came
up looking just the same, and it thought that all the old files
and directories and programs were there. Weird. Then Hacker
found out that her program was in this new machine somewhere,
running and launching threads, and still shaving a few bytes
off the file size every few minutes. The interesting part was,
that it just didn't have any filename, that this fake Windows
could see. Her process name, squeezer.exe showed up in the Task
Manager's list of running programs, but no file name like that
could be found by Windows, the fake Windows. And she couldn't
kill that process, permission denied. It came to her
then, that her program was the only thing that was really
running, and it was faking Windows. That was it, she had
something useful. She made her source code into a Web page and
posted it on the Internet. In a couple days, somebody sent her a
stripped down version in an email, which was even smaller.
When she looked at it, she found this code a lot cleaner, so she
changed her Web page to this version. Another week or so,
and she was amazed to find herself in the middle of a hurricane
of hacker activity. Everybody was spreading her code and
calling her a genius. Well, was it so special to want to
make Windows smaller? The really crazy thing was when she heard
that her program could be ported right over to Linux, and do
the same insane things! It would make a bootable file that
generated a working fake Linux system. Both programs would chop
out about 25% of the system size in the first few minutes,
but then had to run for a couple days before rounding the corner
and making some really dramatic shrinkages. There were some
really monsterous intermediate files, which Hacker hadn't noticed
the first time. There was a real problem, though, when you
wanted to install new software. Programs that would work fine on
normal Windows sometimes wouldn't run on fake Windows. Some
geek on a newsgroup found out why. The squeezer program hadn't
really saved all of Windows. It just kept the parts which
were needed by the programs which were already installed on the
machine when the squeezer started running. The rest of
Windows was tossed, along with the unused parts of application
programs. So when you tried to give the fake Windows a
new program to install, and the new program wanted to use some
part of Windows that had been tossed, it just wouldn't work.
Put the new program in before running the squeezer, and it all
worked just fine. Strange. It took her a while to figure
out what the hackers were so excited about. It turned out to
be a legal matter. If you had a program, or Windows itself, you
were in theory liable to worry about somebody else's copyright.
But after her squeezer had worked the software over, all the
copyrights were squished together in a huge mound of mangled
code spaghetti. It was totally impossible to trace what part of
the code had come from which file without her emulator
running, seeing files and directories that weren't even there.
The hackers all figured she had killed off copyright on
computer software. Somebody explained it to her like this.
Her program didn't run Windows and it didn't run Netscape. It ran
an emulation of the Netscape program, running on top of an
emulation of the Windows operating system. None of the original
code was left which could be traced. Only the look and feel
of the original program remained, and the look and feel was
beyond copyright. Her program essentially wrote a complete port
of every piece of software to each individual machine. It
resolved the issue of software copyright at one blow. Hacker
had managed to build a machine to make copyright extinct.
Her program could keep learning, and still keep its size
pretty small. That compensated for the lossy compression
method it used to build its initial emulation. It was hard to
compile programs in her emulation, without getting errors
from some mysterious problem in memory management, or some
tricky twists in device drivers that weren't there in the real
software. But her machine kept learning, and after a couple
tries at writing a program in a couple different ways the
machine seemed to sort of get the idea, and the third try
generally worked. The best part was, that it was hard
to crash. The number of frustrating crashes got fewer as
her program ran longer. It didn't keep getting smaller
forever, of course. It would grow a lot when she browsed the
Internet, but she knew that was just the cache size, and she
checked this out by getting Netscape to erase its cache. But if
she didn't erase the cache it would gradually shrink anyway,
as her program digested the cache by compressing it.
It felt good being the center of attention. Hacker especially
liked on her IRC channel, how people kind of hung back for a
second after she sent, like they were in awe, and hanging
on her every word. Well, she had done something important, and it
wasn't by accident, she had meant to do it. Partly, at
least. Then one night a gloomy dude got her thinking
really paranoid when she was chatting with him. She got some
Internet utilities and started pinging servers, and logging
return times. She wanted to learn if her packets were
forwarded by too many routers, to find out if some kind of
spooks were delaying her packets to clone them. She quit that
when she figured that a tap on her phone line from the
downtown office couldn't be spotted that way, and would be a lot
more efficient. Then she spent a couple minutes worrying
about her ISP, who for all she knew might be a front for the
NSA, and then she was out of her paranoid stage. There was
nothing she could do about any of that. Also, there was no
reason any of that should matter. She didn't do anything wrong,
she just wrote a small utility program to compress the disk.
She just forgot to tell it to stop.
home
Kallisti(k)Copyleft,
November 12, -2, all rites reversed. Everyone is welcome and
encouraged to steal everything. |