(Yup, completely new Worms 2 owner here.)Ī few months ago I looked into this and actually made a loadable module for changing this: ReSolution. I'm still curious why it was left out in this game. Now I also don't have to lament the lack of zoom function anymore. I wouldn't recommend those last two resolutions unless you have a huge monitor as I found 1024x768 already too small in my case. I did that by mistake/curiosity, and even after trying to fix it it became useless within the game, so I had to reinstall the entire thing.) (Note of caution: Don't even think about messing with the ninja rope value. Just extract the WP app file into your Worms 2 folder and run it, select Worms 2, choose the resolution from the list in the lower box, and click on "apply patch". " S*natch's WP - 94kB" is the patch you want to grab. Lo and behold, after a little bit of digging I actually found a solution here, which will let you change the game's resolution to 800圆00, 1024x768, 1152x864, or 1280x1024. “We may see improvements to these kind of strategies appearing in future, so it is good to investigate the worst they could do,” says Ji.Ī paper on the Microsoft research will be presented at the 27th Conference on Computer Communications (INFOCOM) in Arizona, US, in April 2008.Ĭomputer Viruses – Learn more about the threats to your PC in our comprehensive special report.I knew Armageddon was eventually fan-patched to higher resolution(s), so I wondered if something similar existed for Worms 2. Ji has examined records of previous worm attacks, and says there is evidence that some already use similar if less refined tricks to those developed by the Microsoft team.įor example, the Blaster worm preferentially tries to infect local computers, like one of Vojnović’s worms. As well as revealing weaknesses of networks, such a worm could rush out defensive software patches faster than an attacking worm can spread, she says. ‘Perfect worm’Ĭhuanyi Ji at Georgia Tech, University, US, is also interested in designing a “perfect worm”. For example, some of the new strategies would flatten the usual spike in overall network activity that can give away software worm attacks, but instead they would be revealed by spikes in local traffic. “If we understand how future worms might be capable of spreading, we can design better countermeasures,” says Vojnović. The research has a second potential benefit. “These strategies can minimise the amount of global traffic across the network,” Vojnović says. This approach performs almost as efficiently as the strategies using prior knowledge.īecause no central server needs to provide and coordinate all the downloads, Software patches that spread like worms could be faster and easier to distribute because no central server must bear all the load. “After it fails to reach new uninfected hosts a fixed number of times in a row, say 10, it moves on to find new groups using random sampling,” explains Vojnović. If the worm finds plenty of uninfected hosts there, it keeps spreading in that subnet, but if not, it changes tack. After finding one, it uses a more targeted approach, contacting only other computers in the same subnet. In the best of these, a worm starts by randomly contacting potential new hosts. So the researchers have also developed strategies that mean the worms can learn from experience. A worm with that information can focus its attention on the most fruitful subnets – infecting a given proportion of a network using the smallest possible number of probes.īut although prior knowledge could be available in some cases – a company distributing a patch after a previous worm attack, for example – usually such perfect information will not be available. The ideal approach uses prior knowledge of the way uninfected computers are spread across different subnets. Vojnović’s team have designed smarter strategies that can exploit the way some subnets provide richer pickings than others. Most existing worms randomly probe computers when looking for new hosts to infect, but that is inefficient, says Vojnović, because they waste time exploring groups or “subnets” of computers that contain few uninfected hosts. After infecting one computer they probe others to find new hosts. Software worms spread by self-replicating.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |