The question seems a nonsense to me:
you can always type whatever you want, including nasty code, in plain text.
But plain text is not executable: everyone one of you says you have to register it as another kind of extension to make it dangerous (or at least to call it with some kind of script being able to convert the text lines).
You can have about any kind of format recognized as a virus by appropriate software because of an unusual content, and nothing is as dumb as an antivirus: the best known exemple, serving as a test and being totally innocuous is eicar.html, which everyone can reproduce using anywhere the same stupid ascii code:
That still doesn’t tell us what the point is to write harmful code (or what is faked to seem so) in text file or any other format.
Moreover, if i ever wanted to spread code over internet, i wouldn’t get in such a hassle: it is enough to paste old codes any teenager is able to find on “appropriate” websites, and still catch millions of people with such old stuff.
The above code is malicious, but is no virus – coz it can’t spread - reproduce itself – it would be hard for a *.bat file.
Here comes the beauty of open source for linux, where anybody interested can take a look before running.
What about *cmd, *.cpl, *msc formats, not checked by default by D+.in CFP?
Buffer overflow is one thing I agree it can occur, although I haven’t seen any yet.
What about malware in pictures? Would it be possible for that code to be runned, when opening the pic with any picture editor?
For CFP 3, I would say no. The picture viewer software can’t execute the code, so it would have to use another program to execute the code (like cmd.exe). So then you would get an alert saying that PictureViewer is trying to execute Something.exe.
That’s exactly what i said, ragwing: no one would right-minded execute a bat-cmd-pif-com… unknown file on his pc if he is not a definitive moron: no protection firewall can help for that, but most antiviral and mail software have an option to keep out these extensions.
By the way, i am not even sure a batch would execute on a NT/2K/XP machine if the batch is not launched under the path and with administrative rights.
As you can see it just deletes your hard drive, it can be made more difficult etc so you cant see it, and it can be attached to thing etc but I’m not going to say more 'cous they’re going to think that I made that latest virus lol.
This is all I know of batmaking .
Hope I didn’t scare you to much lol
Xan
hey im not exceptionally great at computers i know the basics and i was wondering i found this so wat we do for this is just type that into notepad and save it via floppydisk (as to not infect my computer) and there we have it and if i need to wipe a hardrive then i just open it up in the computer i want to wipe the hardrive on?
Hey Guys I noticed you found a code of mine no don’t question the name I don’t destroy peoples computers and so I noticed the hardware destroying code! Thats amazing! I made a code like that but it was much longer and so now i have a little guy! Thank you! Back to code. :'(.
Will prompt DOS mode and ask if you’re sure you want to delete the C:\ but a person needs to physically press the Y key to do any damage. You can just press N to back out of it. No harm done. I think the reason is because it asks you twice if you want to delete the partition. This may possibly make it irreversable:
You guys are both off topic and computer illiterate (the latter being quite good news when speaking of writing malwares).
Off topic because the initial question is to make a notepad virus.
The answer is definitely no, you can’t transport whatever code in plain txt; but of course, you can use notepad, even if very basic, as every other text editor to write a script then being able to be launched by the parent script application: bat/cmd files are potentially harmful, txt ones are not.
Computer illiterate because you paste something you got from internet concerning the DEL command but (and it’s happy) don’t know a word of Ms Dos and batch scripting to a point where you are not even able to run a quiet batch (and/or to overcome user privileges if remotely using such a script).
I won’t a course, in such circumstances, provide the (very simple) solution; but you should remember that, before being a good hacker, someone must be a good computer user.