Content deleted Content added
Quuxplusone (talk | contribs) Worm news? |
Signpostmarv (talk | contribs) →Worm news?: response |
||
Line 12:
Some information related to the recent "spinning rings" worm[http://it.slashdot.org/comments.pl?sid=207432] would be appreciated. How does one "rez" a new object, refer to other objects, etc.? Are there any restrictions on the replication of objects? Any restrictions on the computing power of scripts? (See the article on [[ZZT-oop]] for a pretty good summary of that kind of thing in a different scripting language.) --[[User:Quuxplusone|Quuxplusone]] 04:57, 21 November 2006 (UTC)
: If you read the scripting wiki [http://lslwiki.com], you'll see that the majority of functions delay the script for x amount of seconds- usually just a fraction of a second.
: the llRezObject() function is used in these grey-goo attacks.
: There is an "electric fence" of sorts that restricts the malicious usage of this function to perform a DOS attack.
: As far as I am aware, Linden Lab have not released official statements regarding the technical restrictions/limitations of the fence. It's simply a case of experiment and try not to blow up the grid.
: Anything not in the inventory of an object can be referred to by it's UUID- a unique identifier.
: I did notice, that unlike the usual self-replicating objects, the majority of the sonic rings did not contain any objects- only a single script.
: While this statement should be taken with a pinch of salt, it is my belief if this was a "traditional" self-replicating object DOS attack, it did so by the ability for an object to be sent content remotely.
: The coverage in the media of this event is laughable, since far worse DOS attacks have occurred over Second Life's history, and the real-world media (as opposed to media solely concerned with SL) haven't covered them at all. I also find it ridiculous that it's called a worm.
: [[User:Signpostmarv|Signpostmarv]] 23:45, 21 November 2006 (UTC)
|