This HTML5 document contains 36 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
yago-reshttp://yago-knowledge.org/resource/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n11https://global.dbpedia.org/id/
yagohttp://dbpedia.org/class/yago/
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
provhttp://www.w3.org/ns/prov#
dbchttp://dbpedia.org/resource/Category:
xsdhhttp://www.w3.org/2001/XMLSchema#
goldhttp://purl.org/linguistics/gold/
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Compression_virus
rdf:type
yago:Virus106585816 yago:Program106568978 yago:Writing106359877 yago:CodingSystem106353757 yago:WikicatComputerViruses yago:WrittenCommunication106349220 yago:Software106566077 dbo:Building yago:Abstraction100002137 yago:Communication100033020 yago:Code106355894 yago:MalevolentProgram106573020
rdfs:label
Compression virus
rdfs:comment
A compression virus is an example of a benevolent computer virus, invented by Fred Cohen. It searches for an uninfected executable file, compresses the file and prepends itself to it. The virus can be described in pseudo code program compression-virus:={01234567;subroutine infect-executable:= {loop:file = get-random-executable-file; if first-line-of-file = 01234567 then goto loop; compress file; prepend compression-virus to file; }main-program:= {if ask-permission then infect-executable; uncompress the-rest-of-this-file into tmpfile; run tmpfile;}}
dcterms:subject
dbc:Computer_viruses
dbo:wikiPageID
23648708
dbo:wikiPageRevisionID
1009836855
dbo:wikiPageWikiLink
dbr:Computer_Virus dbr:Terminate_and_Stay_Resident dbr:Computer_virus dbr:Temporary_file dbr:Fred_Cohen dbr:Data_compression dbr:COM_file dbr:Executable dbc:Computer_viruses dbr:McAfee
owl:sameAs
freebase:m.06zk1h2 n11:4hwYJ yago-res:Compression_virus wikidata:Q5157055
dbo:abstract
A compression virus is an example of a benevolent computer virus, invented by Fred Cohen. It searches for an uninfected executable file, compresses the file and prepends itself to it. The virus can be described in pseudo code program compression-virus:={01234567;subroutine infect-executable:= {loop:file = get-random-executable-file; if first-line-of-file = 01234567 then goto loop; compress file; prepend compression-virus to file; }main-program:= {if ask-permission then infect-executable; uncompress the-rest-of-this-file into tmpfile; run tmpfile;}} The 01234567 is the virus signature, and is used to make sure (if first-line-of-file = 01234567) the file is not already infected. The virus then asks for permission (ask-permission) to infect a random executable (get-random-executable-file). If the permission is granted, it compresses the executable (infect-executable), prepends itself to it (prepend), uncompresses the current executable file (uncompress the-rest-of-this-file) into a temporary file (tmpfile) and runs it (run tmpfile). Cruncher is an example of a compression virus, a strain of which – Cruncher.2092 – is described by McAfee as memory-resident virus that infects all but small com files, making them smaller. The reason for excluding small programs is that their infected versions will be bigger than their originals.
gold:hypernym
dbr:Example
prov:wasDerivedFrom
wikipedia-en:Compression_virus?oldid=1009836855&ns=0
dbo:wikiPageLength
2100
foaf:isPrimaryTopicOf
wikipedia-en:Compression_virus