Library

Video Player is loading.
 
Current Time 0:00
Duration 5:59
Loaded: 0.00%
 

x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    Hello everyone, today we're taking a look at the
    Hello everyone, today we're taking a look at the

  • 00:02

    Internal DOS virus.
    Internal DOS virus.

  • 00:04

    This virus infects one random EXE file
    This virus infects one random EXE file

  • 00:06

    anytime an infected EXE is run.
    anytime an infected EXE is run.

  • 00:08

    And it produces a pretty fun effect a couple of months
    And it produces a pretty fun effect a couple of months

  • 00:10

    after the initial infection.
    after the initial infection.

  • 00:12

    Now, whichever security researcher had this virus
    Now, whichever security researcher had this virus

  • 00:14

    before me
    before me

  • 00:16

    had their date set to January 1st, 1980.
    had their date set to January 1st, 1980.

  • 00:18

    So they probably had some old IBM PC or compatible
    So they probably had some old IBM PC or compatible

  • 00:22

    that did not have a real-time clock and just went with the default date.
    that did not have a real-time clock and just went with the default date.

  • 00:26

    So that's the date that the virus wants
    So that's the date that the virus wants

  • 00:28

    and that's what we're gonna use.
    and that's what we're gonna use.

  • 00:29

    [clicky enter key]
    [clicky enter key]

  • 00:30

    Looking at the virus itself [type type type]
    Looking at the virus itself [type type type]

  • 00:34

    We can see it's fourteen hundred and twenty nine bytes long
    We can see it's fourteen hundred and twenty nine bytes long

  • 00:37

    and since it infects EXE files, we're going to be looking at
    and since it infects EXE files, we're going to be looking at

  • 00:40

    POWER.EXE, not GRAPHICS.COM this time.
    POWER.EXE, not GRAPHICS.COM this time.

  • 00:44

    Sorry graphics :(
    Sorry graphics :(

  • 00:46

    POWER.EXE is eight thousand fifty two bytes in length
    POWER.EXE is eight thousand fifty two bytes in length

  • 00:49

    so if we see that size increase, we'll know it's been infected.
    so if we see that size increase, we'll know it's been infected.

  • 00:52

    Alright, I think that just about covers it.
    Alright, I think that just about covers it.

  • 00:55

    Let's start running the virus until we see POWER get infected.
    Let's start running the virus until we see POWER get infected.

  • 00:58

    [typity type]
    [typity type]

  • 01:00

    There we go.
    There we go.

  • 01:02

    ...No, there we DON'T go...Let's try that again.
    ...No, there we DON'T go...Let's try that again.

  • 01:07

    There we go.
    There we go.

  • 01:08

    Now, we should be able to run this over and over
    Now, we should be able to run this over and over

  • 01:10

    until we eventually see POWER.EXE get infected,
    until we eventually see POWER.EXE get infected,

  • 01:13

    along with a bunch of other EXE files on our system.
    along with a bunch of other EXE files on our system.

  • 01:16

    [even more typing]
    [even more typing]

  • 01:18

    [endless F3 + enter clicking]
    [endless F3 + enter clicking]

  • 01:22

    Every now and then you'll hear the click of the hard drive
    Every now and then you'll hear the click of the hard drive

  • 01:25

    as it writes to a new EXE file.
    as it writes to a new EXE file.

  • 01:28

    [hope you're not tired of F3 + enter clicking]
    [hope you're not tired of F3 + enter clicking]

  • 01:31

    [still clicking]
    [still clicking]

  • 01:34

    [yet more clicking]
    [yet more clicking]

  • 01:35

    Let's see if POWER got infected yet.
    Let's see if POWER got infected yet.

  • 01:40

    Not yet, let's keep running the virus.
    Not yet, let's keep running the virus.

  • 01:44

    [SURPRISE! IT'S CLICK TIME!]
    [SURPRISE! IT'S CLICK TIME!]

  • 01:48

    Alright, I've been running Internal over and over for about a minute.
    Alright, I've been running Internal over and over for about a minute.

  • 01:54

    And we're still not infected! Okay, another minute, let's go.
    And we're still not infected! Okay, another minute, let's go.

  • 02:00

    [Click 2 - Click Harder]
    [Click 2 - Click Harder]

  • 02:06

    Okay, now...
    Okay, now...

  • 02:10

    There we go.
    There we go.

  • 02:10

    Now we can see Internal has infected POWER,
    Now we can see Internal has infected POWER,

  • 02:13

    which has grown in length to nine thousand four hundred forty-five bytes,
    which has grown in length to nine thousand four hundred forty-five bytes,

  • 02:17

    as the virus code is now present in this EXE file.
    as the virus code is now present in this EXE file.

  • 02:20

    So now every time we run POWER,
    So now every time we run POWER,

  • 02:22

    we'll be running the virus as well.
    we'll be running the virus as well.

  • 02:27

    So we still see "Power manager not installed."
    So we still see "Power manager not installed."

  • 02:30

    But.
    But.

  • 02:31

    We now know it's also running Internal as well as POWER.
    We now know it's also running Internal as well as POWER.

  • 02:35

    So let's get to the fun part. We're gonna reset and change the date...
    So let's get to the fun part. We're gonna reset and change the date...

  • 02:40

    So we'll just make it 1/1/1994, why not?
    So we'll just make it 1/1/1994, why not?

  • 02:44

    Any time that's at least a couple months after the original infection.
    Any time that's at least a couple months after the original infection.

  • 02:48

    And I don't need to restart, but I'm going to so you can hear the seek test.
    And I don't need to restart, but I'm going to so you can hear the seek test.

  • 02:51

    [you're welcome]
    [you're welcome]

  • 02:57

    [A drive BRRRRBRRRR]
    [A drive BRRRRBRRRR]

  • 02:58

    [B drive BRRRBRRRR]
    [B drive BRRRBRRRR]

  • 03:02

    [POST beeeeeeep]
    [POST beeeeeeep]

  • 03:02

    [A drive CHRK noise - checking for disk]
    [A drive CHRK noise - checking for disk]

  • 03:06

    [gentle hard drive reading sounds]
    [gentle hard drive reading sounds]

  • 03:12

    Okay, that's a fun effect.
    Okay, that's a fun effect.

  • 03:14

    So...
    So...

  • 03:16

    As the computer attempted to run my program...
    As the computer attempted to run my program...

  • 03:19

    ...which changes the DOS refresh rate to 60 Hz.
    ...which changes the DOS refresh rate to 60 Hz.

  • 03:22

    so that it looks nice on the camera.
    so that it looks nice on the camera.

  • 03:25

    Apparently that got infected with Internal as well and
    Apparently that got infected with Internal as well and

  • 03:27

    here is the effect - I didn't expect to see it quite so soon...
    here is the effect - I didn't expect to see it quite so soon...

  • 03:32

    ...but here it is!
    ...but here it is!

  • 03:33

    It scrambles the text on your screen
    It scrambles the text on your screen

  • 03:35

    and outputs "INTERNAL ERROR 02CH.
    and outputs "INTERNAL ERROR 02CH.

  • 03:37

    PLEASE CONTACT YOUR HARDWARE MANUFACTURER IMMEDIATELY !
    PLEASE CONTACT YOUR HARDWARE MANUFACTURER IMMEDIATELY !

  • 03:40

    DO NOT FORGET TO REPORT THE ERROR CODE !"
    DO NOT FORGET TO REPORT THE ERROR CODE !"

  • 03:43

    [typing as always]
    [typing as always]

  • 03:45

    So...you'd better get on that, cuz this doesn't look good.
    So...you'd better get on that, cuz this doesn't look good.

  • 03:50

    Let me ah...get us back into 60 Hz.
    Let me ah...get us back into 60 Hz.

  • 03:55

    so that nobody has to stare at the blinking monitor anymore.
    so that nobody has to stare at the blinking monitor anymore.

  • 03:59

    So any EXE file that we run, like POWER,
    So any EXE file that we run, like POWER,

  • 04:03

    which is still infected, will now produce this effect.
    which is still infected, will now produce this effect.

  • 04:07

    Let's get a - just a regular directory listing here, we'll see
    Let's get a - just a regular directory listing here, we'll see

  • 04:09

    how it looks when it scrambles these characters.
    how it looks when it scrambles these characters.

  • 04:16

    So it just shifts them around, moves them all around a little bit
    So it just shifts them around, moves them all around a little bit

  • 04:20

    and just generally messes up your screen
    and just generally messes up your screen

  • 04:23

    and outputs the same error.
    and outputs the same error.

  • 04:24

    So when you start seeing this error over and over,
    So when you start seeing this error over and over,

  • 04:27

    you might think you actually need to go contacting
    you might think you actually need to go contacting

  • 04:29

    Packard Bell...or Hewlett Packard, or IBM,
    Packard Bell...or Hewlett Packard, or IBM,

  • 04:33

    or whoever manufactured your computer cuz clearly something is wrong
    or whoever manufactured your computer cuz clearly something is wrong

  • 04:37

    The fun part of this virus, too,
    The fun part of this virus, too,

  • 04:40

    is that after you see this message from any infected program,
    is that after you see this message from any infected program,

  • 04:43

    it removes the virus!
    it removes the virus!

  • 04:45

    So you may be sitting here, seeing this message over and over,
    So you may be sitting here, seeing this message over and over,

  • 04:48

    and finally decide to call up IBM,
    and finally decide to call up IBM,

  • 04:51

    and when it comes time to show them what happens,
    and when it comes time to show them what happens,

  • 04:53

    nothing. Cuz the virus has removed itself from the system.
    nothing. Cuz the virus has removed itself from the system.

  • 04:56

    Maybe you'll get lucky like me and have some random
    Maybe you'll get lucky like me and have some random

  • 04:58

    EXE file you weren't expecting do this trick,
    EXE file you weren't expecting do this trick,

  • 05:01

    but either way, it's mildly devious.
    but either way, it's mildly devious.

  • 05:05

    You'll see the same thing with Internal itself,
    You'll see the same thing with Internal itself,

  • 05:09

    which made it quite fun to make this video
    which made it quite fun to make this video

  • 05:11

    cuz it kept disinfecting itself whenever I would try to copy
    cuz it kept disinfecting itself whenever I would try to copy

  • 05:13

    the sample over.
    the sample over.

  • 05:14

    [enter key clicks]
    [enter key clicks]

  • 05:15

    So here's our effect, and now INTERNAL.EXE is just a
    So here's our effect, and now INTERNAL.EXE is just a

  • 05:19

    useless thirty-four byte EXE program that does nothing.
    useless thirty-four byte EXE program that does nothing.

  • 05:23

    And it's not destructive, it doesn't go out of its way to harm your data.
    And it's not destructive, it doesn't go out of its way to harm your data.

  • 05:27

    It just scrambles your screen
    It just scrambles your screen

  • 05:29

    and removes itself from your computer -
    and removes itself from your computer -

  • 05:31

    or at least from the infected file that you ran.
    or at least from the infected file that you ran.

  • 05:33

    And I have a soft spot in my heart for the mischievous viruses
    And I have a soft spot in my heart for the mischievous viruses

  • 05:37

    that are not overtly destructive.
    that are not overtly destructive.

  • 05:40

    And while those are fun, and interesting to look at,
    And while those are fun, and interesting to look at,

  • 05:43

    I think viruses like these also have their place in history.
    I think viruses like these also have their place in history.

  • 05:47

    Written for fun, simply to mess with you.
    Written for fun, simply to mess with you.

  • 05:50

    Alright - that's enough speaking from the heart.
    Alright - that's enough speaking from the heart.

  • 05:52

    That is about it for the Internal DOS virus.
    That is about it for the Internal DOS virus.

  • 05:55

    Thank you very much for watching,
    Thank you very much for watching,

  • 05:57

    take care. :)
    take care. :)

All interjection
hello
/həˈlō/

word

say or shout ‘hello’

Virus.DOS.Internal

35,366 views

Video Language:

  • English

Caption Language:

  • English (en)

Accent:

  • English (US)

Speech Time:

77%
  • 4:38 / 5:58

Speech Rate:

  • 198 wpm - Fast

Category:

  • Science & Technology

Intro:

Hello everyone, today we're taking a look at the. Internal DOS virus.. This virus infects one random EXE file. anytime an infected EXE is run.. And it produces a pretty fun effect a couple of months
after the initial infection.. Now, whichever security researcher had this virus. before me. had their date set to January 1st, 1980.. So they probably had some old IBM PC or compatible. that did not have a real-time clock and just went with the default date.
So that's the date that the virus wants. and that's what we're gonna use.. [clicky enter key]. Looking at the virus itself [type type type]. We can see it's fourteen hundred and twenty nine bytes long
and since it infects EXE files, we're going to be looking at
POWER.EXE, not GRAPHICS.COM this time.. Sorry graphics :(. POWER.EXE is eight thousand fifty two bytes in length

Video Vocabulary

/inˈtərnl/

adjective noun

Within or inside; interior; not external. inner parts.

/ˌfôrˈtēn/

number

14.

verb

To control the making a movie or television show.

/səˈkyo͝orədē/

noun

Person paid to protect property and people.

adverb

At a time you choose, it's not important when.

/dəˈfôlt/

noun verb

Failure to meet an agreement or make a payment. To return to a previously determined state.

/rəˈsərCHər/

noun

Someone who works to find new facts and ideas.

/ˈɡrafiks/

noun other

products of graphic arts. Images on a computer screen or TV.

/inˈfektəd/

adjective verb

Made bad due to a virus. To make people feel the same emotion you are.

/ˈrəniNG/

adjective noun verb

flowing naturally or supplied to building through pipes and taps. The act of moving your legs to move quickly. (Of an engine) to be operating.

/inˈfekt/

verb

To make people feel the same emotion you are.

/ˈhəndrəd/

noun number

subdivision of county or shire. 100.

/ˈlo͝okiNG/

adjective verb

having specified appearance. To appear to be when you look at them; seem.

/ˈpräbəblē/

adverb

That is likely to happen or be true.