![]() The running program constantly returns new outputs and reuses them. When the target user double-clicks this BAT file, the fork bomb starts working. If the attacker targets Windows, they save the fork bomb code in a text file as a BAT file. That's why attackers prepare their fork bombs in these file extensions. When the CPU can no longer cope with it, the computer will crash.įor the fork bomb to work, the target user must run these files somehow-BAT for Windows, SH files for Linux, both of which can run with a simple double-click. Just like this, the fork bomb creates many new fork bombs within itself and after a while it starts to consume the computer's CPU. While there was only one bacterium in the container, tens of thousands of bacteria may have formed after a few hours. Bacteria are constantly divided and duplicated if the necessary conditions and environment are provided. Think of it like bacteria starting to breed in a container. ![]() ![]() Fork bombs basically consist of functions that trigger each other. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |