Skip to main content

Information security and trojan horses

Information security and trojan horses

Normally we are thinking trojan horses as the malicious software, what is slipped to the system, and what is transforming from some shareware program to a computer virus or spying tool. But there is another way to think about the trojan horse, and that thing is connected with the idea of the virtual working environment.

That idea is that the entire virtual headquarters of the company can turn to trojan horse very easy way. When the system architects are building the internet or IP-base solution, where the team can work virtually, that thing causes one very interesting problem, when we are thinking it in the point of view of the cybersecurity.  What if the entire company would cheat to use the similar digital headquarters, what is maintained by criminals?

The idea is that if we would use the virtual headquarters, and we offer the service from some company, somebody can build a duplicate of that service or working environment. After that, the hostile operator just cheats the crew of the company for using that giant trojan horse, and the thing of how cheating can happen is quite easy. The people, who would install IP-addresses and Internet addresses to the system would simply get wrong net-addresses, or the link, what is sent to the customer can be faked.

That would cause that entire corporation would turn to use hostile virtual solution, and make every action under the surveillance of the hostile operator. This kind of things can cause the worst kind of data leak as possible. And when we are thinking about the informative trojan horses, what can be used to send the faked information about the advantage of the economic situation of some companies, the thing can be done by NAT: ing the homepages.

This means that the router would automatically turn the IP-address to another, and this technology is created for denying the loss of IP-addresses. But if the natting parameters are wrong, the system can turn dangerous. The thing is that the router can link faked homepages, like as an example the faked homepages of stock markets, and that thing could make possible that the investors would get false information of the advantages of the value of shares.

But that kind of techniques, what are called as phishing can use to get access codes and other things from the law enforcement and other operators, what should be trusted. And if some unauthorized user would see the wrong databases, that thing can cause very bad troubles for many people.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...