Skip to main content

The networks, virus scanners, and hacking

The networks, virus scanners, and hacking

If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.

Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.

And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".

That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.

But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.

One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.

That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.

Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.

Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.

The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.

So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.

I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...