Skip to main content

The networks, virus scanners, and hacking

The networks, virus scanners, and hacking

If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.

Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.

And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".

That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.

But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.

One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.

That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.

Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.

Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.

The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.

So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.

I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

Metamaterials can change their properties in an electric- or electro-optical field.

"Researchers have created a novel metamaterial that can dynamically tune its shape and properties in real-time, offering unprecedented adaptability for applications in robotics and smart materials. This development bridges the gap between current materials and the adaptability seen in nature, paving the way for the future of adaptive technologies. Credit: UNIST" (ScitechDaily, Metamaterial Magic: Scientists Develop New Material That Can Dynamically Tune Its Shape and Mechanical Properties in Real-Time) Metamaterials can change their properties in an electric- or electro-optical field.  An electro-optical activator can also be an IR state, which means. The metamorphosis in the material can thermally activate.  AI is the ultimate tool for metamaterial research. Metamaterials are nanotechnical- or quantum technical tools that can change their properties, like reflection or state from solid to liquid when the electric or optical effect hits that material. The metamaterial can cru