Wednesday, June 3, 2020

Artificial intelligence and hacking

 


Artificial intelligence and hacking

Artificial intelligence is one of the most dangerous tools in the hands of hackers. If that kind of tool can be installed in the system, it can select interesting documents from the database, and the artificial base complicated hacking tool allows us to send fewer data to the servers of intruders, and that thing would allow hackers to deny the catching. In that case, the system would just turn the RAID-5 backup to another server only in the cases, where that kind of system would get the interesting information. So every type of data doesn't interest the hackers, who want to steal industrial secrets. 

But the thing is that intelligent spying tools can clean the databases after the operations, and that makes tracking the bank accounts, where the money would be transferred. And that allows hackers to hide their identity because they can be tracked by using the number of the bank account. This is one of the things that is used to track computer criminals. But at first the identity of some part of that action. 

The next-generation artificial-intelligence-based programming solution would make computer programs and network applications independently. The user must just describe the purpose of the system, and the robot tool would create that platform independently. And if that kind of tool would be to the hands of hackers, that can cause catastrophe for the data security. 

Sometimes there has been predicted that the future of the programming is something different, what is it now. The program would generate the code independently by using parameters, what the user wants to give. The first program would ask the purpose of the program, and then the login-data to server. Then the graphic interface and log-in lines would just be drawn on the top of the solution. 

So what would hackers do, if they would get this kind of solution in their hands? That kind of artificial intelligence-based solution might have prohibited words, like "slipping in" or some kind of hacking terms, but excellent programmers can make the own solution to that kind of system, which might base open source or open architecture. 

The "open-source" means that the source code can be download from the net, and then it can just translate to the program by using code-editor. If the person has good enough programming skills, that thing makes it possible to reprogram some parts of that kind of program. And the open architecture means that there could download the modules for the artificial intelligence-based programming tool. 

So the hackers can make their modules to that kind of systems and that makes this kind of programming tool dangerous in the wrong hands. Of course, the programming tool can deny the creation of computer viruses, but the problem is that those programs can be created by underground programmers, and they might be shared by using USB-sticks. 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Can Sci-fi weapons: nanomachines and sophons be a reality someday?

  The grey fog is one of the superweapons that are so horrifying that we cannot even imagine them. That grey fog can erase entire planets. N...