How to find out if somebody delivers computer viruses?
There has been claimed that the ADSL-networks are taken in use because tracking hackers is easier in the ADSL-networks. Who knows the truth about this kind of thing. But there is a possibility, that some authorities are sending the malicious- looking code to the internet. The virus scanners should block those codes, but if the blocking is not done, that code infects the small parasite on the computer. This parasite code sends the report that somebody uses bad virus control, and that is telling, that the person might write viruses.
Sometimes we are facing the thing, that the ADSL or fast but fixed Ethernet has been made impossible to make the computer viruses traditionally. The ADSL-routers antivirus sniffer detects the virus and then tracks the user in seconds. The thing is that this kind of tracking can be made in every single network on the Earth. Things like hotel networks are not so anonymous, what we might want to believe.
The thing is that the network of some hotels might be served free for quests, but when the quest is booked out, the same network turns to a honey pot. That means when the old passwords are used, the system might start to begin the surveillance of the user. There is a possibility that the data that is loaded by using the old passwords is equipped with the small tracking (or HTTP) cookie.
That "cookie" is the code, which reports that the computer has been used in some areas without proper authorization. And other thing is that the system might have a program, which reports if there are too many computers logged in the network. In this case, every key might have their password. In this kind of case, the authorities might check if the person has been in some other hotel on the same night.
And if that person is not in other hotels, that makes a person interesting. If a certain person travels 500 kilometers for using some network, that thing is suspicious. There is a possibility, that the hotel quest is given the password for some outside. But the thing is that this kind of thing is strictly prohibited. The passwords must not be given any outsider.
This means that the system might report this kind of unauthorized use of the net to the security staff. And the reason for this kind of protocol is that if somebody delivers things like illegal films or some other illegal material, that can cause closing all the network. If there is some kind of illegal use the system can send the data straight to officials. And this thing makes this kind of hotel and other systems problematic.
But the classified data can equip with the tracking code. The system would hide the "Echo-request" command in the classified files, and that system can send the tracking code to the net. The tracking bases that the computer, what opens the file will send the signal what includes the IP-Address of the computer to the net.
And then the Internet-root server would send that code to the NSA or GCHQ computer, which tells that the unauthorized data is copied to that computer. Then the server of security service would send the ping-request to the IP-address, where that data is coming. Then the system can try to track the computer by using the carrier IQ. When the place is located that area can be photographed even by using recon satellites.
Have you ever heard things like RAID-5? That technology is used in the backup systems. But a similar system can copy all data, what the user delivers to the systems, what can be even the other side of the world. The thing is that the series of RAID-5 routers can send all data, what is delivered even to Russia, and that kind of thing is difficult to track.
The first RAID-5 server can send the data to the legal server, what location in the same country, where the hotel. Then the system can duplicate that data, and send it to some apartment, where lives the embassy worker. Then that server would send the data to the server, what location in the embassy, and then the data would send by using secured lines to the headquarters of GRU or NSA.
Backup: https://en.wikipedia.org/wiki/Backup
HTTP Cookie: https://en.wikipedia.org/wiki/HTTP_cookie
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.