Skip to main content

The internet has been made many things safer. But it's a dangerous place.



Students are told not to use Wikipedia in research, but it's trustworthy. Says the article in "The Conversation". The link to the article is here. But you can see the URL below this text. 

The prohibition of using Wikipedia as a source for research is one of the most interesting questions in the studies. In normal cases the Wikipedia is trustworthy. And some people are saying that the purpose of that prohibition is to make work more difficult than it is. 

The thing is that Wikipedia is trustworthy in the cases like computing and natural sciences. But there are also problems with the things like selecting sources for the works in the modern world. Things like books are good sources if they are confirmed. But the fact is that during the time of the internet the printed information might be old. 

When books are coming to bookstores they might handle the old-fashion information. And that thing is visible in the most intensive areas like computing. The things that people are used to doing might turn old-fashion in a very short period. The fast advantages in the programming architecture and operating systems are making some well-known methods old-fashion. 

Let's take one example. In the past, data security was the area, where only a couple of operators worked. Their mission was to deny the hacking. And in old good times, hackers just called the phone calls. But today the fixed data connections are making the internet more secure. 

If we are taking the point of view from the coding and programs. The firewalls are blocking the normal malicious code like echoing the formatting command from operating systems. The artificial intelligence-based firewalls are searching the source code of the data packages. 

But the risks are turned to social media. People can share data that should not share. Things like images of firearms and memberships of the shooting clubs can cause burglaries because criminals want that kind of stuff. And also things like papers that are forgotten to table and where is passwords can cause problems for data security. If criminals are zooming those images. 

They can get the passwords for the targeted systems. Also, things like hidden surveillance cameras can uncover data from the screens. One of the examples of that kind of thing is uncovering the Russian "Status-6" "Kanyon" torpedo with 100 mt. warhead. The papers that were visible on the camera allowed western actors to isolate the diagrams of that system by using the zoom of the graphics program. 

When the organization faces data crime the first thing is to report that to authorities. And of course, that report can also give to the media. That allows that all people know that there was a security leak. And they know how to handle the situation. And when the data security has been broken or dangered. That thing should cause discussions about the topics: "what should we do otherwise that this would not happen again". 

That kind of thing is called physical hacking. The workers should dare to report the people who are asking strange questions. Or bar evenings where the "film is cut". That thing can tell that somebody is trying to steal data from the system by asking for passwords. And also family members should tell if they get strange phone calls or somebody asks about things like when parents are at work. 

The mainframe of the hacking is turning to social hacking. In the worst-case criminals are taking hostages for blackmailing key persons.  The hacker would send the probe like E-mail or text message for asking passwords. That means the mobile telephone or the captured Email of the boss would open the road to the system. 

Or otherwise, hackers might try to cheat or blackmail people give passwords and access to the system. One version is to stun a person by using chloroform. And then the Sodium Amytal would force the person to give passwords. 

In another version, the data criminals use the zombie poison (Tetrodotoxin) to order their victims to transfer money to their accounts.  The thing in data security is the "open attitude". If something is tried to affect the person that person should dare to tell that thing. If the hackers are stolen data the first action is to confess that thing. Hiding the information-stealing is the worst thing, that people can do. 


https://theconversation.com/students-are-told-not-to-use-wikipedia-for-research-but-its-a-trustworthy-source-168834


https://networkedinternet.blogspot.com/


Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...