Skip to main content

The thing about tracking software and private corporations

The thing about tracking software and private corporations


When we are asking some private operator work for our data security, we must realize that those corporations are not always what they claim. That means that sometimes those operators have not able to check the identities of their workers, and here I mean cases where the private operator takes the foreign citizens in their team.

Private corporations have not the same abilities to check backgrounds of their workers than governments have, and sometimes they are facing the situation, that they must hire somebody, and there are only a few suitable coders. In that case, there are only a couple of coders, who has the necessary skills, and then the corporation must make so-called fast recruitment.

In fact in the world of data security, the problem is, that if something reads in the CV that would mean nothing. If the person says that the job is done by using some programming language, that would mean, that this inmate has done anything. And there have been cases, that some "programmer" would be ordered the codes from some friends, and this is the problem for the data security. Those people can call to somebody, who will send the code to the Email, and then they might send the malware accidentally.


One way to make malware, what can pass the firewall is to send the source code by using PDF of some other file, and after that, the contact person just copy-pastes the source code to the program editor, and then the thing is ready. Pressing Ctrl+A and Ctrl+V is very good to take the source code from the document, and then just pressing Ctrl+V the code would be copied to the editor. After that, the user must only create the file, what is able to run and then the software is ready for the run.


Innocence is a pretty thing 


Sometimes we are thinking that some persons are safe because they have limits. This thing is not actually true, because modern electronic equipment has given a chance to make flexible and easily portable screens and communication devices. In fact, even the person, who has ever made code or even opened a computer before can hack by using modern equipment. in this case, the person wears only the action camera, what is in the headset, and mobile telephone. The action camera is connected to the Internet by the mobile telephone, and another telephone can be on the table, and the hacker can send messages, what the operator who is in the house must do.

Or if the team wants to get the feeling of what is a very well known thing from some actions movies, they can use smart glasses, and the hacker can write commands to that screen and follows the things, what is going on the computer screen by using this "remote eye". And on the passage would be the remote camera, what warns the inner operator about the quests like security operators. That camera can be connected to the drone, what just flies out from the window when the operator is gone.

And then the hacker would give the instructions to that person by telling, what must be done. Or if the person, who operates uses the screen like smart glasses, the thing goes more easily, because the hacker can write commands and send them to that screen. Of course, a normal mobile telephone can be done with that and the hacker who watches the screen of the computer from somewhere in distance must only give the person, who operates inside the instructions by using Whatsapp or some other social media solution. In this case, the person, who is in the building is operating as the "human robot".

In those cases, there might be a very big risk, that something disappears, and that "something" might be the source code of the tracking tools of that company. This kind of things is really bad things because by using those code lists the hackers can modify the code, and then make own versions of that malware. This means that the malware maker just renames the program, and changes the addresses, where the system would send the data, and that thing might cause a massive data leak.

This kind of attacks needs the contact person, who has access to the system as the superuser. And in fact, even a handicapped person can make those things, if that person gets the instructions. When we are thinking about the "human robot", we can give that inmate the action camera, and mobile telephone, and then we can give the instructions by using Whatsapp, and that is the situation, what has ever mentioned.

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...