Skip to main content

Why does somebody want to destroy the data system?

Why does somebody want to destroy the data system?

Why does somebody want to destroy the data system?

One of the most important things for hackers is to create the right code, which can destroy the system or send the data, what system involve to the hackers. If we think the first case, where a hacker would want to destroy the data system, the motive might be that the system, what breaks down offers the hacker opportunity to load malicious software in the system by using a memory stick or infected hard disk.

The destruction of the data system might also be made for covering the stealing the information, and the destruction is hoped to cover the position, where the stolen data have been sent. Or one thing of the destructive virus would just make problems for some web stores, and maybe some hacker would want to destroy the database of the customers, that this person should not pay the bills about the stuff, what has been ordered.

How to capture virus code?

But the more complicated viruses are sending data to the hackers. Those viruses are complicated to create because the system would report to the network surveillance team, that somebody is making the viruses. Or in this case, the tracking tools, what is more effective, complicated and profitable tools than some virus, what just destroys the data system.

The tracking tool is not very easy to create, and the thing is that hackers must make the software, what will slip through the firewall and antivirus software. So the hackers must get the code before they can begin their operations. And that thing can be made by playing a millionaire, and hope that some service would infect their computer by the tracking cookie.

One of the problems with that thing is that they must recognize and isolate the virus file and after that those persons must modify the code, that it will send the data to their computers. This is really difficult, because the code has caused the alarm, and it must modify that it could avoid the virus scanners and other network security programs.

And if some computer would send malicious software to network too often, would that cause that the network of that person would be cut. Then those hackers must test their program, and there might be only one chance to make the perfect virus. But the thing is that those hackers must handle complicated programming methods. They must also realize, that some developing tools are sending information to anti-virus if somebody is trying to make malicious software by using that tool.

The stolen data might contain the tracking cookie

The stolen data can be tracked and if the hacker's location is found out, there would be only one choice. Those persons can be arrested or they must move to another country. And that's why they must cover their location by using tools like chained remote use of computers. In this version, the hacker would use a chain of computers by using remote tools, and if those machines would be located in different countries, the system might cover the identity of hackers.

But that kind of use of computers needs physical computers. And putting them in different countries need good relationships. Those hackers need to get safe places for those computers in different cities because if the location of the computers is not safe, somebody can steal the physical computers. And that's why those hackers must get the flats for their operations.

This costs money.  So those hackers can steal a couple of Dollars from the thousands or millions of bank accounts and earn billions of Dollars, and nobody even notices that thing. But those hackers could also try to put the tracking tool to the computers of the Department of Defense. But as I told you this kind of things need money, and the persons, who would boot the computers, if there is some kind of updates, what need rebooting the system, and after that, the remote connection must be established again.

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of