Skip to main content

The networks, virus scanners, and hacking

The networks, virus scanners, and hacking

If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.

Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.

And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".

That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.

But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.

One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.

That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.

Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.

Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.

The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.

So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.

I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...