Skip to main content

The networks, virus scanners, and hacking

The networks, virus scanners, and hacking

If we are thinking about the role of the virus scanners in a computer network, the system might detect things, what people might not want to tell. When we are thinking about the role of networks in computing, we have always forgotten that almost every computer in the western ICT-infrastructure is connected to the network.

Every network is an intranet, and in cases, like North-Korea the entire country is the giant intranet, where is shared very well filtered information. The methodology is similar to the companies, what are using IP-address based system, where is shared only information, what is allowed by the leaders of the company. But the scale of those macro-sized intranets is much larger than in some company's network.

And also official authorization makes those systems more powerful tools for surveillance more effective than any private network can be. In that infrastructure, people must force to use the software, what is terminating their privacy, and let government agents check their computers whenever they want. Also, those people should force to get surveillance operators to use their web-cameras by remote control to find out, who is with them. If somebody denies those things, that person might send to prison camps for "retraining".

That means that we must be careful, what we are doing with our computers. The virus scanners can protect the network in the many layers, and of course, server-based systems might protect the system even single computers would not have virus scanners.

But this thing requires one thing, every bit what comes to the network and comes from the network must travel through that server. And the thing is that also the communication between computers, which are connected to the network must be routed that also their data would travel through the server. This arrangement is called the star topology.

One of the things, what virus scanners are doing is that they are protecting the network from outer attackers, and the other mission, what virus scanners have is to protect other users from the attacks, what comes from some network. The thing is that if some hacker would use some network as the attack platform, that means the system can cause damages because trust to that operator is gone, but also authorities are making research and investigations.

That means that the offices might be sealed by officials, and the use of the internet is limited from the personnel who are working in that company. Sometimes is introduced a scenario, where saboteurs would connect their devices to the network, what is operated by their competitor for making troubles for the reputation of that company, what they use as an attack platform.

Those attacks might be tracked very soon, and the police would arrive at the headquarters of some company. Even if those attacks would fail, the platform company would get very big losses, because police must search those offices and interview personnel. When we are thinking the antivirus software in this kind of situation, the mission of it might be identified all computers, which are connected to the network.

Also, the system might have a mission to detect computers, which have different settings than other users computers. But when we are returning to think about our favorite tool, the artificial intelligence, that system can detect computers, what seems like hacking tools. The thing is that the creators of artificial intelligence can input the parameters, what can detect the computers, what are used for hacking tools.

The profile of those machines would get from the computers, what the officials are confiscated. Then the settings and programs of those machines would be programmed to artificial intelligence, and it can detect similar settings and programs from the network. But if we could get more data about the actions of hackers, we could use that data to make a model of the hacker, and that model can be used to detect other hackers from the network.

So in this model, the actions of detected hackers would observe, and that data is used to make model and profile, what can compare with other users. In the best case, the data can be collected from entire studies time, if the hacker is a student. And then the officials would arrest that person after graduation, which makes possible to create a full-scale complete profile of that kind of people.

I know this seems utopistic, but during that surveillance time the hacker could be used to share hoax information to the back organization, and also the files, what that person deliver might be equipped with tracking cookie. Tracking code allows detecting people, who are paying for some other reasons to share that information, what is got by using the illegal methods.

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of