Skip to main content

Firewall "the guardian angel" of the network

 

 
Firewall "the guardian angel" of the network

The password hacking programs are normally the dictionary books, what are connecting to the program, what can fill the forms of the screen. The thing, that those programs can also make is to change the IP-Address of the attacking system, which gives it more opportunities to test the passwords for the targeting system. 

Normally firewall detects the number of errors in the use of passwords, and if the system is properly made, certain false attempts to log in the system cause the denying of the IP-address. Or while the system would make BizTalk with the systems, what are attempting to log in, but what has the unusual error-level in the attempting to log in that system can send the tracking cookie to that kind of system. 

If we are thinking about the secured systems they would keep some secrets, which people might not know. And one of them is that if the logging in is made by using the computer, what is not in the proper environment, that thing causes alarm. The other thing is that the tracking systems can use biometric recognition along with passwords, which means that the system can see if there is somebody else using the computer or some other person standing in the room with the user. 

Also learning artificial intelligent algorithms see, what kind of homepages those users normally are using. Things like the average number of attempts to log in can be stored in a database and that thing makes it possible to see, what kind of person uses the system. And if there is some kind of unusual errors or anomalies the systems, what are guarding the systems would detect that thing. 

The thing is that there might be many action models if the controllers of the system detect anomalies. One is that the security director would call the police, but another is that the system would lead the hacker to the honey bot. That kind of system is created to track the hackers. But there is a possibility that the system would involve the very many files, which are looking involving very interesting data about all kinds of products, what the company makes. 

That makes possible to make a profile about the hackers. The files that are stored in the honey pot would involve interesting looking, but useless data of the systems, which cannot even produce. What kind of files those hackers have been chosen for downloading are giving the tip of the motive of hackers. The nature activists are normally looking for data on the poisonous chemicals and other kinds of things. 

But the people who are working for the professional industrial spies are looking for research and development of sophisticated computer programs. And the other thing, what is interesting about the industrial spies is data of the military industry and especially high-tech weapons. That data can also interest human rights-activists. But the algorithms are the modern-day version of the guardian angels. They are watching the system all day and night. 

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of