Monday, September 17, 2007

Who Is Watching You?

Emails are not the only way of delivering trojans onto your hard-drive – if you unwisely click on any links in them – but online in any direction you go cyber-cruising is fraught with a never ending minefield you will have to tread extremely carefully to avoid infection by virus or trojan.

In another article I wrote about trojans being downloaded by unsuspecting visitors to blogs clicking on a link in a 'comment' and leading to downloading a trojan – not the expected pdf or other information.

The sophisticated ease by which trojan writers can make these 'virtual spies' and send them out to the gullible populace online is breathtaking in it's concept.

Underground hacker sites are forums for discussing how to make 'worms', 'virus' and 'trojan' code work to do whatever the intended use is. A lot of these users of these underground hacker forums are 'script kiddies' with no more sophistication than any other 'normal' ten or twelve year old – but the damage by what they do can run into billions of dollars in costs for the 'clean-up' of servers and hard-drives – the anti-virus makers are making a killing selling the latest product to find and remove trojans and virus code from hard-drives world-wide.

The explosion of 'malware' is giving concern to security experts who have the task of securing networks of computers that may encompass the world, and therefore, the entry points for such 'malware' are numbered in their thousands – very large sites with bank and credit card details are especially targeted for information by trojans in particular.

“Worms' are also traveling the internet right now looking to land on any network of computers they can find – it's impossible to get rid of them, you would have to close the internet down altogether to do that – they are designed to look for bank account numbers, credit card details, password and username pairs – giving access to such online organizations as Paypal, Ebay, Etrade, Wellsfargo and many others.

“Worms' are coding that 'learns' and then 'mutates' to adapt to what it has learned – it then replicates itself in all directions it can go to land on yet more hard-drives. The coding of a 'worm' can be totally different to a 'worm' on some other computer somewhere else, due to the fact that they 'learn' and add code as they travel different networks – so therefore, anti-virus software may not detect the 'signature' of a 'worm' on a different network at all, leading to anti-virus software makers sleepless nights trying to keep up with all the different 'signatures' required to download to their subscribers so as to keep their software – reasonably - up to date with anti-viral 'definitions'.

On some underground hacker forums a 'phishing kit' is available for free download – this allows username and password pairs for internet banking to be discovered and the information can be emailed to a 'throw-away' email address inbox to garner the details – but not only the user of the 'phishing kit' gets the information – but the maker of the kit gets this information emailed to them as well.

If you thought – quite reasonably – that makers of trojans had to have a degree in programming languages – think again. Any 'script kiddies' can make a very sophisticated trojan to do whatever it's intended use is determined by the juvenile miscreant, in a software package called 'Shark2' – it's for free download and the program allows for inputting various attributes you want to imbue in the trojan via an intuitive interface – and just click and your trojan code is ready for business.

It is known that a miscreant can add instructions into the trojan code quite easily to operate software on a hard-drive, and even – switch on the 'web cam' to see what unsuspecting users are actually doing in the room near their machines.

Tony Dean is a published author and writer of many topics and runs two web sites at:- http://www.worldnetsources.info and http://www.baltic-european.com

Labels: , , ,

Saturday, September 15, 2007

Way to Artificial Intelligence

The general perception of information technology and computers in particular has been that of a computing mechanism primarily used to manipulate data and present it in various ways. The comparison with human intelligence has been rather tenuous and in the realm of science fiction. It may therefore come as a surprise to many that scientists and engineers have been working on systems which may replicate organic intelligence in future. In fact, many algorithms and software have already been designed to mimic real intelligence.

Artificial intelligence has found widespread use in biometrics. Fingerprint readers are commonplace and are extensively deployed in access control systems. Face and iris recognition have lately become popular security devices.

Expert systems are a branch of artificial intelligence where computers are used to play the role of experts. They are also known as decision support systems and were first deployed by the military. They are used to help military commanders to take tactical decisions under battle conditions. Sometimes the amount of processing and calculations on the field can best be solved by expert systems. As the name suggests, state of the art technology can at present only help in assisting people in taking decisions. However, researchers in this field are confident in creating expert systems which will completely replace human interface.

Robotics is another exciting area under the umbrella of artificial intelligence. As of now, robots are assisting humans in automating factory operations. Computer aided design and computer aided manufacture are already crafting complex mechanical devices with high accuracy. Robots are also used in mines and restricted places for operations which are dangerous for human beings. They are also used in conducting delicate surgeries in hospitals.

Other terms which are associated with artificial intelligence are neural network and fuzzy logic. Neural networks as the name suggests is a type of system which is designed to replicate human decision process. The tree like structure with different path in the decision process forms the units of a neural network. It is evident that neural networks are essentially hierarchical and follow a definite pattern.

As against a rule based approach, fuzzy logic claims a more exalted place in the pantheons of artificial intelligence. Some scientists believe that human intelligence is not pure logic and has an enormous amount of fuzziness. Two people under similar circumstances may very well behave in different fashion. They therefore conclude that true intelligence is actually fuzzy. However in practice, it is not easy to mathematically model fuzziness. Probability and random number theory have assumed importance and these concepts are used widely in designing systems with fuzzy logic.

The subset of artificial intelligence consists of Expert systems with decision support systems and Robotics. These are implemented with neural networks or fuzzy logic. Human brain is too complex and the logic widely dispersed, to be replicated in its entirety. Therefore those mechanical activities which do not require much logic and are hierarchical in nature are best suited for present day applications .A day will certainly come when human intelligence is fully replicated by artificial means, though it may not happen in the immediate future.

Copyright (c) 2007 Dean Barnard

Join us at Deans IT Support and I will be in touch soon friend.

Labels: , , ,