You know.. when I played this game.. it made me wonder...

Inactive threads from other boards are stored here.
User avatar
Tsukaru
Player Character
Posts: 378
Joined: Fri Jan 30, 2004 12:05 am

Post by Tsukaru »

EXAMPLE: Let us say Yahoo! had a pretty big virus on it. That would not effect google, or AOL or anyother server. All that it would effect is yahoo itself, it would not really effect your PC either. But PCs can have viruses that lock down your computer for good, but mostly if the person who owns the computer can put that virus on, OR if the computer is connected to school computers or even a friends computer than your friend or someone at school can put a virus on it, or on there own computer and it would greatly effect yours. So dont connect computers with anyone you cant trust, or any Boy friends.........trust me not a good thing.....
Image
User avatar
Bear
Mr. Flibble's Very Cross
Posts: 792
Joined: Wed Feb 05, 2003 6:50 am

Post by Bear »

Dealing with computer security is a major part of what I do, so I can say authoritatively that discussing this to the fullest extent would take...a very, very long time. It's not a simple thing. I'll take a stab at clarifying what I've said. My apologies if I go off ranting or this isn't what you were looking for - it's been a hectic week so far and I'm tired. ^_^;

Cyral: the servers for most large Web sites do run some kind of UNIX system (such as Linux, Solaris, or FreeBSD), not Windows. See the Netcraft link I posted earlier; almost all Apache installations are on UNIX.

The term "virus" is very often used to indicate things that really aren't virii, and when talking about whether something could affect a large chunk of the Internet, it's important to understand the differences. Here's a brief off-the-cuff encyclopedia of nasty software. As you can probably imagine, many of these traits may be combined in a single piece of software.

Malware: Malicious software in general.

Virus: A self-replicating segment of computer code that "piggybacks" on another computer program, adding its own (generally hidden) functionality. When an infected program is run, the virus code will generally spread, automatically adding itself to other programs and possibly doing other things. Most malicious pieces of software nowadays are not virii: modifying another program's code is inherently cumbersome, and there are much faster, more effective, and nastier ways to spread. In the old days, computers were not directly connected, so malware couldn't automatically contact other computers; it had to rely on the user unwittingly giving someone else a copy of an infected program.

Trojan horse: A program that claims to do one thing, and does something else (generally hidden), either instead of or in addition to the claimed functionality. Some trojan horse programs are simply "droppers" that release a virus or worm into a system; others are more straightforward and will play rude noises, delete files, etc.

Exploit: Software specifically designed to make use of a flaw in the design or programming of another program or system, so as to make the target do something (e.g. grant access) that it ordinarily would not.

Worm: Presently the most common, and arguably the most dangerous, type of malware. A worm runs its program code on a system by making use of either social engineering (a user's naivete - e.g. masquerading as a legitimate e-mail attachment) or an exploit. Once it's on the system, it will then spread by automatically e-mailing itself to any address that it can find, scanning the Internet for computers that it can exploit, adding itself to file-sharing software upload directories with an enticing name (a trojan horse technique), etc., etc. The recent MyDoom worm is an example of how effective this can be.

Spyware: Software that reports aspects of how you use your computer, and/or the Internet, to another party. Spyware is frequently included with other software (both commercial and free), and is only mentioned on page 14 of the 20-page license agreement. This software is generally legal, due to the clauses in the agreement. There is often no visible sign that it is being installed and run. Some Web pages will also automatically redirect you to a download for spyware, which many people will reflexively click "Yes" on. Spyware is generally only written for Windows, since it's the most popular consumer computing platform, and it (especially Internet Explorer) is conducive to the kind of tricks that can be used to do a hidden installation.

Adware: Software that displays additional ads on your computer, often installed and hidden using the same methods as spyware. A good sign that you've got adware: popup ads on Google, or other sites that don't actually have them. Again, generally only for Windows, and generally legal.

Keylogger: A program that records keystrokes, mouse movements, etc. This is one of the most insidious kinds of malware, and is generally installed deliberately by a person who has physical access to the computer or has broken into it over the Internet. Using a program like this is, arguably, illegal wiretap unless all parties using the computer (and, in some states, all parties who communicate over the Internet with anyone using the computer!) either consent to it in advance or do not have an expectation of privacy. In other words, it's a Bad Idea. Talk to a lawyer.

Dialer: Software that either secretly or overtly makes a computer's modem dial a telephone number. The telephone number will often turn out to be an exorbitant toll call. Many dialer programs promise free pornography.

Backdoor or rootkit: A piece of software designed to undetectably modify the system in some way so as to allow future access to unauthorized individuals. Some are more undetectable than others; many are detectable if you know what to look for, and all are detectable if you're an expert with a whole lot of time and a good computer forensics toolkit. Almost always illegal to install.

Virii, spyware and adware are extremely rare on UNIX systems. A virus depends on editing other programs' code. UNIX is designed from the ground up as a multiple-user system, and as such, one user's programs cannot reach out and edit another's. Most programs are installed system-wide, rather than for just one user, and can only be changed by the "root" (administrative) user. The first things most UNIX system owners learn are to never use the root account unless it's necessary, and to never, ever run suspicious software as root. Trained and/or experienced sysadmins (system administrators) keep themselves constantly informed about new exploits and apply security updates as soon as they're available, and know how to recognize the activity of a worm or rootkit.

In summary: Don't believe what you see in the movies - or in anime - about computer security. It's probably wrong, and it's certainly oversimplified. ^_^
User avatar
kboy7
Player Character
Posts: 478
Joined: Sun Dec 07, 2003 5:33 am

Post by kboy7 »

.............................................Whoa. That is a lot.
http://kmhearts.proboards43.com
kingdom Hearts forum ... Over 2000 posts and counting!
Image
User avatar
Tsukaru
Player Character
Posts: 378
Joined: Fri Jan 30, 2004 12:05 am

Post by Tsukaru »

You made me tired just reading it....wow....
Image
User avatar
kboy7
Player Character
Posts: 478
Joined: Sun Dec 07, 2003 5:33 am

Post by kboy7 »

Yeah that is pretty much what I was thinking.
http://kmhearts.proboards43.com
kingdom Hearts forum ... Over 2000 posts and counting!
Image
User avatar
krono7
Player Character
Posts: 148
Joined: Thu Jan 29, 2004 12:04 am

Post by krono7 »

whoa thats alot of typing and tose are all different types of viruses?
krono7 100 posts!!!
What an unusual bracelet.
I've never seen that before.
I can even smell the rarity!
Sniff Sniff.-Mireille Chan
User avatar
kboy7
Player Character
Posts: 478
Joined: Sun Dec 07, 2003 5:33 am

Post by kboy7 »

I don't think they are all considered viruses but I could be wrong.
http://kmhearts.proboards43.com
kingdom Hearts forum ... Over 2000 posts and counting!
Image
User avatar
krono7
Player Character
Posts: 148
Joined: Thu Jan 29, 2004 12:04 am

Post by krono7 »

oh it was kinda confusing the way he wrote it then
krono7 100 posts!!!
What an unusual bracelet.
I've never seen that before.
I can even smell the rarity!
Sniff Sniff.-Mireille Chan
User avatar
Bear
Mr. Flibble's Very Cross
Posts: 792
Joined: Wed Feb 05, 2003 6:50 am

Post by Bear »

krono7 wrote:whoa thats alot of typing and tose are all different types of viruses?
Bear wrote:The term "virus" is very often used to indicate things that really aren't virii, and when talking about whether something could affect a large chunk of the Internet, it's important to understand the differences. Here's a brief off-the-cuff encyclopedia of nasty software.
User avatar
Haiikari
Lowbie
Posts: 26
Joined: Sun Nov 30, 2003 11:33 pm

Post by Haiikari »

Alright here's another example of a world spreading virus... remember when the I Love You e-mail was sent out almost through the world? That was a HUGE virus, what would happen if something like that got out, except it was even worse? Don't you think SOMETHING crazy would mess up in the world? Just a thought though.... :?
Pity, that the things we seek most in life, we never seem to find... And the things we fear seeking the most, always seem to find us...
User avatar
Haiikari
Lowbie
Posts: 26
Joined: Sun Nov 30, 2003 11:33 pm

Post by Haiikari »

But of course I have to ask ONE question. If a human creates a virus/software/machine whatever, is it REALLY possible for the creation to take over the creator? This is WAY of subject, but the movie Charley these scientist took a mentally challenged person and did a surgery to make him three times smarter. His IQ was 63 to begin with so it was above 200 by the time the surgery was over. Everybody was scared of Charley because they didn't understand how he was so intelligent. I think this is kinda similar to what we're talkin about :? idk though just a thought.....
Pity, that the things we seek most in life, we never seem to find... And the things we fear seeking the most, always seem to find us...
User avatar
MeultimaSama
Player Character
Posts: 346
Joined: Mon Sep 22, 2003 6:50 pm

Post by MeultimaSama »

Lain will devour your soul!!! Bwuahahaha....I had to say that.
Image
User avatar
thedudewhosadude
Legend
Posts: 1462
Joined: Fri May 02, 2003 8:13 pm

Post by thedudewhosadude »

0_0 Haiikari, i just saw that movie in school the other day! We were doing a book-movie comparison on that! The book's called Flowers for Algernon or however the hell you spell his name. In my opinion, it explains everything better than the movie. Anyway, it is quite possible for that to happen, and it does. An example would be Orca and Kite. Orca introduced Kite to 'The World', and was unable to defeat Skeith (or at least damage him) at level 50. You were able to defeat him in the range of lv.25-30. By //OUTBREAK, you've already surpassed Orca's power. In the case of person to machine, it could happen. Let's take DDR for example. The developers made several options to make gameplay more difficult and varied (shuffle, boost, stealth, etc.) However, things like shuffle just make the arrows random. The programmers may be able to predict what set of random arrows appear, but they will always make more and more additions to it. An example of DDR surpassing its creator would be MAX PARINOIA/MAX 300/Healing Vision Angelic Mix on Heavy, with the speed set to x8, with boost, steath, and shuffle. I highly doubt the developers would be able to do that.
You're only young once, but you're NEVER too old to be immature.
User avatar
Xhacker
Legend
Posts: 554
Joined: Wed Feb 11, 2004 9:59 pm

Post by Xhacker »

All that I have to say is that there is always a way to bypass a system. Thus, if a person bypasses a website,such as AOL, they can send a spike directly to AOL, making it so that they can have temporary control over the website. Or the person could simply steal stock and/or company bank accounts.
User avatar
Bear
Mr. Flibble's Very Cross
Posts: 792
Joined: Wed Feb 05, 2003 6:50 am

Post by Bear »

Xhacker wrote:All that I have to say is that there is always a way to bypass a system. Thus, if a person bypasses a website,such as AOL, they can send a spike directly to AOL, making it so that they can have temporary control over the website. Or the person could simply steal stock and/or company bank accounts.
It's...a lot more complicated than that. ^_^;
Haiikari wrote:Alright here's another example of a world spreading virus... remember when the I Love You e-mail was sent out almost through the world? That was a HUGE virus, what would happen if something like that got out, except it was even worse? Don't you think SOMETHING crazy would mess up in the world? Just a thought though.... :?
The SQL Slammer worm, a while back, was actually the worst I've seen so far. It didn't affect consumer machines, so isn't as well known as many recent worms, but it actually took down large portions of the Internet for a few hours.

Until most of the Internet backbones totally blocked the traffic pattern, returning everything to normal in a matter of moments. A couple of ATM networks had some trouble that day and the next. The details are confidential, but they probably weren't sufficiently isolated from the Internet, which I imagine is now corrected. (When something as major as an ATM network has widespread problems for a day, people get fired, particularly when it's a major security policy violation such as that.)

That's all that happened, and in the grand scheme of things, that isn't bad at all. Even if a totally new virus or worm came out, and were specifically programmed to destroy data, only some consumers and small businesses would be badly hurt. Almost everyone else, especially critical infrastructure providers, makes numerous and frequent backup copies of all of their data.

There really isn't all that much that absolutely depends on the Internet; the truly important things that do depend on it are very well protected security-wise, to the point where a virus or worm would just slide off.
Locked