National
commentator Bill O'Reilly's latest commentary begins with "What is
really dividing America?" This simple statement accepts the division
while begging an answer. On the one had, it is a confession there is a
division. No longer is there a fiction of division. On the other hand,
it confesses the division is a matter of concern, discussion, and hopes
for resolution. It seeks for a solution. There is none.
You can
talk about a division. We all do this, sometimes just to make a point. But when you cite it as a
given, this is yet another proposition. When you say there is no
solution to a division, you are inviting an irresolute situation. This
can be divisive; this can be derisive; this can be deadly.
Monday, August 12, 2013
Tuesday, August 6, 2013
The Ultimate Virus
The ultimate computer virus is this. Suppose you are infected by some virus, probably detected by your virus software. This is great. You feel secure, invulnerable, unassailable, comfortable. You can do what you will. Protected, you are. So, you think, and so do I.
But suppose that virus that is soon detected and carefully destroyed has already done its damage. It has infected your virus detection agent. When you update it, as you will, the software downloaded originates at some alternate site. You will never see the undetectable URL. It will download and install the virus laden software that surely will appear to function as intended. It will even find stuff that may not be there. You feel secure, invulnerable, unassailable, comfortable. But for certain viruses and other malware - theirs - your system is now totally and irretrievably corrupted. The now scurrilous software may now serve for key-logging, may extract passcodes, may analyze key-words, or may determine account numbers.
Such an advent could compromise any encryption software you may be applying.
You think this is silly, beyond the pale. One rule of thumb is that if you can conceive the notion, and it is possible, it exists. The concept of a covert spy spying upon spies (except one) is a tactical element that has been extant for centuries. Why not with software?
The purveyors of this cannot be detected, and live beyond any knowledge. They can become known only through their own errors of application - a variation of greed or counter-deception.
But suppose that virus that is soon detected and carefully destroyed has already done its damage. It has infected your virus detection agent. When you update it, as you will, the software downloaded originates at some alternate site. You will never see the undetectable URL. It will download and install the virus laden software that surely will appear to function as intended. It will even find stuff that may not be there. You feel secure, invulnerable, unassailable, comfortable. But for certain viruses and other malware - theirs - your system is now totally and irretrievably corrupted. The now scurrilous software may now serve for key-logging, may extract passcodes, may analyze key-words, or may determine account numbers.
Such an advent could compromise any encryption software you may be applying.
You think this is silly, beyond the pale. One rule of thumb is that if you can conceive the notion, and it is possible, it exists. The concept of a covert spy spying upon spies (except one) is a tactical element that has been extant for centuries. Why not with software?
The purveyors of this cannot be detected, and live beyond any knowledge. They can become known only through their own errors of application - a variation of greed or counter-deception.
Subscribe to:
Comments (Atom)