Skip to main content

Devil's best trick is to claim, that he is not exist



Kimmo Huosionmaa

When we are talking about intruders of data systems, we must know that those intruders might be people who have spent years in the system, before they begin to leak information. This kind of intruder is harmful and hard to remove because he or she had become a member of the team. And that's why those sleepers are very hard to locate and isolate. Many people noticed that is written with spy term, what is in John  Lé Carre's novels.


Those methods are used in everyday life of industrial spying and information stealers world. A methodology of this kind of operation is, that when spying organization will get one person to the certain position of the system, he or she can make very much harm to that system. An agent might use harassment as a weapon with fumigate other workers out of their job and replace them with people like him or herself. That's why in systems must use offensive security, where security workers work undercover that they see what really is going on in their system.


That real-life sleeper is an agent who is put in the system, and that way make very much trouble to his or her clients. The best place to put that sleeper is some antivirus software company's coder, where that person can pollute many systems with malware code. Agent means a hostile operator, who works against companies interests. Normally those agents are very social and people want to believe their stories about how fine workers they are. But when we are talking about agents, we must realize that those persons are more often normal criminals that some governmental workers.


They might work for some criminal organization, what is led by organized crime, whose interests are stealing money from banks with hacking. Those operators might want to steal money from many bank accounts, what means that crime might stay out of security personnel's eye. That kind of criminals might steal the only couple of euros from millions of bank accounts, and because the transfer is so little, some people won't even notice, that their account is missing one or two euros.


And using this "cheese slider" methodology, those gangsters might take a couple of transfers in the same bank. If those people are clever, and use port accounts in many banks, to collect that stolen money in data form. Many gangsters make that kind of mistake, that they steal too much. If somebody realizes suddenly that his or her account is empty, that person normally calls to police. And that makes those money transfers easily to track. Where those people need an agent? They need that person to put their malware program to the server.


That kind of operations must be done outside from building because if all actions will happen inside from house, will data tracked immediately. But when gangsters will make them transfers with remote using the computer, they need access card and another kind of stuff, that they can accomplish the mission. But the problem is that bank's central computer will collect data of those transfers, and if gangsters have done that kind of operation they must destroy that database, that bank can't track them from the net. And that action must be done by malware because if that action is done by the agent the all actions will be uncovered by inner circle job.


But how an agent will rise to that kind of place, where that person make unlimited actions inside that network? Normally the agent will make him needful and helpful actor in the system. That rises he or she social rank in other person eyes. And what makes computer security team suspect that there is an agent inside the system, is that there is more so-called "little mistakes or errors" in system. How can data projector cut communication to the computer if cables are untouchable? Answer in machine or component called router.


Some operator must only disband that data port, and after that computer can't get the connection to the projector.  Normally that happens by giving router orders to shut down that gate what allows communication between data-projector and computer. After that even the best ICT-specialists can't get computer's screen to data-projector. What makes people harass other. One answer is that they do it for money, that somebody can replace some workers with the new one.

https://crisisofdemocracticstates.blogspot.fi/

Comments

Popular posts from this blog

Antigravity will be the greatest thing. That we have ever created.

"Artistic depiction of a fictional anti-gravity vehicle" (Wikipedia, Anti-gravity) Sometimes, if the airships have the same lifting power as the weight of the airship.  It can act like some “antigravity system”. Those systems are based on lighter-than-air gas or hot air. The system can have a helium tank. And the hot-air section whose temperature can be adjusted using microwaves or particles that lasers warm. Those systems are faster to control than some gas flames. This makes it possible. To adjust the lifting power.  If a thing like a balloon has the same lifting power as its weight, the balloon can be lifted to a certain point and altitude. And the balloon stands at that point until something moves it. That kind of thing can make an impression. On the antigravity systems. Modern airships. Like Lockheed-Martin P-791 can look. Like a “UFO”. The system can use systems to move the craft. Or maybe those ion systems are used for plasma stealth systems, if those airships' mis...

The first test flight of X-59 QueSST

The X-59 QueSST (Quiet Supersonic Technology) demonstrator is the next generation of aircraft design. The QueSST technology means. The aircraft creates a gentler sonic boom. Because its wings are radically long and narrow delta wings, and its nose is also radically long, which makes the sonic pressure cone thinner. That technology makes the sonic boom quieter.  The QueSST technology in X-59 is a new and radical design. All of those systems are caricatures. And the final solutions might look far different than the prototypes. The QueSST technology is one of the things. That is planned to be used. It is used in military and civil applications. If that technology is successful. It can be used in manned and unmanned systems. But that requires more work.  The X-59 also uses fundamental technology. Where the pilot must not have windows. To see outside. The camera and other sensors replace traditional windows. And that can be useful in more advanced aircraft that operate at hypersoni...

The theory about paralleled universes

http://crisisofdemocracticstates.blogspot.fi/p/the-theory-about-paralleled-universes.html Kimmo Huosionmaa There is the quite unknown theory about paralleled universes. In this theory, there is not a single universe. Universes are like pearls in the pearl necklace, and there could be the connection between those universes. The connection to other universes would make possible the channel what is forming when the black hole would make the gravity tunnel to another universe. And in the paralleled universe theory, there could be millions of universes in the line, and this is also known as "Multiverse-theory". This theory was established when the galaxy-groups were noticed by astronomers. In that time were noticed that there are so-called super-groups of the galaxy, and those super-groups, where we're so much galaxy that galaxy involved stars made some cosmologists think that maybe there is also groups of universes in the emptiness. This kind of structures is so enormo...