Posted on 12/11/2011 10:13:19 PM PST by neverdem
When the Conficker computer worm was unleashed on the world in November 2008, cyber-security experts didnt know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption code so sophisticated that only a very few people could have deployed it. For the first time ever, the cyber-security elites of the world have joined forces in a high-tech game of cops and robbers, trying to find Confickers creators and defeat them. The cops are failing. And now the worm lies there, waiting
The first surprising thing about the worm that landed in Philip Porrass digital petri dish 18 months ago was how fast it grew.
He first spotted it on Thursday, November 20, 2008. Computer-security experts around the world who didnt take notice of it that first day soon did. Porras is part of a loose community of high-level geeks who guard computer systems and monitor the health of the Internet by maintaining honeypots, unprotected computers irresistible to malware, or malicious software. A honeypot is either a real computer or a virtual one within a larger computer designed to snare malware. There are also honeynets, which are networks of honeypots. A worm is a cunningly efficient little packet of data in computer code, designed to slip inside a computer and set up shop without attracting attention, and to do what this one was so good at: replicate itself.
Most of what honeypots snare is routine, the viral annoyances that have bedeviled computer-users everywhere for the past 15 years or so, illustrating the principle that any new tool, no matter how useful to humankind, will eventually be used for harm. Viruses are responsible for such things as the spamming of your inbox with penis-enlargement come-ons or...
(Excerpt) Read more at theatlantic.com ...
bfl
The Article is dated June 2010, that means you are only looking at and reading a virtual computer screen. Your computer memory has been erased and replaced by information the Obama Administration wants you to know.
-——Anyone who designs worms or viruses needs the death penalty——
The designers and implementers of Stuxnet deserve a medal. They have likely prevented a nuclear war
Bookmark for later reading.
It’s difficult because if you know how to do this, you also know hoe to protect yourself from being identified.
thanks
Take a crack at a out-of-date encryption algorithm, and get back to us.
Sometimes rocket science is rocket science.
Renegade Mossad/CIA ?
http://www.freerepublic.com/focus/f-news/2815101/postsFri Dec 2, 2011 5:23am EST
(Reuters) - A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran’s nuclear program in 2010 to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions of PCs.
Thanks Ultra Sonic 007. And I agree with those above who favor the death penalty for these worm- and virus-writers.
BTW, I don’t necessary mean, “after a fair trial”.
and yet Iran is still a huge threat isn’t it?
Mostly I was speaking for those “civilians” who just use their computer for “normal” use.
Not government spooks “trying” to stop radical nutcases.
But, I still stand by my statement.
Someone could make a cool movie out of this guy's livelihood.
I WANNA KNOW
WHERE MY PIE AT, FOO'?
My computer didn’t get Conficker. I feel left out...
Also the big question has to be who is moneyed enough and influential enough to put together a group like this and also has a motive. I wonder if it isn't the "one worlders". It seems to be someone who has an interest in controlling the whole world at some level
China.
——yet Iran is still a huge threat isnt it?——
Perhaps not. The edge seems to have been removed and the sword is pretty dull. Iran has been relieved of the strongest offensive capabilities for the time being
bfl
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.