The Dark Side Clouds Everything!

October 21, 2008

Senator Palpatine addressing the Senate

 

 

 

 

Senator Palpatine addressing the Senate

We now turn to the Dark Side of computing.

Remember in Star Wars when Palpatine became Chancellor?  He promised to reunite the disaffected, and bring order and justice to the government. After all his own home world had been invaded and his commitment to the Republic was without question. 

 

But the problems were ALL engineered by Palpatine. The corruption, the embargo, the invasion, the separatist movement and the WAR.

 

Everyone trusted him.

Sincerely Deceiving

Sincerely Deceiving

 

He deceived everyone!

  

Even the Jedi Masters were deceived!

 

Finally, when it was too late He fully revealed himself!

The real Palpatine

The real Palpatine

 
 
 
 

How was this possible?

The Dark Side clouds everything!

 

 

The Dark Side of Computing.

 Over 20 Million PC’s are infected with a very clever malware that takes its cue from the Dark Side. Once it enters your computer it pretends to be a part of the Windows Operating System. It redirects the screensaver images to a new folder containing screen captures of Blue Screens (messages that inform the user of the crash of the Operating System).  Then when it is ready, a FALSE Windows image appears.

the Fake virus found message

the Fake virus found message

 When this happens people then update their residing anti-virus software and run it.  While the anti-virus software is scanning, because of the non use time the screen saver kicks in, but because the Windows Operating System has been redirected to a different folder with blue screen images, guess what comes up?

You got it, Blue Screen images !

Blue Screen of Death

Blue Screen of Death

 Now every computer tech knows that when a blue screen appears its “GAME OVER” the computer is locked up.  But what flabbergasts the tech is when he touches the keyboard or mouse, the blue screen disappears and he sees the anti-virus program is still running.  Why ?  Because the system didn’t really crash, the blue screens are only screen savers!  This scenario continues as the “non use limit ” is reached and the screen saver kicks in and another different blue screen appears!  Again when he touches the keyboard or mouse the blue screen disappears and the monitor shows the anti-virus still scanning!  Frustration is not good enough a description to describe the feeling of the user.  Why isn’t the anti-virus working?

Because screensaver images are not virus’!

Finally the malware reveals itself when the next image appears.

the Fake virus found message

the Fake virus found message

  If you press on yes, you are offered to buy an anti-virus that will remove your “virus” for a small sum of

$49.00

Over 20 million people have paid $49.00 for the removal of screensaver images !

Remember:

 Why tempt fate keep your anti virus and anti spyware up to date !

BEWARE OF THE DARK SIDE

Advertisements

WHERE DID MY EMAIL GO?

October 8, 2008

Virtual image of a network cable
Virtual image of a network cable

Or

Why is sending and recieving email to and from a friend no different than driving to Mexico from Los Angeles and back again?

My friend wanted to show off his new spaceship, uh sports car, by inviting me to a trip from Los Angeles to a little sea port village south of Tijuana. His enthusiasm for the fun we would have was quite comical especially the part when he said we would be back the next day.

Did he know it was a weekend? yes.

Did he know it was also a holiday? yes.

Is he crazy? No. He did not understand how traffic flows and the obstacles that he would face, obstacles that he was totally unaware of.  

Did I go with him? No. Did he go anyway? Yes. Did he have any fun? He said he did but sitting for 10 total hours stopping and going at 3 miles an hour in a spaceship no matter how luxurious is not my my idea of fun. 

What was the problem? Going from one network of traffic to another, the border wait. IF you ever have driven to Mexico then the following pictures should trigger your memories of frustration and discomfort.

crossing the boarder to Mexico

crossing the border to Mexico

 

How about coming back?

Leaving Mexico
Leaving Mexico

 

What does this have to do with email?

Well internet traffic is designed after the same model of highways, freeways, roads and border crossings that cars, trucks and motorcycles travel by. 

IP packets and vehicles
IP packets and vehicles

Just like trucks and cars and motorcycles ip-packets that carry your data though the internet are of different sizes and travel different speeds. Remember the anger you felt after 2 hours of waiting at the border to see a motorcycle shoot past your car and all the other motionless traffic to take first place at the border exit? Or maybe you have been stuck behind a slow moving semi and finally were able to accelerate around him and proceed at a faster pace. Or just for fun you wished you had a police interceptor and to go flying down the freeway, way past the speed limit with the siren and lights blaring?

If we imagine that every firewall and router as a border crossing and each motorcycle, car and truck as an IP packet carrying data then we begin to see where the problems can and do happen.

Let me introduce the CHP vehicle of the internet “ping”. “ping” does not behave as other vehicles (IP packets) his job is to patrol the internet when called upon to report access and destination status. He travels at top speed and has total clearance through border crossings (firewalls and routers). 

If you click the  start icon and then left click on run then type in cmd, a black window appears. Type in “ping yahoo.com” then press enter.

You get a report like this:

  

Ping reports that yahoo.com is the ip adress of 68.180.206.184 and it took anywhere from 19 ms( miliseconds) to 23 ms (miliseconds) average speed 21 ms.

So then 21ms is  the speed your data moves to get to yahoo and back?  No!

It’s like being a police interceptor with lights and sirens blaring, that is not normal traffic, this is “ping”.

Now lets check the border crossings i.e. the routers and firewalls.

We will now simulate a packet of data and report the wait time at each border (router and firewall) on the way to yahoo.com

In the same window now type “tracert yahoo.com”.

As it goes through each border (firewall and router) it reports the wait time.  

tracert for Yahoo.com
tracert for Yahoo.com

 

The three columns are the three times it is tried.  

Notice it took 31 ms to leave San Diego but it took over 106 ms to get through Los Angeles!

Also notice the first attempt to get through router 4.69.137.45  in Los Angeles (line 8 ) took 260 ms !

What if we drove across the borders in a semi instead of a cobra sports car (tracert)  would the times be different?

What do you think happens when we add pretty graphics with fancy fonts for our email and attach multiple photo images with sound? Does the word “18 wheeler” mean anything to you?  🙂

IF your vehicle (ip packet) is suspected of carrying contraband (viruses and spyware) it will be rerouted to a different gate to be inspected ! That inspection could take forever! Worst yet your vehicle (ip packet) could be confiscated!

Will I go to Mexico with you?

Only if we travel light and ride motorcycles! 🙂