The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak

Advertisements

Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Why is My Computer Problem called a Virus? Why isn’t it called a Bacteria?

December 31, 2008

v6lbl7Virus are not the same as bacteria.

Just as computer viruses are not the same as malware (spyware). If you can imagine an elephant being bit by a mosquito then you have the comparison in size between the bacteria (elephant) and the virus (mosquito).

The question is what is a virus and why is the problem with the computer called a virus?

Well have you ever wondered what is the determining factors for something to be called alive? What makes a rock not alive and a plant and an animal alive? First it consumes and second it grows and developes and  third it reproduces itself. A bacteria does all these things and does it every twenty minutes! What about a virus? It does NONE of these things! 

Bacteria are micro scale and viruses are nano scale.  A bacteria is very complex single cell organism.

untitledPicture in your mind a peach. If you cut it in half and looked at it, what do you see. (We are going to use the peach as an example of a single cell.) The skin would be the cell membrane, the meat of the peach the cell’s cytoplasm but the seed would be the cells nucleus. The nucleus is not really like a seed but more like a small ball of spaghetti. (you can tell I haven’t had diner yet!)  The awesome thing about the strands of spaghetti is the length of the strand and the protein sequence, that length is the sequence of what the cell is to do its whole life! Including its response to any stimuli (things that happen to it).

Its just like the programing code for a computer operating system!

Didn’t know that the spaghetti like nucleus of a cell (DNA) was modeled after a computer’s operating system, did you?  (smile) Just joking.

What about the virus?  Well it’s just a little snippet of the the spaghetti like strand of code in the nucleus of the cell in a fancy delevery box!

t4bacteriophageThis is a electron microscope image of a virus (bacteriophage) that is harmless to us but deadly to bacteria.

The little appendages lock on to the elephantine bacteria while the shaft penetrates the cell membrane injecting the small package of a piece of spaghetti (protein code, DNA) from it little head into the cell. Once into the cell necleus it attach’s to the spaghetti code and reprograms the cell to literally dismantle itself and make copies of the virus! When the whole cell is transformed internally to nothing but virus clones the cell burst open and releases thousands of the little critters! Guess what they go and do?

Well now back to computers.

So what would you call a little snippet of computer code that takes the computers resources away to replicate itself as many times as it can destroying the computer’s operating system and using that system to infect other systems? Right, a virus!

What would you call a small yet complete program that grows inside your computer’s system taking data and information, processes it and develops and finally replicates itself? Bacteria?

No its called malware or spyware.

Wait if small snippets of code that screws up your computer is called a virus then complete programs that process your personal information to send it to another location and replicates itself should be called Bacteria, right?

Yeah, but if you said your computer had a bacteria instead of malware or spyware people would think that you were weird though you would be logically correct.

I’m hungry, I’m going to get me some spaghetti, want to join me, there is peach for desert 🙂