The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak

Advertisements

The Killer Tomato, Potato and Botnet

December 15, 2009

Here are the last few seconds of this fly’s life before the lighting quick jaws of the venus flytrap leaf snaps shut and the plant begins to digest this fly, pulling the life giving nutrients from the fly to the plant. The venus fly trap (Dionaea muscipula) is labeled a carnivorous plant but not all carnivorous plants capture prey the same way. The standard definition would be “any of several unrelated plants modified to capture and digest animals, especially insects, which supply nitrogen that may otherwise be unavailable in their habitat.”

According to the standard definition; if a plant, because of it’s design, characteristics or attributes, captures and or kills an animal for the purpose of extracting nutrients to be used by the plant, it is carnivorous.

Carnivorous plants don’t digest all their victim only the nutrients it needs. Then when it opens only the structure and shell of the victim is left.

Other carnivorous plants  use nectar mixed with a sap and digestive chemicals to lure and capture the animal like the sundew (Drosera) .

While others are more passive like the  pitcher plant (Nepenthaceae and Sarraceniaceae) who lure insects into an opening that forces them to drown in a pool of water in the center of the plant. Thus extracting the nourishment over time as the animal dissolves in the water.

The problem is there are a whole group of plants that still fit the definition of carnivorous plant but because they do it differently they have never been recognized as been carnivorious.

Ladies and gentleman I introduce the covert carnivorous plants, our well-known tomato and potato plants! All this time we never recognized their carnivorous behavior. For those who grow tomatoes they have always recognised the dead insects on the plant or on the ground around the plant but have generally ignored it.  We never thought about it. I guess we all thought the insects just came to the plant to die. 🙂 The truth, recently accepted without controversy, is the tomato and potato plant lure the insects then the insects are trapped by the sticky hairs on the tomato or potato plant THEN (and here is where we missed it) as the sappy lure dries it finally releases the dead victim to dissolve on the soil to feed the roots of the plant just below the surface.

What does this have to do with Computers?

If you look at a computer program as a kind of life form then you see it needs the nutrients that are available from other computers to grow. So if there is a kind of program that can grow outside its own computer it must lure other computers, capture them then extract or assimilate those computers processor and memory to grow and capture other computers.

Is there such a carnivorous program? If so how big is it?

There are carnivorous programs and they are called  botnets!

How many botnets are there? There are hundreds but there are 16 which are the real monsters and have eaten the lions share of the world’s computers.

Are they dangerous to people? Well that depends on how much of your life is dependent on computers. For illustration purposes let’s use automobiles instead of computers. What if someone could take control away from the driver of a car and completely control it remotely? Could they do any damage? What if they could take control of 100 cars at any moment could they do any damage? Look at the size of  top 5 of these carnivorous programs!

  1. Conficker           35 ,000,000 +   computers controlled
  2. Kraken                     495,000       computers controlled
  3. Srizbi                        450,000      computers controlled
  4. Bobax                       185,000      computers controlled
  5. Rustock                    150,000      computers controlled

HOW DID CONFICKER GROW SO BIG!

After it has infected a target computer (by downloading a Trojan), it tries to prevent it’s removal by disabling anti-virus software and blocking access to security-related web sites, as well as stealing personal information by masquerading as an anti-virus product called Spyware Protect 2009. How ?   The worm informs the user that his computer is infected and takes the user to a fake security Web site, asks them to pay $50 for a spyware program that actually is the Conficker worm, then keeps their credit card information, to boot.

How can you tell if your computer is infected with the conficker worm?

There is a test to see if your computer is infected click here 

Where is the infection mostly located?

 

What should everyone do? Keep their antivirus and antispyware up to date and scan regularly.

Hey I’d rather eat a potato or tomato than be eaten by one! 🙂

 

 by R. Frank Tulak


Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


…They know when your awake. They know if you’ve been bad or good, so ..

January 7, 2009
They see

They see

 

Privacy  has many  definitions, definitions which are dependant on who you are talking to.

 

Donald Kerr, Principal Deputy Director of National Intelligence  perceives the definition of privacy as anonymity. Therefore from his point of view he believes in this day and time that it  is impossible if there is to be security. In other words, privacy is what you and the government know about you and no others; this is for your safety! 

White Hats, Hackers, Phreeks (a portmanteau for phone and geek no I don’t know why there is an “r” in phreek) define privacy another way; that if you have given that information to anyone then they have a right to it as well. What is left is private.

Then there are those that believe privacy is like going to the beach; if you go to the beach your going to be exposed or why did you go to the beach? What is the beach? The internet. This group of marketers who manufacture the majority of spyware feel they are allot like Santa Claus; “who sees you when your sleeping and knows when your awake and knows when you’ve been bad or good..” and for a price will give any information on any and every type of person who uses the internet ( Ho Ho Ho). One of the oldest is http://www.doubleclick.com/: for a list of most of the American companies that write the spyware programs go to   http://www.spywareguide.com/creator_list_full.php?s=m.

The final group of spyware writers is the smallest but the most infamous they are the Black Hats. These have the skills of all those above but are bad guys “black hats“. They are after your computer to make it commit crimes for them; so that the FBI knocks on your door and arrests you and not them. They work to get your name, social security, birth date and credit card numbers. No, they are not thieves who use your credit cards to go to Europe and eat at fancy restaurants and stay at big hotels then throw your card away. These guys are very intelligent and astute. They collect information and credit card info on hundreds of thousands of people. Then they make a $0.14 to $0.24 transaction of each card at the end of each month.  How much is $0.14 X 100,000 ?  Have you ever complained about a $0.14 charge on your credit card? No one does. Where does the money go? The money trail ends in countries at the fringes of international law; to countries in Eastern Europe and private organizations in Pakistan. What do they do with the money? I don’t think its anything legal!

You are probably asking why I mentioned phreeks (phone geeks) in this article about privacy, right? Because many people say they don’t do credit card transactions over the Internet but only over their cell phones. Do I have a surprise for them. Your cell phone is a computer but what is worse it’s a wireless one.  All broadcasts over the airwaves are monitored and recorded by government agencies except the phone you have that has a wire attached; it is illegal for anyone to monitor that wired phone without a judges order and due cause, but not so for wireless. It is the job of the government to record and monitor wireless transmissions, does the letters FCC mean anything to you?  Well it’s only the government that is listening to my orders over the cell phone, right? Ladies and gentleman may I introduce to you the hottest selling item imported from Europe and Canada the Optoelectronics Scout frequency counter and a AOR-8200

The TOOL

The TOOL

Imagine the thrill of listening to every cell phone conversation within 40 miles !
There are tens of thousands of these  in the US.
Are they illegal to own? No!
Are they are illegal to use? YES! but they can not be detected if they are used.
Honestly it’s far safer to use the computer on the internet then a cell phone to transmit personal information.
With the Internet browser set to 128 bit encryption (and there is no spyware on your system) your computer is linked to the transactional computer and is virtually secure against anyone’s eyes while the information is in transit. How do you know its working?
There will be a little padlock either at the top next to the URL (internet address) or bottom right corner of your Internet browser.
Your transactions are secure!

Your transactions are secure!

 
 
.
Privacy to me is very simple.
If I get private with my wife behind closed doors where I can plainly see  the dimples on her cheeks then I guarantee she can see mine .
Privacy is not one way.
Bare truth from both parties is only right.
If they want my privacy then I have a right to theirs or no deal!
The same for the beach!
You want to check me out in a speedo on the beach then you have to be wearing just as little or no deal !
I don’t care how big your belly is !!!
santa_on_holiday_in_spainHO! HO! HO!  

Why is My Computer Problem called a Virus? Why isn’t it called a Bacteria?

December 31, 2008

v6lbl7Virus are not the same as bacteria.

Just as computer viruses are not the same as malware (spyware). If you can imagine an elephant being bit by a mosquito then you have the comparison in size between the bacteria (elephant) and the virus (mosquito).

The question is what is a virus and why is the problem with the computer called a virus?

Well have you ever wondered what is the determining factors for something to be called alive? What makes a rock not alive and a plant and an animal alive? First it consumes and second it grows and developes and  third it reproduces itself. A bacteria does all these things and does it every twenty minutes! What about a virus? It does NONE of these things! 

Bacteria are micro scale and viruses are nano scale.  A bacteria is very complex single cell organism.

untitledPicture in your mind a peach. If you cut it in half and looked at it, what do you see. (We are going to use the peach as an example of a single cell.) The skin would be the cell membrane, the meat of the peach the cell’s cytoplasm but the seed would be the cells nucleus. The nucleus is not really like a seed but more like a small ball of spaghetti. (you can tell I haven’t had diner yet!)  The awesome thing about the strands of spaghetti is the length of the strand and the protein sequence, that length is the sequence of what the cell is to do its whole life! Including its response to any stimuli (things that happen to it).

Its just like the programing code for a computer operating system!

Didn’t know that the spaghetti like nucleus of a cell (DNA) was modeled after a computer’s operating system, did you?  (smile) Just joking.

What about the virus?  Well it’s just a little snippet of the the spaghetti like strand of code in the nucleus of the cell in a fancy delevery box!

t4bacteriophageThis is a electron microscope image of a virus (bacteriophage) that is harmless to us but deadly to bacteria.

The little appendages lock on to the elephantine bacteria while the shaft penetrates the cell membrane injecting the small package of a piece of spaghetti (protein code, DNA) from it little head into the cell. Once into the cell necleus it attach’s to the spaghetti code and reprograms the cell to literally dismantle itself and make copies of the virus! When the whole cell is transformed internally to nothing but virus clones the cell burst open and releases thousands of the little critters! Guess what they go and do?

Well now back to computers.

So what would you call a little snippet of computer code that takes the computers resources away to replicate itself as many times as it can destroying the computer’s operating system and using that system to infect other systems? Right, a virus!

What would you call a small yet complete program that grows inside your computer’s system taking data and information, processes it and develops and finally replicates itself? Bacteria?

No its called malware or spyware.

Wait if small snippets of code that screws up your computer is called a virus then complete programs that process your personal information to send it to another location and replicates itself should be called Bacteria, right?

Yeah, but if you said your computer had a bacteria instead of malware or spyware people would think that you were weird though you would be logically correct.

I’m hungry, I’m going to get me some spaghetti, want to join me, there is peach for desert 🙂