The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak

Advertisements

The Killer Tomato, Potato and Botnet

December 15, 2009

Here are the last few seconds of this fly’s life before the lighting quick jaws of the venus flytrap leaf snaps shut and the plant begins to digest this fly, pulling the life giving nutrients from the fly to the plant. The venus fly trap (Dionaea muscipula) is labeled a carnivorous plant but not all carnivorous plants capture prey the same way. The standard definition would be “any of several unrelated plants modified to capture and digest animals, especially insects, which supply nitrogen that may otherwise be unavailable in their habitat.”

According to the standard definition; if a plant, because of it’s design, characteristics or attributes, captures and or kills an animal for the purpose of extracting nutrients to be used by the plant, it is carnivorous.

Carnivorous plants don’t digest all their victim only the nutrients it needs. Then when it opens only the structure and shell of the victim is left.

Other carnivorous plants  use nectar mixed with a sap and digestive chemicals to lure and capture the animal like the sundew (Drosera) .

While others are more passive like the  pitcher plant (Nepenthaceae and Sarraceniaceae) who lure insects into an opening that forces them to drown in a pool of water in the center of the plant. Thus extracting the nourishment over time as the animal dissolves in the water.

The problem is there are a whole group of plants that still fit the definition of carnivorous plant but because they do it differently they have never been recognized as been carnivorious.

Ladies and gentleman I introduce the covert carnivorous plants, our well-known tomato and potato plants! All this time we never recognized their carnivorous behavior. For those who grow tomatoes they have always recognised the dead insects on the plant or on the ground around the plant but have generally ignored it.  We never thought about it. I guess we all thought the insects just came to the plant to die. 🙂 The truth, recently accepted without controversy, is the tomato and potato plant lure the insects then the insects are trapped by the sticky hairs on the tomato or potato plant THEN (and here is where we missed it) as the sappy lure dries it finally releases the dead victim to dissolve on the soil to feed the roots of the plant just below the surface.

What does this have to do with Computers?

If you look at a computer program as a kind of life form then you see it needs the nutrients that are available from other computers to grow. So if there is a kind of program that can grow outside its own computer it must lure other computers, capture them then extract or assimilate those computers processor and memory to grow and capture other computers.

Is there such a carnivorous program? If so how big is it?

There are carnivorous programs and they are called  botnets!

How many botnets are there? There are hundreds but there are 16 which are the real monsters and have eaten the lions share of the world’s computers.

Are they dangerous to people? Well that depends on how much of your life is dependent on computers. For illustration purposes let’s use automobiles instead of computers. What if someone could take control away from the driver of a car and completely control it remotely? Could they do any damage? What if they could take control of 100 cars at any moment could they do any damage? Look at the size of  top 5 of these carnivorous programs!

  1. Conficker           35 ,000,000 +   computers controlled
  2. Kraken                     495,000       computers controlled
  3. Srizbi                        450,000      computers controlled
  4. Bobax                       185,000      computers controlled
  5. Rustock                    150,000      computers controlled

HOW DID CONFICKER GROW SO BIG!

After it has infected a target computer (by downloading a Trojan), it tries to prevent it’s removal by disabling anti-virus software and blocking access to security-related web sites, as well as stealing personal information by masquerading as an anti-virus product called Spyware Protect 2009. How ?   The worm informs the user that his computer is infected and takes the user to a fake security Web site, asks them to pay $50 for a spyware program that actually is the Conficker worm, then keeps their credit card information, to boot.

How can you tell if your computer is infected with the conficker worm?

There is a test to see if your computer is infected click here 

Where is the infection mostly located?

 

What should everyone do? Keep their antivirus and antispyware up to date and scan regularly.

Hey I’d rather eat a potato or tomato than be eaten by one! 🙂

 

 by R. Frank Tulak


Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Why is My Computer Problem called a Virus? Why isn’t it called a Bacteria?

December 31, 2008

v6lbl7Virus are not the same as bacteria.

Just as computer viruses are not the same as malware (spyware). If you can imagine an elephant being bit by a mosquito then you have the comparison in size between the bacteria (elephant) and the virus (mosquito).

The question is what is a virus and why is the problem with the computer called a virus?

Well have you ever wondered what is the determining factors for something to be called alive? What makes a rock not alive and a plant and an animal alive? First it consumes and second it grows and developes and  third it reproduces itself. A bacteria does all these things and does it every twenty minutes! What about a virus? It does NONE of these things! 

Bacteria are micro scale and viruses are nano scale.  A bacteria is very complex single cell organism.

untitledPicture in your mind a peach. If you cut it in half and looked at it, what do you see. (We are going to use the peach as an example of a single cell.) The skin would be the cell membrane, the meat of the peach the cell’s cytoplasm but the seed would be the cells nucleus. The nucleus is not really like a seed but more like a small ball of spaghetti. (you can tell I haven’t had diner yet!)  The awesome thing about the strands of spaghetti is the length of the strand and the protein sequence, that length is the sequence of what the cell is to do its whole life! Including its response to any stimuli (things that happen to it).

Its just like the programing code for a computer operating system!

Didn’t know that the spaghetti like nucleus of a cell (DNA) was modeled after a computer’s operating system, did you?  (smile) Just joking.

What about the virus?  Well it’s just a little snippet of the the spaghetti like strand of code in the nucleus of the cell in a fancy delevery box!

t4bacteriophageThis is a electron microscope image of a virus (bacteriophage) that is harmless to us but deadly to bacteria.

The little appendages lock on to the elephantine bacteria while the shaft penetrates the cell membrane injecting the small package of a piece of spaghetti (protein code, DNA) from it little head into the cell. Once into the cell necleus it attach’s to the spaghetti code and reprograms the cell to literally dismantle itself and make copies of the virus! When the whole cell is transformed internally to nothing but virus clones the cell burst open and releases thousands of the little critters! Guess what they go and do?

Well now back to computers.

So what would you call a little snippet of computer code that takes the computers resources away to replicate itself as many times as it can destroying the computer’s operating system and using that system to infect other systems? Right, a virus!

What would you call a small yet complete program that grows inside your computer’s system taking data and information, processes it and develops and finally replicates itself? Bacteria?

No its called malware or spyware.

Wait if small snippets of code that screws up your computer is called a virus then complete programs that process your personal information to send it to another location and replicates itself should be called Bacteria, right?

Yeah, but if you said your computer had a bacteria instead of malware or spyware people would think that you were weird though you would be logically correct.

I’m hungry, I’m going to get me some spaghetti, want to join me, there is peach for desert 🙂