Wednesday, December 2, 2009

Virus sources

http://www.virusbtn.com/resources/glossary/index
http://securityresponse.symantec.com/avcenter/reference/simile.pdf

I'm also going to cover what anti-virus software does

Monday, November 30, 2009

Day 23- viruses

What makes a virus successful?

Keeping the "last updated" section the same
Overwriting parts of a file so the file size is the same "cavity viruses"
Don't infect the virus check software since it often checks its own code first and the virus will be detected easily and early on
Don't infect "bait files"; be able to ID bait files
Intercept requests from the anti-virus program and send them to the virus, not the OS, then send an uninfected copy of the file
Modify code for each infection so it can't be infected
polymorphic code- re-encrypts itself differently in each file it infects so that it can't be detected by its identical parts
metamorphic code- re-write themselves entirely each time they infect something new

Not doing something really cool right away because then it will get caught and won't live long enough to infect other peoples' computers

Tuesday, November 17, 2009

Day 22: how stuff works

E-MAIL
Every e-mail has two different components in the address. There is a name like "LAnderson13" and then a place like "elon.edu" separated by "@". The @ symbol explains which machine should receive the message. So, the "elon.edu" part would have a folder specifically for "LAnderson13". This is how the "sender" and "receiver" are identified- that way my internets won't get lost in tubes and sent to somebody else's internet because it's very important that I receive all my internets.
So, for e-mail that is application based rather than web based, the e-mails are sort of downloaded to the computer so that I as a user have all my old e-mails on my computer until I delete them. However, I can only access my e-mail from the computer with the application. In contract, web-based e-mail means I can connect to my e-mail account from any computer with internet, but if I don't have internet... I can't access anything. (The exception to this is that gmail offers Gears for offline access)
So, what happens is my computer would request to access my file in a remote server that contains my messages. There are two options- one allows me to download my messages from the server and once they are safely saved in my e-mail application, they are deleted from the server. Or, I can "have my cake and eat it to" that is I leave a copy of all the messages on the server even after I download a copy so that other users may also download it. Sending e-mails is a little different since I can technically "send" an e-mail and nothing happens until my computer connects to the internet. So, I am on the internet and I receive my e-mails. Then I take my laptop to Auntie Sue's house who has no internet. There I read and respond to all of my e-mails. My sent e-mails are placed in a folder and so basically my job is done BUT nobody will receive my sent e-mails until I go back home and connect to the internet at which point my sent e-mails go out and I receive my new messages. Which is why outlook has the "send/ receive" button- this tells the computer to connect to the internet and essentially synch your mailboxes.
http://en.wikipedia.org/wiki/Webmail
http://en.wikipedia.org/wiki/E-mail_client
http://communication.howstuffworks.com/email2.htm

Monday, November 2, 2009

Day 18- Net Neutrality

Net Neutrality: the principle that Internet users should be able to access any web content they want, post their own content, and use any applications they choose, without restrictions or limitations imposed by their Internet service providers (ISPs).
http://www.commoncause.org/site/pp.asp?c=dkLNK1MQIwG&b=4773657
This is socialist, sort of.

Quality of Service: provide guarantees on the ability of a network to deliver predictable results
http://compnetworking.about.com/od/networkdesign/g/bldef_qos.htm

Data discrimination: the Internet Service Provider (ISP) assigns a priority level to data frames
http://en.wikipedia.org/wiki/Data_discrimination
Because they can, because this is a free country

Tiered Service: theoretical framework for reasoning about and pricing Internet tiered services, and develops a practical algorithmic toolset for network providers to develop customized menus of service offerings
http://www.springer.com/engineering/signals/book/978-0-387-09737-4
Why would we let the government regulate this??

FCC & role in government: government agency charged with regulating interstate and international communications by radio, television, wire, satellite and cable
http://www.fcc.gov/aboutus.html


John McCain-A senator who ran for president in the last election and was a major contender. First joined Congress in 1982 also famous for his time in the armed services and his experience as a POW http://projects.washingtonpost.com/congress/members/m000303/ Introduced the Internet Freedom Act to the Senate "that would effectively allow Internet service providers to slow down or block Internet content or applications of their choosing" "McCain "called the proposed Net neutrality rules a 'government takeover' of the Internet that will stifle innovation and depress an 'already anemic' job market in the US."
But supporters of Net neutrality argue that the rule is needed to ensure that Internet providers don't censor content, or slow down traffic to Web sites that are in competition with their business allies.
FCC chairman Julius Genachowski argued that "reasonable and enforceable rules of the road" were needed "to preserve a free and open Internet.""
"His bill "will keep the Internet free from government control and regulation," McCain said, as quoted by Phil Goldstein at Fierce Wireless. "It will allow for continued innovation that will in turn create more high-paying jobs for the millions of Americans who are out of work or seeking new employment. Keeping businesses free from oppressive regulations is the best stimulus for the current economy."" http://rawstory.com/2009/10/mccain-net-neutrality/

McCain wouldn't exactly be poor were he on his own. As a senator he earns $165,200 a year, and he has a $54,000 Navy pension. And then there's publishing. http://money.cnn.com/galleries/2007/moneymag/0712/gallery.candidates.moneymag/4.html

Wednesday, October 28, 2009

Day 17- IP Addresses

My IP address is 152.33.62.5

I looked up twitter and found this:

Record expires on 21-Jan-2018

Record created on 24-May-2009

Database last updated on 27-May-2009

I assume this means it only started in May of this year which I find surprising- I thought it was much older than that.

http://www.networksolutions.com/whois-search/twitter.com

Monday, October 26, 2009

Day 16- messages in networks

The word I recieved was "quassias" which are small shrubs.
I was trying to send the word "bauhinia" which is a subtropical shrub in the pea family.

It takes a LONG time to send the message using this method since there were many collisions and it takes a long time to actually code and decode the message and read off all the bits of information. I found it a lot easier to recieve messages using this method. Once I had sent mine, I just had to sit there and wait for somebody to say my name then write what they said. When sending, I was strategically trying to figure out when to send out and listening for collisions and then trying to quickly figure out which was my next byte to send and to read it loudly and clearly but also quickly.

I think the main "bottleneck" was that nobody really waited a random amount of time. everybody would try to speak right after somebody finished or right after there was a collision. I think if everybody had to pick a random number of seconds to wait after they decided to send a message, then it would have gone more quickly. For example if I had to say okay, after this person, I want to send a message but I must wait 3 seconds. Then, of the three or four people who had chosen to send a message at that time, it is highly unlikely that they would all have to go at the same time. Also, what would make it faster would be if people actually stopped when somebody was talking so there wouldn't be such a long pause. Everybody tried to sort of claim the airwaves by shouting their name as quickly as possible but then they'd have to wait and make sure nobody else had done the same. If people just decided to say their name and then their number, there wouldn't be that waiting time. Also, if everybody was actually always ready to send/ recieve. It seemed a lot of times people had to wait a long time to say a number or they took too long to write it down and therefore missed the last few bits of information.

Wednesday, October 21, 2009

Day 15- Bus Typology

I think the best way to solve the communication issue in a bus typology could work similarly to how I think e-mail works with sort of mini servers. For example, your message could get sent to whatever server is at the end of your bus and then ask the question is Aunt Mary's computer on the same bus and then if not, which is hers. E-mail (I think) does this where I send an e-mail to gmail and it passes it on to yahoo mail which delivers it to auntmary@yahoo.com. Or, it could use something like the IP address of a computer so that when I say to send it to Aunt Mary, my computer puts the IP address of Aunt Mary's computer coded into there somewhere. So then, it follows around the bus (linearly?) until it gets to Aunt Mary's computer or back to mine with an error.

To solve the issue of communication, the bus could have several wires to handle different types of information. So, for the 30 computers in this room, each funciton of the computers is broken down and uses a different wire. Or, it could work like a CPU- instead of "multitasking" it just shifts really quickly between all the different tasks. The first would mean the bus would need to be physically large, containing many wires, but it would probably be faster than the second since it would only depend on say 30 instant messaging conversations per wire rather than 30 conversations, emails, radios, and online purchases all at once.