Monday, November 30, 2009

Day 23- viruses

What makes a virus successful?

Keeping the "last updated" section the same
Overwriting parts of a file so the file size is the same "cavity viruses"
Don't infect the virus check software since it often checks its own code first and the virus will be detected easily and early on
Don't infect "bait files"; be able to ID bait files
Intercept requests from the anti-virus program and send them to the virus, not the OS, then send an uninfected copy of the file
Modify code for each infection so it can't be infected
polymorphic code- re-encrypts itself differently in each file it infects so that it can't be detected by its identical parts
metamorphic code- re-write themselves entirely each time they infect something new

Not doing something really cool right away because then it will get caught and won't live long enough to infect other peoples' computers

Tuesday, November 17, 2009

Day 22: how stuff works

E-MAIL
Every e-mail has two different components in the address. There is a name like "LAnderson13" and then a place like "elon.edu" separated by "@". The @ symbol explains which machine should receive the message. So, the "elon.edu" part would have a folder specifically for "LAnderson13". This is how the "sender" and "receiver" are identified- that way my internets won't get lost in tubes and sent to somebody else's internet because it's very important that I receive all my internets.
So, for e-mail that is application based rather than web based, the e-mails are sort of downloaded to the computer so that I as a user have all my old e-mails on my computer until I delete them. However, I can only access my e-mail from the computer with the application. In contract, web-based e-mail means I can connect to my e-mail account from any computer with internet, but if I don't have internet... I can't access anything. (The exception to this is that gmail offers Gears for offline access)
So, what happens is my computer would request to access my file in a remote server that contains my messages. There are two options- one allows me to download my messages from the server and once they are safely saved in my e-mail application, they are deleted from the server. Or, I can "have my cake and eat it to" that is I leave a copy of all the messages on the server even after I download a copy so that other users may also download it. Sending e-mails is a little different since I can technically "send" an e-mail and nothing happens until my computer connects to the internet. So, I am on the internet and I receive my e-mails. Then I take my laptop to Auntie Sue's house who has no internet. There I read and respond to all of my e-mails. My sent e-mails are placed in a folder and so basically my job is done BUT nobody will receive my sent e-mails until I go back home and connect to the internet at which point my sent e-mails go out and I receive my new messages. Which is why outlook has the "send/ receive" button- this tells the computer to connect to the internet and essentially synch your mailboxes.
http://en.wikipedia.org/wiki/Webmail
http://en.wikipedia.org/wiki/E-mail_client
http://communication.howstuffworks.com/email2.htm

Monday, November 2, 2009

Day 18- Net Neutrality

Net Neutrality: the principle that Internet users should be able to access any web content they want, post their own content, and use any applications they choose, without restrictions or limitations imposed by their Internet service providers (ISPs).
http://www.commoncause.org/site/pp.asp?c=dkLNK1MQIwG&b=4773657
This is socialist, sort of.

Quality of Service: provide guarantees on the ability of a network to deliver predictable results
http://compnetworking.about.com/od/networkdesign/g/bldef_qos.htm

Data discrimination: the Internet Service Provider (ISP) assigns a priority level to data frames
http://en.wikipedia.org/wiki/Data_discrimination
Because they can, because this is a free country

Tiered Service: theoretical framework for reasoning about and pricing Internet tiered services, and develops a practical algorithmic toolset for network providers to develop customized menus of service offerings
http://www.springer.com/engineering/signals/book/978-0-387-09737-4
Why would we let the government regulate this??

FCC & role in government: government agency charged with regulating interstate and international communications by radio, television, wire, satellite and cable
http://www.fcc.gov/aboutus.html


John McCain-A senator who ran for president in the last election and was a major contender. First joined Congress in 1982 also famous for his time in the armed services and his experience as a POW http://projects.washingtonpost.com/congress/members/m000303/ Introduced the Internet Freedom Act to the Senate "that would effectively allow Internet service providers to slow down or block Internet content or applications of their choosing" "McCain "called the proposed Net neutrality rules a 'government takeover' of the Internet that will stifle innovation and depress an 'already anemic' job market in the US."
But supporters of Net neutrality argue that the rule is needed to ensure that Internet providers don't censor content, or slow down traffic to Web sites that are in competition with their business allies.
FCC chairman Julius Genachowski argued that "reasonable and enforceable rules of the road" were needed "to preserve a free and open Internet.""
"His bill "will keep the Internet free from government control and regulation," McCain said, as quoted by Phil Goldstein at Fierce Wireless. "It will allow for continued innovation that will in turn create more high-paying jobs for the millions of Americans who are out of work or seeking new employment. Keeping businesses free from oppressive regulations is the best stimulus for the current economy."" http://rawstory.com/2009/10/mccain-net-neutrality/

McCain wouldn't exactly be poor were he on his own. As a senator he earns $165,200 a year, and he has a $54,000 Navy pension. And then there's publishing. http://money.cnn.com/galleries/2007/moneymag/0712/gallery.candidates.moneymag/4.html