BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Tuesday, March 23, 2010

Computer Virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spywareprograms that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, orUSB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spywareprograms that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused withcomputer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

The Trojan Horse

After the events of the Iliad and the death of Hector, the Trojan War still wasn't over. Neither the Greeks nor the Trojans seemed to be able to win, until one of the Greek kings, Odysseus of Ithaca, had an idea. "Build a big wooden horse on wheels," he said, "big enough for a bunch of Greek soldiers to hide inside it." So the Greeks did. Then the Greeks all pretended to sail home (except the ones hiding inside the horse!). They acted like they had given up and left. But really they hid just around the corner.
Soon the Trojans found the horse. "What is it?" they asked each other. Nobody knew. (The Greek soldiers hiding inside kept very quiet). Then they found a Greek soldier hiding nearby. He said (though this was part of the trick) that the other Greeks hated him and they had left him behind. So the Trojans asked him what the horse was for. He said it was an offering to Athena.
GA_googleFillSlot("Contentbox");
Well, the Trojans didn't want to upset Athena either, so they rolled the big horse into the city of Troy. It was so big it wouldn't go through the gate, and they had to tear down a piece of the city wall to get it in. They left it at the temple of Athena, and then the Trojans had a big party to celebrate the end of the war. (Still the Greek soldiers inside the horse kept very quiet).
Finally everyone fell asleep, and NOW the Greek soldiers came out of the Trojan Horse and killed the guards on the walls. They signalled to the other Greeks to come attack Troy. They could get in now because the walls were torn down. There was a big battle and the Greeks won. All the Trojan men were killed, and all the women and children were taken back to Greece as slaves.
This story does not actually appear in the Iliad or the Odyssey, but it is told in Virgil's Aeneid and in other ancient sources.
Here's a video of some high school boys reenacting the Trojan Horse story. I think it's interesting to remember that the men who fought the war were only a year or two older than these boys, and actually the men fighting in Iraq now are also only a year or two older.

Salami slicing

Salami slicing is a series of many minor actions, often performed by clandestine means, that together results in a larger action that would be difficult or illegal to perform at once. The term is typically usedpejoratively.
An example of salami slicing, also known as penny shaving, is thefraudulent practice of stealing money repeatedly in extremely small quantities, usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. It would be done by always rounding down, and putting the fractions of a cent into another account. The idea is to make the change small enough that any single transaction will go undetected.[1][2]
In information security, a salami attack is a series of minor attacks that together results in a larger attack. Computers are ideally suited to automating this type of attack.
In politics, the term salami tactics has been used since the 1940s to refer to a divide and conquer process of threats and alliances used to overcome opposition.
In academia, salami slicing refers to the practice of creating several publications out of material that could have been published in a single journal or review. (See also least publishable unit).