essay: Malware Spirit

Clementon, NJ

#1 Feb 26, 2013
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data (digital mostly in the computer-centric Information Age) and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data (source: Wikipedia).

A virus is a small infectious agent that can replicate only inside the living cells of an organism and destroy genetic or cellular information security. A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. Worms and Trojans simply distribute themselves across computer linked by networks, while viruses have the ability to replicate themselves (source: Wikipedia).

Most viruses and malware function by substituting flexible algorithms to trick CPUs into outputting data that seems on reading simple answers given by the CPU’s processors.

To “out-trick” malware, anti-virus software and anti-malware software must be written to protect the integrity and output strictness of a given CPU’s algorithm. For example, if a CPU’s algorithm reads,“If input = X and/or Y, then output = 1 and/or 2, and If input = Z, then output = 3,” then a malware algorithm will read,“If input = X, then output =2,” tricking the CPU into thinking that the simplified command is more efficient rather than less strict (and creating potential to insert false data), so an inserted appropriate anti-malware sub-program must read,“If input = X and/or Y, then output = 1 and/or 2, and if input = Z, then output = 3, but if input = X or Y, then output = 1 or 2.”

In other words, to create software protocols that are reliable and verifiable, anti-malware tools must be developed that will effectively assist a CPU or entire network of CPUs to create command template verification stencils, suggesting that relevant skeleton structure descriptive-themed Hollywood (USA) movies such as "Ghost in the Machine" (1993) represent summary intentions.

Are they printing movie posters on hemp/recycled paper yet?

God bless!

Tell me when this thread is updated:

Subscribe Now Add to my Tracker

Add your comments below

Characters left: 4000

Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite. Inappropriate posts may be removed by the moderator. Send us your feedback.

Computer Science Discussions

Title Updated Last By Comments
News Mark Zuckerberg says there's nothing to fear fr... Feb 3 marko 2
News The real reason Microsoft open sourced .NET Jan 27 Lizzy Gingerich 1
News B.C. to add computer coding to school curriculum Jan 17 Vancity Buzz 1
News Linux creator says Windows, Os X, iOS and Andro... (May '15) Jan 14 Microsoft Crap 3
News Man v machine: Half of NSW jobs at risk of comp... Jan 9 Play it again Sam 7
News Microsoft hopes new, old leaders can rekindle m... (Feb '14) Dec '15 Anonymous 2
News World traveller hitchBOT comes to rest at Ottaw... Dec '15 obit Fred John H... 1
More from around the web