Picture I |
Kimmo Huosionmaa
Many people think, that Linux is the most secure operating system in the world. This might be true, but there is a possibility that people would load their operating system from the wrong servers, and that means, the all operating system can be surveillance or another malware tool. That kind of tools can deliver confidential information to the unauthorized operators, or they can be used to take all network under the control.
And when the hacker wants, that kind of very huge malware can shut down computers, what is connected to the network. Or it can deny the ability to send E-mail or shut down telephone central, what means that the communication lines in some area are cut. This might cause disorder in the community.
In this case, even the gigabyte -class malware tools can be installed in the operating system itself, or if the hackers can slip the update package, that contains the malicious code, that thing can be devastating. In the worst case, the operating system starts to act like some kind of amoeba, and pump the data viruses to other servers. Those systems can be remote controlled, and the operator can send the IP-addresses of the homepages, what wanted to take the control or shut down.
And then the operating system would start to replace the update packages, what would send to the targeted system by malicious code. One version of that code could destroy the database of the system, and crush the web pages. But it can change the server as the "Spam server", what might cause, that the Internet service provider could cut the wire. Or the server could start to upload material, what is not legally shared because of the copyrights to the Internet.
And that would cause problems with the law for the owner of the server. When we are thinking about exotic operating systems, we must remember, that those systems collect attention. In this case, we must remember, that if many people would look at the use of the computer, the bigger is the change that important information would leak straight from the screens to unauthorized users like hackers.
Picture I
https://thenypost.files.wordpress.com/2017/07/170727-hacker-rehab-feature.jpg?quality=90&strip=all&w=618&h=410&crop=1
Comments
Post a Comment