Skip to main content

Linux and cybersecurity


Picture I

Kimmo Huosionmaa

Many people think, that Linux is the most secure operating system in the world. This might be true, but there is a possibility that people would load their operating system from the wrong servers, and that means, the all operating system can be surveillance or another malware tool. That kind of tools can deliver confidential information to the unauthorized operators, or they can be used to take all network under the control.

And when the hacker wants, that kind of very huge malware can shut down computers, what is connected to the network. Or it can deny the ability to send E-mail or shut down telephone central, what means that the communication lines in some area are cut. This might cause disorder in the community.

In this case, even the gigabyte -class malware tools can be installed in the operating system itself, or if the hackers can slip the update package, that contains the malicious code, that thing can be devastating. In the worst case, the operating system starts to act like some kind of amoeba, and pump the data viruses to other servers. Those systems can be remote controlled, and the operator can send the IP-addresses of the homepages, what wanted to take the control or shut down.

And then the operating system would start to replace the update packages, what would send to the targeted system by malicious code. One version of that code could destroy the database of the system, and crush the web pages. But it can change the server as the "Spam server", what might cause, that the Internet service provider could cut the wire. Or the server could start to upload material, what is not legally shared because of the copyrights to the Internet.

And that would cause problems with the law for the owner of the server. When we are thinking about exotic operating systems, we must remember, that those systems collect attention. In this case, we must remember, that if many people would look at the use of the computer, the bigger is the change that important information would leak straight from the screens to unauthorized users like hackers.

Picture I

https://thenypost.files.wordpress.com/2017/07/170727-hacker-rehab-feature.jpg?quality=90&strip=all&w=618&h=410&crop=1

Comments

Popular posts from this blog

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.

  "ZEROe teams powered on the iron pod, the future hydrogen-propulsion system designed for Airbus’ electric concept aircraft." (Intersting Engineering, Airbus's ZEROe: First engine fuel cell powers up for hydrogen flight) Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.  Airbus Zero is a testbed for fuel cells that are used in commercial aircraft. The problem with aircraft is always noise and pollution. If the aircraft uses electric engines. That decreases noise levels and cleans the air, especially around airfields. Lightweight solar panels that can be installed on the wings and body of aircraft can give electricity to electric engines. And they can extend an aircraft's operational range.   The thing that makes this kind of system interesting is that the "flying cars" or cheap VTOL aircraft can use them as a power source. The hydrogen power cells can give energy to electric aircraft at night time. And that makes them m