Skip to main content

Why fingerprints are risking the data security?


Kimmo Huosionmaa

Access to rooms could get by using fingerprints. The idea is to clean the keys and keyboards before the person comes in, and then the intruder would use those buttons for getting access in the room. The thing, what those persons need is acetone and UV-light, what uncovers the fingerprints from the keys. 

Also, the computer program, what calculates the sort of the letters, what can be inputting the system by used keys is necessary. And this is why the hacker must remember to put the special marks in the program, what would calculate the order of the given marks.  The mathematical term for the number of sorts is the permutation.

Writing of that kind of program, where the mathematical formula calculates the order of the letters, what are inputting there is not very difficult. Then the program must first input the possibilities to the database, and then simultaneously test every possible order of the marks, what can give by the certain keys of the keyboard.

There are only limits of the numbers and marks, what are used for the access, and if the pin-code is short, the person can use a permutation to calculate the combination, and the permutation of four numbers is not very big. If the hackers have the computer program, what will calculate the of the numbers or letters, would the access to the targeted computer granted in seconds.

The permutation is the number of possibilities, how the line can be sequenced, and then the intruder can test every possibility of the sequence. But the special marks of the number keys are making the break in more difficult. By the way, its possible to program the keyboard emulation program, what can test automatically every possibility of the mark lines, and if the laptop is equipped with this software and install to the targeted computer, would it open quite fast.

Normally the passwords to the system are hard to calculate, but if the hacker would have the length of the password and the keys, what the person has been pressed, would the computer program allow guessing the password quite fast. The thing that the hacker would get the pin code or password happens quite easily if that intruder would allow to input those keys inside the calculation program, what calculates every way, how those letters or numbers can be sort.

The length of the password is very easy to guess, by reading the instructions, and if the two same marks or numbers are not allowed to get twice, the number of the keys, what person has been used uncovers the length of the password, and the pressed buttons can be uncovered by using acetone for cleaning them. And if the last thing, what person does after this is giving the password, those marks what is used is very easy to give the hacking program, what emulates the keyboard, but does the breaking in the system more faster than using the keyboards manually.

But this requires access to the same room with the targeted computer. In fact, the hotels are a good place for this kind of operation,  and when the target person goes for breakfast, would this person leave the laptop in the hotel room, and then the hacker can slip in and break the system. And this is the thing, what would not even be noticed. And the data, what hackers would steal from those computers, can give access to many computers and systems if the man stores the passwords in the computer by using the text documents, and the experienced hacker would find those documents in seconds. This is why the computers should ever leave unattended in some hotel rooms or cloakrooms.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that