2008년 6월 8일 일요일

last sum of the semester

resistance
countering the techniques and “technologies of power” that impose isolation, distraction and domination through surveillance, entertainment, and force.
examples of "electronic dusturbance"
-what is a software virus
a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends . The virus may do nothing but propagate itself and then allow the program to run normally.
. Many nasty viruses, written by particularly perversely minded crackers, do irreversible damage, like nuking all the user's files.
-what is a software "trojan horse"?
A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or a program to find and destroy viruses
-what is "worm"?
A program that propagates itself over a network, reproducing itself as it goes. Compare virus.
(Morris)
-what is a software "bomb"?
Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met
-what is a "back door"?
A hole in the security of a system deliberately left in place by designers or maintainers.
often lurked in systems longer than anyone expected or planned, and a few have become widely known.
Robert Tappan Morris
-he is MIT professor. when 23,brought the internet to a virtual
stop in 1988 with a “worm.” his father was big man in country.
so it was more surprising occurence.
-End