To main page | E-mail us | Serach our site phone (063) 620-06-88 (other) Укр | Рус | Eng   
In the next world war would unfold the struggle for intellectual property, and not for oil
  news  ·  articles  ·  services  ·  info  ·  questions & answers  ·  about Yaroslav Vashchuk  ·  contact for site: 
×
If you see any mistype or mistake in any our site's texts, select those
text (whole or part of sentence/paragraph) and press Ctrl+Enter to inform us about it.
×

Inventions in the field of computer security based on electromagnetic resonance effects and resonance spectroscopy

2012-06-18
Andrew (Gabriel) Livshits

Very often, corporate users of computer networks are powerless against hackers
There are many examples, but suffice to consider the most pressing and dangerous to the user cases:

The internal computer network of the lower house of the Japanese parliament was subjected to regular attacks by hackers since July 2011. On Tuesday, October 25, Reuters reported with reference to the Asahi Shimbun.

As told Japanese newspaper an anonymous source, the attackers got the passwords to the electronic mailboxes of parliamentarians with a computer virus. Presumably, the purpose of hackers have information related to the policy of Japan in the field of defense and international relations.

It is noted that the first computer was hacked virus c server registered in China, but to determine who downloaded the virus on the server, it is not possible.
This is the first attack by hackers on the computers of the lower chamber of parliament in Japan. Information that the hackers have changed or moved any information contained on the internal network of Parliament, no.

Post a cyber attack on the internal network of the Japanese parliament came a month after it became aware of the first recorded attack by hackers on the defense industry in Japan. Then the computer network was hacked company Mitsubishi Heavy Industries Ltd. (MHI), which produces, in particular, ships, missiles and components for nuclear power plants.

Ministry of Justice of Israel reported today that the contracted employee of the Ministry of Labour and Social Welfare has stolen during their stay there personal data over 9 million Israelis, copy numbers of their identities, names, addresses, dates of birth, information about the family and relatives, etc . for sale

This information was published after the police removed the prohibition on disclosure of this information, write to the Monday, October 24, the Israeli media.

Personal data of citizens of Israel have been transferred to a person who has created on their basis a computer program called "Agron 2006", which allows illegal to use this database for different purposes.
The report of the newspaper The Jerusalem Post emphasizes that by "Agron 2006" can be traced family connection million Israelis, including infants and the long dead.

A copy of this program, not having any protection has been obtained by some computer technician from Jerusalem, named Ari, 25, who laid it on the Internet for free access. These data were presented in the form provided with the website and instructions on downloading.

In the investigation of the case the police arrested in June this year, Ari, as well as five other suspects, who was later released, subject to certain restrictions.

Ynet news site notes that the information about this crime has been used in the report of the complaints of the population against government agencies and government ministries, the state controller presented Miha Lindenstrauss in 2009.

This case was discussed in the Knesset, where the parliament approved a program of transition to biometric passports.

Threats to data users are diverse - there are viruses, which, once on your computer, spread further, and phishing pages-blende lure sensitive information, and, of course, a malicious application.

Modern browsers have built-in protection from a number of threats - in particular, they warn the user about sites that may pose a threat to your computer. According to the company NSS Labs, the best level of protection in such cases in 2010, provided the technology SmartScreen, built into the system of Internet Explorer 8.

Later, the primacy passed to Internet Explorer 9, which improved SmartScreen. In May 2011 the eighth and ninth version of Microsoft's browser every day reflected from two to five million attacks on users' computers, which is 5 times or more greater than that of other browsers

Initially, the main component of SmartScreen was checking the page address in the presence of suspicious symptoms. SmartScreen's reputation counts URLs. This figure is influenced by many parameters: the address itself, the frequency of entering the site, domain, IP-address and DNS-servers who know of the existence of the resource. Due to the complex checking attackers, who are in the black list will have to seriously invest in transport infrastructure in the other place.

Internet Explorer has learned to identify phishing, that is, fake sites, even in the seventh version. Since that time, Microsoft browsers were found more than 160 million phishing pages. Since its release of Internet Explorer 8 and a half billion have been prevented attacks associated with malicious software. Overall, IE 8, reflects about 90 percent of those threats.

The remaining 10 per cent of Internet Explorer «closed» in the ninth version, SmartScreen when a new layer of protection - calculation of image applications. Such a mechanism in other browsers do not.

According to Microsoft, every fourteenth downloaded program is malicious. The user simply does not know how to distinguish good from bad application. Internet Explorer 9 can, in turn, give advice, based on the reputation of the program.

Reputation application consists of several components. The browser keeps track of applications, digital signatures (to sign the developers), and more confidence in the program signed. At age also affects the reputation of the site - to the newly created resource confidence is lower than the sites from which you download the program for a long time. Technology calculating reputation can often warn about the potential harmfulness of the program even before they know about the antivirus.

Due to the fact that most publishers have a certain application is already reputation, 90 percent of cases it goes without warning. The browser warns you about unknown programs; with a probability of 25 to 70 per cent did not obey warning the user downloads the malicious software. Fortunately, 95 percent of users followed the recommendations and not run suspicious programs.

Alarm browser starts hitting only in the case of a particularly high risk. By calculations of Microsoft, the average user of Internet Explorer 9 is faced with such a warning to only twice a year.

The results of the implementation of the system speak for themselves. In May 2011 Microsoft released a forecast that the mechanism of image applications on a monthly basis will prevent 20 million infections. And that's not counting the pages that are blocked by the usual SmartScreen.

The effectiveness of the system depends on the amount of data that it collected. Thus, the longer runs SmartScreen, the closer the measure of protection to one hundred percent. Thus, the number of "survivors" of computers from month to month, will only grow.

It seems to me most appropriate to address the full range of issues related to computer security, invented by me to use an integrative method of identifying the optical storage of information by means of intrinsic properties and the electromagnetic resonance
Summary of proposed innovative products:

1. The product is based on the application - Micro - sensors designed to be embedded in spindle unit Read and write optical memory;

Product is a micro-resonant sensor with a lot of options for the topology of the location of special nano-Sensitive detectors and with a large variation of these nano-detectors, the sensor is installed in the receiver optical drive spindle assembly memory sensor is connected to the system software, which identifies the signals received by detectors, and tells the drive to work or blocking the top of the drive work in the absence of proper identification, installed in the optical disc drive, the coordinates of the nano-detectors should be the same with the coordinates of the coding of nano-implants, the characteristic difference of the product:

1.1. High precision measurements

1.2. Simplicity of design

13. Reliability and durability

1.4. The complete absence of contact with the surface to be measured

1.5. The possibility of integration into any existing process flow module and optical memory modules that are currently under development, including for the terabyte optical disc;

1.6. The product consists of all standard elements, which determines its high reliability, low production costs, the possibility of organizing production without special technological equipment, production of detectors can be conducted on the existing process equipment in the semiconductor industry;

1.7. Low levels of energy consumption for operation of a product, the sensor is sufficient for a few milliwatts of energy;

1.8. Ability to control the location of any topology configurations nano implants;

1.9. Ability to control ultra-pure materials and the ability to control and identification of different materials on the isotopic level;

1.10. The possibility of integration in automatic control systems are not necessarily related to optical storage devices, the ability, through the highest sensitivity to catch any signals from ferromagnetic nano - powders, even if the amount of the powder does not exceed 100 cubic nanometers;

1.11. Ability to work in standalone mode, without regard to external interference;

2. The product is based on the application - optical disc encodes the information INCURRED BY MEANS OF NANO - IMPLANTS; product is any version of the optical disc drive, digital information at a certain level of which topology and some are nano implants, which are each nano-capsule of a magnetic material with a shell of a nonmagnetic material, the orientation of nano capsules in the body of the disk prior to gluing operation halves the disk, perform the appropriate size of nano-capsules, deepening, which rubbed nano capsules, and then glue the halves of the disk to the existing technology, such disks can be used in any optical storage memory, if the recording was made without a special code, if an entry is made in view of the code, read the information may only drive with a resonant micro-sensor, and the coordinates of the location of implants and nano detectors must be the same, large corporate customers, thanks to this technology may have their own drives installed in all computers and proprietary optical disks, the coordinates of the location of nano-implants which coincide with the nano detectors drives, a coding system completely protects a client's data arrays from hacking, theft or other provocative actions.

useful info? Press:




more articles...
© Yaroslav Vashchuk, 2003-2011
in case of using site's information, referring links to us are necessary
[pageinfo]
сайты Хмельницкого bigmir)net TOP 100