Home     Xml Feed    Submit Articles     Editor Login
More4you Article Directory
  RSS Feeds   Add us to favorites
  Make us your home page
You want more tips, training and tutorials... everything you need to make your web site and business a success?

You get that and much more with the More4you Blogletter!

Subscribe today for free!

First name:

Email address:

  • Cash in on the multi billion dollar domain name industry!
  • sponsor WebSite.ws
  • Earn an Instant Income, Track, Cloak And List Build 100% on Autopilot!
  • sponsor ViralURL.com
  • Get FREE Instant Access To A Brand New, Rebrandable Product Each & Every Month To Build A List & Profit!
  • sponsor ViralPLR.com
  • An All-in-One Email Solution For Internet Professionals!
  • sponsor ViralinBox.com
  • The Web Host Top Internet Marketers Choose...
  • sponsor WebHostingSecret.com
    Affiliate Programs
    Auto & Trucks
    Book Reviews
    Direct Mail
    Domain Names
    Food & Drink
    Gadgets & Gizmos
    Home Accessories
    Home Business
    Home Repair
    Kids & Teens
    Link Popularity
    Men`s Issues
    Off-Line Promotion
    Online Business
    Online Promotion
    Pets & Animals
    Press Releases
    Product Reviews
    Real Estate
    Religion & Faith
    SE Optimization
    SE Positioning
    SE Tactics
    Self Help
    Site Security
    Social Issues
    Traffic Analysis
    Viral Marketing
    Web Design
    Web Hosting
    Weight Loss
    Women`s Issues

    The Making Of Weapons--underground
    Author: Augustus Booker
    Website: http://www.hibiny.com/forum/go.php?url=http://nguyenphamquocanh.com/
    Added: Tue, 12 Nov 2019 18:52:33 +0000
    Category: Press Releases
    Printable version | Email | Bookmark

    id="article-body" class="row" section="article-body"> The weapons used to bring down some of the most powerful companies on the Internet bear the markings of a small circle of anonymous programmers who create hostile technologies in the name of security research. Although none of these individuals is accused of any wrongdoing, at least one name has emerged in interviews with CNET News.com in relation to this week's wave of "denial of service" assaults. A computer expert in Germany who goes only by "Mixter" is believed by some to be the author of the type of software that has been used to attack Yahoo, eBay, Amazon.com and other online giants.

    No one has suggested that Mixter or any of his peers have carried out the assaults, but some of the tools used in these incidents appear to carry his technological signature. Although his software could have been easily replicated by others in today's trend toward "open source" coding on the Net, security analysts say certain signs point to Mixter as the author of the original programs.

    In an interview with News.com, Mixter denied any responsibility in the incidents of the last three days but confirmed that he has written programs that appear similar to those used in the attacks.

    "He's the author. Absolutely," said Gia Threatte, an expert at a computer security site called Packet Storm, who said she communicates with Mixter by phone and email. "When he was coming out with the tools, he worked with us" so that the site could post his software.

    Regardless of who is behind these particular cases, the weapons used in them can be traced to a loosely knit nether-community whose work can raise troubling ethical--if not criminal--questions.

    These technophiles, and the programs they create, stand at the nexus of the underground Internet of years past and the profit-obsessed enterprises that are driving much of its growth today. That dichotomy makes it difficult to determine who's on which side, as well as their motives, especially when politically charged issues such as commerce vs. community come into play.

    Robert Clyde, vice president at security company Axent Technologies, said programmers can often be divided into "white hats" and "black hats"--those who write software to expose vulnerabilities and those who use them to exploit an issue. As with most things in life, however, things aren't so simple: While the white hats like to portray themselves as above the fray, he said, they often know how their work will be used after they post potentially malicious programs on the Web.

    "This is in the same spirit as the people on the Internet who post how to build pipe bombs. You do bear some responsibility," Clyde said. "But the advantage is that (others) have a chance to protect against it."

    These programmers, whose technical backgrounds vary widely, work with security professionals ostensibly to identify potential threats. In doing so, they regularly create hostile technologies that are used to test the security of firewalls, much like biologists identify and isolate strains of the flu in developing vaccines.

    But in the uncontrolled environment of independent Internet research, these programs can fall into the wrong hands. And once they are "in the wild," as researchers call it, anything can happen.

    Even Mixter, for example, said he was stunned by this week's events.

    "The fact that I authored these tools does in no way mean that I condone their active use. I must admit I was quite shocked to hear about the latest attacks," he wrote in an email interview with News.com. "It seems that the attackers are pretty clueless people who misuse powerful resources and tools for generally harmful and senseless activities just because they can."

    Ironically, Mixter has been working to protect against the very attacks his software makes easier. Threatte said he is the winner of a $10,000 Packet Storm contest for the best way to defend against distributed denial of service attacks, which swamp a computer with improperly encoded packets of information that eventually render it unable to respond to regular network traffic.

    A security consultant at Security Focus said the tools used in the current attacks look like the software from a group of technologies known as the Tribe Flood Network family. The TFN family of software tools has been credited to Mixter, whose name appears in their code.

    "I can't say for certain, but it looks just like the ones we've seen in the past," said Ryan Russell, MIS manager and security consultant at the company. "There is no reason to believe it is any different."

    The exact nature and identity of the software used in the attacks won't be pinned down until one of the relay computers used in the incidents is examined. Nor is Mixter the only author of these types of tools. A program of undetermined origin called Trinoo came before Mixter's TFN, and a later one known as Stacheldraht Flood Network Demon was authored by someone who goes by the name "randomizer," according to the programming code.

    One reason Mixter's work has become known is his postings on sites like Packet Storm and the Bugtraq computer security mailing list.

    Threatte said the Packet Storm site has posted his attack tools so security professionals can examine them, adding that Mixter posts the tools elsewhere. Packet Storm, a division of security company Kroll-O'Gara, advocates the philosophy that it's better to be able to scrutinize the tools doing the attacking.

    Threatte said she believes that Mixter isn't involved in the attacks beyond writing software used in them. In addition, given the way these technologies work, it may be impossible to catch the perpetrators.

    Tribe Flood Network 2K, or TFN2K, is an updated version of the earlier Tribe Flood Network. It has been used in the recent attacks, having been identified by a specific channel it uses to attack.

    TFN2K hides the identity of the attacker by letting the attacker use other computers for the actual attack. These compromised intermediate systems used in recent attacks are scattered across many countries, Threatte said, making it more difficult for computer administrators to request that a particular attacking computer be shut down.

    Groups and individuals have been bartering "constellations" of compromised computers that can be used in an attack, Threatte said, and the identity of the attacker is hard to know because TFN2K encrypts the signals used to control the software.

    As she put it, "The evolution of these tools far outpaces anything that the security community is coming up with to protect against it."

    Comments Tech Industry Notification on Notification off

    View all Augustus Booker's articles

    About the Author:
    I'm Augustus (30) from Haren, Netherlands.
    I'm learning Norwegian literature at a local high school and I'm just about to graduate.
    I have a part time job in a backery.

    When you loved this post and you want to receive details with regards to chuyên gia tài chính assure visit our website.

    More Press Releases articles

    :- Articles Search

    Click to search for articles!

    :- Recent Articles
    Comparison between Selenium, Cypress, Puppeteer, Playwright
    The global energy drinks market Division, New Business Opportunities, Growth Rate, Development Trend and Feasibility Studies 2026
    Inspection Rsidentielle Et Commerciale
    Are You Able To Spot The A Where To Buy Green Coffee Bean Pro?
    Kinky Sex Spots You Need To Strive!
    How to Use an Insulation Blowing Machine
    Lets Save some money for you!
    An Overview On Criminal Lawyers And Public Defenders
    Tibetan Sky Burial Custom
    A Brief Knowledge of Human Growth Hormone and Its Availability in Online Platforms

    :- Top Resources

    Copyright 2000- Add2it.com Marketing Pty Ltd. All Rights Reserved.

    Powered by ArticleDirectoryPro