Skip to main content

Should I choose an open or closed source for the ICT environment?

   Should I choose an open or closed source for the ICT environment? 


How to avoid Trojan Horses, the malicious software, camouflaged as utility software or hidden in utility software code? 

If I cannot see the source code. Somebody may hide malicious software in that code. But to get full benefit from the open source I must know something about programming. 

This is a good question. Open source allows one to see the source code. And that gives freedom, flexibility, and customization for the data environment. That allows to make custom modifications for applications. But there is one problem. People should know about programming. They should know what they do in the system when they configure code. And that thing has limited the use of open source applications in the business environment. 

And need to know the coding sometimes mentioned, as the reason for choosing closed code. The company should hire some coders, that don't fit their image or something like that. Sometimes the reason for choosing closed code is that the company has no time to test systems. And they want a complete and key-to-hand solution that works from the first day.

The problem is that the customer doesn't see the source code. And that makes it possible to hide so-called parasite programs in that code. The parasite program is sequenced in program code that steals information. And it's one subtype of the Trojan horse. In Trojan Horse, the malicious software is like a parasite in the utility program code. The utility program acts as a carrier. 




Making that kind of software and controlling the code requires programming skills. But the new tools make the world easier to live in. 

But the AI is the game-changer. The Open-source language model applications make it possible. That system can generate new and complicated code quickly and with low-level errors. The same systems can also make code checks to discover the parasite program from the source code. The program can cut spyware into pieces in the computer program. This kind of malware is hard to notice. And sometimes it's marked as "dead code". 

Then the system will connect those code bites when the program is assembled. The problem with this kind of parasite program is that it might written using a different programming language than the program itself. When the utility program comes to the computer, it loads connector applications into memory. That collects those code bites together. 

If the hacker wrote that malicious code using some other programming language. The connector separates the malicious code easily. Hackers can send those malicious program bites to targeted systems using different channels. 

The attacker cuts that kind of stealth algorithm cut in as small bites as possible. There is some collector program that recognizes the code. Then that program connects the code bites and decodes those bites. In that case, the malicious software is masked as non-functional or "trash" code. 

The antivirus cannot see it if those code bites are small and they involve minimum information. Also, programmers can cut critical lines that make it harder to detect malicious code. There is a possibility that a hacker cheats the antivirus by sending the program packages using different carrier programs on different days. But the success of that thing requires the ability to slip the collector-connector program in the system. There is the possibility that the malware writer uses multiple programming languages. And then there is a translator in some program code that connects that thing into entrirety. 

The AI can notice those code bites from a very large program. It can be the next-generation tool for programming and malware detection. The AI also makes it possible to create customized software for users. And that means hackers in China and Russia can also benefit from that kind of thing. 

Comments

Popular posts from this blog

The new bendable sensor is like straight from the SciFi movies.

"Researchers at Osaka University have developed a groundbreaking flexible optical sensor that works even when crumpled. Using carbon nanotube photodetectors and wireless Bluetooth technology, this sensor enables non-invasive analysis and holds promise for advancements in imaging, wearable technology, and soft robotics. Credit: SciTechDaily.com" (ScitechDaily, From Sci-Fi to Reality: Scientists Develop Unbreakable, Bendable Optical Sensor) The new sensor is like the net eye of bugs. But it's more accurate than any natural net eye. The system is based on flexible polymer film and nanotubes. The nanotubes let light travel through it. And then the film at the bottom of those tubes transforms that light into the image. This ultra-accurate CCD camera can see ultimate details in advanced materials. The new system can see the smallest deviation in the materials.  And that thing makes it possible to improve safety on those layers. The ability to see ultra-small differences on surf

Quantum breakthrough: stable quantum entanglement at room temperature.

"Researchers have achieved quantum coherence at room temperature by embedding a light-absorbing chromophore within a metal-organic framework. This breakthrough, facilitating the maintenance of a quantum system’s state without external interference, marks a significant advancement for quantum computing and sensing technologies". (ScitechDaily, Quantum Computing Breakthrough: Stable Qubits at Room Temperature) Japanese researchers created stable quantum entanglement at room temperature. The system used a light-absorbing chromophore along with a metal-organic framework. This thing is a great breakthrough in quantum technology. The room-temperature quantum computers are the new things, that make the next revolution in quantum computing. This technology may come to markets sooner than we even think. The quantum computer is the tool, that requires advanced operating- and support systems.  When the support system sees that the quantum entanglement starts to reach energy stability. I

Humans should be at the center of AI development.

"Experts advocate for human-centered AI, urging the design of technology that supports and enriches human life, rather than forcing humans to adapt to it. A new book featuring fifty experts from over twelve countries and disciplines explores practical ways to implement human-centered AI, addressing risks and proposing solutions across various contexts." (ScitechDaily, 50 Global Experts Warn: We Must Stop Technology-Driven AI) The AI is the ultimate tool for handling things that behave is predictable. Things like planets' orbiting and other mechanical things that follow certain natural laws are easy things for the AI. The AI might feel human, it can have a certain accent. And that thing is not very hard to program.  It just requires the accent wordbook, and then AI can transform grammatically following text into text with a certain accent. Then the AI drives that data to the speech synthesizer. The accent mode follows the same rules as language translation programs. The ac