
Evolution
I went to read the news on Habré.
Infosphere evolution is gaining momentum. In one of my blogs (I’m not afraid to name this address - on Mail.ru) I already thought about the fact that we are witnessing the evolution in the Infosphere, which so far is being driven by people rather than machines. The pre-evolutionary stage ... which has already led to the fact that network worms are fighting with each other for a placeunder the sun on servers.
And now I read this ...
(cit.)... An interesting Vigilante program is being created at the Cambridge division of MS Research. This program detects and responds to attacks of network worms of an unknown type. To detect them, honeypots are placed on the network, which must be attacked by worms in the first place. These servers analyze incoming traffic, and if a new “infection” is detected, the program informs security specialists about this.
So, in addition to the proto-creature broth, we have “least favored areas” (well, or you can call it a mutagenic factor) in the Infosphere, where poorly adapted codecs will die out whole species. The next step in development, I suppose the emergence of a generation of codeware capable of identifying such places on the Web, and rebuilding your code so as not to fall into these traps. From there, it is already close to interspecific coordination, and to crossing.
So far, the main activity of worms is the devouring of a resource (with the corresponding "waste" in the form of spam), and reproduction. But development is going on ...
Infosphere evolution is gaining momentum. In one of my blogs (I’m not afraid to name this address - on Mail.ru) I already thought about the fact that we are witnessing the evolution in the Infosphere, which so far is being driven by people rather than machines. The pre-evolutionary stage ... which has already led to the fact that network worms are fighting with each other for a place
And now I read this ...
(cit.)... An interesting Vigilante program is being created at the Cambridge division of MS Research. This program detects and responds to attacks of network worms of an unknown type. To detect them, honeypots are placed on the network, which must be attacked by worms in the first place. These servers analyze incoming traffic, and if a new “infection” is detected, the program informs security specialists about this.
So, in addition to the proto-creature broth, we have “least favored areas” (well, or you can call it a mutagenic factor) in the Infosphere, where poorly adapted codecs will die out whole species. The next step in development, I suppose the emergence of a generation of codeware capable of identifying such places on the Web, and rebuilding your code so as not to fall into these traps. From there, it is already close to interspecific coordination, and to crossing.
So far, the main activity of worms is the devouring of a resource (with the corresponding "waste" in the form of spam), and reproduction. But development is going on ...