Page 6

 
Previous Page                                                                                 

Next Page


the files already scanned. Those “BUOYS” were complex codes that I had designed on my own with main focus on ability and stealth. Whenever, I would target a system with them, they would enter the system cloaked as an update to the security system, but, with a jumbled code hidden inside the file. Being jumbled, the system never took it as a program that could threaten its security. However, once the mail file had found a place to fix itself, it would un-jumble the sentences in the hidden code to form the intended code and would release that into the system.

Most of the networks and sites at that time had enough protection to fend off small attacks and attempts at Password cracking with Brute Force techniques or Hashing algorithms. However, when it came to high-end hackers who were much more adept at breaking into a system or a network, using a bundle of ever-evolving techniques, almost all networks were fallible. The methods to fight hacking had evolved over the years but had not been able to keep up with those of the opponents.

My “BUOYS” were not mere signaling devices. They also acted as the first line of defense against any threat. Whenever someone introduced a Virus or a Worm into a network to disrupt the network or to penetrate it or to create a backdoor, the “BUOYS” acted in the manner similar to an antibody reaction in a human body in response to a viral or a bacterial infection. The “BUOYS” generated certain sequences that attached themselves to the incoming program and either rendered it meaningless or created unending loops. At the same time, they used to pull out all the information about that program’s source and its path as can possibly be retrieved, and would send



Previous Page                                                                        

Next Page