Skip to main content

Writing about the secure computer solutions


(picture 1)

Kimmo Huosionmaa

Trojan horse can also be secured computer solution because the system might transfer the information to the third part´s databases, and nobody else cannot see the information what this kind of computer program will send to the hackers. This kind of intelligence software can be used by the NSA for monitoring the targetted military bases.


That software can pass the vulnerability test, and they can be very secure things, but they will send the information to the NSA servers, without nobody ever notices anything. When I'm writing about NSA, it can mean any kind of military organization, what has in the interests to collect the information from some special secured databases, and then target the other military actions against those targets. The targets for those operations might be the personnel, who are in the key role in the national security.


This kind of thing might be the operating system size surveillance program, what might have also the capacities to destroy the weapon systems databases, or even terminate all operating systems in the missile control computers. So this kind of thing could be the logical bomb, what is very good support weapon for another military equipment. If the operating systems of the missiles and airplane computers can be erased, the enemy could not use their most effective weapon systems like smart bombs and sharp Stand-off missiles, because if the operating system of the computers of the missiles has been erased, there would be no change to aim those things.


Also if the GPS/GLONASS and communication satellites would be terminated by using the computer viruses for those satellites, and that kind of viruses can make the satellite unable to work for a couple of hours, until the computer programs were reloaded to satellites main computer. The time when the computer viruses are effective in those systems might be the only couple of minutes, but when the mission-critical system will be halted in a couple of minutes, would the result be devastating, if the nuclear submarines won't get the launching codes if enemy missile raid would already begin.


Then we are talking about this kind of military systems, what can shut down enemy communication systems or even the tactical fire control in the minutes. We must think that the NSA or whatever intelligence or military organization is behind this kind of operation, would that organization think, that it is only part, what will get that information and ability to use those programs and malware in their own purposes. That kind of programs can steal the information of the nuclear staff of the military forces, and then the special forces can be targeted the assassination operations against that personnel, what is in the main role of the launching process.

Source

Picture 1

http://static2.businessinsider.com/image/5571d503eab8ea0a56186f2b/us-official-on-china-hacking-government-database-this-is-deep.jpg

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th