14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

84 Nodes<br />

U.S. Navy computer clusters). Over the years, a whole bestiary <strong>of</strong><br />

infectious code has come to populate the information landscape,<br />

including spam, spyware, and adware, as well as other nonvirus automated<br />

code such as intelligent agents, bots, and webcrawlers.<br />

Computer viruses thrive in environments that have low levels <strong>of</strong> diversity.<br />

Wherever a technology has a monopoly, you will find viruses. <strong>The</strong>y<br />

take advantage <strong>of</strong> technical standardization to propagate through the<br />

network. (This is why Micros<strong>of</strong>t products are disproportionately infected<br />

by viruses: Micros<strong>of</strong>t eclipses the marketplace and restructures<br />

it under a single standard.) Viruses and worms exploit holes and in<br />

this sense are a good index for oppositional network practices. <strong>The</strong>y<br />

propagate through weaknesses in the logical structure <strong>of</strong> computer<br />

code. When an exploit is discovered, the broad homogeneity <strong>of</strong> computer<br />

networks allows the virus to resonate far and wide with relative<br />

ease. <strong>Networks</strong> are, in this sense, a type <strong>of</strong> massive amplifier for action.<br />

Something small can turn into something big very easily.<br />

Anyone who owns a computer or regularly checks e - mail knows that<br />

the virus versus antivirus situation changes on a daily basis; it is a game <strong>of</strong><br />

cloak - and - dagger. New viruses are constantly being written and released,<br />

and new patches and fixes are constantly being uploaded to Web sites.<br />

Users must undertake various prophylactic measures (“don’t open<br />

attachments from unknown senders”). Computer security experts<br />

estimate that there are some eighty thousand viruses currently recorded,<br />

with approximately two hundred or so in operation at any given<br />

moment. 63 Such a condition <strong>of</strong> rapid change makes identifying and<br />

classifying viruses an almost insurmountable task. Much <strong>of</strong> this changeability<br />

has come from developments in the types <strong>of</strong> viruses, as well.<br />

Textbooks on computer viruses <strong>of</strong>ten describe several “generations”<br />

<strong>of</strong> malicious code. First - generation viruses spread from machine to<br />

machine by an external disk; they are <strong>of</strong>ten “add - on” viruses, which<br />

rewrite program code, or “boot sector” viruses, which install themselves<br />

on the computer’s MBR (master boot record) so that, upon<br />

restart, the computer would launch from the virus’s code and not the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!