Linggo, Hulyo 3, 2011

LAW AND ORDER - Access Nation: Possible Technologies

http://compsci-11-12-1.blogspot.com/Some of the technologies shown in the movie are hacking, viruses, and file recovery after deletion.

FILE RECOVERY AFTER DELETION
I’ve read an article that says files could still be recovered though already deleted from the recycle bin, for as long as it wasn’t overwritten on your hard drive with other data and that you attempt to recover the files shortly after you delete them.
This technology is possible for an undelete program iRecover. According to the site, iRecover is an advanced data recovery program that will help you recover data that was lost because of file system corruption, formatting, virus damage, partition deletion or user error.Here are some other features of iRecover:
  • Supports FAT, FAT32, NTFS and Ext2 formatted drives
  • Extracts data from lost partitions
  • Recovers data from deleted partitions (partition recovery)
  • Unformat recovery - Recover data from corrupt, not formatted, RAW partitions
  • Recovers data from formatted partitions (unformat recovery)
  • Retrieves data from severely corrupted disks and volumes
  • Digital image recovery, digital photo recovery - recovers deleted files from memory cards (e.g. camera flash cards.
http://www.rickysays.com


VIRUSES
Acording from such discussions in an article,http://www.wisegeek.com/what-is-computer-hacking.htm, computer hacking has nothing to do with viruses. 
HACKING
Hacking is simply the ability to change (hardware or software) what the original creator had intended (i.e. changing how your windows system runs a certain program or adding certain components to your computer that weren't originally intended to be there). This could not only be about illegal manipulation and stealing of other’s private data, but can also lead to constructive development.
There’s this variation between hackers and crackers. Hackers gave us the Internet, PCs in general, game consoles, and before computers, things like the automobile and electricity. Hackers are innovators and make existing things better by figuring out how they work, and make them work better.  Often times companies hire hackers to hack into their own systems to check for weak points then have the hackers tell them how to fix it.While crackers just crack to open a system, and still data inside.http://www.wisegeek.com/what-is-computer-hacking.htm

Actually there are hackers with good purposes. They are called ethical hackers. I’ve noticed it the movie that through hacking, the files of the victim, Tracy Conley, were opened without its consent. Files opened include bank accounts, medical files, driving records and even those internet activities or webs browsed can be traced by a hacker.
Professional Hackers hack government servers, making viruses in list, like in the FBI. They use certain actions like, keystroke logging, cracking, phishing and etc.
Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworthy person/organization.

Kernel-based software type keyloggers gain access to any information typed on the keyboard as it goes to the operating system.
Form grabbing-based software type keyloggers log web form submissions by recording
the web browsing on submit event functions. This records form data before it is passed over the Internet and bypasses HTTPS encryption.
Packet analyzers-based software type keyloggers involve capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords.
Keystroke logging(keylogging) is the action of tracking keys pressed on a keyboard, typically without letting
the user be aware that his actions are monitored.
Software Keylogging also feature:
  •    Programmatically capturing the text in a control. The Microsoft Windows API allows programs to request the text 'value' in some controls. This means that some passwords may be captured, even if they are hidden behind password masks (usually asterisks).
  •    The recording of every program/folder/window opened including a screenshot of each and every website visited, also including a screenshot of each.
  •    The recording of search engines queries, instant messenger conversations, FTP downloads and other Internet-based activities (including the bandwidth used)
http://en.wikipedia.org