Tuesday, June 24, 2008

MUC (Message Unlock Code)

MUC (Message Unlock Code)used to initiate trust. If a message is sent to a new recipient, the system generates a random MUC. The sender communicates the MUC to the recipient by using another communication channel than email, e.g. personally, by phone or SMS for security reasons (Out-of-band). With the MUC the recipient gets access to the secure message and confidential documents and can download them. If the recipient has already been in contact with the sender through secure messaging and is enrolled, a MUC is no longer required.

Wednesday, June 18, 2008

Types of Trojan horse payloads

Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The six main types of Trojan horse payloads are:

* Remote Access
* Data Destruction
* Downloader
* Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
* Security software disabler
* Denial-of-service attack (DoS)

Some examples of damage are:

* Erasing or overwriting data on a computer
* Encrypting files in a cryptoviral extortion attack
* Corrupting files in a subtle way
* Upload and download files
* Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context
* Showing fake downloads of software movies, games, porn videos and porn websites, that you did not download nor go on.
* Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
* Spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
* Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
* Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
* Making screenshots
* Logging keystrokes to steal information such as passwords and credit card numbers
* Phishing for bank or other account details, which can be used for criminal activities
* Installing a backdoor on a computer system
* Opening and closing CD-ROM tray
* Playing sounds, videos or displaying images.
* Calling using the modem to expensive numbers, thus causing massive phone bills.
* Harvesting e-mail addresses and using them for spam
* Restarting the computer whenever the infected program is started
* Deactivating or interfering with anti-virus and firewall programs
* Deactivating or interfering with other competing forms of malware
* Randomly shutting off the computer
* A virus

Wednesday, June 11, 2008

Conceptual system

A conceptual system is simply a model. There is no limitations on this kind of model whatsoever except those of human imagination. If there is an experimentally verified correspondence between a conceptual system and a physical system then that conceptual system models the physical system. "values, ideas, and beliefs that make up every persons view of the world": that is a model of the world; a conceptual system that is a model of a physical system (the world). The person who has that model is a physical system.

In psychology and social work, when they talk about a conceptual system, they are referring to some person's model of the world, but if they try to understand that model, they end up making a model of that model, which is just a model of the person's behavior. In any case, this is exactly the purpose of the general term "conceptual systems".

Tuesday, June 03, 2008

Psychosynthesis

Psychosynthesis is an original approach to psychology that was developed by Roberto Assagioli. He considered it an Existential psychology which includes spiritual goals and concepts. Psychosynthesis was not intended to be a school of thought or an exclusive method but many conferences and publications had it as central theme and centers were formed in Italy and the USA in the 1960s.

Psychosynthesis departed from the empirical foundations of psychology in that it studied a person as a personality and a soul but Assagioli continued to insist that it was scientific. Assagioli developed therapeutic methods other than what was found in psychoanalysis. Although the unconscious is an important part of the theory, Assagioli was careful to maintain a balance with rational, conscious therapeutical work.