Showing posts with label Programming. Show all posts
Showing posts with label Programming. Show all posts


As you know that Linux is the best operating system of hackers. As you know that this operating system consists inbuilt hacking tools. It is also the favourite operating system of Professional hackers because of its inbuilt Hacking tools. So after installing the Linux Kali you will not have to download the hacking tools.

Kali launch its new LINUX OS, Kali Linux 2017.3, on 21st November. They reveal that new launch of Kali in their official website. They added new features in Kali 2017.3 version. They fixes many bugs and security issues. In this new update of Kali Linux, kernel has to been updated to 4.13.10.

Since the last update on September, Kali adds new additional features in their new version of Linux. There are five new features in Kali Linux.


InSpy


This feature helps you in enumeration on LinkedIn. It is very small but impressive feature in new Kali. It helps you to find people on the basis of their job title, company or email.

InSpy is a LinkedIn Enumeration which is based on Python. It has two functionalities:

  • TechSpy
  • EmpSpy

They both together complete the enumeration task in LinkedIn.


CherryTree


It is simply a note taking feature, which gives you the features like rich text with highlighting syntax. This CherryTree feature provides you to store the data in only single XML file. This feature is very familiar to all of you, if you ever used "Big-Name" note organization applications.


Sublist3r


Sublist3r will be the great application for you or may be the best application in Kali if you enumerates sub-domain. This application give you the facility to enumerate many sub-domains of multiple sources at once. It is Python-Based application.


OSRFramework


OSRFramework is used to perform IP Open source intelligence task. It is simply a set of libraries, you will used to perform that open source intelligence task. OSRFramework is a collection of scripts that can enumerate users, domains etc.


Massive Maltego Metamorphosis


Maltego is one of the favorite application in Kali Linux. Maltego is impressive open-source information gathering tool.


Requirements


On an average, every Kali Linux OS requires 20 Gigabytes of free Hard Drive Disk for installing. And your RAM of must be 1 Gigabyte with the i3 core processor and AMD64 architectures. Also, a bootable CD-ROM or USB stick.

At last, Kali Linux is best for professional penetration testing and security auditing.


Thanks for reading... 




Visualizable questions in science and medication stretch out over a tremendous scope of scale, from singular particles and cells through the assortments of tissue and interstitial interfaces to finish organs, organ frameworks, and body parts.

The act of pharmaceutical and investigation of science have dependably depended on perceptions to contemplate the relationship of anatomic structure to biologic capacity and to identify and treat sickness and injury that aggravate or undermine typical life forms. Generally, these representations have been either immediate, through surgery or biopsy, or aberrant, requiring broad mental remaking. The potential for progressive development in the act of drug and in biologic examinations lies in coordinate, completely immersive, constant multi tangible combination of genuine and virtual data information streams into on the web, ongoing perceptions accessible amid real clinical methodology or organic analyses. In the field of logical representation, the expression "four dimensional perception" as a rule alludes to the way toward rendering a three dimensional field of scalar esteems.

"4D" is shorthand for "four-dimensional"- the fourth measurement being time. 4D perception takes three-dimensional pictures and adds the component of time to the procedure. The progressive abilities of new three-dimensional (3-D) and four-dimensional (4-D) restorative imaging modalities alongside PC reproduction and rendering of multidimensional medicinal and histologic volume picture information, hinder the requirement for physical analyzation or conceptual gathering of life systems and give capable new chances to therapeutic finding and treatment, and in addition for organic investigations.In complexity to 3D imaging demonstrative procedures, 4D enables specialist to envision inside life structures moving continuously. So doctors and sonographers can identify or preclude any number of issues, from vascular inconsistencies and hereditary disorders. Time will uncover the significance of 4d perception

4D-The Modern Dimensions


"4D" is shorthand for "four-dimensional"- the fourth measurement being time. 4D representation takes three-dimensional pictures and adds the component of time to the procedure.

As opposed to 3D imaging symptomatic procedures, 4D enables specialist to envision inside life systems moving progressively. For instance: Movement examples of embryos enables conclusions to be drawn about their advancement; increment of precision in ultrasound guided biopsies on account of the representation of needle developments continuously in every one of the 3 planes. So doctors and sonographers can identify or preclude any number of issues, from vascular oddities and hereditary disorders

3D Gives Life to 4D


Bolted inside 3-D biomedical pictures is critical data about the items and their properties from which the pictures are inferred. Endeavors to open this data to uncover answers to the riddles of shape and capacity are framed in the area of picture preparing and perception. An assortment of both standard and advanced techniques have been created to process (alter) pictures to specifically upgrade the perceivability and quantifiability of wanted question highlights and properties. For instance, both authenticity protecting and observation adjusting ways to deal with picture show have fundamentally propelled the down to earth handiness of 4-D biomedical imaging.

Numerous hazardous maladies or potentially personal satisfaction tribulations still require physical intercessions into the body to decrease or expel sickness or to reduce destructive or agonizing conditions. In any case, insignificantly intrusive or noninvasive mediations are presently inside achieve that adequately increment doctor execution in capturing or curing illness; lessen chance, agony, difficulties, and reoccurrence for the patient; and diminishing human services costs. What is yet required is engaged lessening of later and proceeding with propels in representation innovation to the level of training, so they can give new apparatuses and systems that doctors ''must have'' to treat their patients and enable researchers in biomedical investigations of structure-to work connections.


Shaping a picture is mapping some property of a protest onto picture space. This space is utilized to imagine the question and its properties and might be utilized to portray quantitatively its structure or capacity. Imaging science might be characterized as the investigation of these mappings and the advancement of approaches to better comprehend them, to enhance them, and to utilize them gainfully. The test of imaging science is to give propelled capacities to procurement, handling, representation, and quantitative examination of biomedical pictures to increment considerably the loyal extraction of valuable data that they contain.

Idea Of 4D Visualization


In the field of logical representation, the expression "four dimensional perception" for the most part alludes to the way toward rendering a three dimensional field of scalar esteems. While this worldview applies to a wide range of informational collections, there are likewise utilizes for imagining information that compare to genuine four-dimensional structures. Four dimensional structures have ordinarily been envisioned by means of wire outline techniques, however this procedure alone is normally lacking for a natural comprehension. The perception of four dimensional items is conceivable through wire outline techniques with broadened representation signs, and through beam following strategies. Both the strategies utilize genuine four-space seeing parameters and geometry.

The beam following methodology effortlessly settles the concealed surface and shadowing issues of 4D questions, and yields a picture as a three-dimensional field of RGB esteems, which can be rendered with an assortment of existing techniques. The 4D beam tracer likewise bolsters genuine four-dimensional lighting, reflections and refractions. The show of four-dimensional information is generally expert by allocating three measurements to area in three-space, and the rest of the measurement to some scalar property at every three-dimensional area. This task is very able for an assortment of four-dimensional information, for example, tissue thickness in an area of a human body, weight esteems in a volume of air, or temperature dispersion all through a mechanical question


4D Image Warping


For heartily measuring worldly morphological cerebrum changes, a 4D picture distorting component can be utilized. Longitudinal steadiness is accomplished by considering all fleeting MR pictures of an individual all the while in picture distorting, instead of by separately twisting a 3D layout to an individual, or by distorting the pictures of one time-point to those of some other time-point. Also, picture includes that are reliably perceived in unequaled focuses direct the twisting system, though spurious highlights that show up conflictingly at various time-focuses are dispensed with. This misshapening methodology altogether enhances power in identifying anatomical correspondences, subsequently delivering smooth and exact estimations of longitudinal changes. The trial comes about demonstrate the huge change of 4D distorting strategy over past 3D twisting technique in measuring unpretentious longitudinal changes of cerebrum structures.
Strategy:

4D-Hammer


It includes the accompanying two stages:

Rigid arrangement of 3D pictures of a given subject gained at various time focuses, with a specific end goal to create a 4D picture. 3D-HAMMER is utilized to build up the correspondences between neighboring 3D pictures, and after that adjust one picture (time t) to its past time picture (t-1) by an inflexible change computed from the built up
correspondences.

Hierarchical misshapening of the 4D map book to the 4D subject pictures, through a various leveled quality based coordinating technique. At first, the misshapening of the map book is affected basically by voxels with particular characteristic vectors, in this way limiting the odds of poor matches and furthermore diminishing computational weight. As the disfigurement continues, voxels with less unmistakable characteristic vectors step by step pick up impact over the twisting.

Conclusion


Propelled therapeutic imaging innovation permits the procurement of high settled 3D pictures after some time i.e.4D pictures of the thumping heart. 4D representation and PC bolstered exact estimation of therapeutic markers (ventricle volume, discharge portion, divider movement and so forth.) have the high potential to significantly streamline comprehension of the morphology and elements of heart cavities, at the same time lessen the likelihood of a false determination. 4D representation goes for giving all data helpfully in single, stereo, or intuitively turning enlivened perspectives.

Thanks for Reading...


Scratch is a very simple and easy programming language especially for children. This, let you create your own interactive stories, animations,  games etc. specially for fun. 

  • Scratch is a free download software. 

Features of Scratch


There are numerous features of this language:

  • It is very easy to learn and use. That's why this language is also in primary children's syllabus, because it is very easy and give the first introduction of Programming to the children.
  • It allows you to learn the basic of the programming in a manner that full of fun. 
  • Scratch provides a graphical environment where you connect blocks of code to build programs. 



About Developer


This language was developed by the Lifelong Kindergarten, Group at the MIT(Massachusetts Institute of Technology) Media Lab,  which is led by Mitchel Resnick in 2003. They had financial support from the National Science Foundation,  Intel Foundation, and the MIT(Media Lab). 

  • The first official website was originally launched in 2006.

Scratch 2.0 it's the second current major version. Scratch 2.0 is followed by Scratch 1.4. It has redesigned editors, and allows you to edit projects directly from your web browser. It support offline editors as well. It was officially released on May 09, 2013.

Scratch software can easily run on different operating system(OS) including Windows, Mac OS and also Linux. 

Thanks for reading... 















Man accidently stops cyber attack that hit 99 countries


A cyber security researcher unintentionally found a way to temporarily stop the massive ransomware
attack  that targeted 99 countries including india on Friday.
The researcher chanced upon a domain name in the code of the ‘ Wannacry’ ransomware.
Registering the domain name triggered the switch which had been hardcoded into the malware tostop it from spreading in case of emergencies.

How should one respond to ransomware attacks?

Ransomware is malicious program that looks files on a user’s computers or smartphones till the meet attackers ‘  ransom demands. Researchers encourage users hit by ransomware to call enforcement 
and not pay the money demanded, as it doesn’t guarantee the computer will be unlocked.
Preventive measures include using anti-virus, backing up files, and updating a device’s software 
regularly.

‘ Wannacry’ malware has hit 2 lakh victims, 150 countries

Friday ‘ s large – scale cyber attack dubbed as ‘wannacry’ hit 2 lakh victims in at least 150 countries
and number is feared to increase when people will return to work on Monday, European Union’s as
the ransomware was used in combination with “a worm functionality”  so the infection spread automatically, Europol added.

What is the impact of ransomware attacks in India

With increasing digitization in India, the country faces a greater risk of being affected by malicious
software such as ransomware which locks computer files till hacker’ demands are met. Such attacks
can harm services like online Aadhaar database. Andhra Pradesh police stations confirmed being hit by Friday’s WannaCry ransomware, but its impact was minimal as documents are also recorded offiline.

                                                     😊
           


CORBA, the Common Object Request Broker Architecture defined by the Object Management Group (OMG), specifies how software objects distributed over a network can work together without regard to client and server operating systems and programming languages.

CORBA is a complete distributed object platform. It extends applications across networks, languages, component boundaries, and operating systems. A CORBA Object Request Broker (ORB) connects a client application with the objects it wishes to use.

The client application does not need to know whether the object resides on the same computer or on a remote computer elsewhere on the network. The client application needs to know only two pieces of information: the object's name and how to use the object's interface. The ORB takes care of the details of locating the object, routing the request, and returning the result.

CORBA grew at the same time as three influential trends, which lent credence to the CORBA vision. First, the software development community realized the importance of object-oriented programming techniques, even though they’d been around for the better part of two decades. Second, industry leaders - including IBM, Microsoft, and Apple - were advocating new application models based on small, task-specific components instead of large, general-purpose monoliths. The components would be easy to write and update, since they were small.

Developers could more conveniently, and cheaply, upgrade only those parts of their software that were out of date, and users wouldn't have to purchase entirely new versions of the entire package. And the small components could be distributed over a network more easily than their gargantuan ancestors. The more enlightened of these component architectures promised a cross-platform future, where all components could work together entirely independent of the underlying operating system.


Introduction of CORBA Technology


The Common Object Request Broker Architecture (CORBA) is an emerging open distributed object computing infrastructure being standardized by the Object Management Group (OMG). CORBA automates many common network programming tasks such as object registration, location, and activation; request demultiplexing; framing and error-handling; parameter marshalling and demarshalling; and operation dispatching.


How CORBA Works?


A CORBA Object Request Broker (ORB) is the middleware that establishes the client-server relationship between objects. Using an ORB, a client object can invoke a method on a server object that can be on the same machine or across a network. The ORB intercepts the call and finds an object that can implement the request, pass it the parameters, invoke its method, and return the results. CORBA, like SQL, provides both static and dynamic interfaces to its services. The client does not have to know the object's location, its programming language, its operating system, or any other system aspects that are not part of an object's interface.

The objects are small software components that provide some kind of a service, such as access to a database, account management, or inventory tracking. Fundamental to the architecture are the ORBs. For any client or server to be a part of the CORBA scheme, it must include an ORB to help it find and communicate with other CORBA objects. Once outfitted with an ORB, a client or server can use the services of any CORBA object on any server or host on the network.

An object can be both a client and a server: when it provides services to another object, it's a server; when it requests services from another object, it's a client. The CORBA architecture provides a set of services that help objects interact with each other.


Interface Definition Language


CORBA  defines a special language - IDL -which provides a language-neutral way of describing a specification for a CORBA object and the service(s) it provides. IDL lets components written in different languages communicate with each other using IIOP and the rest of the CORBA architecture.

Currently, it’s easiest to provide an IDL specification for objects written in C, C++, and Java, because the OMG has completed mapping schemes - or translation guides - from IDL to those languages. Also, there are already compilers that employ those mapping schemes to translate IDL to C, C++, and Java. (OMG is currently working on IDL mappings for ADA, SmallTalk, and other languages.)

CORBA objects may sit on different types of systems - Windows or Unix servers, IBM 3090 or DEC VAX mainframes. They may even be written in different languages. In fact, the objects don't need any inherent knowledge of each others' existence. As long as the interface to the service provided by the object is written in IDL, all the objects can communicate and use each others' services through ORBs sitting on clients, servers, database systems, mainframes, and other systems on the network.



                                                🌝😉



Anonymous Communication

INFORMATION

Anonymous communication is a necessary measure to protect the privacy of users, and protect computer systems against traffic analysis. Anonymity systems seeks to build an infrastructure running on top of the existing Internet protocols that allows people to communicate with each other without necessarily revealing their personal network identifiers.

 CPM-1do-BD  

The basic idea behind any anonymous system is to provide unlinkability between communicating parties by relaying traffic through a number of intermediate nodes. If the messages are delayed and buffered at these intermediate nodes then they can provide stronger anonymity.

Such message based systems are suitable for high latency anonymous applications such as anonymous email. Such sytems are called Mix based system. Circuit based randomized routing techniques like Onion Routing and TOR are used for providing low latency applications like anonymous web browsing or remote login. All these anonymous systems are used by are used by diverse group of users to protect their identities on the Internet

Introduction of CHAUM’S MIX

It is a concept introduced by David Chaum which is based on public key cryptography that allows an electronic mail system to hide whom a participant communicates with as well as the content of the communication . The basic building block of such a high latency anonymous communication systems is a mix. At a high level ,a mix is a process that accepts encrypted messages as input and groups several messages together into a batch , and then decrypts and
forwards some or all of the messages in the batch.

The principal idea is that messages to be anonymized are relayed through a mix. The mix has a well-known RSA public key, and messages are divided into blocks and encrypted using this key. Upon receiving a message, a mix decrypts all the blocks, strips out the first block that contains the address of the recipient, and appends a block of random bits (the junk) at the end of the message. The length of the junk is chosen to make messages size invariant. The most important property that the decryption and the padding aim to achieve is bitwise unlinkability.

An observer, or an active attacker, should not be able to find the link between the bit pattern of the encoded messages arriving at the mix and the decoded messages departing from the mix. More precisely, a mix first generates a public and private key pair and makes the public component known to clients who wish to relay messages through the mix .We let C = Ex (M) denote encryption of a message M with mix x’s publickey, and also let M = Dx(C) denote decryption of a cipher text C with mix x’s corresponding privatekey. Further ,we let Ax represent the identity or address of mix x (e.g., x’sIPaddress).

Consider a sender , Alice , who wants to anonymously send a message M to a recipient , Bob ,via a single mix x .Then , Alice would compute Ex (Rx , M, AB),where Rx is a string of random bits and AB is Bob’s address . She then sends the resulting cipher text to the mix, which can use its privatekey to retrieve M and AB. Rx is simply discarded, but is included in the encryption to help prevent an adversary from identifying two identical messages encrypted under the same asymmetric key . Also alice could first encrypt Message M using publickey of Bob so that even the mix couldn’t read it. This can be concisely represented as

Ex (Rx , M, AB) → M.

The mix collects messages into a batch until it has received “enough” ,and then forwards each to the destination address extracted from the decrypted input message

MIX NETWORKS

More level of anonymity can be achieved by using a series of mixes instead of a single mix.In mix networks senders can choose an ordered sequence of mixes through which to send their messages. The sequence of mixes through which a message is routed as that message’s path. There are two general path selection strategies typically considered: free routes and mix cascades. In free route topology the clients are able to choose any ordered sequence of mixes in the network for their message’s path. In a mix cascade topology, there are one or more
predefined routes through which all client traffic is relayed.

If Alice wants to anonymously send a message M to Bob via a path P = {x, y, z} , she would iteratively create a layer of encryption, in the same manner as above, for each mix starting with the last mix in the path and working back toward the first. Alice then sends the resulting multiply encrypted ciphertext to the first mix in the path.


DOS Attack



Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management.



There are two general forms of DoS attacks: those that crash services and those that flood services. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.



Symptoms and Manifestations

The United States Computer Emergency Response Team defines symptoms of denial-ofservice attacks to include:


 Unusually slow network performance (opening files or accessing web sites)



 Unavailability of a particular web site  Inability to access any web site



 Dramatic increase in the number of spam emails received—(this type of DoS attack is considered an e-mail bomb)



Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network. If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment.




Ping of Death

This vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them to reboot) so that no users can use its services. This exploit no longer works, as almost all system administrators would have upgraded their systems making them safe from such attacks. In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP, which is 65 536. This would have almost always caused the remote system to hang, reboot or crash. This DOS attack could be carried out even through the command line, in the following manner: The following Ping command creates a giant datagram of the size 65540 for Ping.


How to prevent people from breaking your system



If no patch is available, and your main concern are pings from users outside your network, it would seem the best quick-fix solution is to block ping at the firewall. This is not a longterm solution. If you have any services listening on any ports at all, they are vulnerable. Be assured that sooner or later someone will come out with a program which sends invalid packets to a web server, an ftp port. The only solution is to patch your operating system. By blocking ping, you prevent people from pinging you at all. This could possibly break some things that rely on. A better solution than blocking all pings is to block only fragmented pings. This will allow your common-or-garden 64 byte ping through on almost all systems, while blocking any bigger than the MTU size of your link. (This varies, but about 1k is a good bet).



Ping flood



A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. It only succeeds if the attacker has more bandwidth than the victim (for instance an attacker with a DSL line and the victim on a dial-up modem). The attacker hopes that the victim will respond with ICMP Echo Reply packets, thus consuming outgoing bandwidth as well as incoming bandwidth. If the target system is slow enough, it is possible to consume enough of its CPU cycles for a user to notice a significant slowdown. There are two general forms of DoS attacks: those that crashes services and those that flood services.



Teardrop



The Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is being sent over the Internet, it is broken down into smaller fragments at the source system and put together at the destination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000 bytes is sent at one go. This entire chunk of data is first broken down into smaller parts and divided into a number of packets, with each packet carrying a specified range of data. For Example, say 4000 bytes is divided into 3 packets, then:



The first Packet will carry data from 1 byte to 1500 bytes



The second Packet will carry data from 1501 bytes to 3000 bytes



The third packet will carry data from 3001 bytes to 4000 bytes



These packets have an OFFSET field in their TCP header part. This Offset field specifies from which byte to which byte does that particular data packet carries data or the range of data that it is carrying. This along with the sequence numbers helps the destination system to reassemble the data packets in the correct order. Now in this attack, a series of data packets are sent to the target system with overlapping Offset field values. As a result, the target system is not able to reassemble the packets and is forced to crash, hang or reboot. Say for example, consider the following scenario-: (Note: _ _ _ = 1 Data Packet) Normally a system receives data packets in the following form, with no overlapping Offset values.



_ _ _

_ _ _
_ _ _
(1 to 1500 bytes)
(1501 to 3000 bytes)
(3001 to 4500 bytes)
Now in a Teardrop attack, the data packets are sent to the target computer in the following format:
_ _ _


_ _ _

_ _ _
(1 to 1500 bytes)
(1500 to 3000 bytes)
(1001 to 3600 bytes)
When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot.


Distributed DOS Attacks

DOS attacks are not new; in fact they have been around for a long time. However there has been a recent wave of Distributed Denial of Services attacks which pose a great threat to Security and are on the verge of overtaking Viruses/Trojans to become the deadliest threat to Internet Security. Now you see, in almost all of the above TCP/IP vulnerabilities, which are being exploited by hackers, there is a huge chance of the target's system administrator or the authorities tracing the attacks and getting hold of the attacker.


Now what is commonly being done is, say a group of 5 Hackers join and decide to bring a Fortune 500 company's server down. Now each one of them breaks into a smaller less protected network and takes over it. So now they have 5 networks and supposing there are around 20 systems in each network, it gives these Hackers, around 100 systems in all to attack from. So they sitting on there home computer, connect to the hacked less protected Network, install a Denial of Service Tool on these hacked networks and using these hacked systems in the various networks launch Attacks on the actual Fortune 500 Company.



This makes the hackers less easy to detect and helps them to do what they wanted to do without getting caught. As they have full control over the smaller less protected network they can easily remove all traces before the authorities get there. Not even a single system connected to the Internet is safe from such DDOS attacks. All platforms including Unix, Windows NT are vulnerable to such attacks. Even MacOS has not been spared, as some of them are being used to conduct such DDOS attacks.



Conclusion

DDos attack tools are readily available and any internet host is targetable as either a zombie or the ultimate DDos focus. These attacks can be costly and frustrating and are difficult, if not impossible to eradicate. The best defence is to hinder attackers through vigilant system administration. Applying patches, updating anti-malicious software programs, system monitoring, and reporting incidents go further than retarding DDos attacks – these defences also protect against other attacks. The Internet is not stable—it reforms itself rapidly. This means that DDoS countermeasures quickly become obsolete.


New services are offered through the Internet, and new attacks are deployed to prevent clients from accessing these services. However, the basic issue is whether DDoS attacks represent a network problem or an individual problem—or both. If attacks are mainly a network problem, a solution could derive from alterations in Internet protocols. Specifically, routers could filter malicious traffic, attackers could not spoof IP addresses, and there would be no drawback in routing protocols. If attacks are mostly the result of individual system weaknesses, the solution could derive from an effective IDS system, from an antivirus, or from an invulnerable firewall. Attackers then could not compromise systems in order to create a "zombies" army. Obviously, it appears that both network and individual hosts constitute the problem. Consequently, countermeasures should be taken from an antivirus, or from an invulnerable firewall.