Monday, December 3, 2018

Blockchain

Seminar Topic on Blockchain

 A blockchain originally block chain is a growing list of records, called blocks, which are linked using cryptography.Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash).

A Brief History of Blockchain

To start, let’s talk about the history of the blockchain. Before it was ever used in cryptocurrency, it had humble beginnings as a concept in computer science — particularly, in the domains of cryptography and data structures.

The very primitive form of the blockchain was the hash tree, also known as a Merkle tree. This data structure was patented by Ralph Merkle in 1979, and functioned by verifying and handling data between computer systems. In a peer-to-peer network of computers, validating data was important to make sure nothing was altered or changed during transfer. It also helped to ensure that false data was not sent. In essence, it is used to maintain and prove the integrity of data being shared

In 1991, the Merkle tree was used to create a “secured chain of blocks” — a series of data records, each connected to the one before it. The newest record in this chain would contain the history of the entire chain. And thus, the blockchain was created.

In 2008, Satoshi Nakamato conceptualized the distributed blockchain. It would contain a secure history of data exchanges, utilize a peer-to-peer network to time stamp and verify each exchange, and could be managed autonomously without a central authority. This became the backbone of Bitcoin. And thus, the blockchain we know today was born, as well as the world of cryptocurrencies.

How does the blockchain work?

Any data put into the blockchain must be verified. Transactions are grouped together in blocks, hence the name blockchain, then verified by the computers (nodes) in the network. When a computer joins the network as a node, they receive a copy of the blockchain which acts as proof of all the transactions that have been performed.

This means that all data stored on the network is transparent; it is public by default. This also means that all the data in the blockchain network cannot be corrupted or deleted.

However, this doesn’t mean you can see who is doing the transaction. For instance, with bitcoin, the public can see that someone is sending an amount to someone else but there is no information linking the transaction to anyone. This is because the public keys linking the transaction are kept anonymous.

As well, it is un-hackable because it doesn’t have a centralised system. Instead, it is hosted by millions of nodes around the world, instead of being in one central place.

Source
https://en.wikipedia.org/wiki/Blockchain
https://www.investinblockchain.com/what-is-blockchain-technology/
https://www.standard.co.uk/tech/what-is-blockchain-explainer-uses-importance-a3779746.html

Saturday, December 1, 2018

Ethical Hacking on Hacktivism

Hacktivism

What is Hacktivism

Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist.

In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial-of-service attacks (DoS), redirects, website parodies, information theft, virtual sabotage and virtual sit-ins.

 A Brief History of Hacktivism


1996—The word “hacktivism” is coined by Omega, a member of the hacking group Cult of the Dead Cow (cDc).

1998—Electronic Disturbance Theater, a group of online political performance artists, hack the Pentagon, the Mexican government, and the German stock exchange to protest the clampdown on the Zapatista Army of National Liberation.

2001—A branch of cDc, Hacktivisimo, announces the hacktivist community’s dedication to combat “state-sponsored censorship of the internet” in the Hacktivisimo Declaration.

2003—Fifteen-year-old Christopher Poole uses a computer in his bedroom to create 4chan.org, the eventual birthplace of the notorious hacktivist group Anonymous.

2011—Hacktivist group LulzSec’s releases private information from Senate.gov just to show it can.

2011— Servers at the NSA, the Pentagon, NASA, the Department of Defense, and other military departments are infiltrated. A hacker called sl1nk claims credit and releases formerly secured information as proof.

2012— Anonymous claims credit for infiltrating and taking down the CIA website.

2014— In what the FBI and Secret Service said was “among the most sophisticated attacks ever launched against US government systems,” someone hacks the White House computer system. The FBI begins publishing numbers of hacktivism incidents in its annual reports.

2016— Information leaked from Democratic National Committee emails conspiring against potential presidential candidate Bernie Sanders are published on WikiLeaks.

Acts of hacktivism, or "hacktions," tend to fall into one or more of the following categories:

Distributed Denial of Service (DDoS) Attacks: Attacks which bring down websites or otherwise disrupt Internet activity by systematically sending so many requests to a server that it cannot handle the traffic and is rendered temporarily useless. Common examples include email bombing and web sit-ins.

Website Defacements: Attacks which change the content of websites, usually for the purpose of spreading a political message.

Internet Worms: Programs designed to spread themselves within a network, either for the purpose of disrupting activity or spreading a message. 





The Rise of Hacktivism [Infographic]
Source: CyberSecurityDegrees.com

Sources:
https://www.highspeedinternet.com/resources/political-hacking-in-the-us/
https://www.techopedia.com/definition/2410/hacktivism
https://foreignpolicy.com/2013/04/29/hacktivism-a-short-history/ 
https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/Hacktivism/hacktivism.html#

Sunday, November 25, 2018

artificial intelligence(ai)

 Artificial intelligence (AI)

 Artificial intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. In computer science AI research is defined as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.Colloquially, the term "artificial intelligence" is applied when a machine mimics "cognitive" functions that humans associate with other human minds, such as "learning" and "problem solving".

History of  Artificial Intelligence (AI)

 

Timeline Of  Artificial Intelligence (AI)

A timeline of developments in computers and robotics.
Source:LiveScience

Thursday, May 3, 2018

Data-Activated Replication Object Communications (DAROC)




Programming distributed computer systems is difficult because of complexities in addressing remote entities, message handling, and program coupling. As systems grow, scalability becomes critical, as bottlenecks can serialize portions of the system. When these distributed system aspects are exposed to programmers, code size and complexity grow, as does the fragility of the system. This paper describes a distributed software architecture and middleware implementation that combines object-based blackboard-style communications with data-driven and periodic application scheduling to greatly simplify distributed programming while achieving scalable performance. Data-Activated Replication Object Communications (DAROC) allows programmers to treat shared objects as local variables while providing implicit communications.




Monday, March 5, 2018

Controller Area Network (CAN bus)

A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each others' applications without a host computer. It is a message-based protocol, designed originally for multiplex electrical wiring within automobiles to save on copper, but can also be used in many other contexts. For each device the data in a frame is transmitted sequentially but in such a way that if more than one device transmits at the same time the highest priority device is able to continue while the others back off. Frames are received by all devices, including by the transmitting device.

Controller Area Network (CAN), an overview


CAN (Controller Area Network) is a serial bus system, which was originally developed for automotive applications in the early 1980's. The CAN protocol was internationally standardized in 1993 as ISO 11898-1 and comprises the data link layer of the seven layer ISO/OSI reference model.
CAN, which is by now available from around 40 semiconductor manufacturers in hardware, provides two communication services: the sending of a message (data frame transmission) and the requesting of a message (remote transmission request, RTR). All other services such as error signaling, automatic re-transmission of erroneous frames are user-transparent, which means the CAN chip automatically performs these services.

The equivalent of the CAN protocol in human communication are e.g. the Latin characters. This means a CAN controller is comparable to a printer or a type writer. CAN users still have to define the language/grammar and the words/vocabulary to communicate.

CAN provides

  • a multi-master hierarchy, which allows building intelligent and redundant systems. If one network node is defect the network is still able to operate.
  • broadcast communication. A sender of information transmits to all devices on the bus. All receiving devices read the message and then decide if it is relevant to them. This guarantees data integrity as all devices in the system use the same information.
  • sophisticated error detecting mechanisms and re-transmission of faulty messages. This also guarantees data integrity.




CAN history

In February of 1986, Robert Bosch GmbH introduced the serial bus system Controller Area Network (CAN ) at the Society of Automotive Engineers (SAE) congress. It was the hour of birth for one of the most successful network protocols ever.
Today, almost every new passenger car manufactured in Europe is equipped with at least one CANnetwork. Also used in other types of vehicles, from trains to ships, as well as in industrial controls, CAN is one of the most dominating bus protocols maybe even the leading serial bus system worldwide.

CAN physical layer


  • Bit encoding
  • Bit-timing and synchronization
  • Interdependency of data rate and bus length
  • Physical media
  • Network topology
  • Bus access
  • Physical layer standards

Physical layer standards


ISO 11898-2 (high-speed)
ISO 11898-3 (fault-tolerant)
SAE J2411 (single-wire)
ISO 11992 (point-to-point)
Others

The Controller Area Network (CAN) protocol defines the data link layer and part of the physical layer in the OSI model, which consists of seven layers. The International Standards Organization (ISO) defined a standard, which incorporates the CAN specifications as well as a part of physical layer: the physical signaling, which comprises bit encoding and decoding (Non-Return-to-Zero, NRZ) as well as bit timing and synchronization.