Ant-ivirus

Discussion in 'other anti-virus software' started by midway40, Sep 28, 2009.

Thread Status:
Not open for further replies.
  1. midway40

    midway40 Registered Member

    Joined:
    Jul 24, 2006
    Posts:
    1,257
    Location:
    SW MS, USA
    "Digital ants to the rescue

    Swarms of digital ants may soon crawl all over the internet, scouting not for food, but computer worms and self-replicating programs designed to steal information or facilitate unauthorised use of machines. Security experts have successfully deployed a new type of network security software which mimics the habits of real-world ants..."

    http://www.business-standard.com/india/news/digital-ants-torescue/371377/
     
  2. Arin

    Arin Registered Member

    Joined:
    May 1, 2004
    Posts:
    997
    Location:
    India
    Well as far as I know the baddies don't just hide inside the cablings. They are either loaded in RAM or stored in local discs of some machine. So does it mean the digital ants will break into those machines?

    Or it will be performed through an open port with user's permission? Sounds like nanomites. :D

    And computer users need not worry that a swarm of digital ants will decide to take up residence in their machine by mistake. Digital ants cannot survive without software “sentinels” located at each machine, which in turn report to network “sergeants” monitored by humans, who supervise the colony and maintain ultimate control.

    Is it SaaS?
     
  3. scott1256ca

    scott1256ca Registered Member

    Joined:
    Aug 18, 2009
    Posts:
    144
    2nd paragraph
    Now reread it, but replace the word "threat" with the word "vulnerability" and see if you get worried about potential abuse of this "new technology". :)

    Edit:
    I guess you also have to replace the words "huuman operators" with the words "virus writers" or "little bastards". :)
     
  4. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    A whole new meaning for "buggy" or "web bug". It wouldn't surprise me if they use a variation of this technology against P2P. It has potential for automated denial of service attacks against file sharers.
     
  5. kasperking

    kasperking Registered Member

    Joined:
    Nov 21, 2008
    Posts:
    406
    well thankfully its not digital aunts:D
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.