Tux, STUX, D.E.F.T, M.A.D and C.W.F (Cyberwarfare), Cyberparanoia and Stuxnet
New vocabulary is entering general use with cyber attacks becoming preemptive at
international stage. I am not going to be expressive here since
hackers (they) might think my IP address is some defence attaché and
attack with D.O.S (Denial of Service Attack).
Cyber space is free but it is not is not a fair play ground for a
simple academic like me to engage in, who is nearer to the grave by
natural causes and do not need any interference to my intellectual
exercises unless of incapacitated by natural illness or loss of memory.
I am disturbed by the use of TuX in Stuxnet and this Simple Linux Guy (S.M.G) whom I adore. His girls are Penny and Gown.
Stuxnet is the Virtual attack that was directed at Iran’s nuclear reactors.
Tux is a penguin character and the
official Mascot of the Linux kernel. Originally created as an entry to a
Linux logo competition, Tux is the most commonly used icon for Linux,
although different Linux Distributions depict.
Tux in various styles. In video games
featuring the character, female counterparts, named Penny and Gown,
accompany him. The character is used in many other Linux programs and as
a general symbol of Linux.
STUX
STUX is a bootable CD with a collection
of software, automatic hardware detection, and support for many graphics
cards, sound cards, SCSI and U.S.B devices and other peripherals.
STUX also contains an installation wizard on the Live CD for
putting the distribution on a Pendrive and thereby booting from it.
However, a 1GB pen drive is required to do this which is far larger than
other U.S.B Linux distributions.
DEFT is a Linux distribution with Digital Evidence and Forensic
Investigations tools attached. It is not at military level bu at simple
desktop or server leve.
I was trying to download (point to point) it and I have failed in 5 attempts now due to abrupt termination of service.
MAD is Mutually assured Destruction
Mutual Assured Destruction is a doctrine of
military strategy and National Security Policy in which a full-scale use
of high-yield Weapons of Mass Destruction (WMD) by two opposing sides
would effectively result in the complete, utter and irrevocable
annihilation of both the attacker and the defender. becoming thus a war that has no victory nor any armistice but only effective reciprocal destruction.
C.W.F is Cyberwarfare.
There are very interesting articles and one who interested in can
browse but suffice is to say even an innocent device like Play Station
can be used for an attack.
Other interesting point is that proprietary operating system with
the O.E.M guys can use a device to send secret message to the company or
the country’s National security for spying on your web activities.
This is why I am strongly against Windows 8 attempt to invade and intrusion of One’s Freedom of Use (O.F.U).
Cyberparanoia is the word I coin today to describe this phenomenon from a doctors point of view.
That is my contribution to the jargon and vocabulary.