Tongam S. Kom | STMIK Budi Darma Medan (original) (raw)
Papers by Tongam S. Kom
Mengamankan distribusi dokumen seperti dokumen video masih sering tidak diperdulikan saat ini. Pa... more Mengamankan distribusi dokumen seperti dokumen video masih sering tidak diperdulikan saat ini. Padahal tanpa pengamanan, dokumen video yang dikirimkan dapat dimanfaatkan orang yang tidak berkepentingan seperti dimanipulasi, dibajak, dan disebarluaskan sehingga merugikan pemilik video tersebut. Hal ini menjadi sangat penting terutama pada divisi film programming PT. Graha Layar Prima (Bioskop Blitzmegaplex) yang bertugas menyeleksi film-film yang akan ditayangkan melalui materi cuplikan adegan dalam video dan trailer film. Dokumen video eksklusif ini sifatnya sangat rahasia dan hanya boleh diketahui serta disaksikan oleh kedua belah pihak saja yakni pihak bioskop (Eksibitor) sebagai penyedia tempat penayangan dan pihak Distributor sebagai penyedia konten tayangan (film). Dalam pengirimannya, dokumen video disimpan kedalam DVD atau flashdisk dan diantarkan langsung oleh pihak Distributor ke Eksibitor untuk menjaga keamanannya. Dibutuhkan suatu solusi dalam pemecahan masalah untuk keamanan dokumen video tersebut sekaligus mempermudah pendistribusian melalui jaringan internet sehingga tidak diperlukan pengiriman video secara langsung. Salah satu metode yang digunakan adalah kriptografi dengan berbagai algoritmanya. Kriptografi dapat diterapkan pada objek citra digital, dan video merupakan sekumpulan objek citra digital yang membentuk suatu animasi atau gambar bergerak. Teknik kriptografi yang dapat digunakan dalam penyandian objek video adalah Algoritma Rivest-Shamir Adleman (RSA) sehingga hanya orang-orang tertentu saja yang dapat melihat bentuk asli video yang didistribusikan dengan fasilitas enkripsi dan deskripsi melalui pemilihan private key dan public key. Hal ini membuat keamanan data tersebut dapat dijamin kebenarannya.
Books by Tongam S. Kom
This electronic edition of The Little Black Book of Computer Viruses is copyright 1996 by Mark A.... more This electronic edition of The Little Black Book of Computer Viruses is
copyright 1996 by Mark A. Ludwig. This original Adobe Acrobat file
may be copied freely in unmodified form. Please share it, upload it,
download it, etc. This document may not be distributed in printed form
or modified in any way without written permission from the publisher.
The Little Black Book of Computer Viruses has seen five
good years in print. In those five years it has opened a door to
seriously ask the question whether it is better to make technical
information about computer viruses known or not.
When I wrote it, it was largely an experiment. I had no idea
what would happen. Would people take the viruses it contained and
rewrite them to make all kinds of horrificly destructive viruses? Or
would they by and large be used responsibly? At the time I wrote,
no anti-virus people would even talk to me, and what I could find
in print on the subject was largely unimpressive from a factual
standpoint—lots of hype and fear-mongering, but very little solid
research that would shed some light on what might happen if I
released this book. Being a freedom loving and knowledge seeking
American, I decided to go ahead and do it—write the book and get
it in print. And I decided that if people did not use it responsibly, I
would withdraw it.
Five years later, I have to say that I firmly believe the book
has done a lot more good than harm.
On the positive side, lots and lots of people who desperately
need this kind of information—people who are responsible
for keeping viruses off of computers—have now been able to get
it. While individual users who have limited contact with other
computer users may be able to successfully protect themselves with
an off-the-shelf anti-virus, experience seems to be proving that such
is not the case when one starts looking at the network with 10,000
users on it. For starters, very few anti-virus systems will run on
10,000 computers with a wide variety of configurations, etc. Secondly,
when someone on the network encounters a virus, they have
to be able to talk to someone in the organization who has the
detailed technical knowledge necessary to get rid of it in a rational
way. You can’t just shut such a big network down for 4 days while
someone from your a-v vendor’s tech support staff is flown in to
clean up, or to catch and analyze a new virus.
Secondly, people who are just interested in how things
work have finally been able to learn a little bit about computer
viruses. It is truly difficult to deny that they are interesting. The idea
of a computer program that can take off and gain a life completely
independent of its maker is, well, exciting. I think that is important.
After all, many of the most truly useful inventions are made not by
giant, secret, government-funded labs, but by individuals who have
their hands on something day in and day out. They think of a way
to do something better, and do it, and it changes the world. However,
that will never happen if you can’t get the basic information about
how something works. It’s like depriving the carpenter of his
hammer and then asking him to figure out a way to build a better
building.
At the same time, I have to admit that this experiment called
The Little Black Book has not been without its dangers. The Stealth
virus described in its pages has succeeded in establishing itself in
the wild, and, as of the date of this writing it is #8 on the annual
frequency list, which is a concatenation of the most frequently
found viruses in the wild. I am sorry that it has found its way into
the wild, and yet I find here a stroke of divine humor directed at
certain anti-virus people. There is quite a history behind this virus.
I will touch on it only briefly because I don’t want to bore you with
my personal battles. In the first printing of The Little Black Book,
the Stealth was designed to format an extra track on the disk and
hide itself there. Of course, this only worked on machines that had
a BIOS which did not check track numbers and things like that—
particularly, on old PCs. And then it did not infect disks every time
they were accessed. This limited its ability to replicate. Some
anti-virus developers commented to me that they thought this was
The Little Black Book of Computer Viruses
a poor virus for that reason, and suggested I should have done it
differently. I hesitated to do that, I said, because I did not want it to
spread too rapidly.
Not stopping at making such suggestions, though, some of
these same a-v people lambasted me in print for having published
“lame” viruses. Fine, I decided, if they are going to criticize the
book like that, we’ll improve the viruses. Next round at the printer,
I updated the Stealth virus to work more like the Pakistani Brain,
hiding its sectors in areas marked bad in the FAT table, and to infect
as quickly as Stoned. It still didn’t stop these idiotic criticisms,
though. As late as last year, Robert Slade was evaluating this book
in his own virus book and finding it wanting because the viruses it
discussed weren’t very successful at spreading. He thought this
objective criticism. From that date forward, it would appear that
Stealth has done nothing but climb the wild-list charts. Combining
aggressive infection techniques with a decent stealth mechanism
has indeed proven effective . . . too effective for my liking, to tell
the truth. It’s never been my intention to write viruses that will make
it to the wild list charts. In retrospect, I have to say that I’ve learned
to ignore idiotic criticism, even when the idiots want to make me
look like an idiot in comparison to their ever inscrutable wisdom.
In any event, the Little Black Book has had five good years
as a print publication. With the release of The Giant Black Book of
Computer Viruses, though, the publisher has decided to take The
Little Black Book out of print. They’ve agreed to make it available
in a freeware electronic version, though, and that is what you are
looking at now. I hope you’ll find it fun and informative. And if you
do, check out the catalog attached to it here for more great information
about viruses from the publisher.
Mengamankan distribusi dokumen seperti dokumen video masih sering tidak diperdulikan saat ini. Pa... more Mengamankan distribusi dokumen seperti dokumen video masih sering tidak diperdulikan saat ini. Padahal tanpa pengamanan, dokumen video yang dikirimkan dapat dimanfaatkan orang yang tidak berkepentingan seperti dimanipulasi, dibajak, dan disebarluaskan sehingga merugikan pemilik video tersebut. Hal ini menjadi sangat penting terutama pada divisi film programming PT. Graha Layar Prima (Bioskop Blitzmegaplex) yang bertugas menyeleksi film-film yang akan ditayangkan melalui materi cuplikan adegan dalam video dan trailer film. Dokumen video eksklusif ini sifatnya sangat rahasia dan hanya boleh diketahui serta disaksikan oleh kedua belah pihak saja yakni pihak bioskop (Eksibitor) sebagai penyedia tempat penayangan dan pihak Distributor sebagai penyedia konten tayangan (film). Dalam pengirimannya, dokumen video disimpan kedalam DVD atau flashdisk dan diantarkan langsung oleh pihak Distributor ke Eksibitor untuk menjaga keamanannya. Dibutuhkan suatu solusi dalam pemecahan masalah untuk keamanan dokumen video tersebut sekaligus mempermudah pendistribusian melalui jaringan internet sehingga tidak diperlukan pengiriman video secara langsung. Salah satu metode yang digunakan adalah kriptografi dengan berbagai algoritmanya. Kriptografi dapat diterapkan pada objek citra digital, dan video merupakan sekumpulan objek citra digital yang membentuk suatu animasi atau gambar bergerak. Teknik kriptografi yang dapat digunakan dalam penyandian objek video adalah Algoritma Rivest-Shamir Adleman (RSA) sehingga hanya orang-orang tertentu saja yang dapat melihat bentuk asli video yang didistribusikan dengan fasilitas enkripsi dan deskripsi melalui pemilihan private key dan public key. Hal ini membuat keamanan data tersebut dapat dijamin kebenarannya.
This electronic edition of The Little Black Book of Computer Viruses is copyright 1996 by Mark A.... more This electronic edition of The Little Black Book of Computer Viruses is
copyright 1996 by Mark A. Ludwig. This original Adobe Acrobat file
may be copied freely in unmodified form. Please share it, upload it,
download it, etc. This document may not be distributed in printed form
or modified in any way without written permission from the publisher.
The Little Black Book of Computer Viruses has seen five
good years in print. In those five years it has opened a door to
seriously ask the question whether it is better to make technical
information about computer viruses known or not.
When I wrote it, it was largely an experiment. I had no idea
what would happen. Would people take the viruses it contained and
rewrite them to make all kinds of horrificly destructive viruses? Or
would they by and large be used responsibly? At the time I wrote,
no anti-virus people would even talk to me, and what I could find
in print on the subject was largely unimpressive from a factual
standpoint—lots of hype and fear-mongering, but very little solid
research that would shed some light on what might happen if I
released this book. Being a freedom loving and knowledge seeking
American, I decided to go ahead and do it—write the book and get
it in print. And I decided that if people did not use it responsibly, I
would withdraw it.
Five years later, I have to say that I firmly believe the book
has done a lot more good than harm.
On the positive side, lots and lots of people who desperately
need this kind of information—people who are responsible
for keeping viruses off of computers—have now been able to get
it. While individual users who have limited contact with other
computer users may be able to successfully protect themselves with
an off-the-shelf anti-virus, experience seems to be proving that such
is not the case when one starts looking at the network with 10,000
users on it. For starters, very few anti-virus systems will run on
10,000 computers with a wide variety of configurations, etc. Secondly,
when someone on the network encounters a virus, they have
to be able to talk to someone in the organization who has the
detailed technical knowledge necessary to get rid of it in a rational
way. You can’t just shut such a big network down for 4 days while
someone from your a-v vendor’s tech support staff is flown in to
clean up, or to catch and analyze a new virus.
Secondly, people who are just interested in how things
work have finally been able to learn a little bit about computer
viruses. It is truly difficult to deny that they are interesting. The idea
of a computer program that can take off and gain a life completely
independent of its maker is, well, exciting. I think that is important.
After all, many of the most truly useful inventions are made not by
giant, secret, government-funded labs, but by individuals who have
their hands on something day in and day out. They think of a way
to do something better, and do it, and it changes the world. However,
that will never happen if you can’t get the basic information about
how something works. It’s like depriving the carpenter of his
hammer and then asking him to figure out a way to build a better
building.
At the same time, I have to admit that this experiment called
The Little Black Book has not been without its dangers. The Stealth
virus described in its pages has succeeded in establishing itself in
the wild, and, as of the date of this writing it is #8 on the annual
frequency list, which is a concatenation of the most frequently
found viruses in the wild. I am sorry that it has found its way into
the wild, and yet I find here a stroke of divine humor directed at
certain anti-virus people. There is quite a history behind this virus.
I will touch on it only briefly because I don’t want to bore you with
my personal battles. In the first printing of The Little Black Book,
the Stealth was designed to format an extra track on the disk and
hide itself there. Of course, this only worked on machines that had
a BIOS which did not check track numbers and things like that—
particularly, on old PCs. And then it did not infect disks every time
they were accessed. This limited its ability to replicate. Some
anti-virus developers commented to me that they thought this was
The Little Black Book of Computer Viruses
a poor virus for that reason, and suggested I should have done it
differently. I hesitated to do that, I said, because I did not want it to
spread too rapidly.
Not stopping at making such suggestions, though, some of
these same a-v people lambasted me in print for having published
“lame” viruses. Fine, I decided, if they are going to criticize the
book like that, we’ll improve the viruses. Next round at the printer,
I updated the Stealth virus to work more like the Pakistani Brain,
hiding its sectors in areas marked bad in the FAT table, and to infect
as quickly as Stoned. It still didn’t stop these idiotic criticisms,
though. As late as last year, Robert Slade was evaluating this book
in his own virus book and finding it wanting because the viruses it
discussed weren’t very successful at spreading. He thought this
objective criticism. From that date forward, it would appear that
Stealth has done nothing but climb the wild-list charts. Combining
aggressive infection techniques with a decent stealth mechanism
has indeed proven effective . . . too effective for my liking, to tell
the truth. It’s never been my intention to write viruses that will make
it to the wild list charts. In retrospect, I have to say that I’ve learned
to ignore idiotic criticism, even when the idiots want to make me
look like an idiot in comparison to their ever inscrutable wisdom.
In any event, the Little Black Book has had five good years
as a print publication. With the release of The Giant Black Book of
Computer Viruses, though, the publisher has decided to take The
Little Black Book out of print. They’ve agreed to make it available
in a freeware electronic version, though, and that is what you are
looking at now. I hope you’ll find it fun and informative. And if you
do, check out the catalog attached to it here for more great information
about viruses from the publisher.