+- +-


Welcome, Guest.
Please login or register.
Forgot your password?

+-Stats ezBlock

Total Members: 43
Latest: Heredia05
New This Month: 0
New This Week: 0
New Today: 0
Total Posts: 10415
Total Topics: 244
Most Online Today: 1
Most Online Ever: 52
(November 29, 2017, 04:04:44 am)
Users Online
Members: 0
Guests: 1
Total: 1

Post reply

Warning: this topic has not been posted in for at least 365 days.
Unless you're sure you want to reply, please consider starting a new topic.
Message icon:

Help (Clear Attachment)
(more attachments)
Allowed file types: doc, gif, jpg, jpeg, mpg, pdf, png, txt, zip, rar, csv, xls, xlsx, docx, xlsm, psd, cpp
Restrictions: 4 per post, maximum total size 1024KB, maximum individual size 512KB

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: AGelbert
« on: May 26, 2017, 02:23:48 pm »

Agelbert NOTE: What People should know about the Replace Exclusive OR Instruction (RXOR) and Hackers.

The page contains images that come from the domain "somecards.com" which is presumably on Symantec's blacklist for hosting malicious .jpg images.
This blanket approach is too broad, giving false positives, but you can never be too careful, especially if you are using a Windows OS.

In regard to ensuring careful attention to potential attacks, for once, we agree. 

I programmed a mainframe air traffic control computer for several years. I was one of the few who could program in machine code. That means I am an expert at using Boolean algebra (denoting a system of algebraic notation used to represent logical propositions, especially in computing and electronics.) to talk directly with a computer. What does that have to do with this discussion?

I know, for example, that the RXOR instruction (that ALL COMPUTERS USE ROUTINELY)  is a toggle switch to completely reroute a program path a certain way, and then when the same key sequence is made, reroute it back. THAT is one of the FEW ways that hackers use to do their thing. Yes, I'm sure you know that. But I am bringing it to the fore here  so readers can understand that hacking is not some big mysterious thing for math "wizards"; it is a way for devious individuals of average, not superior, intelligence to try to STEAL from honest people. 

ALL computers MUST run in machine language, regardless of what "high order" language they use to interface human speak commands about math and labels to the machine language of binary bit coding. The only nuances in machine language (bit pattern the hardware understands) come from the size of a "word" (this determines where to set the far left bit when a "word" is a negative number) and whether you use octal or hexadecimal numbering. But in the end, it's all  LA(load accumulator) followed by other instructions like shift left so many bits or shift right so many bits, OR, XOR, RXOR, AND, NOT, SA (store in the accumulator), jump to label contents (address) if flag is set or don't jump if the flag is not set. etc.

The point is that hackers can ONLY get into your stuff by pushing some code into a program branch that is routinely used. THAT'S IT. They make a big deal about "viruses" and "malware" and "ransomeware" and "phishing" (and so "I am the greatest and can steal you blind so be afraid" on braggadocio), but it's all MAINLY about the RXOR.

The RXOR can, by jumping to a subroutine that zeroes out multiple memory locations, effectively wipe out giant swaths of code, if that's what you want to do, AND LEAVE NO TRACE that it was done. But they do that only when they want to crash your system without leaving evidence you can analyze in a post crash dump (trigger a Store zeroes instruction to the area the they reprogrammed).

The BASTARDS that do hacking these days do not really want to crash your system; they want to WATCH what you do in order to steal you blind. So, they insert a RXOR to, in nanoseconds, store some of your activity and rapidly return to your normal routine.

What they call "worms" and "viruses" are simply a step by step process to to get into what is called "protected" memory (read only) and WRITE something into it. That "something" is usually a RXOR (replace exclusive or) instruction that sends your program to a quiet key logger and back. They can be real "sophisticated" and put timers for DOING STUFF at certain dates or when certain activity is detected. It is all quite entertaining to unethical bastards that enjoy this sort of thing.

So, yeah, you can be assured that I will ALWAYS be VERY careful.  8)

+-Recent Topics

Weird Science by AGelbert
August 18, 2018, 04:48:35 pm

Corruption in Government by AGelbert
August 16, 2018, 08:54:59 pm

Global Warming is WITH US by AGelbert
August 15, 2018, 07:54:26 pm

The Big Picture of Renewable Energy Growth by AGelbert
August 15, 2018, 05:31:39 pm

Profiles in Courage by AGelbert
August 15, 2018, 03:19:09 pm

Genocide by AGelbert
August 15, 2018, 12:43:04 pm

Photvoltaics (PV) by AGelbert
August 15, 2018, 12:21:45 pm

Electric Vehicles by AGelbert
August 15, 2018, 11:55:23 am

Pollution by AGelbert
August 14, 2018, 10:37:03 pm

Hydrocarbon Crooks Evil Actions by AGelbert
August 14, 2018, 06:22:50 pm