Renewable Revolution

Open Forum => General Discussion => Topic started by: AGelbert on May 26, 2017, 02:23:48 pm

Title: Computer Software Security
Post by: AGelbert on May 26, 2017, 02:23:48 pm
Agelbert NOTE: What People should know about the Replace Exclusive OR Instruction (RXOR) and Hackers.


The page contains images that come from the domain "" which is presumably on Symantec's blacklist for hosting malicious .jpg images.
This blanket approach is too broad, giving false positives, but you can never be too careful, especially if you are using a Windows OS.

In regard to ensuring careful attention to potential attacks, for once, we agree. 

I programmed a mainframe air traffic control computer for several years. I was one of the few who could program in machine code. That means I am an expert at using Boolean algebra (denoting a system of algebraic notation used to represent logical propositions, especially in computing and electronics.) to talk directly with a computer. What does that have to do with this discussion?

I know, for example, that the RXOR instruction (that ALL COMPUTERS USE ROUTINELY)  is a toggle switch to completely reroute a program path a certain way, and then when the same key sequence is made, reroute it back. THAT is one of the FEW ways that hackers use to do their thing. Yes, I'm sure you know that. But I am bringing it to the fore here  so readers can understand that hacking is not some big mysterious thing for math "wizards"; it is a way for devious individuals of average, not superior, intelligence to try to STEAL from honest people. 

ALL computers MUST run in machine language, regardless of what "high order" language they use to interface human speak commands about math and labels to the machine language of binary bit coding. The only nuances in machine language (bit pattern the hardware understands) come from the size of a "word" (this determines where to set the far left bit when a "word" is a negative number) and whether you use octal or hexadecimal numbering. But in the end, it's all  LA(load accumulator) followed by other instructions like shift left so many bits or shift right so many bits, OR, XOR, RXOR, AND, NOT, SA (store in the accumulator), jump to label contents (address) if flag is set or don't jump if the flag is not set. etc.

The point is that hackers can ONLY get into your stuff by pushing some code into a program branch that is routinely used. THAT'S IT. They make a big deal about "viruses" and "malware" and "ransomeware" and "phishing" (and so "I am the greatest and can steal you blind so be afraid" on braggadocio), but it's all MAINLY about the RXOR.

The RXOR can, by jumping to a subroutine that zeroes out multiple memory locations, effectively wipe out giant swaths of code, if that's what you want to do, AND LEAVE NO TRACE that it was done. But they do that only when they want to crash your system without leaving evidence you can analyze in a post crash dump (trigger a Store zeroes instruction to the area the they reprogrammed).

The BASTARDS that do hacking these days do not really want to crash your system; they want to WATCH what you do in order to steal you blind. So, they insert a RXOR to, in nanoseconds, store some of your activity and rapidly return to your normal routine.

What they call "worms" and "viruses" are simply a step by step process to to get into what is called "protected" memory (read only) and WRITE something into it. That "something" is usually a RXOR (replace exclusive or) instruction that sends your program to a quiet key logger and back. They can be real "sophisticated" and put timers for DOING STUFF at certain dates or when certain activity is detected. It is all quite entertaining to unethical bastards that enjoy this sort of thing. (

So, yeah, you can be assured that I will ALWAYS be VERY careful.  8)