What is parasitic computer technology?
parasitic computer technology is a technique in which one computer or server refers to other servers and uses this device to ensure computing capacity. Normally, it is not considered hackering or theft of computer services, because the program does not betray any locks or warranty on the second device. Rather, the legitimate message may be delivered to other computers and provides computing capacity without any security violation.
When the Internet grew at the end of the 20th century, many thousand, not millions of servers, was connected using public computer networks. When a computer sends a request to a website or document to another computer on the Internet, a number of confirmation will be used to confirm that the sent and received messages are the same. One technique is the use of a "check sum", which is a calculation of data sent by a computer and is recalculated at the other end. If both calculations coincide, the message is considered legitimate and nettempt stole the computer time or "hack"tray.
6 In the message there is a code that requires some calculation to start on a receiving computer. No person approved the application and in most cases the fact that the work is carried out is obvious. The calculations can be completed and the data returned to the desired computer without a visible effect on any computer. However, there are ethical concerns about the effect of parasitic calculations on Internet sources.After requesting a computer to provide the calculation time by another computer, some of its sources are used for this request. Together with electrical consumption of computer hardware, other legitimate computer tasks may be slowed down or delayed with requests for computer technology. There is no secretion violation and the requesting computer will not steal any information. Although no physical damage can occur, this may affect the performance of another computer that some critics are considering theft of services.
parasitic pThe tub is often confused with another type of shared computer services, usually called cluster computing. Clusters are computers voluntarily connected to provide capacity beyond the ability of any single computer. In the 20th century, a thousand public and private computers associated with the calculation of signaling data in the search for extraterrestrial intelligent life (SETI) or signals from other planets were an example of cluster computers. The radio telescope scanned parts of the sky and gathered radio signal data, and the cluster computers shared the time for a computing time to analyze data and look for patterns.
Negative parasitic computer technology can occur when the computer is infected with a virus or software called Trojan horse. Viruses can be downloaded by e -mails or infected websites and in some cases it will allow a computer to become a hacker parasite and provide a computer that can repeatedly infect others. Infected computers can also send multiple requirementsOn the legitimate website and overwhelming its servers, a technique called "attack of the service refusal" that can close the website.
The Trojan horse is a software packet that is transmitted along with a legitimate message or site and is usually invisible to every occasional computer user. Therefore, it was named for a mythical horse who hid the soldiers to surprise and defeat the enemy. When a Trojan horse is installed on a new computer, it can use some sources of this computer to send unauthorized e -mails called "SPAM" or providing the stolen computing force to another person.