--- "John G. Rose" <[EMAIL PROTECTED]> wrote: > > From: Matt Mahoney [mailto:[EMAIL PROTECTED] > > > > What are the best current examples of (to any extent) self-building > > software > > > ? > > > > So far, most of the effort has been concentrated on acquiring the > > necessary > > computing power. http://en.wikipedia.org/wiki/Storm_botnet > > > > Just think of the orchestrative ability that is going on with this botnet. > This is an area that is underexploited especially in LEGALLY constructed > botnets.
It amazes me that a crime of this scale can go on for a year and we are powerless to stop it either through law enforcement or technology. The Storm botnet already controls enough computing power to simulate a neural network the size of several human brains. Imagine if this computing power could be used to rewrite itself using the same software skills needed to automatically discover and exploit vulnerabilities in popular software. The trend is clear. We are already losing control of our computers. http://www.mozilla.org/projects/security/known-vulnerabilities.html http://blogs.csoonline.com/windows_vista_90_day_vulnerability_report http://www.cert.org/stats/fullstats.html Are the hackers smart enough to control an evolutionary process whose fitness function is the acquisition of computing resources? -- Matt Mahoney, [EMAIL PROTECTED] ----- This list is sponsored by AGIRI: http://www.agiri.org/email To unsubscribe or change your options, please go to: http://v2.listbox.com/member/?member_id=8660244&id_secret=69256763-113a80
