--- "John G. Rose" <[EMAIL PROTECTED]> wrote:

> > From: Matt Mahoney [mailto:[EMAIL PROTECTED]
> > 
> > What are the best current examples of (to any extent) self-building
> > software
> > > ?
> > 
> > So far, most of the effort has been concentrated on acquiring the
> > necessary
> > computing power.  http://en.wikipedia.org/wiki/Storm_botnet
> > 
> 
> Just think of the orchestrative ability that is going on with this botnet.
> This is an area that is underexploited especially in LEGALLY constructed
> botnets.

It amazes me that a crime of this scale can go on for a year and we are
powerless to stop it either through law enforcement or technology.  The Storm
botnet already controls enough computing power to simulate a neural network
the size of several human brains.  Imagine if this computing power could be
used to  rewrite itself using the same software skills needed to automatically
discover and exploit vulnerabilities in popular software.  The trend is clear.
 We are already losing control of our computers.

http://www.mozilla.org/projects/security/known-vulnerabilities.html
http://blogs.csoonline.com/windows_vista_90_day_vulnerability_report
http://www.cert.org/stats/fullstats.html

Are the hackers smart enough to control an evolutionary process whose fitness
function is the acquisition of computing resources?


-- Matt Mahoney, [EMAIL PROTECTED]

-----
This list is sponsored by AGIRI: http://www.agiri.org/email
To unsubscribe or change your options, please go to:
http://v2.listbox.com/member/?member_id=8660244&id_secret=69256763-113a80

Reply via email to