Friday, November 25, 2011

Security is sometimes Unsecure


We have been getting lot of online PDF files and also consider that format to be very much secure as it is a picture format. But what i will present below are some facts, which will make you think again on the defination of Security

Stegnography : An art to hide malicious files inside picture formats. The recent terriost attacks were successfully executed with this technology. With increase in the maturity within global cyber intelligence group world wide, movement of information in a public platform without getting detected is becoming more and more critical. So this art came as a rescue, to understand this art, we need to understand that this is not a recent technology but it is very old one. But the importance, has grown with the growing strictness in global cyber law on sharing information.

The motive is simple, you need to take a picture or anything which is of embedded in nature, where the internals are not visible and then inject a malicious object inside that, is tricky. There are tools like S-Tools 4, using which you can put anything in any picture. The interface is clean, with no much jargons and one can easyly understand, how to handle the application;. The coolest part is that the injection can be done simply with dragging and droping the file into the picture. But one thing you need to keep in mind is to choose the object smaller in size as compared with the parent picture.

But this is not the same with PDF files, one cannot inject an object in that so easy. having a very condensed architecture that finding the right insertion point is very difficult. But it not that, it is safe. There is a tool called FileInsight, which opens the architecture of any online PDF. If you want to infect any online PDF, you can just open it using this tool and paste anything you need. The good part is, whatever you do, you do online, so no saving on the hard disk.

This tool takes a PDF URL and opens the entire logic in front of you, you can see everything, how the file is working or what is the logic behind the file format. You can create a small probe and paste the code in the file and send the file. I will not call this totally Stegnography, as it more on images, but i will include this as a part of the technology.

Now the question is how to detect this, open your eyes when you see any picture. The easiest way to detect this, is the change of the color schema of the picture. The % of change in the pixals will determine the type of object it is carrying. The problem is more in PDF, as no one detect the presence of an object just by seeing that. Modern day's anti-viruses also fail in detecting such probes and so even after having most advanced security technologies, fail to prevent the threat.

Wednesday, November 2, 2011

Artificial Intelligence (AI)


We all have seen lot of movies, focusing on "ARTIFICIAL INTELLIGENCE"., but how many of us really understand this concept? First of all, is it really possible to replicate human intelligence and make a system or an agent which will show the same kind of adaptability to its environment and intelligently produces the same kind of reasult, which a human being could have produced.

Sounds Intresting, AI has been designed as a branch of computer science, which deals in understand the emotional stimulas and creating intelligent agents, within the same human wavelength. The focus is to create an intelligent race of intelligent species , who can double the productivity graph with out facing a human latency.

Many prominent scientists have given their entire life in doing behavioural analysis on human intelligence and still they are not able to decode the exact pattern to replicate the human behavour. But there are lot of researches going on this ground and people have started making human endroids. These endroids are classified as in the higher classes of robots, who can act and react like humans.

Some of the specialized projects in Artificial Intelligence (AI) are:

Cat : A - Brain simulation


Cyc, an attempt to assemble an ontology and database of everyday knowledge, enabling human-like reasoning.


Eurisko, a language by Douglas Lenat for solving problems which consists of heuristics, including heuristics for how to use and change its heuristics.


Mycin, an early medical expert system.



Cat : B - Cognitive architectures


CALO, a DARPA-funded, 25-institution effort to integrate numerous artificial intelligence approaches (natural language processing, speech recognition, machine vision, probabilistic logic, planning, reasoning, numerous forms of machine learning) into an AI assistant that learns to help manage your office environment.

SHIAI (Semi Human Instinctive Artificial Intelligence), an AI methodology based on the use of semi-human instincts, developed at Islamic Azad University in 2004.

Virtual Woman, the oldest continuous form of virtual life — a chatterbot, virtual reality, artificial intelligence, video game, and virtual human.


Cat : C - Games


Chinook, a computer program that plays English draughts; the first to win the world champion title in the competition against humans.

Deep Blue, a chess-playing computer developed by IBM which beat Garry Kasparov in 1997.

FreeHAL, a self-learning conversation simulator (Chatterbot) which uses semantic nets to organize its knowledge in order to imitate a very close human behavior within conversations.


Cat : D - Knowledge and reasoning

Blue Brain Project, an attempt to create a synthetic brain by reverse-engineering the mammalian brain down to the molecular level.

HNeT (Holographic Neural Technology), a technology by AND Corporation (Artificial Neural Devices) based on non linear phase coherence/decoherence principles.


Hierarchical Temporal Memory, a technology by Numenta to capture and replicate the properties of the neocortex.


Cat : E - Motion and manipulation



  • Cog, a robot developed by MIT to study theories of cognitive science and artificial intelligence, now discontinued.




  • Grand Challenge 5 – Architecture of Brain and Mind, a UK attempt to understand and model natural intelligence at various levels of abstraction, demonstrating results in a succession of increasingly sophisticated working robots.



  • Cat : F - Natural language processing

    AIML, an XML dialect for creating natural language software agents.

    A.L.I.C.E., an award-winning natural language processing chatterbot.

    ELIZA, a famous 1966 computer program by Joseph Weizenbaum, which parodied person-centered therapy.


    If this works out well then we can save human lives in wars and other critical and emergency situations. We can replicate endlessly and keep on creating intelligent agents, which will serve the mankind in the same way humans serve.


    # The project information is taken from http://en.wikipedia.org/wiki/List_of_notable_artificial_intelligence_projects