American library books Β» Thriller Β» The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) πŸ“•

Read book online Β«The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) πŸ“•Β».   Author   -   Thomas Biehlig



1 2 3 4 5 6 7
Go to page:
longer had the strength to warm them. Finally they wrapped themselves in the blanket and drank the last portion of wine. When finally Marc let it be known that he had booked a room in the hotel, they decided to go there immediately. Julia was enthusiastic, and under the blanket they could hardly keep their hands off one another. Full of anticipation they checked in at last and went to their room. Since it was in the meantime a little after 9 p.m. they decided to eat in the room, and for that they straight away ordered two bottles of a light Portuguese vino verde. When the room waiter knocked on the door at last to bring the meal, Julia had to flee into the bathroom because she was already stark naked.

But Jansen quickly called out, β€œA moment, I’m coming,” while he hastily put on his trousers and T-shirt.

With his foot he kicked Julia’s things under the bed, adjusted his hairdo with a look at the hall mirror and finally thought he was ready enough to open the door and accept the meal.

Scarcely had Jansen closed the door again than Julia came out of the bathroom still naked and asked cheekily: β€œShould I help with setting the table; I have an idea how we could enjoy the dessert.”

With those words she weaved her way past Jansen, hopped onto the bed sprawled seductively between the sheets. A romantic candlelight dinner was now out of the question. Marc could not get rid of his clothing fast enough, so great had his excitement become. When at last he succeeded in taking off his trousers again he slid into the bed and pulled Julia close to himself. Before five minutes had passed the two of them were united, and Marc in desperation had to try to relax and think of something else. He was about to have an orgasm and definitely wanted to draw it out. Unfortunately Julia too did not need long, and he felt the coming explosion. Then they came to a climax at almost the same time. Exhausted and contented they sank onto the silky sheet.

Next morning they returned to Hamburg. Jansen said goodbye to Julia. His penis was sore and he did not want to arrive late on his first work day for his new employer. Arrived back in his flat, Jansen changed his clothes and packed things for a week and set off at 10 a.m. in the direction of Berlin.

Punctually at 2.30 he parked his car in front of the old town villa in Berlin Grunewald and rang the doorbell.

 

2

 

 

There was a buzzing and Jansen pressed the wooden main door open. It had on it many decorations and small glass windows. Curious, he walked up the creaking old stairway. The office was on the second floor.

When he had arrived Victor’s secretary opened the door for him. She gave him a friendly greeting and said, β€œWe’ve prepared everything. I’d like to introduce you straight away to Lana de Vries. She’s waiting for you in the conference room. Later Martin, Roman, and I will join you. Those two you already know from our previous collaboration.”

At the same moment the door of the conference room opened up and a woman walked out. When Jansen saw her he was speechless. In front of him stood one of those women in whose presence he always felt helpless. He could not help staring at her. She was about 1.70m tall, had long black hair, slightly curled, which she had with some effort bound at the back to make a plait. Her face had a faintly Asiatic cast and her deeply dark brown eyes beamed at him. A body-hugging short black fitted dress and tight leggings completed the picture. Then he pulled himself together and introduced himself: β€œMarc Jansen. I assume you’re Lana de Vries. It’s a pleasure to meet you.”

 

 

 

GLOSSARY

 

Quantum computer

A quantum computer or quantum calculator is a computer whose function is based on the laws of quantum physics. In contrast to the digital calculator it does not work on the basis of the laws of classical physics or IT, but on the basis of quantum mechanical states, and that essentially goes beyond the rules of classical theories. Processing of those conditions occurs according to quantum mechanics principles, e.g., the so-called quantum entanglement.

 

Quantum entanglement

Quantum entanglement is the name given to an effect that apparently allows two or more particles to influence each other without passage of time over any special distance. Although that behaviour is widely understood in the framework of quantum physics, it goes contrary to our intuition. One possibility of creating complex states of entanglement is to make a great number of photons interact on each other. However, as soon as there are more than two or three photons involved it becomes enormously difficult. Here quantum technology faces a really big challenge.

 

Qubit (Qbit)

Qubits (or Qbits) form the basis of quantum computers in quantum IT. The Qubit plays a role analogous to that of the classical bit in traditional computers: it serves as the smallest possible memory unit.

 

Quantum points

A quantum point is a nanoscopic material structure mostly made of semiconductor material. Charge carriers (e.g., electrons) in a quantum point are so limited in their ability to move in all three special directions that their energy is not continuous but can take on only discreet (finite, countable) values. Hence quantum points behave in a way similar to atoms, but their form, size, or the number of electrons in them can be influenced. Hence electronic and optical properties of quantum points can be configured. One method of producing that is lithography. The quantum point is ascribed to a substrate by means of electronic rays, a scanning microscope or something similar, and subsequently released through a suitable etching technique.

 

Quantum teleportation or β€œbeaming”

Quantum teleportation is the transfer of quantum conditions with the help of an instant alteration of state of quantum systems entangled with each other. For a complete transfer of a quantum state it is necessary to have also an interchange of information between sender and recipient in the classical manner (with maximum speed of light). A team under the Viennese physics professor Anton Zeilinger teleported the quantum state of a photon from La Palma on the Canary Islands to neighbouring Tenerife, over a distance of 143 kilometres. The interesting detail is that thereby satellite-based quantum communication is within reach. But for teleporting objects or even living things the technique is not suitable. True, researchers have already succeeded in sending not only the properties of particles of light, but also those of atoms. But β€œbeaming” of human beings, as happens in Spaceship Enterprise, will probably remain for the time being within the realm of science fiction. As is well known, a human being consists of a huge number of atoms which, into the bargain, would have to arrive at the target in their original arrangement.

 

 

Nanolithography / informational nanolithography

Nanolithography is the description given to processes that are chiefly suitable for creation of structures with dimensions of a few nanometres. Among those are, for example, electron-ray and informational nanolithography. They are employed where a structuring by means of conventional photo lithography is not possible, and are meant in future to replace it in the production of integrated switching circuits. Informational nanolithography is a nanolithographical process for financially economical production of nanostructures by means of a nano-structured stamp. Informational nanolithography is applied in the production of electronic and opto-electronic components.

Informational nanolithography is used for the production of two- and three-dimensional organic or semiconductor nanostructures in optics, electronics, photonics, and in biology. Applications in optics and photonics are optical filters, polarisators, or e.g., photonic circuits. Quantum wires and points are of interest for optic semiconductor elements such as lasers or diodes.

 

MRAM

Magneto resistive Random Access Memory is a non-volatile memory technique that has been developed since the 1990’s. In contrast to traditional memory techniques, such as DRAM or SRAM, the information is stored not by electric elements, but by magnetic charges, i.e., the properties of certain materials is exploited which alter their electrical resistance under the influence of magnetic fields.

The advantage of the MRAM technology is that it is non-volatile that means, the chips retain their stored data even after the switching off of the energy source. Hence electronic apparatuses such as computers can be made that are immediately ready to operate as soon as they are switched on, and do not have to be loaded into the working storage for the operation of necessary data by a permanent storage such as a hard drive. In contrast to established non-volatile memory techniques such as Flash, MRAMs, like traditional DRAM/SRAM, can be written on practically an infinite number of times. So MRAM should combine the advantages of the various established memory techniques and thereby point to the potential of the so-called universal memory which could replace DRAM, SRAM, and Flash.

At the moment the firm Everspin Technologies is the only commercial supplier of MRAM memory chips. Almost all other big memory producers, such as Samsung, Hynix, etc., have announced they will invest in development and production of MRAM.

Because of their high price MRAMs are utilised in the first place in industrial systems to protect against critical loss of data. Typical applications are control systems for storable programs (SPS), POS/electronic cash, GPS trackers, or as the cache in server systems. Because of their radiation stability MRAMs are more and more used in air transport and space travel.

 

Bootkit virus

A bootkit is a collection of software tools or boot loaders installed in the compromised system after hacking into a computer system to deactivate further security mechanisms of the operation system. So a bootkit is a mixture of boot sector virus and a rootkit. The assumption here is that whoever has the hardware under his control can also have the software under his control.

 

Rootkit

A rootkit is a collection of software tools installed after hacking in a software system of the compromised system to conceal future logins by the intruder and hide processes and files.

The purpose of a rootkit is to conceal malwares from antivirus programs and the owner through a disguise. Since a 100% recognition of rootkits is impossible, the best way to remove them is a complete reinstallation of the operating system. Since some rootkits are hidden in BIOS, even that method does not offer a 100% certainty of removal of the rootkit. The boundary between rootkits and Trojan horses fluctuates, though a Trojan horse has a different procedure in infecting a computer system.

 

Backdoor

Backdoor describes a part of a software (often installed by the author) that enables users, without the normal access safeguards, to have access to the computer or to another protected function of a computer program.

Examples are universal passwords for a BIOS or special software (usually secretly installed by a Trojan horse) which allow distant access to the computer. Backdoors make it easier for the hacker to have access to existing or already compromised systems, for example if a shell is started, or when a login question is asked for a certain network portal.

 

DDoS

Distributed Denial of Service (DDoS) is the description in IT of the non-availability of a whole number of systems which really should be available. Although there may be various reasons for the non-availability, DDoSs are usually described as a consequence of overloading of infrastructure systems. That can be caused by unintentional overloading or by a malicious attack on a server, a calculator, or other components of a data network.

DDoS attacks, such as SYN flooding or the smurf attack, overburden the access to the internet, the operating system, or the services of a host with a bigger number of questions than can be processed, and as a result regular questions cannot be answered or only very slowly. Examples are WinNuke, Land Attack, Teardrop Attack, or the Ping of Death.

Denial-of-Service attacks are nowadays being offered for sale by cyber criminals, for example to damage the competition. Malicious DDoS attacks are often carried out with the help of

1 2 3 4 5 6 7
Go to page:

Free e-book: Β«The Cyber War Conspiracy by Thomas Biehlig (best way to read e books .TXT) πŸ“•Β»   -   read online now on website american library books (americanlibrarybooks.com)

Comments (0)

There are no comments yet. You can be the first!
Add a comment