anti virus program

it’s unfortunate that we don’t have much insight into oliver’s background as a hacker because i feel like that aspect of his character could be a goldmine in understanding his motives for helping out first connor, then annalise, then end up working (more or less with connor) for annalise because hacking in itself is already very telling of someone’s personality, i think. 

so like there’s three types of hackers: black hats, white hats, and grey hats. 

black hat hackers are the bane of people’s lives affected by technology (i.e. everyone!). they steal identities, credit card information, undermine security systems for their own nefarious gain. 

white hat hackers are like your anti-virus protection programs. they build walls to make sure black hat hackers don’t get in. companies hire white hats to make sure their systems are protected against competition or malfunction. you call up white hats when you’re suddenly infected with malware.

and lastly, there’s the grey hat hackers. likely noble-hearted computer nerds who break apart the walls white hats build to: uncover secrets (like wikileaks and the panama papers) and expose corruption and the underhanded dealings of criminals (like finding buyers and sellers of child pornography). for example, the group anonymous. they hack for a “cause”.

now i’ve always felt what ollie is a bit of a grey hat and so with that in mind here’s some of my headcanon regarding hacker!ollie: 

  • we have oliver hampton thrust into the world of annalise keating: someone who fights for her clients and does whatever it takes in the name of ~justice~. someone who makes enemies out of the corrupt, the privileged, and the rich influential people at the top of the food chain. someone who breaks down walls in their pursuit of what is right and true… basically a grey hat hacker in real life. it was no wonder he so admired this woman even before having met her. 

Keep reading

OH THAT’S HOW THEY FIND VIRUSES

Silly me, here I thought I needed an anti-virus program because viruses installed malicious code in the boot sector changing the way the operating system worked, but really the whole thing works by simply finding the text labeled “Malicious virus” in obvious-red amongst all the blue.

Textbooks on computer viruses often describe several ‘generations’ of malicious code. First generation viruses spread from machine to machine by an external disk; they were often ‘add-on’ viruses, which rewrite program code, or ‘boot sector’ viruses, which would install themselves on the computer’s MBR (Master Boot Record) so that, upon restart, the computer would launch from the virus’s code and not the computer’s normal MBR. Early anti-virus programs performed a calculation in which the size of program files were routinely checked for any changes (unlike document files, program files should not change, thus a change in the file size indicated an add-on or other type of virus). Second generation viruses were able to out-maneuver these calculations by either ballooning or pruning program code so that it always remained the same size. Third generation viruses, such as ‘stealth’ viruses, went further, being able to intercept and mimic the antivirus software, thereby performing fake file scans. Fourth generation viruses are the opposite of third generation; they employed ‘junk code’ and ‘attack code’ to carry out multi-pronged infiltrations, in effect overwhelming the computer’s anti-virus software (‘armored’ viruses). However, one anti-virus technique has remained nominally effective, and that is the identification of viruses based on their unique ‘signature’, a string of code that is specific to each virus class. Many anti-virus programs use this approach today, but it also requires a constantly updated record of the most current viruses and their signatures. Fifth generation viruses, or ‘polymorphic’ viruses, integrate aspects of artificial life and are able to modify themselves while they replicate and propagate through networks. Such viruses contain a section of code - a ‘mutation engine’ - whose task is to modify continuously its signature code, thereby evading or at least confusing anti-virus software. They are, arguably, examples of artificial life.
—  Galloway, A. and Thacker, E. (2006) ‘On Misanthropy’
Attention MS Paint Adventures fans

Just a little public service announcement.

One of the links off the website in Problem Sleuth contains a virus that WILL infect your computer.  

This page right here.

It brings up one of those pop up websites that says there’s a virus on the computer and will not let you close out of the website until you agree to their terms.

The only way to deal with this is to immediately shut your computer down by holding the power button.

After this happened a virus WAS introduced onto my computer.  (I kept getting pop ups from Windows Defender)

However running a scan from Advanced System Care Ultimate 8 I was able to eliminate the problem.  I suppose running any thorough anti-virus program should work.

I’m assuming that whatever website that link was supposed to go to has since been hacked since this page is several years old.

Just warning.