linkedin post 2019-10-06 03:17:21

linkedin post 2019-10-06 03:17:21

Uncategorized
NEW VIEW. “Agency, context, meaning, interpretation and behaviour are features of biological organization that can be independent of the DNA-based code script. In living organisms, these cognitive features feed back, in a top-to-bottom manner, into the DNA sequences.” http://europepmc.org/articles/PMC3512409/ View in LinkedIn
Read More

linkedin post 2019-10-07 05:42:20

Uncategorized
COMPUTER VIRUSES. “None of these characteristics came from the viruses themselves. Rather, each change and addition to the virus behavior has been wrought by an outside agency: the programmer.” (Reference to camouflage, territorial behavior, predatory behavior, and speciation in computer viruses). https://books.google.com/books?id=qErpoKjc1h4C&pg=PA261&lpg=PA261&dq=computer+virus+metabolism&source=bl&ots=NWmF_p3xqj&sig=XEfXy2VQZdbYQgBJSndUVHbkDSI&hl=en&sa=X&ved=0ahUKEwi51qLC35fLAhUBcj4KHQW-B9AQ6AEIFzAE View in LinkedIn
Read More

linkedin post 2019-10-07 05:44:17

Uncategorized
ARTIFICIAL EVOLUTION. “Human-induced characteristics of computer viruses are not terribly interesting. However, computer viruses that do mutate without human input are an entirely different story. This is the artificial life. Autonomously mutating computer code is subject to artificial evolution, and can potentially evolve very quickly.” https://lnkd.in/dhEdXSq View in LinkedIn
Read More

linkedin post 2019-10-07 05:46:04

Uncategorized
SPONTANEOUS MUTATION. “What if, instead, malware were able to change its function or behavior autonomously? What if, in the absence of human intervention, computer viruses resembled biological viruses in their ability to adapt to new defense technologies as soon as they came into effect?” http://arxiv.org/pdf/1111.2503 View in LinkedIn
Read More

linkedin post 2019-10-07 05:48:30

Uncategorized
1ST TYPE of self-mutating computer virus: "Polymorphic viruses are capable of changing its encryption key and generating new instances of their decryption routines with simple obfuscation transformations, such as nop-insertion, code transposition and register reassignment.” https://lnkd.in/dEVUYUW View in LinkedIn
Read More