Military Review

Federal Antivirus

51
Defenders of the virtual world need state help


The most unpleasant thing in anti-Russian sanctions is that they threaten to stall cooperation in high technologies and electronic means of communication. And for example, blocking the international system of interbank settlements SWIFT can paralyze entire sectors of the economy. At the same time, the West is silent that it has long been striving to turn our country into electronic slavery, trying to control our cyberspace, and even control it.

Even at the dawn of "democratic transformations" we were hooked on an imported computer needle, and now the lion's share of software and "smart hardware" even at Russia's foreign-made strategic enterprises. Moreover, few of the citizens - users of smartphones and the Internet - think that all personal information becomes available to the secret services of the likely adversary at any time, and all sorts of manipulations with virtual technologies have already turned into a series of state coups and fratricidal wars that reached Iraq, Egypt, Libya to Ukraine.

Now is not the time to nostalgic for the Soviet "defense", in which even the import nail was not, not like foreign electronic brains. While lulling tales about entering the civilized world, our “probable friends” and their agents of influence choked domestic intellectual productions and promising developments (which by the way in 80 were not inferior to Western ones) and outbid prospective specialists. And yet we must not sprinkle ashes on our heads, but to see what we really have, what hidden reserves can be mobilized and what exactly needs to be done now so that the oncoming cyber threat does not become lethal.

According to Kaspersky Lab, 2005 registered thousands of viruses in 350, about 2008 millions in 15, 2011 millions in 946, and over six billion in 2014. Panda Security reports daily detection of thousands of malware instances by 160. You should not sin on antivirus protection. Programmers who create it, spinning like a squirrel in a wheel, forced to update their databases every 40 minutes, and as a result, 99,9 recognizes the percentage of unwanted e-guests invading. But penetrating a small fraction is enough not only to spoil the mood, but to disable the whole system.

Intruder network


In the past decade, information security experts have noted an avalanche-like increase in the number of virus attacks on users' organizations and computers. And such an attack is not just a spontaneous flow of electronic "killers", but a highly accurate cyber weapon, organized aggression on a specific, well-protected object of strategic importance with a specific goal (download information, interfere with normal work or lay low and wait for the destruction team).

According to Positive Technologies, an intruder acting over the Internet is able to access the internal 9 network from 10 systems. In 55 percent of cases, an external attacker can build on success and gain complete control over the entire infrastructure of the company.

Federal AntivirusHow, for example, was organized by the very first major target virus attack Stuxnet, aimed at Iran’s nuclear facilities and discovered in 2010 by experts of the Belarusian company VirusBlokAda. At the first stage, some suppliers of equipment were subjected to hidden virus exposure, then - a software and hardware complex for centrifuge control.

The unique nature of Stuxnet is, firstly, that its goal was not even connected to the Internet, secondly, although the virus (the brainchild of the US and Israeli intelligence services) was intended for Iran, it was later recorded in 12 countries of the world, including Russia . And another curious detail: Stuxnet was revealed in 2010 year, remaining unnoticed in networks for three years. Antivirus developers have not yet known such a failure.

Of the recent incidents, an attack on Rosoboronexport’s servers in March 2014 is known. Having cracked the IT systems of the Indian Embassy in Moscow, the attackers sent a malicious email to the head of the state-owned company, infected the Sukhoi, Oboronprom, Gazflot and other enterprises. Hackers published extracted archive files of 448 MB - more than a thousand documents of various degrees of secrecy.

The consequences of the Darkhotel attack, which began in 2004, are unpredictable, and for seven years nobody suspected it. According to some reports, it lasts so far. High-ranking officials, businessmen, and top managers of large companies who settled in the premium-class hotels of several Asian countries became victims of cyber-spies. As soon as the VIPs connected to the hotel Wi-Fi, viral programs were introduced into their gadgets and penetrated through the closed servers of the organizations where guests worked. This indicates both the highest qualification of computer hackers and the fact that their activities are coordinated.

Every third under the hood


After the revelations of Edward Snowden and numerous publications, it became obvious that the United States, in addition to virus attacks, used a wide range of technical methods of spying on citizens of various countries. We name only some of the specialized tracking and listening systems that are used by overseas special services.

PRISM is a completely secret US state program, adopted by the US National Security Agency in 2007, according to which a massive unofficial collection of information transmitted over telecommunication networks. According to estimates by the Washington Post, the NSA in 2010-m daily intercepted and recorded almost 1,7 billion calls and e-mails, about five billion records of the whereabouts and movements of mobile phone owners around the world.

The secret program Aurora Gold was developed by the NSA for tracking mobile operators. According to one of the documents, made public by Snowden, by May 2012, US intelligence was receiving technical information about 70 percent of mobile networks in the world. The NSA spied on, among other things, the influential British GSM Association, an association of mobile operators that develops standards for GSM communications. This organization, in particular, includes leading Russian companies: MTS, Megafon and Beeline.

Approximately 32 percent of the working population of Russia use smartphones, in other words, spyware. This means that overseas overseers at any second know the location of 30 of millions of Russian citizens with an accuracy of 50 meters, their routes, all personal data, including last name, first name, patronymic name, age, account numbers, social circle, friends, acquaintances, relatives, correspondence via SMS and e-mail, the profession, all their social activities, status, photos, audio and video preferences and so on. According to the user agreements, all these data can be transferred to US government agencies (intelligence services) without the knowledge of customers.

Another powerful tool of Western e-aggression is social networks, which entangle an increasing number of inexperienced, revealing the souls of the World Wide Web and falling under the influence of cyberklists. It is known that the coordination of anti-state speeches, including riots on Bolotnaya Square in 2011, was carried out via social networks.

Against "ducks" and "bugs"


Recently, there have been frequent injections of misinformation camouflaged as usual. news. The technology is simple. An absolute fake passes through a furious repost and begins to be quoted by the official media. As a result, the lie acquires the legitimacy of the news - it is replicated. Sometimes refutation succeeds, in most cases - not. Bad information spreads more successfully, because the negative clings stronger, on which the stuffing is based.

As President Vladimir Putin noted at the FSB collegium, in 2014, over 25 thousands of Internet resources were found with publications violating the law, and more than 1,500 extremist websites were shut down.

“We need to continue to clear the Russian Internet space of illegal, criminal materials, more actively use modern technologies for this, to participate in the formation of the international information security system,” the head of state demanded. - It's not about restricting freedom on the Internet, not at all. It is about ensuring security and the rule of law. At the same time, it is necessary to strictly observe Russian and international legal norms and standards in this field. Not to interfere with the communication of people on the Web and the placement of legal, permissible and correct information there. ”

Information is the most expensive product, saving on its quality and security is extremely dangerous. And the antidote to malicious programs that breed at the speed of 300 thousands per day, Russian specialists in electronic security create. Let's see how this is done, for example, the development company InfoWatch. The system is not initially looking for spyware as such, but identifies IT deviations from the norm, constantly honing the skill of detecting virus attacks. The whole process - from sampling the current data stream to a detailed study of the identified anomalies and diagnosis - occurs automatically. Moreover, the analysis is carried out on servers inaccessible to attackers. For example, in the cloud service. Due to self-learning system 98-percent guarantee is achieved that dangerous software will be detected and correctly classified in automatic mode. The remaining most difficult and insidious two percent of cases will be neutralized by computer analysts, who will also take on the retraining of their IT colleagues.

Armed with domestic know-how, the response centers for threats that should be formed in each region can become a reliable intellectual guardian of cybersecurity.

However, technology is only one of the elements of a country's digital sovereignty, securing the rights and capabilities of a state to independently determine its interests in the electronic sphere, including the Internet.

The program of digital sovereignty should be adopted as national - with appropriate support, including financial. By the way, according to experts, the cost of electronic security will be about 0,1 percent of the profits of the enterprise. God knows what amounts even with the current economic turbulence.

An important section of the program is import substitution and support for domestic developers. Where there are Russian analogues, it is necessary to apply them, where not - to create.

Unfortunately, many of our scientists and production workers are not eager to switch to domestic technologies. Last year, only 20 percent of the total government procurement in software was spent on the purchase of Russian information development.

Almost the entire domestic defense industry uses foreign computer equipment, and this cannot guarantee confidentiality. Not only can foreign supplies and services be stopped due to sanctions, where are the guarantees that there are no “bugs” there, that information does not flow to “probable friends”? Back in September, the State Council of China 2003 adopted a resolution prohibiting government agencies from purchasing foreign software.

The state program of digital sovereignty must be backed up by legislative and regulatory framework. The doctrine of the information security of Russia was adopted in the 2000 year, and there are not enough documents providing the mechanism for its implementation.

Interregional conference in St. Petersburg was devoted to recommendations on how to overcome the whole spectrum of threats in the field of electronic security. It was held under the auspices of the State Duma Committee on Defense, which will present specific legislative initiatives to the country's leadership. But to ensure the information security of Russia with the help of domestic developments, political will is required.
Author:
Originator:
http://vpk-news.ru/articles/28996
51 comment
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. beer-youk
    beer-youk 4 February 2016 19: 09
    19
    Maybe you shouldn't spare money to support our, no doubt, brilliant computer scientists, both official and self-taught. No matter how you think it is for the state (not the government) and all of us economically more profitable than "supporting the banking sector of the economy (???)"!
    1. NIKNN
      NIKNN 4 February 2016 19: 12
      10

      "Cyberspace has officially become a battleground: the Pentagon has published a new strategy for the Internet, in which it equates the digital world with land, sea, air and space. Today, according to American strategists," bits and bytes are the same weapons as bullets and bombs. " . And from now on, the US military will respond to hacker attacks "according to the laws of war."
      so be careful, if you break the Pentagon - they will send a terrible virus, he will choose your worst pictures, put it in contact, put it on the ava and write in the status "I am a stupid person." lol
      1. Arh
        Arh 4 February 2016 19: 21
        +3
        We must do it ourselves - produce - invent computers, smartphones, programs, etc. , so as not to depend on anyone and their own !!!
        1. Andrey Yuryevich
          Andrey Yuryevich 4 February 2016 19: 30
          13
          Quote: Arh
          We must do it ourselves - produce - invent computers, smartphones, programs, etc. , so as not to depend on anyone and their own !!!

          write to Chubais, he will send you Yotafon ...
          1. 13elf
            13elf 4 February 2016 21: 28
            -1
            Using Yotafon 2 for over a year, I came to the conclusion that there is no better phone. Nafig Chubais that he himself is not able to earn a decent machine?
          2. Arh
            Arh 4 February 2016 22: 23
            0
            Quote: Andrew Y.
            Quote: Arh
            We must do it ourselves - produce - invent computers, smartphones, programs, etc. , so as not to depend on anyone and their own !!!

            write to Chubais, he will send you Yotafon ...


            Write yourself if you want))), I have another thought))) fool tongue laughing
        2. Nzn
          Nzn 5 February 2016 07: 44
          0
          That's it. Then the eternal excuse, like we can’t expand the production of microcontrollers and other components, because there is no demand, will disappear.
    2. rpek32
      rpek32 5 February 2016 04: 31
      -5
      Even at the dawn of "democratic transformations" we got hooked on an imported computer needle,


      did not read further.
      1. V.ic
        V.ic 5 February 2016 06: 23
        +3
        Quote: rpek32
        did not read further.

        Is there not enough RAM?
        1. rpek32
          rpek32 6 February 2016 06: 05
          0
          Quote: V.ic
          Is there not enough RAM?

          we have enough brains to understand that they didn’t plant us, but we started working out and in order not to remain in the century of automation, we had to transfer to foreign electronics. minusers apparently had no brains to understand this.

          for those who have a lot of RAM, the question is: without electronics at all (since there was none) or with someone else's. who planted something, huh?
  2. Const
    Const 4 February 2016 19: 10
    0
    Yeah, they created a headache for themselves. And where are your OSes and microcircuits without bookmarks?
    1. KBR109
      KBR109 4 February 2016 19: 13
      +2
      Chubais is developing !!! laughing
    2. tol100v
      tol100v 4 February 2016 19: 27
      0
      Quote: Const
      And where are your OSes and microcircuits without bookmarks?

      All this is, only in microscopic quantities!
    3. Avantageur
      Avantageur 4 February 2016 21: 34
      +2
      Quote: Const
      Yeah, they created a headache for themselves. And where are your OSes and microcircuits without bookmarks?

      Google about the Astra Linux operating system, which is the official Russian derivative distribution and a system for protecting information with an increased level of security, which, if desired, can be used at home (release "Eagle" and "Smolensk"), and also ...

      even at strategic enterprises of Russia

      1. NEXUS
        NEXUS 4 February 2016 21: 41
        +5
        Quote: Avantageur
        Google about the Astra Linux OS,

        Astra Linux (Astra Linux, from the Latin astra - star) is a special-purpose operating system based on the Linux kernel, created for the needs of Russian law enforcement agencies and special services. It provides the degree of protection of the processed information to the level of state secret “top secret” inclusive. It is certified in the certification systems for information security equipment of the Ministry of Defense, FSTEC and the FSB [3] of Russia.

        Interesting ... but Linux itself is not our operating system, unfortunately. Although, I do not argue, it is quite functional.
        1. Inok10
          Inok10 4 February 2016 21: 49
          +4
          Quote: NEXUS
          Interesting ... but Linux itself is not our operating system, unfortunately. Although, I do not argue, it is quite functional.

          ... ours, not ours ... open source .. everyone makes "their own" for themselves ... our Elbrus ... but very specialized ... hi
          1. NEXUS
            NEXUS 4 February 2016 21: 54
            +1
            Quote: Inok10
            .. our, not ours ... open source .. everyone makes "their own" for themselves ... our Elbrus ... but very specialized ...

            PhantomOS from Dmitry Zavalishin (http://www.dz.ru/solutions/phantom), ReactOS (http://www.reactos.org/en/index.html) - a free analogue of the MS Windows operating system. Here are two more systems that claim to become the first Russian operating system ...
            1. Avantageur
              Avantageur 4 February 2016 22: 01
              0
              Quote: NEXUS
              Here are two more systems that claim to be the first Russian operating system ...

              Is not a fact. This will be decided by users ...
              1. NEXUS
                NEXUS 4 February 2016 22: 03
                +1
                Quote: Avantageur
                Not a fact.

                We'll wait and see. "Operating system" is of course good ... with the hardware we are doing much worse.
                1. Avantageur
                  Avantageur 4 February 2016 22: 08
                  0
                  Quote: NEXUS
                  Quote: Avantageur
                  Not a fact.

                  We'll wait and see. "Operating system" is of course good ... with the hardware we are doing much worse.

                  The Chinese are still fine, this is ...
                  1. NEXUS
                    NEXUS 4 February 2016 22: 16
                    +1
                    Quote: Avantageur
                    The Chinese are still fine, this is ...

                    The presence of its own operating system and "hardware" is one of the aspects of the information and technological sovereignty of the country. And the Chinese will certainly help, maybe not free of charge, but for our technologies in other areas and for real money.
                    1. Avantageur
                      Avantageur 4 February 2016 22: 24
                      0
                      Quote: NEXUS
                      And the Chinese will certainly help, because it’s not for free, but for our technologies in other areas and for real money.

                      Yes, what kind of technology are there ... They are a product for me - I give them money. I want, not from the Chinese, I will take the goods from the Koreans ...
                      1. derik1970
                        derik1970 5 February 2016 07: 17
                        +1
                        If a war happens, and it’s already in principle, no one will sell us anything either hardware or software ... China is on its own mind and it’s not at all our brother! hi
                      2. Avantageur
                        Avantageur 5 February 2016 11: 50
                        -1
                        Quote: derik1970
                        If a war happens, and it’s already in principle, no one will sell us anything either hardware or software ... China is on its own mind and it’s not at all our brother! hi

                        What do you think on Chinese laptops the white light converged like a wedge? And if a war happens (which, in principle, does not yet exist) ... Well, then you will live without Windows, Chinese "hardware" and iPhones, you will start going to libraries, in general, you will live the same way as your dad and your mom used to "lived, not we grieved and went to the movies "...


        2. Avantageur
          Avantageur 4 February 2016 21: 58
          +1
          Quote: Inok10
          Quote: NEXUS
          Interesting ... but Linux itself is not our operating system, unfortunately. Although, I do not argue, it is quite functional.

          ... ours, not ours ... open source .. everyone makes "their own" for themselves ... our Elbrus ... but very specialized ... hi

          The main thing is that this is not a spyware Windows, and you can use it without any paranoia ...
  3. rpek32
    rpek32 5 February 2016 04: 34
    +2
    Quote: Const
    Yeah, they created a headache for themselves. And where are your OSes and microcircuits without bookmarks?

    https://geektimes.ru/post/270382/ к ознакомлению. подробный разбор
    1. derik1970
      derik1970 5 February 2016 07: 27
      0
      They say that we, as it were, even release our cell phones in China and on their equipment, but like our software, in short our phones ... And the question is, whose are ours? Yes, and so it’s clear that some kind of oligarch, the government smokes on the sidelines ... But if China shows a cookie, then our mobile software can be thrown out, because the software is written for specific iron and we don’t make iron ... It’s a mystery, however, that here is ours. In fact, nothing, durilovka ordinary and fingers fan. And our military seems to boil in their own juice, get out as they can, where they buy it and live! hi
  • SAM 5
    SAM 5 4 February 2016 19: 20
    0
    Cyber ​​war is in full swing. And what will end - xs.
  • hawk
    hawk 4 February 2016 19: 20
    0
    The question of archives is important, comrades ... Even computers that are not on the networks are potential victims of external influences, as well as collectors and transmitters of information. I’m lost in speculation that the cardinal can be opposed, because decades lost ...
    1. engineer74
      engineer74 4 February 2016 19: 44
      +2
      "Bits and bytes are the same weapons as bullets and bombs."

      They give us a megabyte - we give them a megaton! soldier
      But seriously, protection exists - crypto protection, plus hiding the information in a heap of insignificant data and the time to decrypt arrays and analyze information tends to infinity ...
  • Igor V
    Igor V 4 February 2016 19: 25
    0
    In this gigantic amount of surveillance, have they not yet drowned?
  • Back in USSR
    Back in USSR 4 February 2016 19: 25
    +2
    Quote: hawk
    I’m guessing that the cardinal can be opposed ...

    Unplug the cable and sleep soundly.
    1. faridg7
      faridg7 4 February 2016 19: 53
      +1
      Yes? Damn, but I do not have a cable, all without wires. how am I going to live now - babamy secret henchmen always know what I think and say about him.
      In general, the problem is that even a computer that is not connected to the network is a guarantee of the safety of information. For example:
      https://www.youtube.com/watch?v=8r4s7KQx-Nk&feature=youtu.be
  • Lysik001
    Lysik001 4 February 2016 19: 35
    +6
    Chatter is one and things are still there. OS should be your own. This is a crucial issue. In the event of a conflict, everything will be cut off to us and we will blow bubbles. Where I just did not write about this. Looks like the truth is our fate. Win with great blood. Because we are constantly not ready for anything!
    1. derik1970
      derik1970 5 February 2016 07: 38
      -1
      In our large country, everything should be its own, so as not to undermine defense capability. Here you say victory with great blood. I think they will merge us as under Yeltsin, we won’t have time to blather. I doubt that somewhere, someone happened in the country, a coup will go to guerrilla in the amount of at least 1000 people in the taiga. We will all sit and watch ballet on TV. What they say in the Kremlin, then we will do it, we will resist, they will put it to the wall, the opinion of the people does not interest anyone, there are slogans and solid fiction around. hi
  • Bort radist
    Bort radist 4 February 2016 19: 39
    0
    Quote: Back in USSR
    Unplug the cable and sleep soundly.

    Wi-Fi can not be forgotten, Bluetooth, it’s somehow when you do not need to turn on.
    That's when the paper in the drawer you can sleep recourse
  • afrikanez
    afrikanez 4 February 2016 19: 40
    +3
    I don’t understand one thing, well, they will find out everything about me there and what? You might think that something will change in my worldview. Nothing like that. But seriously, it’s time for a long time to do everything and not rely on Uncle Sam and whom else. Only now all this must be entrusted to very responsible and knowledgeable people (not Chubais for sure)
    1. NEXUS
      NEXUS 4 February 2016 21: 23
      +1
      Quote: afrikanez
      But seriously, it’s time for a long time to do everything and not rely on Uncle Sam and whom else.

      They do it, albeit with the Chinese ... the Baikal processor for example. Or the first Russian tablet (created in Taiwan) bb-mobile Topol.
      But this is still the beginning, and so far we can’t do without Chinese technologies. Unfortunately, like the Chinese, we can say without our technologies in aircraft construction (I’m talking about combat fighters).
      1. derik1970
        derik1970 5 February 2016 07: 47
        0
        Sorry, but the Chinese are not friends to us. Friends of our country Army and Navy, everything else is so related garbage. And this tablet and everything connected with it remained in China, and we only have pieces of paper signed by the Chinese. During the fighting, the papers are least trusted !!! hi
    2. The comment was deleted.
    3. The comment was deleted.
    4. Kelwin
      Kelwin 5 February 2016 01: 06
      +2
      Cross-sectional analysis is a terrible thing, by itself we have not resisted anyone, but having formalized search criteria and access to information (everything will do, and sms, mail and tweets, etc. that are not encrypted) there is a nonzero chance to detect, for example, the relocation of HF or the fact of the deployment of tactical weapons in the N district. One sent a text message to his wife, like "the sun, I won't come home, we are unloading some eldovins, three carriages", his acquaintance in contacts posted a photo from the railway station, and at the railway station there was a hole in the schedule. That's it, fuck it, enough ...
    5. The comment was deleted.
  • Sukhovei
    Sukhovei 4 February 2016 19: 46
    -1
    We need our own OS, our own software, so as not to depend on the grace of the small soft ones and others like them
  • Grbear
    Grbear 4 February 2016 19: 59
    +1
    What clueless - somberly written off for decades now and then ... fool
    In the active phase of the confrontation, the Window is not needed. There will be no time. Strategic objects are also controlled by our electronics (watch the reports from the "booths" on TV on the Zvezda channel, it still looks Soviet-style there).
    And its own Axis can be developed, but no one is in a hurry to distribute it, or rather buy it. This is a colossal commercial action. And compatibility even with "tyrenny" products is questionable, not to mention the number of other IT products.
    And thirdly, our "intellectual" companies are not in vain created (not to mention our hackers, who, as I see it, for Russia. The lads keep their fingers on the pulse and it is not yet a fact who will win in the "honest" cyber war ...
    hi
    1. Grbear
      Grbear 4 February 2016 20: 16
      0
      To catch up:
      Something with the VO forum has become ... what
      What happened a year ago - I remember hi
      1. Kelwin
        Kelwin 5 February 2016 01: 26
        -1
        Yes, everything is fine, if it fucks, no one remembers that it is urgent to like what it was, it will blow the moment because of the computer)
        1. Kelwin
          Kelwin April 26 2016 23: 55
          0
          Not that it would deliver a minus, it’s just interesting who it is and what’s inside the skull, express yourself, friend. We have our own axis, AstraLinux is called, only you personally sit on h86chips and Windows, because you need to play, right ?, and you have no idea what is wired there, as well as the fact that your router is wired in UEFI, about which your antivirus I didn’t even hear how you probably are. I apologize to all the other participants, if I hurt someone - they just got tired of it, some pimple owners of 1k likes for null close up the gurus and do not even condescend to slap on the clave, well, what a bl ...
  • Calter
    Calter 4 February 2016 20: 39
    +3
    Well, how can I say ... I use two similar programs for work: Vector NTI and Ugene. The second is the brainchild of Russian programmers: it creeps terribly, hangs all the time, crashes the video driver and clogs the registry. The interface, even after being Russified, is less clear than the English-language Vector. The only advantage was the availability of the local BLAST function I needed, bypassing the NCBI resource. However, I recently discovered such a function in another bourgeois program (CLC Genomics Workbench), which, what the Ugene program took a couple of days to do, LITERALLY in 5 clicks. This gave me the idea that it is better not to deal with Russian bioinformatics programs.
    PS
    The difference between the BLAST algorithms in Ugene and Workbench on the fingers looks something like this:
    Suppose you are a publicist and for an article you want to find the quote you need from one of the "great and immortal" authors.
    How does Ugene do it:
    He accepts keywords and points you to one of the volumes of this author, which contains the exact wording. Then you go to the library, where you yourself are looking for the shelf on which this volume lies. Having found it, you manually scroll through a couple of thousand (or even tens of thousands) pages, where you find the one you are looking for.
    How does the Workbench do it:
    It simply displays you all the quotes of the given author containing the given keywords, and you choose the one in which there are more of these words than in others (as if you just google it).
    Something like that.
    1. fox21h
      fox21h 4 February 2016 22: 52
      +1
      Not every of our software brainchild is directly what is super, but do not forget that a lot of our programmers write for foreign companies and now you won’t tell where it was written not by our compatriots.
  • Michael67
    Michael67 4 February 2016 21: 23
    0
    For the average person, the conclusion is simple: the first computer in the house is only for neta, the second - no contact with the network. Only for documents and personal photos and videos.
    1. Kelwin
      Kelwin 5 February 2016 01: 17
      +3
      In addition, drill a camera in smart with a drill for 10, all flash drives in the microwave, carefully chew credit cards and drink alcohol laughing
    2. The comment was deleted.
  • samarin1969
    samarin1969 4 February 2016 21: 24
    +3
    The article is a rare case where the share of hysteria does not hurt ... Economic, military and cyber problems cannot be solved now without political restrictions .... In the meantime, the prospect of tight state control over offshore crooks, cyberspace, traveling abroad causes superstitious horror in the Kremlin .. . Soros forbade even think about it.
    ... If they can't think of it, let them go for an internship to "partner" Xi ... Great nation!
  • Volzhanin
    Volzhanin 4 February 2016 22: 06
    0
    Author - Great man! Looks at the root!
    The son is 12 years old. Cooking in a cyber fighter! So far, only the ITF Taekwando red belt has received.
  • The comment was deleted.
  • Volzhanin
    Volzhanin 4 February 2016 22: 34
    0
    We’ll see who’s who!
  • Comrade Glebov
    Comrade Glebov 4 February 2016 22: 40
    +4
    Well, I would very much like to have a GOOD domestic OS. Although looking at our "satellite" type search engines, I'm honestly not sure if this is possible. One way or another, you will have to finish it with a file in artisanal conditions. But if they do, then the Mikhalkovs will probably have to pay a tax for allowing them to use the video player, from the wallpaper there is only a portrait of Putin with a guilty look and the postscript "don't steal!" and no shmorrent torrents. I mean:

    "As President Vladimir Putin noted at the board of the FSB, in 2014, over 25 Internet resources with publications that violate the law were identified, and more than XNUMX extremist sites were shut down."

    Yes, yes, as a pirate with experience, I never paid a penny to "microsoft" very loudly and with anguish I sob with laughter looking at the stupidity of our "prohibitors" who beat their bad head against a reinforced concrete wall, knowing that even if "stopitsot" to issue laws, all the same, they will go to the forbidden "rutracker" (albeit in a roundabout way) and glue the necessary information in the right quantities. Give communism to the network! Information resources must belong to the people!
    1. 1rl141
      1rl141 4 February 2016 23: 47
      -1
      Quote: Comrade Glebov
      Yes, yes, as a pirate with experience, I never paid a penny to "microsoft" very loudly and with anguish I sob with laughter looking at the stupidity of our "prohibitors" who beat their bad head against a reinforced concrete wall, knowing that even if "stopitsot" to issue laws, all the same, they will go to the forbidden "rutracker" (albeit in a roundabout way) and glue the necessary information in the right quantities. Give communism to the network! Information resources must belong to the people!


      Let's get them to "microsoft" - not a penny of our money!
  • Olegi1
    Olegi1 5 February 2016 01: 05
    +1
    Quote: Avantageur
    Quote: NEXUS
    And the Chinese will certainly help, because it’s not for free, but for our technologies in other areas and for real money.

    Yes, what kind of technology are there ... They are a product for me - I give them money. I want, not from the Chinese, I will take the goods from the Koreans ...


    Yeah, but the Chinese - technology doesn’t steal? They are a hundred times more than the Americans bugs hoot, tormented to pick out ...
  • renics
    renics 5 February 2016 01: 39
    +2
    About 32 percent of the working age population in Russia use smartphones, in other words, spy devices. This means that overseas overseers at any second know the location of 30 million Russian citizens with an accuracy of 50 meters, their routes, all personal data, including last name, first name, middle name, age, account numbers, social circle, friends, acquaintances, relatives, correspondence by SMS and email, a profession, all their social activity. Well, here the author clearly went too far, I don’t do anything like that via a smartphone, and the vast majority of people don’t do it either. Too much generalization leads to false data.
  • Million
    Million 5 February 2016 09: 15
    0
    We have many geniuses in our country! They need to be given the opportunity to develop, create conditions ... Then they will not run to the United States, but will work for the good of Russia!