Category Archives: Tux

Tux, STUX, D.E.F.T, M.A.D and C.W.F (Cyberwarfare), Cyberparanoia and Stuxnet

New vocabulary is entering general use with cyber attacks  becoming preemptive at international stage. I am not going to be expressive here  since hackers (they) might think my IP address is some defence attaché and attack with D.O.S (Denial of Service Attack).
Cyber space is free but it is not is not a fair play ground for a simple academic like me to engage in, who is nearer to the grave by natural causes and  do not need any interference to my intellectual exercises unless of incapacitated by natural illness or loss of memory.
I am disturbed by the use of TuX in Stuxnet and this Simple Linux Guy (S.M.G) whom I adore. His girls are Penny and Gown.
Stuxnet is the Virtual attack that was directed at Iran’s nuclear reactors.
Tux is a penguin character and the official Mascot of the Linux kernel. Originally created as an entry to a Linux logo competition, Tux is the most commonly used icon for Linux, although different Linux Distributions depict.
Tux in various styles. In video games featuring the character, female counterparts, named Penny and Gown, accompany him. The character is used in many other Linux programs and as a general symbol of Linux.
STUX is a bootable CD with a collection of software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and U.S.B devices and other peripherals.
STUX also contains an installation wizard on the Live CD for putting the distribution on a Pendrive and thereby booting from it. However, a 1GB pen drive is required to do this which is far larger than other U.S.B Linux distributions.
DEFT is a Linux distribution with Digital Evidence and Forensic Investigations tools attached. It is not at military level bu at simple desktop or server leve.
I was trying to download (point to point) it and I have failed in 5 attempts now due to abrupt termination of service.
MAD is Mutually assured Destruction
Mutual Assured Destruction is a doctrine of military strategy and National Security Policy in which a full-scale use of high-yield Weapons of Mass Destruction (WMD) by two opposing sides would effectively result in the complete, utter and irrevocable annihilation of both the attacker and the defender. becoming thus a war that has no victory nor any armistice but only effective reciprocal destruction.
C.W.F is Cyberwarfare.
There are very interesting articles and one who interested in can browse but suffice is to say even an innocent device like Play Station can be used for an attack.
Other interesting point is that proprietary operating system with the O.E.M guys can use a device to send secret message to the company or the country’s National security for spying on your web activities.
This is why I am strongly against Windows 8 attempt to invade and intrusion of One’s Freedom of Use (O.F.U).
Cyberparanoia is the word I coin today to describe this phenomenon from a doctors point of view.

That is my contribution to the jargon and vocabulary.