Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Editing Talk:Command Navigation Program/Archive 1

Discussion page of Command Navigation Program/Archive 1
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision Your text
Line 11: Line 11:
:Strictly speaking, [[Wikipedia:Computer virus|Computer virus]]es and [[Wikipedia:Computer worm|worms]] are defined by their ability to ''proliferate''. It would be most proper to state that the CNP (or part of it) was a Cylon-designed [[Wikipedia:Trojan horse (computing)|Trojan horse]].
:Strictly speaking, [[Wikipedia:Computer virus|Computer virus]]es and [[Wikipedia:Computer worm|worms]] are defined by their ability to ''proliferate''. It would be most proper to state that the CNP (or part of it) was a Cylon-designed [[Wikipedia:Trojan horse (computing)|Trojan horse]].


:The Logic Bomb that infected Galactica's systems was obviously very different - either a remote [[Wikipedia:exploit (computer security)|exploit]] or the work of a Cylon agent onboard ''Galactica'', as I speculated on the "[[Scattered]]" page. --[[User:April Arcus|April Arcus]] 15:53, 23 September 2005 (EDT)
:The Logic Bomb that infected Galactica's systems was obviously very different - either a remote [[Wikipedia:exploit (computer security)|exploit]] or the work of a Cylon agent onboard ''Galactica'', as I speculated on the "[[Scattered]]" page. --[[User:Peter Farago|Peter Farago]] 15:53, 23 September 2005 (EDT)


:: A Trojan Horse is typically a malevalent application disguised as a benevolent one, with no "good" code within. Trojans generally do not activate themselves (as viruses do) or proliferate themselves (as worms do). The CNP was a functional program with backdoors that allowed commands, of which shut down commands, commands to activate a hidden virus or worm inside the CNP code, or copy commands to receive and activate a new virus would work. In "Scattered", ''Galactica'' becomes infected by the Cylon virus transmitted by the attacking fleet using old-school War I tactics--that I'm pretty certain of at this point since we have no other data to support otherwise, and fits ''Galactica's'' technology base. Doesn't mean there wasn't someone on the inside that copied back the virus code on a low-level system into ''Galactica'' after the initial purge in "Scattered." We already know of one or two Cylon infiltrators (Godfrey, Biers), and at least 6 others remain at large. The virus created the Logic Bomb...or the Logic Bomb was implanted by an infiltrator, yes, but we have no way of knowing just yet.[[User:Spencerian|Spencerian]] 17:25, 23 September 2005 (EDT)
:: A Trojan Horse is typically a malevalent application disguised as a benevolent one, with no "good" code within. Trojans generally do not activate themselves (as viruses do) or proliferate themselves (as worms do). The CNP was a functional program with backdoors that allowed commands, of which shut down commands, commands to activate a hidden virus or worm inside the CNP code, or copy commands to receive and activate a new virus would work. In "Scattered", ''Galactica'' becomes infected by the Cylon virus transmitted by the attacking fleet using old-school War I tactics--that I'm pretty certain of at this point since we have no other data to support otherwise, and fits ''Galactica's'' technology base. Doesn't mean there wasn't someone on the inside that copied back the virus code on a low-level system into ''Galactica'' after the initial purge in "Scattered." We already know of one or two Cylon infiltrators (Godfrey, Biers), and at least 6 others remain at large. The virus created the Logic Bomb...or the Logic Bomb was implanted by an infiltrator, yes, but we have no way of knowing just yet.[[User:Spencerian|Spencerian]] 17:25, 23 September 2005 (EDT)
Line 17: Line 17:
==CNP on Civilian Ships==
==CNP on Civilian Ships==


In the miniseries, Doral approaches Baltar with a report he requested: "You asked for a report on how many civilian ships had your CNP program?" Seems pretty clear to me. --[[User:April Arcus|April Arcus]] 12:43, 3 January 2006 (EST)
In the miniseries, Doral approaches Baltar with a report he requested: "You asked for a report on how many civilian ships had your CNP program?" Seems pretty clear to me. --[[User:Peter Farago|Peter Farago]] 12:43, 3 January 2006 (EST)


==Still need clarification==
==Still need clarification==
Line 29: Line 29:
:::Six was referring to Baltar's programming of the CNP itself, of which he wasn't doing a very good job at perfecting. Six made it work, but she also added a bit of extras. If the CNP was a castle, Six added a special magician that, on the Cylon's command, turned its "king" (commander/pilot) into a jester and surrendered the castle instantly. --[[User:Spencerian|Spencerian]] 16:43, 17 April 2006 (CDT)
:::Six was referring to Baltar's programming of the CNP itself, of which he wasn't doing a very good job at perfecting. Six made it work, but she also added a bit of extras. If the CNP was a castle, Six added a special magician that, on the Cylon's command, turned its "king" (commander/pilot) into a jester and surrendered the castle instantly. --[[User:Spencerian|Spencerian]] 16:43, 17 April 2006 (CDT)


:We've had this conclusion several times, so I'm being forced to use bold text here to make sure my point is clear: '''There was. no. virus.''' The CNP included a backdoor which allowed the cylons to dial in and shut down their systems at will. Classic trojan horse. No virus involved. --[[User:April Arcus|April Arcus]] 21:19, 17 April 2006 (CDT)
:We've had this conclusion several times, so I'm being forced to use bold text here to make sure my point is clear: '''There was. no. virus.''' The CNP included a backdoor which allowed the cylons to dial in and shut down their systems at will. Classic trojan horse. No virus involved. --[[User:Peter Farago|Peter Farago]] 21:19, 17 April 2006 (CDT)
::I didn't know that's what a Trojan did.  --[[User:The Merovingian|The Merovingian]] <sup>([[Special:Contributions/The Merovingian|C]] - [[Special:Editcount/The Merovingian|E]])</sup> 21:31, 17 April 2006 (CDT)
::I didn't know that's what a Trojan did.  --[[User:The Merovingian|The Merovingian]] <sup>([[Special:Contributions/The Merovingian|C]] - [[Special:Editcount/The Merovingian|E]])</sup> 21:31, 17 April 2006 (CDT)
:::Don't worry; I'm sure under some yet newer taxonomy it's, e.g., a "hedgehog" or a "plaguecarrier." At least some of the experts on computer security truly enjoy inventing new terminology; years ago, all would have been called a virus, and implementation idiosyncracies would be left to the specific name. For future reference, one can usually get away with being accurate, if highly broad, by calling the item "malware." --[[User:CalculatinAvatar|CalculatinAvatar]] 22:07, 17 April 2006 (CDT)
:::Don't worry; I'm sure under some yet newer taxonomy it's, e.g., a "hedgehog" or a "plaguecarrier." At least some of the experts on computer security truly enjoy inventing new terminology; years ago, all would have been called a virus, and implementation idiosyncracies would be left to the specific name. For future reference, one can usually get away with being accurate, if highly broad, by calling the item "malware." --[[User:CalculatinAvatar|CalculatinAvatar]] 22:07, 17 April 2006 (CDT)
::::I think the reason you have that impression was that viruses actually were the most common type of malware back in the floppy disk era. Most e-mail "viruses" are actually worms, distinguished by their ability to replicate on their own, without piggybacking on another executable which they must "infect". The definition of a trojan horse is essentially something installed in good faith with a hidden malevolent purpose. This sort of, but does not quite perfectly include the idea of a "backdoor", which is really the best possible term to describe the CNP. --[[User:April Arcus|April Arcus]] 22:37, 17 April 2006 (CDT)
::::I think the reason you have that impression was that viruses actually were the most common type of malware back in the floppy disk era. Most e-mail "viruses" are actually worms, distinguished by their ability to replicate on their own, without piggybacking on another executable which they must "infect". The definition of a trojan horse is essentially something installed in good faith with a hidden malevolent purpose. This sort of, but does not quite perfectly include the idea of a "backdoor", which is really the best possible term to describe the CNP. --[[User:Peter Farago|Peter Farago]] 22:37, 17 April 2006 (CDT)
:::::I'm well aware of the distinctions, and I think that the simple fact that boot-sector-overriding programs, including some with beneficial purposes like real-time encryption of disk access, and corruptions of normal user programs use the same term is a clear indication that initially they were made in far less detail. For the most part, jargon exists to identify a community and mystify victi\b\b\b\b\bcustomers. Originally, malware lacked the frequency, variety, or crystalization of attack patterns necessary for the irksome, mostly useless nit-picking of current terminology. --[[User:CalculatinAvatar|CalculatinAvatar]] 23:34, 17 April 2006 (CDT)
:::::I'm well aware of the distinctions, and I think that the simple fact that boot-sector-overriding programs, including some with beneficial purposes like real-time encryption of disk access, and corruptions of normal user programs use the same term is a clear indication that initially they were made in far less detail. For the most part, jargon exists to identify a community and mystify victi\b\b\b\b\bcustomers. Originally, malware lacked the frequency, variety, or crystalization of attack patterns necessary for the irksome, mostly useless nit-picking of current terminology. --[[User:CalculatinAvatar|CalculatinAvatar]] 23:34, 17 April 2006 (CDT)
::::::Still, I think it behooves us not to misuse that terminology, nit-picking as it may be. --[[User:April Arcus|April Arcus]] 23:45, 17 April 2006 (CDT)
::::::Still, I think it behooves us not to misuse that terminology, nit-picking as it may be. --[[User:Peter Farago|Peter Farago]] 23:45, 17 April 2006 (CDT)
::: A really good term is ''worm''. :) --[[User:Shane|Shane]] <sup>([[User_Talk:Shane|T]] - [[Special:Contributions/Shane|C]] - [[Special:Editcount/Shane|E]])</sup> 22:47, 17 April 2006 (CDT)
::: A really good term is ''worm''. :) --[[User:Shane|Shane]] <sup>([[User_Talk:Shane|T]] - [[Special:Contributions/Shane|C]] - [[Special:Editcount/Shane|E]])</sup> 22:47, 17 April 2006 (CDT)
::::A worm has to be self-propagating. The CNP isn't. --[[User:April Arcus|April Arcus]] 23:05, 17 April 2006 (CDT)
::::A worm has to be self-propagating. The CNP isn't. --[[User:Peter Farago|Peter Farago]] 23:05, 17 April 2006 (CDT)


== What did it actually do? ==
== What did it actually do? ==
Line 45: Line 45:
:To be clear, "I'd surmise" means I '''made that up'''. It's a guess, and that's why it's not on the page itself. [[Wikipedia:The Powers That Be (television)|They]]'ve never told us a real answer. --[[User:CalculatinAvatar|CalculatinAvatar]] 15:17, 27 April 2006 (CDT)
:To be clear, "I'd surmise" means I '''made that up'''. It's a guess, and that's why it's not on the page itself. [[Wikipedia:The Powers That Be (television)|They]]'ve never told us a real answer. --[[User:CalculatinAvatar|CalculatinAvatar]] 15:17, 27 April 2006 (CDT)


::I don't know, that seems pretty rudimentary for something that required "OMG teh Forbidden AI technologies", if you will. --[[User:April Arcus|April Arcus]] 16:02, 27 April 2006 (CDT)
::I don't know, that seems pretty rudimentary for something that required "OMG teh Forbidden AI technologies", if you will. --[[User:Peter Farago|Peter Farago]] 16:02, 27 April 2006 (CDT)


:::The plotting of an optimal course in space (relatively) near objects seems to me like a [[Wikipedia:Calculus of variations|variational]] problem desiring a function f(t) giving a vector of the thrusts from each engine at time ''t'' such that C(f) the cost in fuel or time is minimal and the intial position plus the integral of f(t) modified by the forces exerted by the nearby objects over the time used is the destination. This seems related to the [[Wikipedia:N-body problem|''n''-body system]], but I admit my familiarity with the topic is limited. A cursory glance at Google returns gives a [http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/dimacs-nbody.html source] stating good approximation of the solution to a ''n''-body problem is possible in O(n) for each time step (with a complicated algorithm by the standards of someone implementing parallel algorithms for solutions to integral equations). This makes the problem seem tough but trivial compared to an AI. --[[User:CalculatinAvatar|CalculatinAvatar]] 22:14, 27 April 2006 (CDT)
:::The plotting of an optimal course in space (relatively) near objects seems to me like a [[Wikipedia:Calculus of variations|variational]] problem desiring a function f(t) giving a vector of the thrusts from each engine at time ''t'' such that C(f) the cost in fuel or time is minimal and the intial position plus the integral of f(t) modified by the forces exerted by the nearby objects over the time used is the destination. This seems related to the [[Wikipedia:N-body problem|''n''-body system]], but I admit my familiarity with the topic is limited. A cursory glance at Google returns gives a [http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/dimacs-nbody.html source] stating good approximation of the solution to a ''n''-body problem is possible in O(n) for each time step (with a complicated algorithm by the standards of someone implementing parallel algorithms for solutions to integral equations). This makes the problem seem tough but trivial compared to an AI. --[[User:CalculatinAvatar|CalculatinAvatar]] 22:14, 27 April 2006 (CDT)


:Frankly, the CNP was a super-avionics package, nothing more. It also appeared to combine many tactical advantages in fleet combat with improved DRADIS, navigation and battle plans (possibly, fighters or battlestars could coordinate their maneuvers better under a single set of commands) and the like. For the older stuff, see the innards of the Viper Mark II (Miniseries) where we see Starbuck fly the first time. Worked fine. Not flashy, but also it couldn't be hacked--then, or "now." --[[User:Spencerian|Spencerian]] 07:05, 28 April 2006 (CDT)
:Frankly, the CNP was a super-avionics package, nothing more. It also appeared to combine many tactical advantages in fleet combat with improved DRADIS, navigation and battle plans (possibly, fighters or battlestars could coordinate their maneuvers better under a single set of commands) and the like. For the older stuff, see the innards of the Viper Mark II (Miniseries) where we see Starbuck fly the first time. Worked fine. Not flashy, but also it couldn't be hacked--then, or "now." --[[User:Spencerian|Spencerian]] 07:05, 28 April 2006 (CDT)
== Means of Transmission ==
How would the Cylons actually transmit the signals to override the CNP on the target ship? Would it be received via the ship's wireless system?--[[User:Rapturous|Rapturous]] 00:42, 18 October 2007 (CDT)
:I think so. There's not really another way that we know of. --[[User:Catrope|Catrope]]<sup>([[User talk:Catrope|Talk to me]] or [[Special:Emailuser/Catrope|e-mail me]])</sup> 05:47, 18 October 2007 (CDT)
::To clarify: The Cylons (via Caprica-Six) helped ''build'' the thing, so naturally they would know how to talk to it, through its normal means, or by a backdoor means unexplained. And they don't appear to override the CNP. They just appear to tell it to shut down everything, including itself. It would be like your computer turning itself off and your power button would not respond to starting it up. --[[User:Spencerian|Spencerian]] 00:09, 19 October 2007 (CDT)
:::Since Six had such a major part in writing CNP, it's even possible that the signal to override the CNP can be sent to any system capable of receiving, processing and sharing electromagnetic information with the CNP. For example, if the CNP is getting feed from DRADIS, the Cylons could send a particular signal that would mimic DRADIS return, which would make the DRADIS receivers would automatically pickup. Then the DRADIS computer would go "This seems like random sensor noise to me, but hey CNP, does this mean anything to you?" At which point the CNP goes "Did you just toss that Aparture Science we-don't-know-what-it-does into an Aparture Science Emergency Intellegence Incinerator?! That has got to be the... Whoa.. Whoaa.... Whoaaaaaaaaaa.......". Personally, I think this is more likely than using Colonial wireless as a point of entry, simply because that's too obvious and easily stopped. I can't see why the Colonials would network communications to the ship's other systems, even after firewalling it to hell and back. Meanwhile, no one ever seems to ever turn off the DRADIS in BSG and key systems like fire control and navigation almost certainly talk to it directly. --[[User:David Templar|David Templar]] 20:57, 10 November 2007 (CST)

To edit this page, please enter the words that appear below in the box (more info):

Refresh
Cancel Editing help (opens in new window)

  [] · [[]] · [[|]] · {{}} · · “” ‘’ «» ‹› „“ ‚‘ · ~ | ° &nbsp; · ± × ÷ ² ³ ½ · §
     [[Category:]] · [[:File:]] · [[Special:MyLanguage/]] · <code></code> · <nowiki></nowiki> <code><nowiki></nowiki></code> · <syntaxhighlight></syntaxhighlight> · <includeonly></includeonly> · <noinclude></noinclude> · #REDIRECT[[]] · <translate></translate> · <languages/> · {{#translation:}} · <tvar|></> · {{DEFAULTSORT:}} · <categorytree></categorytree> · <div style="clear:both;"></div> <s></s>


Your changes will be visible immediately.
  • For testing, please use the sandbox instead.
  • On talk pages, please sign your comment by typing four tildes (~~~~).

Templates used on this page: