Editing Talk:Command Navigation Program/Archive 1
Discussion page of Command Navigation Program/Archive 1
More actions
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
| Latest revision | Your text | ||
| Line 11: | Line 11: | ||
:Strictly speaking, [[Wikipedia:Computer virus|Computer virus]]es and [[Wikipedia:Computer worm|worms]] are defined by their ability to ''proliferate''. It would be most proper to state that the CNP (or part of it) was a Cylon-designed [[Wikipedia:Trojan horse (computing)|Trojan horse]]. | :Strictly speaking, [[Wikipedia:Computer virus|Computer virus]]es and [[Wikipedia:Computer worm|worms]] are defined by their ability to ''proliferate''. It would be most proper to state that the CNP (or part of it) was a Cylon-designed [[Wikipedia:Trojan horse (computing)|Trojan horse]]. | ||
:The Logic Bomb that infected Galactica's systems was obviously very different - either a remote [[Wikipedia:exploit (computer security)|exploit]] or the work of a Cylon agent onboard ''Galactica'', as I speculated on the "[[Scattered]]" page. --[[User: | :The Logic Bomb that infected Galactica's systems was obviously very different - either a remote [[Wikipedia:exploit (computer security)|exploit]] or the work of a Cylon agent onboard ''Galactica'', as I speculated on the "[[Scattered]]" page. --[[User:Peter Farago|Peter Farago]] 15:53, 23 September 2005 (EDT) | ||
:: A Trojan Horse is typically a malevalent application disguised as a benevolent one, with no "good" code within. Trojans generally do not activate themselves (as viruses do) or proliferate themselves (as worms do). The CNP was a functional program with backdoors that allowed commands, of which shut down commands, commands to activate a hidden virus or worm inside the CNP code, or copy commands to receive and activate a new virus would work. In "Scattered", ''Galactica'' becomes infected by the Cylon virus transmitted by the attacking fleet using old-school War I tactics--that I'm pretty certain of at this point since we have no other data to support otherwise, and fits ''Galactica's'' technology base. Doesn't mean there wasn't someone on the inside that copied back the virus code on a low-level system into ''Galactica'' after the initial purge in "Scattered." We already know of one or two Cylon infiltrators (Godfrey, Biers), and at least 6 others remain at large. The virus created the Logic Bomb...or the Logic Bomb was implanted by an infiltrator, yes, but we have no way of knowing just yet.[[User:Spencerian|Spencerian]] 17:25, 23 September 2005 (EDT) | :: A Trojan Horse is typically a malevalent application disguised as a benevolent one, with no "good" code within. Trojans generally do not activate themselves (as viruses do) or proliferate themselves (as worms do). The CNP was a functional program with backdoors that allowed commands, of which shut down commands, commands to activate a hidden virus or worm inside the CNP code, or copy commands to receive and activate a new virus would work. In "Scattered", ''Galactica'' becomes infected by the Cylon virus transmitted by the attacking fleet using old-school War I tactics--that I'm pretty certain of at this point since we have no other data to support otherwise, and fits ''Galactica's'' technology base. Doesn't mean there wasn't someone on the inside that copied back the virus code on a low-level system into ''Galactica'' after the initial purge in "Scattered." We already know of one or two Cylon infiltrators (Godfrey, Biers), and at least 6 others remain at large. The virus created the Logic Bomb...or the Logic Bomb was implanted by an infiltrator, yes, but we have no way of knowing just yet.[[User:Spencerian|Spencerian]] 17:25, 23 September 2005 (EDT) | ||
| Line 17: | Line 17: | ||
==CNP on Civilian Ships== | ==CNP on Civilian Ships== | ||
In the miniseries, Doral approaches Baltar with a report he requested: "You asked for a report on how many civilian ships had your CNP program?" Seems pretty clear to me. --[[User: | In the miniseries, Doral approaches Baltar with a report he requested: "You asked for a report on how many civilian ships had your CNP program?" Seems pretty clear to me. --[[User:Peter Farago|Peter Farago]] 12:43, 3 January 2006 (EST) | ||
==Still need clarification== | ==Still need clarification== | ||
| Line 29: | Line 29: | ||
:::Six was referring to Baltar's programming of the CNP itself, of which he wasn't doing a very good job at perfecting. Six made it work, but she also added a bit of extras. If the CNP was a castle, Six added a special magician that, on the Cylon's command, turned its "king" (commander/pilot) into a jester and surrendered the castle instantly. --[[User:Spencerian|Spencerian]] 16:43, 17 April 2006 (CDT) | :::Six was referring to Baltar's programming of the CNP itself, of which he wasn't doing a very good job at perfecting. Six made it work, but she also added a bit of extras. If the CNP was a castle, Six added a special magician that, on the Cylon's command, turned its "king" (commander/pilot) into a jester and surrendered the castle instantly. --[[User:Spencerian|Spencerian]] 16:43, 17 April 2006 (CDT) | ||
:We've had this conclusion several times, so I'm being forced to use bold text here to make sure my point is clear: '''There was. no. virus.''' The CNP included a backdoor which allowed the cylons to dial in and shut down their systems at will. Classic trojan horse. No virus involved. --[[User: | :We've had this conclusion several times, so I'm being forced to use bold text here to make sure my point is clear: '''There was. no. virus.''' The CNP included a backdoor which allowed the cylons to dial in and shut down their systems at will. Classic trojan horse. No virus involved. --[[User:Peter Farago|Peter Farago]] 21:19, 17 April 2006 (CDT) | ||
::I didn't know that's what a Trojan did. --[[User:The Merovingian|The Merovingian]] <sup>([[Special:Contributions/The Merovingian|C]] - [[Special:Editcount/The Merovingian|E]])</sup> 21:31, 17 April 2006 (CDT) | ::I didn't know that's what a Trojan did. --[[User:The Merovingian|The Merovingian]] <sup>([[Special:Contributions/The Merovingian|C]] - [[Special:Editcount/The Merovingian|E]])</sup> 21:31, 17 April 2006 (CDT) | ||
:::Don't worry; I'm sure under some yet newer taxonomy it's, e.g., a "hedgehog" or a "plaguecarrier." At least some of the experts on computer security truly enjoy inventing new terminology; years ago, all would have been called a virus, and implementation idiosyncracies would be left to the specific name. For future reference, one can usually get away with being accurate, if highly broad, by calling the item "malware." --[[User:CalculatinAvatar|CalculatinAvatar]] 22:07, 17 April 2006 (CDT) | :::Don't worry; I'm sure under some yet newer taxonomy it's, e.g., a "hedgehog" or a "plaguecarrier." At least some of the experts on computer security truly enjoy inventing new terminology; years ago, all would have been called a virus, and implementation idiosyncracies would be left to the specific name. For future reference, one can usually get away with being accurate, if highly broad, by calling the item "malware." --[[User:CalculatinAvatar|CalculatinAvatar]] 22:07, 17 April 2006 (CDT) | ||
::::I think the reason you have that impression was that viruses actually were the most common type of malware back in the floppy disk era. Most e-mail "viruses" are actually worms, distinguished by their ability to replicate on their own, without piggybacking on another executable which they must "infect". The definition of a trojan horse is essentially something installed in good faith with a hidden malevolent purpose. This sort of, but does not quite perfectly include the idea of a "backdoor", which is really the best possible term to describe the CNP. --[[User: | ::::I think the reason you have that impression was that viruses actually were the most common type of malware back in the floppy disk era. Most e-mail "viruses" are actually worms, distinguished by their ability to replicate on their own, without piggybacking on another executable which they must "infect". The definition of a trojan horse is essentially something installed in good faith with a hidden malevolent purpose. This sort of, but does not quite perfectly include the idea of a "backdoor", which is really the best possible term to describe the CNP. --[[User:Peter Farago|Peter Farago]] 22:37, 17 April 2006 (CDT) | ||
:::::I'm well aware of the distinctions, and I think that the simple fact that boot-sector-overriding programs, including some with beneficial purposes like real-time encryption of disk access, and corruptions of normal user programs use the same term is a clear indication that initially they were made in far less detail. For the most part, jargon exists to identify a community and mystify victi\b\b\b\b\bcustomers. Originally, malware lacked the frequency, variety, or crystalization of attack patterns necessary for the irksome, mostly useless nit-picking of current terminology. --[[User:CalculatinAvatar|CalculatinAvatar]] 23:34, 17 April 2006 (CDT) | :::::I'm well aware of the distinctions, and I think that the simple fact that boot-sector-overriding programs, including some with beneficial purposes like real-time encryption of disk access, and corruptions of normal user programs use the same term is a clear indication that initially they were made in far less detail. For the most part, jargon exists to identify a community and mystify victi\b\b\b\b\bcustomers. Originally, malware lacked the frequency, variety, or crystalization of attack patterns necessary for the irksome, mostly useless nit-picking of current terminology. --[[User:CalculatinAvatar|CalculatinAvatar]] 23:34, 17 April 2006 (CDT) | ||
::::::Still, I think it behooves us not to misuse that terminology, nit-picking as it may be. --[[User: | ::::::Still, I think it behooves us not to misuse that terminology, nit-picking as it may be. --[[User:Peter Farago|Peter Farago]] 23:45, 17 April 2006 (CDT) | ||
::: A really good term is ''worm''. :) --[[User:Shane|Shane]] <sup>([[User_Talk:Shane|T]] - [[Special:Contributions/Shane|C]] - [[Special:Editcount/Shane|E]])</sup> 22:47, 17 April 2006 (CDT) | ::: A really good term is ''worm''. :) --[[User:Shane|Shane]] <sup>([[User_Talk:Shane|T]] - [[Special:Contributions/Shane|C]] - [[Special:Editcount/Shane|E]])</sup> 22:47, 17 April 2006 (CDT) | ||
::::A worm has to be self-propagating. The CNP isn't. --[[User: | ::::A worm has to be self-propagating. The CNP isn't. --[[User:Peter Farago|Peter Farago]] 23:05, 17 April 2006 (CDT) | ||
== What did it actually do? == | == What did it actually do? == | ||
| Line 45: | Line 45: | ||
:To be clear, "I'd surmise" means I '''made that up'''. It's a guess, and that's why it's not on the page itself. [[Wikipedia:The Powers That Be (television)|They]]'ve never told us a real answer. --[[User:CalculatinAvatar|CalculatinAvatar]] 15:17, 27 April 2006 (CDT) | :To be clear, "I'd surmise" means I '''made that up'''. It's a guess, and that's why it's not on the page itself. [[Wikipedia:The Powers That Be (television)|They]]'ve never told us a real answer. --[[User:CalculatinAvatar|CalculatinAvatar]] 15:17, 27 April 2006 (CDT) | ||
::I don't know, that seems pretty rudimentary for something that required "OMG teh Forbidden AI technologies", if you will. --[[User: | ::I don't know, that seems pretty rudimentary for something that required "OMG teh Forbidden AI technologies", if you will. --[[User:Peter Farago|Peter Farago]] 16:02, 27 April 2006 (CDT) | ||
:::The plotting of an optimal course in space (relatively) near objects seems to me like a [[Wikipedia:Calculus of variations|variational]] problem desiring a function f(t) giving a vector of the thrusts from each engine at time ''t'' such that C(f) the cost in fuel or time is minimal and the intial position plus the integral of f(t) modified by the forces exerted by the nearby objects over the time used is the destination. This seems related to the [[Wikipedia:N-body problem|''n''-body system]], but I admit my familiarity with the topic is limited. A cursory glance at Google returns gives a [http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/dimacs-nbody.html source] stating good approximation of the solution to a ''n''-body problem is possible in O(n) for each time step (with a complicated algorithm by the standards of someone implementing parallel algorithms for solutions to integral equations). This makes the problem seem tough but trivial compared to an AI. --[[User:CalculatinAvatar|CalculatinAvatar]] 22:14, 27 April 2006 (CDT) | :::The plotting of an optimal course in space (relatively) near objects seems to me like a [[Wikipedia:Calculus of variations|variational]] problem desiring a function f(t) giving a vector of the thrusts from each engine at time ''t'' such that C(f) the cost in fuel or time is minimal and the intial position plus the integral of f(t) modified by the forces exerted by the nearby objects over the time used is the destination. This seems related to the [[Wikipedia:N-body problem|''n''-body system]], but I admit my familiarity with the topic is limited. A cursory glance at Google returns gives a [http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/dimacs-nbody.html source] stating good approximation of the solution to a ''n''-body problem is possible in O(n) for each time step (with a complicated algorithm by the standards of someone implementing parallel algorithms for solutions to integral equations). This makes the problem seem tough but trivial compared to an AI. --[[User:CalculatinAvatar|CalculatinAvatar]] 22:14, 27 April 2006 (CDT) | ||
:Frankly, the CNP was a super-avionics package, nothing more. It also appeared to combine many tactical advantages in fleet combat with improved DRADIS, navigation and battle plans (possibly, fighters or battlestars could coordinate their maneuvers better under a single set of commands) and the like. For the older stuff, see the innards of the Viper Mark II (Miniseries) where we see Starbuck fly the first time. Worked fine. Not flashy, but also it couldn't be hacked--then, or "now." --[[User:Spencerian|Spencerian]] 07:05, 28 April 2006 (CDT) | :Frankly, the CNP was a super-avionics package, nothing more. It also appeared to combine many tactical advantages in fleet combat with improved DRADIS, navigation and battle plans (possibly, fighters or battlestars could coordinate their maneuvers better under a single set of commands) and the like. For the older stuff, see the innards of the Viper Mark II (Miniseries) where we see Starbuck fly the first time. Worked fine. Not flashy, but also it couldn't be hacked--then, or "now." --[[User:Spencerian|Spencerian]] 07:05, 28 April 2006 (CDT) | ||