Skip to content
Menu
  • Original Short Fiction
Menu

Malware & Cyber Warfare

Posted on 7 March 2012 by The Tactical Hermit
by
HCS Technical Staff
How is it done?
Offensive computer attacks are usually conducted by exploiting flaws in a computer web interface (most often a “login screen”) or surreptitiously installing malicious software (“malware”) on targeted computers to produce a number of effects on the computer system or devices that it controls.
How does it happen?
In the broadest sense, human error is what leads to successful computer attacks. A computer running an unpatched legacy operating system, using an unpatched legacy web browser to view shady sites, opening the attachment on a weird email, a poorly designed web-facing login screen, unencrypted wireless transmissions, or lax enforcement of a security policy in a building are the most common examples of human error.
How does it impact relationships between nation-states?
It provides an indirect means for nation-states to wage deniable proxy war against rival nation states. The best example of this is the Stuxnet worm attack on the Iranian government’s nuclear program. There is also the element of “mutually assured destruction” in cyberwarfare that would impact how major world powers like the United States, Russia, and China deploy offensive cyberwarfare capabilities. I would not be surprised to see treaties between major nation-states (like the United States, Russia, or China) that could function as a sort of “Geneva Convention”
What threat does it pose to me as a civilian?
The biggest cyber threats to a civilian are:
  • Loss of water services
  • Loss of electrical services
  • Loss of Internet service
  • Loss of Financial services
  • Exposure of personal information and/or intellectual property/trade secrets
  • Identity Theft

What can I do to protect myself?
  • Follow basic disaster preparedness procedures
  • Use a prepaid Visa or other cash card for once-off transactions online
  • Keep some cash on you to do basic transactions in the event you have to get a new credit card number
  • Check your online bank account regularly for suspicious transactions or transactions you don’t remember making.
  • Use a LiveCD Operating sytem for online banking and sensitive personal financial transactions
  • If your machine is running Windows XP, back up your files and install Ubuntu Linux instead
    • Microsoft is no longer providing Service Pack Support to Windows XP
  • If you MUST use a Windows computer, keep the following in mind:
    • Make sure it is Windows 7
    • Routinely run Windows Update
    • Install Microsoft Security Essentials
    • Install CCleaner
    • Install Malwarebytes Antimalware
    • Keep your web browser up to date and install multiple web browsers on your PC
    • Google Chrome and FireFox are good to go.
    • I know we are all good Christian Warriors and wouldn’t do such things, but be mindful that surfing for pornography or pirated movies is not much different than going into the “bad part of town” to buy drugs. Big boy rules apply.
How can I protect my small or medium-sized business?
  • Contact Hammerhead Combat Systems Today!
Links:
http://www.ubuntu.com
https://en.wikipedia.org/wiki/Code_injection
https://en.wikipedia.org/wiki/Stuxnet
http://hammerheadcombatsystems.org/2012/02/27/using-a-live-cd-operating-system/
http://support.microsoft.com/lifecycle/?ln=en-gb&c2=1173
http://www.piriform.com/ccleaner
http://www.malwarebytes.org/mbam-download.php

Leave a Reply

Your email address will not be published. Required fields are marked *

Tactical Hermit Substack

Recent Post

  • The True Criminals Wear White Coats and Don’t Use Guns
  • Know Your White History: Richard Wagner (Composer)
  • Morning Laugh
  • Black Thugs Murder White 14-Year Old Thor Walsh
  • Tungsten Super Shot Could be Anti-Drone Shotgun Ammo
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme