Five western intelligence agencies, using Hacienda software, will now be blocked by a new software, which enables connection between user and server through a secret token and invisible transmission of information.
A New Software Developed To Prevent Cyber Attacks by German scientists. Technische Universitat Munchen (TUM) based scientists have developed the software which is able to block five western intelligence agencies, using Hacienda software. This software identify most vulnerable servers across the world, controls them and uses them for own purposes.
A media report says that Hacienda is a port scanning programme, which searches the internet for systems which show potential vulnerabilities. Hacienda is being put into service by the “Five Eyes,” which is a federation of secret services by the US, Canada, the UK, Australia and New Zealand. Emmy Noether research group leader at the TUM Chair for Network Architectures and Services, Christian Grothoff, aid, “The goal is to identify as many servers as possible in other countries that can be distantly controlled.”
Grothoff and his team of students developed the “TCP Stealth” defence software which is able to obstruct identification of systems through Hacienda and several other cyber attack software. A user and a server get connected through Transmission Control Protocol (TCP). First the user’s computer needs to identify itself into a service by sending a data packet to the server. As told by Grothoff, “This is the user asking, ‘Are you there?’” Then the service answers user’s request and within this single response too adversaries can attack the computer.
The newly developed free software is based on a concept. A numbers exists which is only known by the client computer and the server. This number helps generate a secret token which gets transmitted without anyone’s notice when the initial connection is set up with the server. If the token is put in incorrect, then the system never answers back and the service is dead. Similar measures are already known but the new software’s protection capabilities are much higher, as told by the researchers.