To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

"Softwar - La Guerre Douce" (in English "Sotfwar, the soft war") is a technothriller novel by Thierry Breton and Denis Baldwin-Beneich published 1984 in French[1] and translated in 10 languages.[2] The English version was published in 1986.[3] The story is about the use of computer viruses and tampered hardware for spying and sabotage by both US and Russian governments. This international bestseller[4] made a larger non-technical public aware of IT security challenges and was therefore referred to in introductory books on that subject,.[5][6]

YouTube Encyclopedic

  • 1/1
    Views:
    905
  • Ethics 2014 | George Lucas: Cyber Hacktivism and 'Soft' War

Transcription

Plot summary

The main characters of the novel are Bredan and Ioulia. Bredan is an American professor at the MIT in the field of Information Technology, who was hired by the NSA, in the book the "National Software Agency". Ioulia is a Russian software engineer who happened to be his student in the 80's.

The story starts with France selling to the USSR a meteorological Cray-1 system and the related software. At the occasion of an inspection for export control, NSA agents implement a secret software bomb. The system later breaks down on the exact day of an official visit of the Russian authorities, but mysteriously works again the day after without any repair. Ioulia and her assistant discover that some additional software instructions set the computer out of order when it processes some specific meteorological data related to the Saint-Thomas Island in the US Virgin Islands.

When Ioulia later inspects a second computing system imported from the West, she identifies that there are several abnormalities. Not on the American computer this time, but on the peripheral computers which are of Russian origin. She finds out that all the Russian computers happened to be physically tampered with the installation of an additional processing unit made of a Zilog Z80 microprocessor and two ROMs. When this unit detects the code word "VENIK" at a specific address of the computer's random access memory, it erases everything and blocks the computer.

Ioulia finally understand that the goal of the additional component is to allow the central government to shut down any activity (transports, power plants, industry, ...) that is controlled by the Russian computers in the remote regions, in order to serve as a mean to pressure the local government in case of political or military troubles.

Mikhail Gorbachev, who's not yet president, sends Ioulia to Geneva to publicly condemn the American software bomb at an international summit. Brendan, her ex-lover and professor is instructed to discourage her making these revelations. When both meet, Ioulia tells Brendan about her discovery and asks him to disclose the Russian undertaking to the press, so to force her government to withdraw their control system.

See also

References

This article was translated from the French Wikipedia article Softwar.

  1. ^ Denis., Beneich (1984). Softwar : roman. R. Laffont. ISBN 2221044266. OCLC 11601037.
  2. ^ Roussel, Frédérique (2006-02-23). "Thierry Breton, intelligence artificielle" [Thierry Breton, artificial intelligence]. Libération.fr (in French). Libération. Retrieved 2019-10-19.
  3. ^ Thierry, Breton; Baldwin-Beneich, Denis (1986). Softwar. Holt, Rinehart & Winston. ISBN 9780030049989. OCLC 12262044.
  4. ^ Bouquet, Tim; Ousey, Byron (2009). Cold Steel: Lakshmi Mittal and the Multi-Billion-Dollar Battle for a Global Empire. Hachette UK. ISBN 9780748111763.
  5. ^ Russell, Deborah. (1991). Computer security basics. Gangemi, G. T. ([Rev. ed.] ed.). Sebastopol, CA: O'Reilly & Associates. p. 85. ISBN 1565928784. OCLC 44958507.
  6. ^ Kovacich, Gerald L. (2000). High-technology-crime investigator's handbook : working in the global information environment. Boni, William C. Boston: Butterworth-Heinemann. pp. 273. ISBN 075067086X. OCLC 41090895.
This page was last edited on 27 September 2023, at 17:04
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.