1 min read

A New Free Software Has Been Developed By German Scientists To Prevent Cyber Attacks!

Five western intelligence agencies, using Hacienda software, will now be blocked by a new software, which enables connection between user and server through a secret token and invisible transmission of information.

download (1) A New Software Developed To  Prevent Cyber Attacks by  German scientists. Technische  Universitat Munchen (TUM)  based scientists have  developed the software which  is able to block five western  intelligence agencies, using  Hacienda software. This  software identify most vulnerable servers across the world, controls them and uses them for own purposes.

A media report says that Hacienda is a port scanning programme, which searches the internet for systems which show potential vulnerabilities. Hacienda is being put into service by the “Five Eyes,” which is a federation of secret services by the US, Canada, the UK, Australia and New Zealand. Emmy Noether research group leader at the TUM Chair for Network Architectures and Services, Christian Grothoff, aid, “The goal is to identify as many servers as possible in other countries that can be distantly controlled.”

Grothoff and his team of students developed the “TCP Stealth” defence software which is able to obstruct identification of systems through Hacienda and several other cyber attack software. A user and a server get connected through Transmission Control Protocol (TCP). First the user’s computer needs to identify itself into a service by sending a data packet to the server. As told by Grothoff, “This is the user asking, ‘Are you there?’” Then the service answers user’s request and within this single response too adversaries can attack the computer.

download The newly developed free  software is based on a concept. A  numbers exists which is only  known by the client computer  and the server. This number  helps generate a secret token  which gets transmitted without  anyone’s notice when the initial  connection is set up with the  server. If the token is put in  incorrect, then the system never answers back and the service is dead. Similar measures are already known but the new software’s protection capabilities are much higher, as told by the researchers.

Leave a Reply