SlideShare a Scribd company logo
1 of 24
digital demise A proposed net_art project by: robin turner_brad bennie_david pope_a modified dog
digital demise _the collaboration robin turner_a digital arts student responsible for_project co-ordination, design, research and programming brad bennie_a seasoned interactive designer Will be acting as a consultant programmer and Linux (server) expert david pope_is a programmer and web host he is our network specialist A modified dog_is an action script god that lives in online forums. he trouble shoots code issues, and makes rob feel inadequate
digital demise _conceptual statement This project aims to track the destruction caused by hackers in the digital domain. As hackers abuse my server, warehouse the hardrive and tamper with the system settings, their actions are monitored, retrieved and delivered to a remote web server where their secretive doings affect the graphic content of and are broadcast through a peripheral website.
digital demise _conceptual statement Whilst this project aims to satirize the nature of hackers (like a thief robbing from the Big Brother or Survivor set), it also deals with two other important key issues: It aims to document what could potentially be an undocumentable subject matter, as well as look at the nature of life or creativity and death in virtual space as a means of creating from destruction: In death and destruction, beauty and life (or creativity) may exist, for the life of the website is dependant on the death of the server… (a parallel metaphor to the parasitic nature of hackers)…
digital demise _conceptual statement Hackers like to make folders. They fill these folders with illegal software, cracks, porn, movies and mp3’s. They throw the odd virus in to boot. They leave notes and messages for each other in folder descriptors. They tinker with systems files, and the malicious ones aim to take hardware down. PC format once set up a brand new machine, took the security off, plugged it into the network, and promptly had to reformat it 19 seconds later.
digital demise _the components A server will be required. This will be the warehouse that the hacker will use to store uploaded files. David Pope had a server hacked… the hackers over shot his ADSL cap limit by 2 terabytes. They also installed virus’s which act like bots. These probe the server and alert the hacker if the machine is a potentially useable warehouse. Because this server will be designed to be destroyed (all securities and permissions will be laxed), the web site must be hosted on a second server, and the primary server must be totally isolated from any other network for security reasons. The components therefore will consist of a primary server, a secondary web server, a dynamic dns, and an uncapped ADSL line.
 
digital demise _the creative influences In 1995 Gregg Shaw tracked the amount of attempted hacks on his personal computer. Hacking Statistics  is the main feature of his website at the moment, providing various statistics, graphs and tables on unauthorised Internet access to his computer over the period of a year. http://www.btinternet.com/~shawweb/george/
digital demise _the technical influences I found inspiration in Golan Levin's “the dumpster project”. I like the way that the technology populates the website itself, that the website seems alive as it sends its little bots out to find and retrieve personal information, to feed itself.  Like the Dumpsters approach to documenting the similarities and differences between failed relationships, and allowing these to affect the look of the interface, I aim to document and track live hacker activity, and get them to create without them even knowing it.
 
digital demise _the technical influences I find I/O/D’s interface design of particular interest. Whilst I find their approach to web page interfacing of particular importance, I found myself particularly interested in the aesthetic of self generated imagery determined by the software. This is in line with my interpretation of code tracking, and the logging of this to affect the cosmetic qualities of objects (a web site in this case).
 
digital demise _aesthetics Because the site deals with destruction and creativity, and life and death, so the cosmetic or aesthetic approach to the layout of the site looks to mimic an obituary page in a newspaper. As the log file entries created by the server track and record activity (anything from the creation of new folders, to the tampering of security settings), they are presented as columns of obituary entries. The log files and paper clippings share common traits, such as dates, names, know activities, and possibly imagery) The document will search for keywords within the log entry, words such as error, will effect the colour of the entries movie clip, and add relevant phrases to the movie clip (such as: we will miss him dearly) Current thoughts around the presentation of the levels of activity. Automatic system entries will be white Non hazardous interactions (such as folder generation) will be green Semi hazardous entries will be red Total computer meltdown will be black
Phase 1:  - Determine the right operating system for the project.  This will be run on a Linux server – it is free (completed) - Locate Logs files. And find additional sniffer software that can track changes on the server. (completed) - Find a usable network. (completed) - Test the sniffer software. (completed) digital demise _the planning
Phase 2: - Get Flash to read the servers log files across a network  (intended completion by 18 October). - Get Flash to translate and organize the log files. (completed) - Design the site (in completion) - Test (see how long it takes for intrusion to occur) – Monday 22 October digital demise _the planning
Phase 3: - Launch the site (22 October) - post messages and invitations on forums and bulletins (22/23 October) digital demise _the planning
Phase 4: (or Plan B) Install a virus on the server. (lots of hackers use a form of virus to let them know that a server is attackable). A lot of these virus's are on a hacked server that I have access to. They could be used as bait. (24/25 October) Install screen grab software that periodically takes images of the live site over time, to document the activity. (1 November) digital demise _the planning
digital demise _the testing phase The server: the operating system must be installed and set up (Monday 15). This will be served on a Macintosh, which will run Linux). Ensure that the security privileges can be relaxed enough so that it is easily hackable – david pope and brad bennie will help in the setup phase. I will attempt to hack it. (Tuesday 16, Wednesday 17). The web page: test that the web page can in fact read or access the log files across the net. The website will be temporarily delivered over an intranet, this will also help tweak securities and privileges (Thursday 18).  The hackers: dry run the project online to see how many bites the server takes (Monday 22) The users: allow a selected group of users to test the interface, and gauge the strength of conceptual communication (Monday 15)
digital demise _the project so far
It has been suggested that the website adopt a tabbed interface so that users may select and view previous stages or versions of the system meltdown. I may have limited access to the kind of bandwidth required for a project of this nature, and so may only be able to track one ‘death’. There are numerous log files created by servers, each one tracks a different kind of activity. It may well be worth tabbing these so that users may view more than one kind of activity at a time, thus enabling users to browse the website as opposed to merely watching it. Obituaries sometimes include images of the deceased, and so it may be necessary to replace these images with the photographic content supplied by the hackers where they become associated with the relevant log entries. digital demise _where to from here?
Problem #1: The hackers won't come. Or at least, not on a continual basis. Not enough to note the changes in real time anyway. Proposed solution: 1. I post invitations on forums, and wait for them to take the bait. 2. I record the server changes and loop them back until new changes occur, and feed the new changes into the change loop. 3. I infest my machine with bait virus's 4. As the intention of this project is to document changes by true hacktivism, I suggest that the project run for longer than the intended project deadline, sothat the documentation may be meaningful instead of forced (provided I get to use an uncapped line for an unlimited period of time). digital demise _possible shortcomings
Problem #2: The hackers do come. And render my server totally unusable in 19 seconds. Proposed solution: Whilst I think this (or the documentation of this) might be an interesting piece of web art in it own right, I propose that restore points be initiated after the hardware shuts down. This will provide a clean slate. digital demise _possible shortcomings
Problem #3: David Pope (one of the collaborators) experienced hacking on a grand scale. 2 000 gigs worth of traffic went through his server, and he was held financially liable for the cost of this. Proposed solution: I may have limited (but sole) access to an uncapped line. Alternatively, I could purchase a prepaid amount of cap limit. However, the project documentation will end when this runs out. digital demise _possible shortcomings
Problem #4: Local bandwidth is not good enough for the enormous file sizes shifted by hackers. Proposed solution: If I am able to secure sole use of the uncapped line, this should not pose problems. Analyzing the content of the currently hacked server might indicate that enough hacking will occur to produce enough log file to change the graphic content on the secondary site. Alternatively, I could run a destructive virus, and although we would lose the live hacking, viewers will still be able to watch the digital demise. digital demise _possible shortcomings

More Related Content

What's hot

_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 AssignmentLaura Aviles
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014grecsl
 

What's hot (7)

Confidence web
Confidence webConfidence web
Confidence web
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 

Viewers also liked

English Ad(3)
English Ad(3)English Ad(3)
English Ad(3)Aiden Yeh
 
Presentation School English
Presentation School EnglishPresentation School English
Presentation School EnglishJohn Gartland
 
Sexism at the Heart of the Police
Sexism at the Heart of the PoliceSexism at the Heart of the Police
Sexism at the Heart of the PoliceNations11
 
Pressupost 2008 Barcelona
Pressupost 2008 BarcelonaPressupost 2008 Barcelona
Pressupost 2008 Barcelonapilarpifarre
 
Reverse Sensitivity
Reverse SensitivityReverse Sensitivity
Reverse Sensitivitynzde
 
Milagros de la naturaleza
Milagros de la naturalezaMilagros de la naturaleza
Milagros de la naturalezaguest78269f
 
Milagrosdelanaturaleza
MilagrosdelanaturalezaMilagrosdelanaturaleza
Milagrosdelanaturalezaguest78269f
 
La Cultura Y La Practica De La Mediacion En La Educacion 2 Mariacarmeboque
La Cultura Y La Practica De La Mediacion En La Educacion 2 MariacarmeboqueLa Cultura Y La Practica De La Mediacion En La Educacion 2 Mariacarmeboque
La Cultura Y La Practica De La Mediacion En La Educacion 2 MariacarmeboqueAssessoria Àmbit Lingüístic
 
Second Life Libraries
Second Life LibrariesSecond Life Libraries
Second Life LibrariesJames Barrett
 

Viewers also liked (20)

Fabuladistinta
FabuladistintaFabuladistinta
Fabuladistinta
 
Metisse
MetisseMetisse
Metisse
 
Bulgakoff
BulgakoffBulgakoff
Bulgakoff
 
Heroes
HeroesHeroes
Heroes
 
Bulg
BulgBulg
Bulg
 
English Ad(3)
English Ad(3)English Ad(3)
English Ad(3)
 
Edward
EdwardEdward
Edward
 
Bulg
BulgBulg
Bulg
 
Presentation School English
Presentation School EnglishPresentation School English
Presentation School English
 
Edward
EdwardEdward
Edward
 
Sexism at the Heart of the Police
Sexism at the Heart of the PoliceSexism at the Heart of the Police
Sexism at the Heart of the Police
 
Pressupost 2008 Barcelona
Pressupost 2008 BarcelonaPressupost 2008 Barcelona
Pressupost 2008 Barcelona
 
Reverse Sensitivity
Reverse SensitivityReverse Sensitivity
Reverse Sensitivity
 
Milagros de la naturaleza
Milagros de la naturalezaMilagros de la naturaleza
Milagros de la naturaleza
 
Morning Time
Morning TimeMorning Time
Morning Time
 
Milagrosdelanaturaleza
MilagrosdelanaturalezaMilagrosdelanaturaleza
Milagrosdelanaturaleza
 
Stomachin
StomachinStomachin
Stomachin
 
"La Clase Conectada"
"La Clase Conectada""La Clase Conectada"
"La Clase Conectada"
 
La Cultura Y La Practica De La Mediacion En La Educacion 2 Mariacarmeboque
La Cultura Y La Practica De La Mediacion En La Educacion 2 MariacarmeboqueLa Cultura Y La Practica De La Mediacion En La Educacion 2 Mariacarmeboque
La Cultura Y La Practica De La Mediacion En La Educacion 2 Mariacarmeboque
 
Second Life Libraries
Second Life LibrariesSecond Life Libraries
Second Life Libraries
 

Similar to Digital demise net_art project tracks server destruction

The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityMario Heiderich
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primeramiable_indian
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)Wail Hassan
 
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...Paris Open Source Summit
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryonePaul Melson
 
Owning bad guys {and mafia} with javascript botnets
Owning bad guys {and mafia} with javascript botnetsOwning bad guys {and mafia} with javascript botnets
Owning bad guys {and mafia} with javascript botnetsChema Alonso
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
React Conf 17 Recap
React Conf 17 RecapReact Conf 17 Recap
React Conf 17 RecapAlex Babkov
 
Wrath of Ransomware_Longinus Timochenco
Wrath of Ransomware_Longinus TimochencoWrath of Ransomware_Longinus Timochenco
Wrath of Ransomware_Longinus TimochencoLonginus Timochenco
 
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityCS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityRick Patterson
 
project_proposal_osrf
project_proposal_osrfproject_proposal_osrf
project_proposal_osrfom1234567890
 
Offline Webapps
Offline Webapps Offline Webapps
Offline Webapps mnitchie
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big DataFrank Denis
 

Similar to Digital demise net_art project tracks server destruction (20)

The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
 
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...
EOLE / OWF 12 - The affero gp lv3. why it exists and who it's for - bradley m...
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
Owning bad guys {and mafia} with javascript botnets
Owning bad guys {and mafia} with javascript botnetsOwning bad guys {and mafia} with javascript botnets
Owning bad guys {and mafia} with javascript botnets
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Spiffy Spyware Stuff
Spiffy Spyware StuffSpiffy Spyware Stuff
Spiffy Spyware Stuff
 
React Conf 17 Recap
React Conf 17 RecapReact Conf 17 Recap
React Conf 17 Recap
 
Wrath of Ransomware_Longinus Timochenco
Wrath of Ransomware_Longinus TimochencoWrath of Ransomware_Longinus Timochenco
Wrath of Ransomware_Longinus Timochenco
 
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityCS155 Computer Security at Stanford University
CS155 Computer Security at Stanford University
 
project_proposal_osrf
project_proposal_osrfproject_proposal_osrf
project_proposal_osrf
 
Fireshark - Brucon 2010
Fireshark - Brucon 2010Fireshark - Brucon 2010
Fireshark - Brucon 2010
 
Offline Webapps
Offline Webapps Offline Webapps
Offline Webapps
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big Data
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Digital demise net_art project tracks server destruction

  • 1. digital demise A proposed net_art project by: robin turner_brad bennie_david pope_a modified dog
  • 2. digital demise _the collaboration robin turner_a digital arts student responsible for_project co-ordination, design, research and programming brad bennie_a seasoned interactive designer Will be acting as a consultant programmer and Linux (server) expert david pope_is a programmer and web host he is our network specialist A modified dog_is an action script god that lives in online forums. he trouble shoots code issues, and makes rob feel inadequate
  • 3. digital demise _conceptual statement This project aims to track the destruction caused by hackers in the digital domain. As hackers abuse my server, warehouse the hardrive and tamper with the system settings, their actions are monitored, retrieved and delivered to a remote web server where their secretive doings affect the graphic content of and are broadcast through a peripheral website.
  • 4. digital demise _conceptual statement Whilst this project aims to satirize the nature of hackers (like a thief robbing from the Big Brother or Survivor set), it also deals with two other important key issues: It aims to document what could potentially be an undocumentable subject matter, as well as look at the nature of life or creativity and death in virtual space as a means of creating from destruction: In death and destruction, beauty and life (or creativity) may exist, for the life of the website is dependant on the death of the server… (a parallel metaphor to the parasitic nature of hackers)…
  • 5. digital demise _conceptual statement Hackers like to make folders. They fill these folders with illegal software, cracks, porn, movies and mp3’s. They throw the odd virus in to boot. They leave notes and messages for each other in folder descriptors. They tinker with systems files, and the malicious ones aim to take hardware down. PC format once set up a brand new machine, took the security off, plugged it into the network, and promptly had to reformat it 19 seconds later.
  • 6. digital demise _the components A server will be required. This will be the warehouse that the hacker will use to store uploaded files. David Pope had a server hacked… the hackers over shot his ADSL cap limit by 2 terabytes. They also installed virus’s which act like bots. These probe the server and alert the hacker if the machine is a potentially useable warehouse. Because this server will be designed to be destroyed (all securities and permissions will be laxed), the web site must be hosted on a second server, and the primary server must be totally isolated from any other network for security reasons. The components therefore will consist of a primary server, a secondary web server, a dynamic dns, and an uncapped ADSL line.
  • 7.  
  • 8. digital demise _the creative influences In 1995 Gregg Shaw tracked the amount of attempted hacks on his personal computer. Hacking Statistics is the main feature of his website at the moment, providing various statistics, graphs and tables on unauthorised Internet access to his computer over the period of a year. http://www.btinternet.com/~shawweb/george/
  • 9. digital demise _the technical influences I found inspiration in Golan Levin's “the dumpster project”. I like the way that the technology populates the website itself, that the website seems alive as it sends its little bots out to find and retrieve personal information, to feed itself. Like the Dumpsters approach to documenting the similarities and differences between failed relationships, and allowing these to affect the look of the interface, I aim to document and track live hacker activity, and get them to create without them even knowing it.
  • 10.  
  • 11. digital demise _the technical influences I find I/O/D’s interface design of particular interest. Whilst I find their approach to web page interfacing of particular importance, I found myself particularly interested in the aesthetic of self generated imagery determined by the software. This is in line with my interpretation of code tracking, and the logging of this to affect the cosmetic qualities of objects (a web site in this case).
  • 12.  
  • 13. digital demise _aesthetics Because the site deals with destruction and creativity, and life and death, so the cosmetic or aesthetic approach to the layout of the site looks to mimic an obituary page in a newspaper. As the log file entries created by the server track and record activity (anything from the creation of new folders, to the tampering of security settings), they are presented as columns of obituary entries. The log files and paper clippings share common traits, such as dates, names, know activities, and possibly imagery) The document will search for keywords within the log entry, words such as error, will effect the colour of the entries movie clip, and add relevant phrases to the movie clip (such as: we will miss him dearly) Current thoughts around the presentation of the levels of activity. Automatic system entries will be white Non hazardous interactions (such as folder generation) will be green Semi hazardous entries will be red Total computer meltdown will be black
  • 14. Phase 1: - Determine the right operating system for the project. This will be run on a Linux server – it is free (completed) - Locate Logs files. And find additional sniffer software that can track changes on the server. (completed) - Find a usable network. (completed) - Test the sniffer software. (completed) digital demise _the planning
  • 15. Phase 2: - Get Flash to read the servers log files across a network (intended completion by 18 October). - Get Flash to translate and organize the log files. (completed) - Design the site (in completion) - Test (see how long it takes for intrusion to occur) – Monday 22 October digital demise _the planning
  • 16. Phase 3: - Launch the site (22 October) - post messages and invitations on forums and bulletins (22/23 October) digital demise _the planning
  • 17. Phase 4: (or Plan B) Install a virus on the server. (lots of hackers use a form of virus to let them know that a server is attackable). A lot of these virus's are on a hacked server that I have access to. They could be used as bait. (24/25 October) Install screen grab software that periodically takes images of the live site over time, to document the activity. (1 November) digital demise _the planning
  • 18. digital demise _the testing phase The server: the operating system must be installed and set up (Monday 15). This will be served on a Macintosh, which will run Linux). Ensure that the security privileges can be relaxed enough so that it is easily hackable – david pope and brad bennie will help in the setup phase. I will attempt to hack it. (Tuesday 16, Wednesday 17). The web page: test that the web page can in fact read or access the log files across the net. The website will be temporarily delivered over an intranet, this will also help tweak securities and privileges (Thursday 18). The hackers: dry run the project online to see how many bites the server takes (Monday 22) The users: allow a selected group of users to test the interface, and gauge the strength of conceptual communication (Monday 15)
  • 19. digital demise _the project so far
  • 20. It has been suggested that the website adopt a tabbed interface so that users may select and view previous stages or versions of the system meltdown. I may have limited access to the kind of bandwidth required for a project of this nature, and so may only be able to track one ‘death’. There are numerous log files created by servers, each one tracks a different kind of activity. It may well be worth tabbing these so that users may view more than one kind of activity at a time, thus enabling users to browse the website as opposed to merely watching it. Obituaries sometimes include images of the deceased, and so it may be necessary to replace these images with the photographic content supplied by the hackers where they become associated with the relevant log entries. digital demise _where to from here?
  • 21. Problem #1: The hackers won't come. Or at least, not on a continual basis. Not enough to note the changes in real time anyway. Proposed solution: 1. I post invitations on forums, and wait for them to take the bait. 2. I record the server changes and loop them back until new changes occur, and feed the new changes into the change loop. 3. I infest my machine with bait virus's 4. As the intention of this project is to document changes by true hacktivism, I suggest that the project run for longer than the intended project deadline, sothat the documentation may be meaningful instead of forced (provided I get to use an uncapped line for an unlimited period of time). digital demise _possible shortcomings
  • 22. Problem #2: The hackers do come. And render my server totally unusable in 19 seconds. Proposed solution: Whilst I think this (or the documentation of this) might be an interesting piece of web art in it own right, I propose that restore points be initiated after the hardware shuts down. This will provide a clean slate. digital demise _possible shortcomings
  • 23. Problem #3: David Pope (one of the collaborators) experienced hacking on a grand scale. 2 000 gigs worth of traffic went through his server, and he was held financially liable for the cost of this. Proposed solution: I may have limited (but sole) access to an uncapped line. Alternatively, I could purchase a prepaid amount of cap limit. However, the project documentation will end when this runs out. digital demise _possible shortcomings
  • 24. Problem #4: Local bandwidth is not good enough for the enormous file sizes shifted by hackers. Proposed solution: If I am able to secure sole use of the uncapped line, this should not pose problems. Analyzing the content of the currently hacked server might indicate that enough hacking will occur to produce enough log file to change the graphic content on the secondary site. Alternatively, I could run a destructive virus, and although we would lose the live hacking, viewers will still be able to watch the digital demise. digital demise _possible shortcomings