Internet Research Task Force,
Anti-Spam Research Group,
I have an idea to defend computers from botnets to reduce spam. On a computer
security topic, what do you think about the idea of utilizing one or more P2P
DHT's and the hashes of each file, or each important file, on computers? Based
upon the hardware specifications, platform, compiler, and compiler version, the
hashes of compiled item or downloaded binary items can be compared to the
hashes of the files on other Linux servers. That is an example of how P2P
technologies can enhance Linux servers.
Another security procedure, extending from that one, could be to remove the
disks, the hard drives, from computers, periodically, and to scan the file
systems and other disk sectors, using other computing devices, to obtain the
hashes of each file and to then utilize some resource, e.g. a P2P DHT, to
compare the hashes of those files to the hashes of the files on other computers.
Kind regards,
Adam Sobieski
_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg