Contagion - Destruction of Yamato
Posted: 2003-12-15 05:24pm
When the Yamato is destroyed, as the saucer flys away it looks like there's NDF effects that eat away at much of the dorsal saucer. What would cause such an effect?
Get your fill of sci-fi, science, and mockery of stupid ideas
https://bbs.stardestroyer.net/
..A single computer that runs alien software with full permissions. That is to say, a massive, glaring, suicidal flaw.Alyeska wrote:This is nothing more then the problem of opperating the entire ships running systems off a single computer.
I think the 'new' cylons would have fun with that flaw.SirNitram wrote:..A single computer that runs alien software with full permissions. That is to say, a massive, glaring, suicidal flaw.Alyeska wrote:This is nothing more then the problem of opperating the entire ships running systems off a single computer.
It did nothing of the sort. Do you know what a virus is? It subverts the system. While its bad that the computer system runs everything, it doesn't change the fact that whatever interfaced with the Iconian probe would become infected because of a virus, not that the computers give permission. The Romulan ship had similar problems.SirNitram wrote:..A single computer that runs alien software with full permissions. That is to say, a massive, glaring, suicidal flaw.Alyeska wrote:This is nothing more then the problem of opperating the entire ships running systems off a single computer.
Alyeska, please. I know what a virus is, and I know how they work. They cannot work unless executed, they will generally fail if they lack the permissions to do their dirty work. Anything that interfaces with the Probe would be exposed to the virus, just like I get exposed to a virus that someone E-mails me as an attachment. However, I, unlike the Yamato, can choose many options.Alyeska wrote:It did nothing of the sort. Do you know what a virus is? It subverts the system. While its bad that the computer system runs everything, it doesn't change the fact that whatever interfaced with the Iconian probe would become infected because of a virus, not that the computers give permission. The Romulan ship had similar problems.SirNitram wrote:..A single computer that runs alien software with full permissions. That is to say, a massive, glaring, suicidal flaw.Alyeska wrote:This is nothing more then the problem of opperating the entire ships running systems off a single computer.
Then we're looking at a focused, tightbeam form of data transmission. This does remove Option 1(Cut the connection), but does not remove the other two layers. Look, blame the writers if you wish, but the Galaxy Class, and apparently many Trek ships(By the Romulan troubles), have shit for computing security. By shit, I mean worse than modern computers.Alyeska wrote:Thank (or hate) the writers for this. The probe infected the Yamato by firing a beam at it. The Iconian Gateway also did this to Data IIRC. This was some sort of transmission beam, but it wasn't something the Yamato could avoid. The Romulans were listening in and managed to get infected as well IIRC.
Alyeska, you are forgetting that the ship transmitted this virus to the Enterprise as well as a Romulan Warbird by sending messages to them. No direct beam was necessary for those two other victims. This means that executable code in messages is automatically executed by the computer systems of both the Romulans and the Federation.Alyeska wrote:Thank (or hate) the writers for this. The probe infected the Yamato by firing a beam at it. The Iconian Gateway also did this to Data IIRC. This was some sort of transmission beam, but it wasn't something the Yamato could avoid. The Romulans were listening in and managed to get infected as well IIRC.
What difference does it make whether they suspect anything? There is no conceivable reason for the computer to auto-execute code found in a message log! They shouldn't have to enact special precautions against something which should not be allowed by the software in the first place!Alyeska wrote:You have to look at the situation that these transmissions occured. The Yamato captain thought there was a design flaw in that ship causing ot to go haywire. He was correct to a degree, but didn't realize a virus was destroying his system. When he contacted the Enterprise he had no reason to suspect he would infect them. Furthermore Picard had no reason to suspect he would recieve a virus from the Yamato. Its likely there is more information exchanged in communications then what we know about and the virus rode along. As for the Romulan ship. They were intercepting the communications and had no reason to suspect that communication between two Galaxy class ships would give them a virus.
That is what allows the virus to propagate through every system and become a potentially lethal problem, but it is not what allows initial infection.The single biggest problem in this episode is the central computer systems controling every aspect of both the Galaxy class and D'Deridex.
If it came with executable code embedded in it, then yes. I'm not an idiot, and messages are supposed to be just that: messages. Moreover, my mail client is not designed to auto-execute such code.Alyeska wrote:Mike, if you recieved an e-mail from a friend who appeared to have hardware problems, would you be suspect that his e-mail might have a virus?
Wrong. You can examine data without executing it. Virus scanners do this as part of their basic function, Alyeska. In fact, that E-mail virus probably passed through several routers as well as at least one spam filter and two mail servers before it reached my computer, all of which do at least some form of inspection.Its obvious that more data is transmitted in communications then just the message itself. What this means is that a level of data exchange must occur and this information would be automaticaly examined. This means activating the information. That triggers the virus.
Of course it's a huge problem. I'm just pointing out that your excuses for the original infection don't wash.And as for the single computer running everything. That is a big problem because it doesn't take into account the need for critical systems to be kept different. Shields, M/AM control, weapons, life support. They should all be run on isolated systems. Yet they weren't and this is the singlest biggest problem.
Analogies with current IT are always risky IMHO, but if the attack was analogous to a buffer overrun exploit, that would let the fundamental design (but not the implementation) of Rom and Fed systems off the hook.Darth Wong wrote: This means that executable code in messages is automatically executed by the computer systems of both the Romulans and the Federation.
They have what, seven separate "safety interlocks", whatever they are, to protect life support. I doubt that a system that is just as critical as the life support would be given virtually no protection.Actually, this sounds more like a worm. I guess Starfleet computers don't have firewalls.
Explain how the E-D and the Warbird got infected, then.Matt Huang wrote:They have what, seven separate "safety interlocks", whatever they are, to protect life support. I doubt that a system that is just as critical as the life support would be given virtually no protection.Actually, this sounds more like a worm. I guess Starfleet computers don't have firewalls.
Personally, I think that the transfer mechanism (the beam) was able to write directly onto the computer core (maybe using a variant of transporter tech?), bypassing the ST equivalent of firewalls (relatively crude analogy: if I want to wipe your hard drive, I could try to take over your computer and make it overwrite your hard drive with random data via your internet connection, or I could just hit your computer with an EMP).
The prefix code system —the wide-open back door.Uraniun235 wrote:My guess (aside from horrible security design) would be the almighty prefix codes.