This is a very simple. Will be significantly fewer or disappear computer viruses and reduce the space for hackers. This solution will be beneficial for everybody. The average user will not live in fear that his/her computer is infected, system administrators will have less conerns with the strange behaviour of user equipment and servers and companies which are focused on ICT Security will be able to concentrate on real security threats and evaluting who and when did what.
    
    Solution?
Definition and adherence to the basic rules.

    Law no. 1 - Checksums must be always the same
    Law no. 2 - The network shall enable checksum verification
    Law no. 3 - The operating system has to verify the checksum

 

Checksums of file on the user's device = Checksums of file issued by author SW

 

 

The Three Laws of Cyber Security

Control Server

The principle of verification

kontrola has24