Sunday, September 28, 2008

LIFE HISTORY OF FUNGI

Fungi exist primarily as filamentous dikaryotic organisms.
As part of their life cycle, fungi produce spores. In this electron micrograph of a mushroom gill, the four spores produced by meiosis (seen in the center of this picture) are carried on a clublike sporangium (visible to the left and right). From these spores, haploid hyphae grow and ramify, and may give rise to asexual sporangia, special hyphae which produce spores without meiosis.

The sexual phase is begun when haploid hyphae from two different fungal organisms meet and fuse. When this occurs, the cytoplasm from the two cells fuses, but the nuclei remain separate and distinct. The single hypha produced by fusion typically has two nuclei per "cell", and is known as a dikaryon, meaning "two nuclei". The dikaryon may live and grow for years, and some are thought to be many centuries old. Eventually, the dikaryon forms sexual sporangia in which the nuclei fuse into one, which then undergoes meiosis to form haploid spores, and the cycle is repeated.

Some fungi, especially the chytrids and zygomycetes, have a life cycle more like that found in many protists. The organism is haploid, and has no diploid phase, except for the sexual sporangium. A number of fungi have lost the capacity for sexual reproduction, and reproduce by asexual spores or by vegetative growth only. These fungi are referred to as Fungi Imperfecti, and include, among other members, the athlete's foot and the fungus in bleu cheese. Other fungi, such as the yeasts, primarily reproduce through asexual fission, or by fragmentation -- breaking apart, with each of the pieces growing into a new organism.


--------------------------------------------------------------------------------


Fungi are heterotrophic.
Fungi are not able to ingest their food like animals do, nor can they manufacture their own food the way plants do. Instead, fungi feed by absorption of nutrients from the environment around them. They accomplish this by growing through and within the substrate on which they are feeding. Numerous hyphae network through the wood, cheese, soil, or flesh from which they are growing. The hyphae secrete digestive enzymes which break down the substrate, making it easier for the fungus to absorb the nutrients which the substrate contains.

This filamentous growth means that the fungus is in intimate contact with its surroundings; it has a very large surface area compared to its volume. While this makes diffusion of nutrients into the hyphae easier, it also makes the fungus susceptible to dessication and ion imbalance. But usually this is not a problem, since the fungus is growing within a moist substrate.

Most fungi are saprophytes, feeding on dead or decaying material. This helps to remove leaf litter and other debris that would otherwise accumulate on the ground. Nutrients absorbed by the fungus then become available for other organisms which may eat fungi. A very few fungi actively capture prey, such as Arthrobotrys which snares nematodes on which it feeds. Many fungi are parastitic, feeding on living organisms without killing them. Ergot, corn smut, Dutch elm disease, and ringworm are all diseases caused by parasitic fungi.


--------------------------------------------------------------------------------


Mycorrhizae are a symbiotic relationship between fungi and plants.
Most plants rely on a symbiotic fungus to aid them in acquiring water and nutrients from the soil. The specialized roots which the plants grow and the fungus which inhabits them are together known as mycorrhizae, or "fungal roots". The fungus, with its large surface area, is able to soak up water and nutrients over a large area and provide them to the plant. In return, the plant provides energy-rich sugars manufactured through photosynthesis. Examples of mycorrhizal fungi include truffles and Auricularia, the mushroom which flavors sweet-and-sour soup.

In some cases, such as the vanilla orchid and many other orchids, the young plant cannot establish itself at all without the aid of its fungal partner. In liverworts, mosses, lycophytes, ferns, conifers, and flowering plants, fungi form a symbiotic relationship with the plant. Because mycorrhizal associations are found in so many plants, it is thought that they may have been an essential element in the transition of plants onto the land.

WAT IS BACTERIA

Bacteria are microscopic organisms whose single cells have neither a membrane-bounded nucleus nor other membrane-bounded organelles like mitochondria and chloroplasts. Another group of microbes, the archaea, meet these criteria but are so different from the bacteria in other ways that they must have had a long, independent evolutionary history since close to the dawn of life. In fact, there is considerable evidence that you are more closely related to the archaea than they are to the bacteria!

FUNGI

Introduction to the Fungi
Of athlete's foot, champignons, and beer. . .

The Kingdom Fungi includes some of the most important organisms, both in terms of their ecological and economic roles. By breaking down dead organic material, they continue the cycle of nutrients through ecosystems. In addition, most vascular plants could not grow without the symbiotic fungi, or mycorrhizae, that inhabit their roots and supply essential nutrients. Other fungi provide numerous drugs (such as penicillin and other antibiotics), foods like mushrooms, truffles and morels, and the bubbles in bread, champagne, and beer.

Fungi also cause a number of plant and animal diseases: in humans, ringworm, athlete's foot, and several more serious diseases are caused by fungi. Because fungi are more chemically and genetically similar to animals than other organisms, this makes fungal diseases very difficult to treat. Plant diseases caused by fungi include rusts, smuts, and leaf, root, and stem rots, and may cause severe damage to crops. However, a number of fungi, in particular the yeasts, are important "model organisms" for studying problems in genetics and molecular biology.

BACTERIA

Bacteria are often maligned as the causes of human and animal disease (like this one, Leptospira, which causes serious disease in livestock). However, certain bacteria, the actinomycetes, produce antibiotics such as streptomycin and nocardicin; others live symbiotically in the guts of animals (including humans) or elsewhere in their bodies, or on the roots of certain plants, converting nitrogen into a usable form. Bacteria put the tang in yogurt and the sour in sourdough bread; bacteria help to break down dead organic matter; bacteria make up the base of the food web in many environments. Bacteria are of such immense importance because of their extreme flexibility, capacity for rapid growth and reproduction, and great age - the oldest fossils known, nearly 3.5 billion years old, are fossils of bacteria-like organisms.

WORM

A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they replicate, and often carry payloads that do considerable damage. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.

A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server. "Wired" magazine took a fascinating look inside Slammer's tiny (376 byte) program.

Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately nine hours on July 19, 2001 [Source: Rhodes].

The Code Red worm slowed down Internet traffic when it began to replicate itself, but not nearly as badly as predicted. Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that did not have the Microsoft security patch installed. Each time it found an unsecured server, the worm copied itself to that server. The new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.

The Code Red worm had instructions to do three things:

Replicate itself for the first 20 days of each month
Replace Web pages on infected servers with a page featuring the message "Hacked by Chinese"
Launch a concerted attack on the White House Web site in an attempt to overwhelm it [Source: eEye Digital Security]
Upon successful infection, Code Red would wait for the appointed hour and connect to the www.whitehouse.gov domain. This attack would consist of the infected systems simultaneously sending 100 connections to port 80 of www.whitehouse.gov (198.137.240.91).

The U.S. government changed the IP address of www.whitehouse.gov to circumvent that particular threat from the worm and issued a general warning about the worm, advising users of Windows NT or Windows 2000 Web servers to make sure they installed the security patch. .

Reported Viruses
According to a report by Symantec published in September 2007, the company received more than 212,000 reports of viruses, worms and other threats during the first half of 2007, a 185% increase over the second half of 2006.

A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm uses social engineering techniques to trick users into loading the worm on their computers. So far, it's working -- experts believe between one million and 50 million computers have been infected [source: Schneier].

When the worm is launched, it opens a back door into the computer, adds the infected machine to a botnet and installs code that hides itself. The botnets are small peer-to-peer groups rather than a larger, more easily identified network. Experts think the people controlling Storm rent out their micro-botnets to deliver spam or adware, or for denial-of-service attacks on Web sites.

In the next section, we'll look at patching your system and other things you can do to protect your computer

VIRUS HISTORY

Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. The first factor was the spread of personal computers (PCs). Prior to the 1980s, home computers were nearly non-existent or they were toys. Real computers were rare, and they were locked away for use by "experts." During the 1980s, real computers started to spread to businesses and homes because of the popularity of the IBM PC (released in 1982) and the Apple Macintosh (released in 1984). By the late 1980s, PCs were widespread in businesses, homes and college campuses.
The second factor was the use of computer bulletin boards. People could dial up a bulletin board with a modem and download programs of all types. Games were extremely popular, and so were simple word processors, spreadsheets and other productivity software. Bulletin boards led to the precursor of the virus known as the Trojan horse. A Trojan horse is a program with a cool-sounding name and description. So you download it. When you run the program, however, it does something uncool like erasing your disk. You think you are getting a neat game, but it wipes out your system. Trojan horses only hit a small number of people because they are quickly discovered, the infected programs are removed and word of the danger spreads among users.
Floppy disks were factors in the spread of computer viruses.
The third factor that led to the creation of viruses was the floppy disk. In the 1980s, programs were small, and you could fit the entire operating system, a few programs and some documents onto a floppy disk or two. Many computers did not have hard disks, so when you turned on your machine it would load the operating system and everything else from the floppy disk. Virus authors took advantage of this to create the first self-replicating programs.Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from a bulletin board and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. When the user runs the legitimate program, the virus loads itself into memory­ and looks around to see if it can find any other programs on the disk. If it can find one, it modifies the program to add the virus's code into the program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time the user launches either of those programs, they infect other programs, and the cycle continues.
If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to a bulletin board, then other programs get infected. This is how the virus spreads.
The spreading part is the infection phase of the virus. Viruses wouldn't be so violently despised if all they did was replicate themselves. Most viruses also have a destructive attack phase where they do damage. Some sort of trigger will activate the attack phase, and the virus will then do something -- anything from printing a silly message on the screen to erasing all of your data. The trigger might be a specific date, the number of times the virus has been replicated or something similar.
In the next section, we will look at how viruses have evolved over the years.

CYBERCRIME

Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware