Skip to main content

Your Average Ten-Year-Old's To-Do List: Do Homework, Practice the Piano, Build a Trojan Horse Virus

You keep hearing about the dangers of the Internet - nastiest with names like my Doom and Autorun.ini are supposed to be waiting for you to make one misstep on the Internet, and they latch onto you, to make a nuisance of themselves. Sure, we've all had an infection or two that sometimes the antivirus software that we paid top dollar for did not take care of, but if you do get infected, how bad can it be? Sure, Trojan horse virus infections can in theory the vacuum your bank accounts dry and all, but those things never seem to actually happen, do they? The companies that make antivirus software would have to correct you on that one. They have been to China, to Eastern Europe, to Russia, places where hacking and virus-making skills seem to be taught on the schoolyard, passed from friend to friend. And they are all after stealing your data, for pocket money. If they were to steal your credit card information and use it, wouldn't they get arrested or something? It really is very difficult after all, to do these things and still remain completely untraceable.

Well, here's the thing, this schoolyard rivalry in creating the best Trojan horse virus and stealing the most financial information from half a world away, does not directly get them any money. They don't directly go home and start stealing from everyone. They just sell the passwords gained, to criminal gangs who have the means to do their work anonymously. We just get to hear how attacks from China have caused this or that instance of theft or crisis; we get no farther, such as with an identifiable name. Consider the huge outcry we have been having for some time now over how Gmail accounts in China were hacked, and how the hackers got in into Google's main source code back in the US, and stole it or altered it. We don't ever get to hear what particular person it came from.

To young people, this has become the new videogame affliction of their generation. And just as there are gamers' forums and contests and conferences, hackers have them too. There is even a magazine called Hacker X-Files; as a subscriber, you'll get your friendly handholding guide to "Building a Trojan Horse Virus for Dummies". And it wouldn't cost you more than a couple of dollars. For instance, the Hackers Penetration Manual, a book that's available in America too, is easily passed around for about five dollars in China. It must be a real thrill to young kids to be able to unleash such mayhem around the world through their computers. It must just feel like a video game to them, with just a little extra kick. And what is more, they get to gain skills that they can help their government with one day, attacking enemy countries' computer systems.

Can you really blame them? If you were a kid, and you had just learnt these fantastic skills on the computer, and you could make like Hugh Jack man in Swordfish hacking into the FBI's website, would you really be aware of how wrong it was, what you did? Some of them even say they know who was behind the whole Google attack. China does have laws against this kind of misbehavior of course; but just as with movie and music piracy, actual piracy is rarely gone after or punished. In China, real hacking skills can mean no end of money and comfort. If nothing else, kids could just make a living teaching other kids how to hack. Most of them don't even need to build new a Trojan horse virus themselves anymore; they know enough about major software packages used by everyone in the world; when the time comes they say, getting in and out of them would be child's play.

Comments

Popular posts from this blog

Lesson Observation Software

What are the benefits to you of Observation Manager? Free Up TIME For Other Things Don’t let lesson observations become a “black hole” for time. All observation types are recorded online and the “workload” can be spread among all levels of staff.  Different levels of access filter what an individual can see and do in the lesson observation software – from Managers and Line Managers to observees. PEACE OF MIND When you know that observation admin, recording & tracking are “being taken care of” in the most efficient, staff engaging way possible. SHARE Good Practice Easily Upload video, documents, sound files, images, PowerPoint etc. this lesson observation software makes the sharing of good practice quick and easy KNOW WHERE YOU ARE With Action Points & Follow Ups Set and monitor objectives and action points to show what’s being done and the effectiveness of actions taken to improve the quality of teaching and learning through staff support and training. Compliance is helped by

Lower Back Pain Symptoms, Diagnosis, and Treatment

The lumbar spine, or low back, is a remarkably well-engineered structure of interconnecting bones, joints, nerves, ligaments, and muscles all working together to provide support, strength, and flexibility. However, this complex structure also leaves the low back susceptible to injury and pain. Continue reading... extremelowbackpain

Jealous of other people's success? Here's the cure...

Alarm. Check earnings. (zero) Facebook. Email. Breakfast. Check earnings. (zero) Facebook. Email. News. Work on project. Check earnings. (zero) Email. YouTube. Research. Facebook. Work on project. Check earnings. (zero) Sleep. --- Sound familiar? I can break this cycle for you today so it becomes; Alarm. Check earnings. ($50+) Breakfast. Check earnings. ($100+) Email Check earnings. ($1500+) Sleep It's proven. It works. It's copy and paste simple and you should grab it now before I take it offline. Make money from home