It Might Not Take Much

Today, I was sent an email with a link to an article attached.  Here is the link.  I will talk about it so don’t feel you have to read it.

Article

The article centers around a suspected group of Muslim (Arab) people (government?) who have attempted, somewhat successfully, to hack into our banking system through denial-of-service attacks.

My best understanding is that these attacks keep the valid people from getting into their bank accounts and, I imagine, the hackers get some time to try to really break into them.

This post is not aimed at the Muslims, the Arabs, or any government.  I think or hope that you all know me a lot better than that.  I want to concentrate on the word “hacker”.  This can be anyone from a six year old child who finds mom’s password to a chat site to a huge group of terrorists trying to shut down a government.

I want you to understand that, for most of us, it’s the little ones that could cause a lot of trouble.  For instance, those of you who don’t worry much about your email passwords.  If someone managed to figure out or steal your password, before you could do much (or, perhaps, before you even know about it) they could simply send a bomb threat or death threat to the president’s public email address.

Now, they may get caught (and then they are in so much trouble), but I can pretty much guarantee you that your home or office would be quickly visited by men in black suits (or swat) and you would have a very interesting day with them (perhaps, several, or more).

The thing is that it might be you having to prove you didn’t do it and that it was, indeed, stolen to get you out of hot water.  Furthermore, with the Patriot Act (that gray piece of law) enacted, they could well hold you in prison without many rights for a very long time if they so chose to do it.

Do I sound like someone who is screaming a bit about freedom and rights?  Maybe, but my main thought here is to protect through knowledge those of us who live a lot of our lives online and who have a lot of different ways back to us on computers.  It’s not even that far fetched.

I know of a situation where a reasonably small town had a hacker attempt to get into the organization.  He didn’t, but, here’s the thing:  the hacker was from Asia!  That’s right.  He was trying from Asia to get into this organization in little Indiana.

You get emails, I am certain, that are from scam artists, a lot of whom are from Africa and such.  I have written about the “women” I have received love letters from.  They say they are from Romania, France, and other countries.  I do not open them.  My email has a preview window.  I copy and paste the note from there and then delete it.  I NEVER answer them or open them up.

Looking through Norton Anti-virus info, I find that it protects me from thousands and thousands of viruses and scam attempts (hacks).  One of the common ways that this works is for you to open an email from the hacker.  The small virus in the email may simply copy your email address list, mail it back to the hacker, and then send the virus out to all the people you send emails to for the next few days or weeks.  When this repeats for a while, the hacker may now have thousands of emails to send things to or to try and hack into.

I did something one time just to see what I could find out.  For a few forwarded emails, I simply copied the email addresses that they were sent out to.  Within an hour I had almost two hundred email addresses, many of whom I didn’t know who they were.  I sent a mass email out to all of these people letting them know how I got their email and suggested to all that, in the future, they “blind copy” the other names instead.  I know one person who started doing this from my suggestion.

The problem is that it only takes one person to carelessly send your email address on for people you don’t want to have access to your address.  I know we give these addresses out freely, but still, I don’t see any reason to “give” information out to others concerning addresses I didn’t ask if I could mention.  Besides, it clutters up the email.

Bottom line:  pay a lot of attention to emails from people you don’t know.  Delete them without looking at them.  I do.  Try to learn a bit about how to not be so vulnerable to hackers.  My previous post on passwords is a start. It is here.  Computers are wonderful, in the right hands.  But, then again, there are a lot of nice things that can be put to bad use.

Namaste,

Scott

Advertisements
Post a comment or leave a trackback: Trackback URL.

Comments

  • beautiful in my eyes piano chords and lyrics  On February 14, 2013 at 10:53 am

    Chords introduce harmony into music and it is the effects created by chords that
    produce the inspiration behind so much music and make it so satisfying both to listen to and to play.
    The sooner you memorize some chords, the easier will be for you to perform
    plenty of styles of music. Best Regards.

    Like

  • bert0001  On September 30, 2012 at 2:31 am

    Email works with smtp. SMTP never asks for a password. Only for receiving mail you need to login. Nobody needs your password to send an email in your name.
    There is a path attached to track the email’s origin though. The originator’s ip-address is in this path, always and can be located.
    Even if they use webmail, by login in with your password, (like gmail), the ip address is there. The men in black know this, ordinary people don’t. Stupid hackers get often caught this way.

    Like

    • kindredspirit23  On September 30, 2012 at 11:20 am

      This is true. I do also know that there are ways for them to “bounce” or falsify this address or make it very difficult to trace back and that they aren’t caught for this reason a lot. Thanks for the extra info.
      Scott

      Like

Feel free to say something; I look forward to it!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Free to express

thoughts, experiences, travel, feelings, stories, diaries and many more...

The Subjective Herald

"If audacity had a viewpoint —and a column—"

Girl Boner

Where Good Girls Go For Sexual Empowerment

Happiness Between Tails by da-AL

Arts + Cooking + Dancing + Joy + Writing + Tales + Tails

Nyssa's Hobbit Hole

Diary, Opinions, Passions, Fiction, Memoir

The Recovering Know It All

The Man who Learned Too Much and Lived to Tell

%d bloggers like this: