Friday, April 23, 2010

As your opponent can resist your protagonist

Computer technology in Romantic Fiction
That information technology has to do with romance novels?
"You mean to use in addition to writing your story?
"Better than a typewriter," said a Heckler. Laughter rises in the room.
"Yes, I reply.
Someone shouted: "You can use the computer to find romance."
"Oh, good. Well, you know. How many of you have done?"
A few hands rise above the crowd.
"Oh, come on. There must be more than a handful."
More weapons, more crawling and lifting of the head.
"Okay. True to this motto, the social networking with a sociopath.
Imagine, if you want a heroine who wants only to find romance. Once out of the losers of the century, she decides that there be a better way. Unable and unwilling to try shooting of Mr. Right based on his own judgments, she turns to a dating site. After all, they shall be for a "happy and satisfied" or refunded.
After signing up for the service, our heroine, we call it Jane is sitting at home, starts his computer, logs on the dating site. Once there, she reviews the recommended games. Finally, they chose one of them, and contacts. Two days later, Jane has her first date.
The few days that agree with the future law of the Lord, but when they curl their toes, not so she decided to go after Mr. Wrong kiss. Unfortunately, Mr. Wrong is refusing to renounce them. It turns out that the Jane Guy was not only elected Mr. Wrong, but it's also a stalker. Because Jane is entitled to a place of their appointments, nutso "knows where she lives and chooses them everywhere they go, even if, on the other days that follow.
"What do you think so far?
"The guy is a real whack job!"
"Yeah, but it happened," someone shouted.
"It's true. Well, one step further."
Our nutso, AKA Bob, had a couple of dates with Jane so he obviously knows something about their taste. Unless, of course, it's one of those guys who speaks only for himself.
Deep rumbling laughter in the room.
Let us know that Jane saw Craigslist.com eBay.com and a platinum band sale Dual Denon. It is something she desperately wants to on a regular basis. Now Bob has an idea. Bob brings an ad on eBay and Craigslist both for the band, he knows Jane is accurate and, of course, Jane sees and answers.
Jane is so excited that she finally finds what they wasted no time hunting for him on an offer it only offers the full amount. Seller accepts his money and Jane can not wait to pick it up. It was goose bumps just think about it, his new gadget. After issuing a time to recover his purchase, it uses the instructions of the e-mail sent to his readers and address.
Imagine Jane's face, the look of total shock and lump in my throat when Bob opens the door. Not to see only surprised they annoy Bob, there is no tape. Jane has a U-turn and bolt away. That, my dear friends of fraud.
"You see where I come from? So far our enemies have used computer technology to defraud and to track down our heroes."
"Do we really do that?"
"Duh!" A man shouted from the back of the room.
Waving my hands, I announce: "We have not yet finished. What can these antagonists isolated use of computer technology to wreck havoc on our beautiful protagonists?
"Cyber-Rod!"
I laugh. "Very good. Bob has been identified as a stalker, so why not cyber-stalk."
"What does that mean exactly? Several voices shouted at once.
Cyber-bullying occurs when someone uses the Internet or other electronic means to stalk another person. Tools like e-mail, instant messaging and Web sites are harassed and threatened for someone big. The social networking site can be a fertile ground for this kind of antisocial behavior. Sites such as MySpace, Facebook, Twitter and allow others to follow you and comments for you to see and others. You can try to block it, but there are ways to begin this as easy as creating another account and from the front.
"It is also the fear that it makes you kind of freeze Creepiness factor in cyber-bullying. It is much more than just Bob, we do bad way."
"For example?"
big smile on my face. "Heard I'm so glad you asked. Have you ever Phishing?
"You mean, like, fishing for trout?
Laughter. I my neck. "Not quite."
Phishing is typically developed by an e-mail or a website to place a real business now, but it is not. For example, phishing with fake e-mail is used to you by your bank, saying: "We need you to confirm your account." Jane, our unsuspecting victims, click on the link in the message and is redirected a fake website. It fills the instructions and personal information, including credit card or bank account. Bob, who committed a fraud, stalkers and no smaller time a further act of fraud and financial information stolen could use it and probably have to get to another credit card account number and / or buy something. Knowing this, Sicko, he bought a dressing gown and sent it to Jane as a gift.
"Remember the movie" The Net "?
The crowd shouted: "Yeah."
This film was about the use of software to steal the identity of another person is based. Basically, Bob has what it takes Jane to steal his identity, thanks to its anti-phishing. But he was able to gather information, a different path. Let's say Bob is a true hacker.
"This guy is getting worse!"
"Without a doubt, but to continue."
Bob is a software guru and knows how to hack systems. He was able, on the basis of information recently, it has already unconsciously Jeanne, it can use a sniffer to retrieve their password. With passwords, Bob now has the opportunity to work with other Web sites that uses Jane or e-mail or otherwise engage thinks them safe. He was able to break into his e-mail and send it elsewhere or turn it off. It could connect to his bank and transfer all of its resources.
Holding an index, I take a glass of water again, and.
Bob is even worse than you think. wanted to see if Bob Jane to get inside information about his competitors. With these passwords, he managed to acquire the computer from Jane's, Bob is guilty of industrial espionage. It can find information about the finances of the company, its research and development, for marketing, and personnel files. The worst thing is that he is Jane's login information so when the burglary and theft is discovered, it will seem as if Jane has done or has been involved.
"Oh, no!"
"Oh, yes. But I'm not ready yet."
Bob is a professional criminals. By accessing the corporate network Jane's, Bob is a software that gives access to funds in their annual installed. It can pull and siphon money into different accounts of his own found to hide the source of his wealth. It is the money laundering in the digital age.
Someone like Bob wants to be himself, or he could be in it to be with a partner. Bob partner in crime is a terrorist.
According to explode into the room panting a full house.
Bob is laundering money for his terrorist enemy requires him to hack websites and lower government agency. Cyber-terrorism. An example of this product last year when someone hacked the website of the Republic of Georgia during the war in Georgia in South Ossetia. This type of terrorism has very little to the reason for a terrorist Bob the money would be paid, found in the comparison. Usually there are illegal weapons, drugs, transportation of people and many other illegal activities.
"What everybody has to do with Jane?" A woman called from his seat.
"Ah. It all began with Jane."
Jane was taken to all these bad things happen. If it did not succeed for lack of Jane's Information Security and Knowledge, Bob never as bad as it deceived him. Remember, too, with the naked eye, the untrained eye, Jane seems to be the criminal.
Our opponent has a great job thwarting our benevolent protagonist, who was just looking for romance done.

No comments:

Post a Comment