Maybe its time to embrace “phisers” and hackers.

Sometimes unusual times call for unusual measures, and to borrow the cliché: do we bite the bullet, and change tact from the present criminalization of ID theft? I know mine would be a very unpopular hypothesis, but one common characteristic of hackers –who by the way may easily be into ID theft and phishing – is that they are usually people with above average intelligence. Kudos to all the companies dedicated to dealing with this menace, usually as a technological pro-bono gesture. Thumbs up to them.

But it might be necessary to ask ourselves: is it possible to eradicate ID theft/ phishing, or at the very least make it so rare as to become almost a non-issue? Do we have the technology to overpower these malicious individuals, and make their ‘art’ so difficult and so financially unproductive so that we end up forcing them to look for legitimate ways of spending their free time?

My answer is an emphatic No. unlike the vehicle industry which takes years to produce a more advanced simple gadget like a carburetor, computer innovations present us with almost daily new, easier to use, hip devices which make life so much fun. Therefore no government can ever discourage the internet revolution and its ever astounding innovations, unless they want to risk a countrywide mutiny.

But could hackers/phisers be successfully re-integrated into the law-abiding populace? Should criminal activity be seen to be encouraged? What about the victims? But if we will never defeat the miscreants, then what is the alternative?

My view, however unpopular, is this: in exchange for leniency/possible outright forgiveness, I’d propose the hacker and the “phisher” to be presented with two alternatives:

  1. A sort of a six month moratorium, where total cooperation with law enforcement agencies should lead to their being absorbed into a special IT security institute – a sort of a half-way house – with good pay, but 50% of it goes to reimburse their victims.
  2.  For those who refuse to come out of their dark criminal world- a long jail term plus hefty fines should await them. I think the reasonable ones would take the former option.  
Posted in General | Tagged Computer Innovations, Criminalization, Forgiveness, , , Gesture, , Hypothesis, Internet Revolution, Kudos, Law Enforcement Agencies, Leniency, Miscreants, Moratorium, Mutiny, Phiser, Phisher, , Phising, Populace, Security Institute, Tact | Leave a reply

How to improve your Computer´s performance

For those who like powerful racing cars and know the effort that teams put in to getting maximum speed on a F1 race they will certainly understand how important it is to have a computer that is operating efficiently and that gives top results. Organization is the key to achieve this.

At times we have hundreds of files on our computers that we do not use, just sitting there. We should establish periods that we do a bit of system cleaning on the computer, deleting unnecessary files and organizing folders in an efficient manner that makes them easily found and with the proper file headings.Computers are like cars they need to be maintained!.

If you have experienced a few system hang ups and had to reboot the computer it is worth running scandisk on the computer to detect and fix errors that arise as a result of these system hang ups and the presence of viruses. But what is scandisk you may be asking yourself? Scandisk is a maintenance tool that aims to search and correct bad clusters when a program was prematurely aborted. At the send of the scan a report is produced that informs the user the files scanned and the amount of space scanned.

Always ensure that the signatures of your Anti-Virus is up to date this will curtail the possibility of viruses infesting your computer system. Ensure that you do frequent system checks to detect viruses, spy ware etc.

Never open e-mails if you do not know the user this will be committing system suicide and be suspicious of formal and informal e-mails that may come from friends as well. They usually do not address you personally eg. Hello , we would like you have a look at our pictures thanks bye.

If you use a password(and I recommend you start doing so) to enter your computer, HIDE IT! DO NOT PASTE IN ON A POST IT AND LEAVE IT FOR THE WORLD TO SEE IN OBVIOUS AREAS!.Another useful tip is to scan all Cds, pen drives, floppy disks for viruses before accessing any file on them.For those that are not computer cracks on the matter then every protection can never be enough to protect you as you navigate the worldwide web. Protecting your password can also come in the form of writing a .htacess file that guarantees protection of sensitive information on your system and thus curtailing hackers and possible phishing.

Once you are expanding your computer operations and sense that your system is slowing down, this could be an indication of the necessity of more memory space or virus infections on your system. Installing memory is a simple process that can be done from home if you one is confident enough to do so, or with a qualified person if not.