The Three Little Users and the Big Bad Wolf

The Three Little Users and the Big Bad Wolf
Once upon a time, there were three little computer users of three different professions and the time came for them to leave home and seek their fortunes.
The first little user with the screen name LiLestPiggy, the youngest, bought his computer at the local chain computer store CompUSA, and had just recently installed a modem so he could surf the net. Email being the primary reason for the use of his computer, LiLestPiggy purchased a computer with the most basic set up. He was planning to surf the web and play games online, pursuing a job as an English teacher at the nearby elementary school. It was the most basic set up for a beginner.
The second little user with the screen name LiLPiggy, the middle of the three, bought a laptop, installed Norton Anti-Virus, and installed a cable modem to insure a fast and safe internet connection. He was planning to pursue a business job so he needed a fast and safe computer.

The third little user with the screen name of IllestPiggy, the eldest of three, built his own computer, installing several Anti-Virus programs and setting up a firewall and top-notch secret government security devices. A firewall protects your network from unwanted Internet traffic. The primary functions of a firewall are to let good traffic pass through while ?bad? traffic is blocked. The most important part of a firewall is its access control features that distinguish between good and bad traffic.
One night, a hacker with the screen name BigBadWolf, who dearly loved to ruin little pigs lives, was out and about. The BigBadWolf instant messaged (IM?ed) LiLestPiggy who has the most basic internet connection. The BigBadWolf said, ?Hello, I was wondering if you would like to be my new dearest friend?? It took forever for LiLestPiggy to respond to him because his internet connection was so slow. Meanwhile, BigBadWolf was getting frustrated due to the lack of response so he sent LiLestPiggy a virus called ?Huff and Puff away.? ?Huff and Puff away? was BigBadWolf?s favorite virus that he wrote up that could disable anti-viruses, then shutdown the computer simultaneously. Moments later, LiLestPiggy?s computer shut down due to his virus.

Then the BigBadWolf decided to IM another user named LiLPiggy. LiLPiggy has a good internet connection and an anti-virus program. The BigBadWolf once again said, ?Hello, I was wondering if you would like to be my new dearest friend?? Moments later LiLPiggy replied ?Not by the hair of my chinny chin chin.? ?Who the heck does he think he?s talking to?? said BigBadWolf. Once again, short-tempered BigBadWolf was furious and opened fire once again on poor LiLPiggy sending him ?Huff and Puff away.? Moments later, LiLPiggy?s computer shut down due to the virus despite the anti-virus software.

Next, the BigBadWolf decided to IM another user named IllestPiggy. IllestPiggy was obviously the brain of the family and owned the fastest connection and best security programs. BigBadWolf said once again, ?Hello, I was wondering if you would like to be my new dearest friend?? Moments later IllestPiggy replied ?Not by the hair of my chinny chin chin, I don?t even know you! Get off my screen, now!? This time, BigBadWolf didn?t even hesitate to send the virus, ?Huff and Puff away.? This time, BidBadWolf?s virus was useless because IllestPiggy had the best of best security software?s. Later that night, the sly BigBadWolf came up with the ultimate virus called Klez H. The new virus was capable of infecting thoughsands of peoples computers within a short period of time and disable any anti-viruses at the time while infecting their computer. Minutes later, he sent it to IllestPiggy once again and demolished his computer. However, since IllestPiggy had top-notch tracking government devices, he was able to locate BigBadWolf. BigBadWolf finally paid for his wicked actions and later that night the BigBadWolf was taken to prison.

12 months later after BigBadWolf got out of jail

He had been waiting for this day for weeks now. BigBadWolf ran to the mailbox to see the mail he was expecting for weeks has finally arrived. He turned the lock of his mailbox swiftly counterclockwise, clockwise, and then back and the lock clicked. The mailbox was full; inside there was a letter, and a magazine. Immediately, he tore apart the black plastic covering the magazine. The monthly Hackers Digest has finally arrived! BigBadWolf jumped in the air, did a little jig, and then ran back to his dorm so he could comfortably read his prestigious magazine. BigBadWolf hit the light switch as he entered his room. Walked by his favorite Weezer posters and sat next to his Pentium IV processor. Opened up the black covered magazine, flipped through the articles to the last page. There he was, nominated as the best hacker of the year! Immediately, I signed onto my computer; instantly people began instant messaging him for his great achievement. Minutes later, a person with the screen name of techie214 instant messaged his. BigBadWolf virus scanned him first before talking to him. Now that he was famous, who knows what type of people will be trying to dethrone him. Techie214 introduced himself to me as the journalist for Hackers Digest, and he wanted to ask him a few questions regarding his honorable status.

Here is a dialogue between the BigBadWolf of the year and the journalist techie214.

Techie214: What makes hackers like you want to write viruses? I have found that there are no simple answers, but if you had to give one reason, what would it be?
BigBadWolf: Actually, I just enjoy making computers do something that it isn?t supposed to be able to do. All throughout my life, I have been involved with the negative side of my pastimes. For instance, when I was younger I was heavily into art, but instead of doing my work on a canvas with oils, I did it on a wall with spray paint. Naturally, when it came to computers I once again found myself on the ?dark side?. Instead of writing utility programs and such, I started writing viruses and hacking into computer systems. It is best wrapped up by saying I find it much easier to accomplish negative actions, than positive thus my drive for writing viruses.

Techie214: At what age did you become involved with computers? Can you describe your initial experiences with computers? How did you learn how to hack into computers? Did you teach yourself, or by an instructor, parent or friend?
BigBadWolf: I built my first computer with my dad at the age of 12. However, at such a young age, all I was interested in was playing computer games. At the age of 15, I really got into computers and started learning more about them. Especially since a close friend of mine knew a whole lot about hacking, he became my private instructor until I knew enough to hack on my own. My first prank happened later that year, and I ?nuked? their computer out of pure pleasure. By ?nuked,? I sent the victim a file and made his computer overload, making him have to restart his computer.

Techie214: How were you able to become such a highly respected computer hacker in the world of hackers?
BigBadWolf: What can I say, I am brilliant. Hah, I?m kidding?Actually I put a lot of time into my viruses and hacking that I feel like this computer is my second heart now. I do not think I would be able to function without it. I have been able to come up with viruses smaller and more effective than anybody else has. One of my viruses called Kelz.H infected approximately 755,000 people in a span of one month. It became the biggest and fastest growing computer virus known to man. I spend about 80 percent of my time trying to break securities and firewalls. For all of you that are new to this field of computer technology, I strongly recommend that you start learning about how the computer works, then go on to learn the basics about hacking into computers at personal web pages or have a friend teach you about it.

Techie214: Does the thought of you being caught again ever cross your mind?
BigBadWolf: The internet is a free world with very little regulations. The First, Fourth and Fifth Amendments include privacy rights, but are very vague. In addition, the only other law which I came across is the Electronic Communications Privacy Act of 1986. The act protects government agencies to from hackers like myself and makes it illegal for people like me to hack into their system. Except I have learned over the past year that there are various ways to hide your identity. Unless the government takes an active role in busting us, we will never be caught. Hackers just have to make sure we are able to hide our identity so nobody will know who we are and what we are capable of doing.

Over the last several years, there has been a significant increase in viruses. Thomas Jefferson University Hospital defines a computer virus as, ?A computer virus is executable code that, when run by someone, infects or attaches itself to other executable code in a computer in an effort to reproduce itself.? Hackers, who are responsible for making these viruses, keep making viruses as the technology keeps growing. With the increasing number of viruses, the manufacturers of the computer products have been trying to strengthen their programs to protect their products from being infected with viruses and being attacked by hackers. Hackers often find the new security as a new challenge, which motivates them to create new and deadlier viruses.

Internet hacking will remain as long as cyberspace exists. The only two current preventions to these viruses are ?anti-virus? and ?computer security.? Current anti-virus software?s is designed to detect the viruses on the computer and seek out any other possible viruses that may be created by hackers everyday.
Anti-Virus programs like MacAfee and Norton Anti-Virus have become the main products for the average computer user for protection against viruses. Anti-virus programs are used to detect the viruses on the computer and seek out any other possible viruses that may be created by hacker?s everyday. It is debatable whether this well constructed anti-virus program is smarter than the hackers who keep breaking the impossible barriers of the security. As soon as the newest most efficient anti-viruses are introduced, hackers target them and pick on the program until they find a flaw, resulting in cracking a code allowing them to disable the anti-virus programs.

Hackers not only can make viruses, but they are also capable of breaking through security walls to invade people?s privacy. One of the viruses I know about can track your computer and read every key you hit. With viruses like that, who knows what other people might know about you. This issue has become a great deal recently since September 11th and it has raised many questions about how the internet is regulated. September 11th made government officials realize that the internet can be used in a very dangerous manner that may help crime. One of the questions brought up was whether the government should take action and patrol cyberspace for possible dangers. Some of the blame of the extensive abuse of the First Amendment can be pointed at the government. However, cyberspace is a place for people to act as they wish and speak freely, unless it would be breaking the first amendment of freedom of speech. If the government took action, there would most likely be conflict and it would be a big deal.

In conclusion, hackers have tremendous power to cause trouble due to the unlimited resources and possibilities of the internet. Although they are capable of trouble, most hackers create viruses because of the purposes of it being challenging and entertaining. In this case, the government should step in and regulate cyberspace to a certain degree. We cannot let people commit crime and let them get away with it.

The Three Little Users and the Big Bad Wolf 7.1 of 10 on the basis of 3164 Review.