Saturday, June 5, 2010
Cyber-Terrorism Case
Brazilian Man Charged in Cyber-Terrorism Case
Leni de Abreu Neto 35 years old from Brazil was charged with one count of conspiracy to cause damaged more than 100,000 computers world wide by selling a network of computer infected with malicious software.
Neto, on the other hand participated in a conspiracy along with others, including unindicted coconspirator with Nasiri 19 years old from Netherlands to use, maintain, lease and sell illegal Botnet.
Actually Botnet is a network of computers that have been infected by malicious software; it referred to as Bot code.
Bot-code is designed to permit an operator to instruct infected computers to perform various functions without the authorization and knowledge of their owners, like attack to disable targeted computer system or sending spam email.
Neto will face a maximum penalty of five years prison and also 250,000$ fine if he convicted.
http://www.americanchronicle.com/articles/view/72302 .
DISCLAIMER
Definition of privacy
Definition of privacy:
“Privacy is not something that I’m merely entitled to, it’s an absolute prerequisite.”
- Marlon Brando
Privacy is the ability of an individual or groups to seclude themselves or information about themselves and thereby reveal themselves selectively. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.
The term “privacy” is used frequently in ordinary language as well as in philosophical, political and legal discussions, yet there is no single definition or analysis or meaning of the term. The concept of privacy has broad historical roots in sociological and anthropological discussions about how extensively it is valued and preserved in various cultures. Moreover, the concept has historical origins in well known philosophical discussions, most notably Aristotle's distinction between the public sphere of political activity and the private sphere associated with family and domestic life. Yet historical use of the term is not uniform, and there remains confusion over the meaning, value and scope of the concept of privacy.
Secrecy
One of the most common understandings of privacy is that it constitutes the secrecy of certain matters. Under this view, privacy is violated by the public disclosure of previously concealed information.
Intimacy
An increasingly popular theory understands privacy as a form of intimacy. This theory appropriately recognizes that privacy is not just essential to individual self-creation, but also to human relationships. The theory views privacy as consisting of some form of limited access or control, and it locates the value of privacy in the development of personal relationships.
Cookies
A cookie is information that a web site on one’s hard disk so that it can remember something about him at a later time. A cookie is a mechanism that allows the server to store its own information about a user on the user’s own computer. The user can view the cookie that that have been stored on his hard disk. So cookie can be used to track people to gain statistics as they go through the web. Because every time we visit a web site, we leave a footprint of personal information about ourselves like our preference, web site we visit, our financial matter etc. while cookie do have uses for both the user and web providers and are even helpful, they can be misused.
Web Bugs
A web bugs, also known as a web beacon, is a file object usually a graphic image such as a transparent GIF that is placed on a web page or in an e-mail message to monitor user behavior, functioning as a kind of spyware.
Hacking
Hacking is ‘unauthorized access’ to a computer and refers to access to the whole or any part of a computer system without permission. Hackers worldwide attempts to hack into remote computer system for multiple purpose like eavesdropping, data theft, fraud, destruction of data, causing damage to computer systems, or for mere pleasure or personal satisfaction. But the term hacking has acquired dual meaning today and a hacker may variably mean a cyber burglar or vandal, an individual or group who believes in causing malicious harm to a network or computer, or steal information like password, credit card numbers, names and address, financial information, even the account information for the ISP, and in short anything stored on a computer.
Spamming
Spamming is another area of concern where cyber privacy is at stake and has become a major problem for all internet users. Spam is unsolicited e-mail on the internet and is the internet version of ‘junk mail’. Spamming is a weapon to help abusers, who repeatedly bombard an email message to a particular address or addresses. It refers to sending e-mail to hundreds or thousands of users.