Security Breaches, Or How To Panic The Game Into Breaking Cover

There are many different techniques for a hunter when they are trying to get the game to show itself – some adopt the sneak-and-creep approach that tries to blend in and give the prey a false sense of security. Others use the big-noise ploy to frighten the animals into leaping from cover. Some just throw out chum – chopped-up whitebait, packets of hot chips, or free tickets to Johnny Farnham concerts.  All three are valid propositions.

One of the best new approaches is for a hacker to tell everyone that they are in terrible danger from hackers, and to direct them to a site that will protect them by harvesting private numbers and passwords. If this sounds a little like the federal government, you have to remember that both the hackers and the politicians learned their trade in the same private schools and may well end up sharing their experiences in the same cell.

The business of computer and internet security is so complex, of course, that it defies normal understanding. Like the mysteries of religion, this creates an opportunity for a priestly caste to step in and control the confused. The fact that the saviours are also the people who invented the danger is sometimes overlooked, in both circumstances.

To some extent this priestcraft is a good thing – if you are prepared to go blindly along with the directions of the experts you will eventually get somewhere – just be careful who you follow. The same principles apply to computer expertise and turf consultancy, and in some cases it seems to be done by the same people. If you are a fan of three-card monte games played in a doorway off a side street you should be perfectly at home.

Where the idea of priestcraft can be seen to be turning to more general benefit is in the fact that there are still several major electronic religions. You need not worship at the same keyboard altar as the person in the next cubicle. The teams can be played one against the other for the benefit of the perplexed. If one discovers a vulnerability of another, they will trumpet it in the mainstream long enough for the guilty party to either slink away or invent a repair for the problem.

You cannot stand firm upon ancient belief when it comes to computers – some prophet is always coming down off a mountain with a shining face and two more tablets of silicon – in many cases the glory turns out to be residual radiation and the wild hair is the result of opening the back of the desk-top a little too early. In any case, you are going to have to adapt, adopt, and update every so often – just do so at the behest of reputable firms and not Flash Harry. As irksome as they can be at times, the major suppliers like Apple and Microsoft really do maintain their own demesnes eventually.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this:
search previous next tag category expand menu location phone mail time cart zoom edit close