Writing Resources from Fifteen Minutes of Fiction
Battleground of the Computer Part 1 - InfectionAll was silent on the outskirts of the computer. The firewall patrolled the rim of the operating system, making sure that the many hacking attempts that occurred every second did not do any damage. The Anti-Virus troops sat behind the firewall, confident that they would not be needed tonight.
The User sat in front of the screen doing his normal browsing, nothing out of the ordinary. All was quiet, and in the long silence, some of the AV troops began to get restless.
Suddenly a warning flashed on the screen in front of the user: You're computer is infected with dangerous spyware! Click here to download protection!" Without thinking, the User clicked the link, opening the firewall and bypassing the AV, to start the war of the computer's lifetime.
For a few days, nothing seemed wrong. The User kept on at his normal browsing, and everything seemed OK. Beneath the screen, however, in the depths of the operating system, the AV was quickly being overrun.
The spyware was not just spyware, but a combination of spyware, viruses, and a trojan. It worked very quickly to shut down both the firewall and the AV.
The AV, however, was not going to go down without a fight. It began giving more infection warnings then usual, but in the end, it was overrun. The spyware included programing to send the AV into snooze mode, permanently.
With the firewall shut down and the AV snoozed, the door was open for more attacks, and the User didn't even realize something was wrong.
Blogs on This Site
Reviews and book lists - books we love!
The site administrator fields questions from visitors.
Like us on Facebook to get updates about new resources