Computer ethics can be broken down in to many topics including piracy, hacking, viruses, spam, phishing, and responsibility of use of software, cyber porn, and invasion of privacy and the use of the computer...
And, if one writes such a destructive program, then one mustuse extraordinary care (i.e., the same care that one takes withtoxic chemicals, explosives, highly radioactive materials, etc.)to make certain that the program is released.
Herpes, a word that all of us know, something that gets made fun of by the raunchiest of comedians, a suggestion of a loose life style, a complex virus that was only recently seen as something to be feared since the early 1970’s for a target of money for pharmaceutical companies.
Partly as a result of adequate law in the Philippines,just five days after the initial release of the virus therewas active discussion of extraditing the suspect to a developed countrywhere harm occurred and where the laws were adequate to punishthe perpetrator.
Computers can also become objects of crime when they or their contents are damaged, for example when vandals attack the computer itself, or when a "computer virus" (a program capable of altering or erasing computer memory) is introduced into a computer system....
During grand jury proceedings in June 1992, two otherCornell students were revealed to have played a role in the distributionof the MBDF virus to various computer bulletin boards.
The MBDF virus was first discovered in the wild by a professor of mathematicsin Wales, who sent it to John Norstad, the author of a now-discontinuedanti-virus program for the Macintosh.
However, unlike social diseases, computer viruses are almost always curable, and the cures for new strains are usually a matter of days away, rather than months or years....
The only reason that I mention the MBDF virus inthis essay is that it is one of a very few cases in which the authorand distributors of a malicious program were arrestedand punished for their crime.
On 5 October 1992, Blumenthal and Pilgrim were each sentenced to:The court clerk has informed me that there is no written Judgmentfiled for either Blumenthal or Pilgrim.
from theft, loss, viruses, fire You should keep information secured from theft on hard disc failures; you can also keep your information safe from viruses that can wipe all your files off the computer.
Like any other computer program, a virus must be executed for it to function-that is, it must be located in the computer's memory, and the computer must then follow the virus's instructions.
A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments.
Macs also are better for the planet, have a longer lifespan, have more reliable hardware, are less likely to crash or get viruses, have better security features, it’s very easy to transfer all your files from a PC to a Mac, and a Mac can be a PC if you really wanted it too....
When the virus is looked at under an electron microscope the filoviridae appear as being long, thin and occasionally they have 'branches' sprouting from one place or another.
What makes the Pathogen virus worth including here is that its authoris one of the very few authors of malicious computer programs whowere arrested and convicted.