Being Aware of Issues with Computer and Internet Security

A Practitioner in New York

PureInsight | April 16, 2006

[PureInsight.org] The Chinese
Communist Party, in its last ditch struggle, has attempted to interfere
with practitioners and their truth-clarification activities in all ways
possible. It has, in very stealthy ways, also attempted to infiltrate
practitioners' computers to interfere with their truth-clarification
work. Recently, there have been several reports of personal computers
or even servers hosting truth-clarification websites being compromised.
The most recent and wide-known case was that of a Trojan virus being
planted on FGMTV.org's pages.



Actually, computers that are connected to the Internet are in a very
dangerous situation these days. Day after day, reports come out about
new viruses, Trojans, worms, etc being released that spread from
computer to computer. Previously, these programs would have obvious
effects, such as erasing data and crashing the computer. Even though
this was a big loss, it was at least notiveable.



Nowadays, computer attacks, and the hackers who build them, have become
stealthier and are using more dangerous tools. Instead of bringing down
computers, they write programs that secretly install themselves on
computers, especially those that are connected to the Internet, and
secretly monitor all the data that is being typed. They may even send
packets secretly to a master server computer somewhere that collects
and reads this information.



In some cases, hackers have been able to install software on different
computers that allow them to command and control what is known as a
botnet, a collection of compromised machines that are running malware
programs that could be used by the hacker for any purpose.



Further, if any of these hackers or tools are in hands of the Chinese
Communist Party, they could be used for disrupting the normal
functioning and operation of Dafa practitioners' clarifying the truth
using computers, as well as for even worse operations to affect truth
clarification efforts.



I hope that all fellow practitioners can pay heed to computer and
network security. I believe that the suggestion about using two
computers, one that is connected to the Internet and one that is not
connected at all, is a good idea.



These articles might be helpful for further reference:

http://en.wikipedia.org/wiki/Botnet

http://en.wikipedia.org/wiki/Denial_of_service

http://www.eweek.com/article2/0,1895,1947561,00.asp

http://www.baselinemag.com/article2/0,1540,1946399,00.asp

Add new comment