You’ve reached the lowest level of the Hinternet when your computer and network connection don’t even really belong to you any more. The New York Times reports today on how trojan horse programs are used to take over people’s computers and use them to relay spam, distribute porn, or do other things that the scumbags use to make money. Unfortunately, the article doesn’t discuss how these programs are distributed, although we can guess that it’s through unpatched computers, email viruses, and the slimiest of malware.
The inevitable evolution of the Hinternet
You’ve reached the lowest level of the Hinternet when your computer and network connection don’t even really belong to you any more. The New York Times reports today on how trojan horse programs are used to take over people’s computers and use them to relay spam, distribute porn, or do other things that the scumbags use to make money. Unfortunately, the article doesn’t discuss how these programs are distributed, although we can guess that it’s through unpatched computers, email viruses, and the slimiest of malware.
Commentary
Previous post
Fighting spam the smart wayNext post
The Gore endorsement