

It could download or install criminally pornographic images on your system, and then notify say ASACAP that it believes the person connecting with your IP address has downloaded such images. Emails to a lover whom your husband or wife might not be too keen about, pornography, evidence of fraud - who knows? Access to any sensitive information makes you a pretty simple target for blackmail. It might search for information on your hard disk which you may well not wish others to know about. Better have a close look at those credit card statements. At its leisure it might trowel though your files, gaining access to financial and other information, and send it off just about anywhere to be, well, misused. For some it would take just a few minutes.īut it could actually do much worse things than that.Īny and all of the unencrypted information on your hard disk is most likely easily accessible to an application. As a software developer I can't tell you how trivial it is to write such an application. This executable file might erase your hard disk. I'll tell you who these people are in a short while, but let's for a moment think about the kind of risk someone who does this may be running. I'm talking about people with at least a modicum of, and often much more computer knowledge and experience. Not "clueless newbies" who have only been using computers for a short while and haven't an idea what could go wrong.

I can guarantee that millions of people will do it today.

What's the betting that you wouldn't run the executable? What's the betting that only an imbecile would run the executable?īut you know what, there is a good chance that someone you know has done something very similar. You don't know me, and to protect me from the law I must remain anonymous, but I am offering something stolen that you want, and which would otherwise cost you a lot of money, for no cost at all! All you have to do is run the attached executable file, and it will make that stolen item available to you. The article goes on to point out the risks of installing execuatbles provided by unknown parties and some of the possible consequences. History: First published at John's blog, dog or higher, April 2004.Īn exploration, for uninitiated, of how software cracking usually works.
