123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Unauthorized Email Blasts On Your Pc

Profile Picture
By Author: Lina Maria
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Having a pretty good track record for avoiding viruses on my computer, I know I don't take it lightly when Norton Antivirus reports that it has blocked an attempt to install a program on my system. Like many people in my profession, I use every precaution possible to avoid unauthorized intrusions. Despite this, ever more sophisticated attacks leave unprotected systems increasingly vulnerable.

Although the reasons for breaking into networks vary, not every attack is deliberately aimed at infecting files or destroying operating systems. Some hackers use phishing scams to steel personal information while others hijack computers to blast out massive email campaigns.

In a recent undercover operation, an FBI agent ordered via email "Viagra" pills from a Russian man named Oleg Nikolaenko. Nikolaenko is believed to have been responsible at the time for a third of the world's spam emails (up to 10 billion a day). The massive broadcasts, fraudulent email headers as well as misrepresentation of product (actually herbal pills) provided ample opportunity to prosecute the 23-year old man's operation for violation of the CAN-SPAM ...
... act.

Accused of creating the MEGA-D spam-bot, a program that controlled a half a million computers according the FBI, Nikolaenko now faces federal prosecution. Nikolaenko's outfit continued to wreak hack until it was shut down by the FireEye network security firm in late 2009.

Nikolaenko will face a possible 3-year prison sentence and $250,000 fine. Considering the money involved in this racket and all the intrusion, stolen bandwidth and deception at stake, the punishment is hardly suited to the crime. The "Spam King" may not have evaded justice entirely, but there are people serving 10 year sentences for doing far less.

If a man can get off this easily for these charges, what is the incentive for being good? Until stiffer penalties are enacted for such conduct, we may as well be leaving our front doors open and a plate of brownies out to welcome criminals.

In a world where a demented individual can deliberately cause great harm to an animal and get off with a single year in prison, I guess this should not come as a surprise. But how do we show people that have little concern for anything but themselves that we are serious when even animal suffering is not considered worthy enough for strict punishment?

Maybe legislation will someday catch up with technology and injustices. Until then, rest assured that restitution is not ensured and no one is truly protected against those who would do us harm.

Robert Haskell is a contributing author and manager of consumer affairs for http://www.officesalesusa.com and http://www.worldatfocus.com. http://www.officesalesusa.com/

Total Views: 119Word Count: 427See All articles From Author

Add Comment

Computer Programming Articles

1. Fast-track Web Development Course At Tcci - Best Computer Training
Author: TCCI - Tririd Computer Coaching Institute

2. Hiring Android Programmers And The Changing Nature Of Mobile Communication
Author: Shree Kumar

3. React Native Tutorial: Everything You Need To Build Modern Mobile Apps
Author: Tech Point

4. Artificial Intelligence Tutorial: A Complete Guide To Understanding Ai Concepts
Author: Tech Point

5. Why Education App Development Matters For Kids In Modern Tech Era 2026
Author: Kuldeep Singh Tomar

6. Stop Experimenting, Start Profiting: How Azure Ai 2026 Delivers Real Business Roi
Author: ECF Data

7. Advanced C Programming Tips & Tricks | Programming Classes
Author: TCCI - Tririd Computer Coaching Institute

8. Step-by-step Angular 8 Tutorial: Features, Benefits, And Easy Learning Guide
Author: Tech Point

9. Reactjs Tutorial Explained: Learn Components, State, And Ui Building
Author: Tech Point

10. Python With Django For Backend Development: Best Computer Classes
Author: TCCI - Tririd Computer Coaching Institute

11. Explore Latest Cybersecurity Trends In 2026
Author: Orson Amiri

12. Master Data Structures (dsa) For Coding Tests - Tcci
Author: TCCI - Tririd Computer Coaching Institute

13. Full Stack Web Dev: Mern Stack Course Iskcon Cross Road, Ahmedabad
Author: TCCI - Tririd Computer Coaching Institute

14. Robusta Coffee Beans: The Bold Brew Driving Global Coffee Culture
Author: komal

15. Legacy System Migration: A Comprehensive Guide To Modernization
Author: Tech Gazebos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: