You are currently viewing THE CYBERSECURITY AND CRIME


In this series on Internet publications, last week, I spoke on “IP address and DNS“.
In this post today, we will talk about cybersecurity and crime, which when neglected can cause serious damage to our lives and to society. This damage can be financially, personally, and even national security.

The big countries do not only have the REGULAR ARMY, but they also have the CYBER ARMY which does not have traditional weapons, but computers that can be used to shut down water supply, the energy network, transport, etc.

In recent years alone, around millions of credit cards have been stolen, millions of identities have been compromised, even a nuclear centrifuge has been hacked and airline drones hijacked.
The people who commit this crime do not have a particular profile. They can be international terrorists, even a teenager or an institution.

How does it work?
Let’s see how cybersecurity works under the hood, by learning about:

  • Virus
  • DDoS
  • Phishing …


In biology, a virus is an organism that spreads in various ways, one of them by physical contact. Viruses work by infecting cells and duplicates their genetic material that makes a person very sick and then spread around.
A computer virus works a bit similar.

In a computer, a virus is a computer program that is installed usually unintentionally and harms the user’s computer. It is also possible for a computer virus to spread and infect other computers.

How the virus does infects?
There is a couple of ways that a virus can infect computer

  • Fake Installation: This is when a popup asking the user to update or install software for an emergency security update. Alternatively, maybe saying your computer has been infected, you need to clean up.
  • Security vulnerability or security backdoors: This happens when your system has a vulnerability or poorly designed system that hackers can access your computer to install his virus or malicious software.

Once the virus in on your computer, it can harm your computer by:

  • Steeling your data
  • Deleting your data or some of your files
  • Allow someone or hacker to control your computer remotely
  • Making certain programs to behave unusually.

DDOS (Distributed Denied OService)

Using computer viruses, hackers can take over millions of computers worldwide and use them as a BOTNET to attack and take down a website, this kind of attack is called DDoS.

DDoS is when a hacker overwhelms a website with too many requests. When he uses millions of a computer that he controls worldwide and attacks at once a website that sends millions of requests at once toward a website that can shut it down.

Most websites are able to handle millions of requests by day. But when that website receives billions and trillions of requests coming from different places, the computer (website server) is overloaded and stop responding (shut down).


A phishing scam is another way cybercriminals use to send some tricking emails scam to people into sharing sensitive personal information.

A Phishing is when users receive an email that seems coming from a trusted company or service provider, asking users to click in order to login to their service website. When a user clicks, it will take him to a fake website that looks exactly like user’s website provider, example your baking website or your Gmail login system that prompt user to sign in with their username and password. Once user enter those credentials, hackers can get hold of those credentials to use it in order to sign in to the user’s real account to steal information or money.

Fortunately, many companies and government organizations are working to make the internet safer, even though that effort is not enough.

People may think that when a computer has been hacked, the problem is security design or software, but 90% of the time, a system is hacked it is not for security or vulnerability in the system but because of a simple human mistake.

We finish today’s post by providing a few steps or advice to take in consideration to avoid being hacked:

  • Use strong password
  • Check for authentic web addresses
  • Install system security updates often
  • Do not install the software you do not trust.

We all need to keep up in order to stay safe.

Hope this helps thanks for reading.

By Alexis Ange Dauli, Web Developer.

This Post Has 98 Comments

  1. sikis

    Excellent article. I am experiencing a few of these issues as well.. Nissy Bax Kemp

  2. altyazili

    I like looking through an article that will make people think. Also, many thanks for permitting me to comment. Tani Rik Yuria

  3. yetiskin

    You have brought up a very fantastic points , thanks for the post. Rosamond Lezley Gaudet

  4. sikis izle

    You made some decent points there. I looked on the internet for the topic and found most guys will consent with your blog. Othilie Nicol Guzel

  5. turkce

    Here are several of the web pages we recommend for our visitors. Cristy Franklin Mannes

  6. bluray

    As soon as I noticed this internet site I went on reddit to share some of the love with them. Rosamund Payton Arlyne

  7. torrent

    I am not rattling superb with English but I line up this rattling easygoing to translate. Genia Chic Fawn

  8. torrent

    You made some decent points there. I looked on the internet for the topic and found most individuals will approve with your website. Breanne Irving Romilda

  9. yify

    Hi mates, its wonderful piece of writing on the topic of tutoringand completely explained, keep it up all the time. Therine Jonas Blanch

  10. download

    I loved your article post. Really thank you! Great. Paula Drud Dulciana

  11. web-dl

    If you would like to grow your know-how just keep visiting this web site and be updated with the newest news update posted here. Romona Zollie Raskin

  12. anime

    Hello, after reading this amazing article i am as well happy to share my experience here with colleagues. Dacy Meredith Dragone

  13. delibal izle

    There is certainly a lot to find out about this subject. I like all the points you made. Milka Westley Helve

  14. deadpool

    Thanks for the post. Really looking forward to read more. Much obliged. Pamella Joel Kezer

  15. online

    I like the efforts you have put in this, appreciate it for all the great articles. Anthea Mickey Almeria

    1. Alexis Dauli

      Hello friend, thank you very much fir the wonderful feedback. And you welcome

  16. watch

    Major thankies for the article. Much thanks again. Great. Liuka Simone Richers

  17. access

    I have been surfing online greater than 3 hours lately, but I never discovered any attention-grabbing article like yours. Kariotta Orlan Pavior Gerty Winn Audley

  18. filmkovasi

    Really appreciate you sharing this blog. Really looking forward to read more. Much obliged. Olive Irwinn Gredel

  19. watch

    so that you demand to be a bust for causal agency other a pass along. Reeva Jeffrey Felizio

  20. 720p

    I was looking at some of your articles on this internet site and I think this website is very instructive! Continue putting up. Marigold Marten Torrey

  21. watch

    I know everything here is true, it is written you have to ask God to open your eyes and pray for the rich and evil good will do the test. Not to worry only trust in the Almighty and put on the armour of god Delinda Maddie Gerta

  22. yabanci

    Hello there. I discovered your web site by the use of Google while searching for a comparable subject, your web site got here up. It appears to be good. I have bookmarked it in my google bookmarks to come back then. Karol Patten Huey

  23. torrent

    Hey there. I found your web site by means of Google whilst searching for a related topic, your website got here up. It appears great. I have bookmarked it in my google bookmarks to visit then. Elysia Base Cesaria

  24. online

    I really enjoy examining on this internet site , it has got great posts . Astrix Drud Tia

  25. online

    Thumbs up! This information is magnificent. You are a very persuasive writer. Good job on this article! Fidela Emmet Ham

  26. anime

    I blog often and I truly appreciate your content. Your article has really peaked my interest. I will bookmark your website and keep checking for new details about once per week. I opted in for your Feed as well. Libbi Colin Tonjes

  27. diziler

    Pretty! This was an incredibly wonderful article. Many thanks for providing this information. Olly Isadore Antonie

  28. bluray

    Very informative blog article. Much thanks again. Fantastic. Latashia Isaiah Philippine

  29. bluray

    I blog frequently and I seriously appreciate your content. This great article has really peaked my interest. I will book mark your blog and keep checking for new information about once per week. I opted in for your RSS feed too. Jennilee Shermy Taub

  30. altyazili

    Nice post. I learn something new and challenging on blogs I stumbleupon everyday. It will always be helpful to read articles from other writers and use a little something from their websites. Kayle Jerrold Seth

  31. torrent

    There is noticeably a bundle to find out about this. I think you made sure great factors in functions also. Christalle Daren Santiago

  32. bedava

    I intended to create you a little note just to give thanks as before for the exceptional solutions you have featured in this case. It was really shockingly open-handed with you to grant publicly just what many of us might have offered for an ebook to generate some dough for themselves, mostly now that you might have tried it in case you desired. These secrets as well served to be a good way to fully grasp that other people online have the identical fervor much like my personal own to know the truth more regarding this matter. I am sure there are numerous more pleasant periods in the future for many who read your site. Alyss Burgess Flower

  33. torrent

    After all, we should remember compellingly reintermediate mission-critical potentialities whereas cross functional scenarios. Phosfluorescently re-engineer distributed processes without standardized supply chains. Quickly initiate efficient initiatives without wireless web services. Interactively underwhelm turnkey initiatives before high-payoff relationships. Holisticly restore superior interfaces before flexible technology. Dotty Winifield Girish

  34. turkce

    Thank you for the sensible critique. Me and my neighbor were just preparing to do a little research about this. We got a grab a book from our local library but I think I learned more clear from this post. I am very glad to see such wonderful info being shared freely out there. Malissa Alfie Mike

  35. bluray

    works great, but is not working as required fields. can you improve this. i will pay you 30 euros for improvment, i think this one could be the number 1 datepicker-plugin. please reply. Eva Reinaldo Scrogan

  36. altyazili

    Thanks so much for the blog post. Thanks Again. Great. Bernette Haydon Sherl

  37. torrent

    definitely an interesting read. i usually dont comment. signed Mark Cuban Elnore Marcellus Barnet

  38. turkce

    Etiam pretium, erat a ultrices sodales, nisl augue venenatis ante, a ultrices quam leo vitae mi. In gravida eleifend interdum. In viverra eros quis leo mattis ultricies. Pellentesque porttitor, tellus sit amet molestie euismod, quam elit pretium nisl, vitae dictum orci lorem imperdiet mauris. Alaine Sidnee Tarah

  39. turkce

    Greetings! Very helpful advice in this particular post! It is the little changes that make the largest changes. Many thanks for sharing! Chelsae Jarad Tavey

  40. indirmeden

    We stumbled over here coming from a different web address and thought I may as well check things out. I like what I see so i am just following you. Look forward to finding out about your web page for a second time. Elsbeth Dav Benildis

  41. erotik

    You made some really good points there. I checked on the internet for more information about the issue and found most people will go along with your views on this website. Sunny Riordan Nasia

  42. erotik

    I like looking through a post that will make men and women think. Also, many thanks for permitting me to comment! Mandie Raffaello Mace

  43. turkce

    I am genuinely delighted to read this webpage posts which carries tons of useful facts, thanks for providing these information. Vivien Elisha Rancell

  44. turkce

    How are you fellow muted the head great info the article 2019 Rosmunda Ari Burra

  45. Nila

    This information is invaluable. When can I find out more?

    1. Alexis Dauli

      Just stay connected, I will put to gether in details as ebook soon.

  46. sanayi blogu

    Wow that was unusual. I just wrote an very long comment but after I clicked submit my
    comment didn’t show up. Grrrr… well I’m not writing all
    that over again. Anyways, just wanted to say wonderful

    1. Alexis Dauli

      Hi friend, thank you for the feedback and your time to reply even the long comment didn’t go through☺.

  47. 0mniartist

    Great delivery. Great arguments. Keep up the amazing spirit.
    asmr 0mniartist

  48. 0mniartist

    Very nice article, just what I wanted to find.
    0mniartist asmr

  49. 0mniartist

    Wow, this post is fastidious, my younger sister is analyzing such things, thus I am going to tell her.
    asmr 0mniartist

  50. 0mniartist

    Great beat ! I would like to apprentice while you amend your website,
    how could i subscribe for a weblog website? The account helped me a applicable deal.
    I have been a little bit acquainted of this your broadcast offered shiny transparent idea asmr 0mniartist

    1. Alexis Dauli

      Thanks, there’s a subscription form there on the sidebar

  51. 0mniartist

    This site truly has all of the information and facts I wanted about
    this subject and didn’t know who to ask. 0mniartist asmr

  52. Lowell

    Incredible points. Great arguments. Keep up the amazing spirit.

Leave a Reply