Martes, Marso 1, 2016

                      IT PROFESSIONALS

What is an IT Professional ?

" An IT Professional is someone who has knowledge , skills and mastery on his field ( Information Technology). In order to be called an IT professional , A person must have knowledge or have been educated in every corner of Information Technology , knowing how it works and how to work on it ."


    What can you say whether a person is an IT professional or  NOT?


We can identify an IT professional if he possess the following Qualities : 
  • Has a working knowledge of related technical areas.
  • Is a mile deep in primary expertise
  • And most of all ,APPLIES ethical manner inside and outside work if he or she doesn't possess any of those stated above , he , in some aspect cannot be consider as a professional

  • .Can you consider a Graduate of 3 month Technician Course a Professional ?                 YES !!!We can consider a 3 month Technician Course a Professional. That is according to an article post by Jeniebarbosa(https://jeniebarbosa.wordpress.com/2011/08/30/can-you-consider-a-graduate-of-a-3-month-computer-technician-course-a-professional/)
There she says that ,they are considered as Professionals ONLY if he/she have utilize and make use of the skills and knowledge acquired into a real working environment.

Does an Email Document acceptable as legal Document as evidence in Court? YES!!!It is acceptable as an evidence in Court ,but first ,they have to measure it's reliability.According to Federal law No. 1 Article 4 , Section 1 :"Electronic messages shall not be denied legal effect and enforceability solely because it is in electronic form."

CASE STUDY 2: E-COMMERCE OF THE PHILIPPINES

1. Does an email document acceptable as legal document as evidence in the courts? Justify your answer. Specify the law, article and section information.
      
 Yes. An email document is acceptable as legal document as evidence in the courts. It is clearly stated in the R.A 8792 – The E-Commerce Law of the Philippines under PART I – CHAPTER II-SECTION 6- Legal Requirements of Electronic Data Messages and Electronic Documents which states that –
“Information shall not be denied validity or enforceability solely on the ground that it is in the form of an electronic data message purporting to give rise to such legal effect, or that it is merely incorporated by reference in that electronic data message.”

2. What are the requirements for an electronic document to be accepted as legal document? Justify your answer. Specify the law, article and section information.

       Proving the validity of an electronic document, it must comply the requirements stated by the E-commerce law under Part I- Chapter II- SECTION 7. 
Legal Recognition of Electronic Documents stating  that
“Electronic documents shall have the legal effect, validity or enforce ability as any other document or legal writing, and –
(a) Where the law requires a document to be in writing, that requirement is met by an electronic document if the said electronic document maintains its integrity and reliability and can be authenticated so as to be usable for subsequent reference, in that –
     i) The electronic document has remained complete and unaltered, apart from the addition of any endorsement and any authorized change, or any change which arises in the normal course of communication, storage and display; and
     ii) The electronic document is reliable in the light of the purpose for which it was generated and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an obligation or whether the law simple provides consequences for the document not being presented or retained in its original form.
(c) Where the law requires that a document be presented or retained in its original form, that requirement is met by an electronic document if –
     i) There exist a reliable assurance as to the integrity of the document from the time when it was first generated in its final form; and
     ii) That document is capable of being displayed to the person to whom it is to be presented: Provided, that no provision of this Act shall apply to vary any and all requirements of existing laws on formalities required in the execution of documents for their validity.
For evidentiary purposes, an electronic document shall be functional equivalent of a written document under existing laws.
This Act does not modify any statutory rule relating to the admissibility of electronic data messages or electronic documents, except the rules relating to authentication and best evidence. 

3. Is it legal to create electronic contracts agreed by both parties? Justify your answer. Specify the law, article and section information.
      
 SECTION 16. Formation and Validity of Electronic Concepts.
(1) Except as otherwise agreed by the parties, an offer, the acceptance of an offer and such other elements required under existing laws for the formation of contracts may be expressed in, demonstrated and proved by means of electronic data messages or electronic documents and no contract shall be denied validity or enforceability on the sole ground that it is in the form of an electronic data message or electronic document, or that any or all of the elements required under existing laws for the formation of the contracts is expressed, demonstrated and proved by means of electronic data messages or electronic documents.
(2) Electronic transactions made through networking among banks, or linkages thereof with other entities or networks, and vice versa, shall be deemed consummated upon the actual dispensing of cash or the debit of one account and the corresponding credit to another, whether such transaction is initiated by the depositor or by an authorized collecting party: Provided, That the obligation of one bank, entity, or person similarly situated to another arising there from shall be considered absolute and shall not be subjected to the process of preference of credits.

4. Would you be imprisoned if you are found guilty of computer hacking? Justify your answer. Specify the law, article, and section information.
 SECTION 33. Penalties.
The following Acts shall be penalized by fine and/or imprisonment, as follows: (a) Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document shall be punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.

5. How much is the fine for computer hacking? Justify your answer. Specify the law, article, and section information.

PENALTIES FOR COMPUTER HACKING
       Someone who hacks into another person's computer could be punished by a number of different crimes, depending on the circumstances. The law punishes hacking under the computer crime statutes. These crimes carry penalties ranging from a class B misdemeanor (punishable by up to six months in prison, a fine of up to $1,000, or both) to a class B felony (punishable by up to 20 years in prison, a fine of up to $15,000, or both). The law also punishes unauthorized access to a computer or computer network, with penalties ranging from a class B misdemeanor to a class D felony (punishable by up to five years in prison, a fine of up to $5,000, or both).
       A number of generally applicable crimes could also apply. For example, hacking could be done to commit identity theft or larceny and it could be punished under those generally applicable crimes.
       In addition to criminal penalties, the law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.

6. Would you be imprisoned for copying or downloading copyrighted movies and music from the internet without proper copyright permissions? Justify your answer. Specify the law, article and section information.
       
SECTION 33. Penalties.
The following Acts shall be penalized by fine and/or imprisonment, as follows: (b) Piracy or the unauthorized copying, reproduction, dissemination, distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks, such as, but not limited to, the internet, in a manner that infringes intellectual property rights shall be punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.




VIRUSES


     I LOVE YOU VIRUSDisablePwdCachingDisablePwdCaching from the computer registry. Once these changes have been made to the computer it will send it self to the people in your address book with the Subject ILOVEYOU.

How and where did the virus originated?

The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEGMP3, and certain other files on the recipient's hard disk. Because Microsoft Outlook is widely installed as the e-mail handler in corporate networks, the ILOVEYOU virus can spread rapidly from user to user within a corporation. On May 4, 2000, the virus spread so quickly that e-mail had to be shut down in a number of major enterprises such as the Ford Motor Company. The virus reached an estimated 45 million users in a single day
 Love Letter Virus, also known as the I love you virus, ILOVEYOU and Love Letter, was a computer worm originating in the Philippines, which began infecting computers on May 5, 2000. It spread by e-mail, arriving with the subject line "ILOVEYOU" and an attachment, "LOVE-LETTER-FOR-YOU.txt.vbs". If the attachment was opened, a Visual Basic script was executed, and the computer was infected. Many recipients were fooled because Microsoft Windows concealed the extension of the file, and it was mistaken as a simple text file. Once executed, the script then e-mailed itself to everyone in the victim's contact list, edited the Windows Registry to execute the worm at startup, and replaced the data in many computer files, including JPEG images and Word Documents, with copies of itself.


Who was responsible for creating and distributing?Some think it was Onel de Guzman of the Philippines. Filipino authorities investigated de Guzman on charges of theft -- at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages.
 Love Bug infects users who are using Microsoft Windows and/or Microsoft Outlook. The following are examples of what the virus might look like. If you see this e-mail do NOT open the attachment and delete the e-mail IMMEDIATELY, even if the message is from someone you know well. uThe ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the hacker used to create the worm:uThe Love Bug infects users who are using Microsoft Windows and/or Microsoft Outlook. The following are examples of what the virus might look like. If you see this e-mail do NOT open the attachment and delete the e-mail IMMEDIATELY, even if the message is from someone you know well. uThe virus begins by copying itself into the Windows directory placing Win32dll.vbs and LOVE-LETTER-FOR-YOU.TXT.vbs. Once these files have been placed on the hard disk. The virus will place it self into the computer's registry making the virus active on the following boots. The virus will also try to delete HideSharePwds


Were there any prosecution?uThe Philippine Department of Justice dropped all charges against a Manila college student accused of releasing the "Love Bug" computer virus, citing a lack of applicable laws and evidence.uThe Philippine authorities filed theft and other charges against Mr. de Guzman, but dropped them in August because of insufficient evidence. The case against him was weakened because at the time, the Philippines did not have laws governing computer espionage.
 NIMDA VIRUS
uThe worm was released on September 18, 2001. Due to the release date, some media quickly began speculating a link between the virus and Al Qaeda, though this theory ended up proving unfounded. The worm’s name spelled backwards is “admin“.uIt was unique in that it used five attack vectors. It infected email and sent itself out to email contacts; broke into web servers and infected files on websites by spreading automatically across a network; and by parasitically infecting existing programs on a hard disk.

Who was responsible for creating and distributing it?uOne of the intriguing things about Nimda, is that it was never established who created it. It appeared one week after 9/11 leading to speculation that it was created by state actors or even terrorist groups. What is certain is that it was an incredibly clever and destructive worm and perhaps a foretaste of what is to come should open cyber warfare ever break out between nation states.

How did the virus work and what effects did have?uNimda virus is a computer worm, and is also a file infector. It quickly spread, eclipsing the economic damage caused by past outbreaks such as Code Red Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.uThe Nimda worm's primary targets were Internet servers. While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time.uThe Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently.    uThe original version of Nimda infected nearly 160,000 systems, according to data from the Cooperative Association of Internet Data Analysis. Many companies pulled their networks from the Internet to avoid being infected with the worm. The worm affected many IT-related websites, including some belonging to Dell, Microsoft and even one security firm, Alternative Computer Technology.

Were there any prosecutions?uThe author of the Nimda worm was never identified, so there can be no legal consequences for him. The code for the Nimda contains a copyright notice stating that it originated in communist China, but I have seen no confirmation that this statement is correct. 


 MELISSA VIRUSDavid L SmithComputer programmer David L. Smith pleaded guilty on Thursday December 9th 1999 in USA courts for his role in creating and distributing the Melissa macro virus.


How and where did the virus originated?
Two days after his federal sentencing, the admitted creator of the "Melissa Virus" that snarled e-mail worldwide received a 20-month prison sentence from a state court Friday. David L. Smith also was fined $2,500 by state Superior Court Judge Lawrence M. Lawson. May 1, 2002

How did the virus work and what effects did have?
the virus through a hijacked AOL account to Smith, then 30. On December9th of that that year the programmer plead guilty to computer crimes instate and federal court, and stipulated in a detailed plea agreement tohaving caused over $80,000,000 in damage. The losses, coupled with otherstipulations in the plea agreement, carry a prison term of 46 to 57months.Smith remained free on $100,000 bail.There, the flurry of activity stopped. Smith's February 18th, 2000sentencing date was postponed, then, as the new date neared, was postponedagain. In all, Smith's sentencing has slipped five times. If he were to besentenced today, the elapsed time between his adjudication and sentencingwould come in at five times the 125 day federal average. The state case --subordinate to the federal sentence -- remains in limbo.Then-U.S. Attorney General Janet Reno lent a quote to the press release;Smith remained free on $100,000 bail.There, the flurry of activity stopped. Smith's February 18th, 2000sentencing date was postponed, then, as the new date neared, was postponedagain. In all, Smith's sentencing has slipped five times. If he were to besentenced today, the elapsed time between his adjudication and sentencingwould come in at five times the 125 day federal average. The state case --subordinate to the federal sentence -- remains in limbo.Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-mail program, causes the virus to be resent to the first 50 people in each of the user's address books. While it does not destroy files or other resources, Melissa has the potential to disable corporate and other mail servers as the ripple of e-mail distribution becomes a much larger wave. On Friday, March 26, 1999, Melissa caused the Microsoft Corporation to shut down incoming e-mail. Intel and other companies also reported being affected. The U. S. Department of Defense-funded Computer Emergency Response Team (CERT) issued a warning about the virus and developed a fix.
Melissa virus creator(David L. Smith)
Melissa arrives in an attachment to an e-mail note with the subject line "Important Message from ]the name of someone[," and body text that reads "Here is that document you asked for...don't show anyone else ;-)". The attachment is often named LIST.DOC. If the recipient clicks on or otherwise opens the attachment, the infecting file is read to computer storage. The file itself originated in an Internet alt.sex newsgroup and contains a list of passwords for various Web sites that require memberships. The file also contains a Visual Basic script that copies the virus-infected file into the normal.dot template file used by Word for custom settings and default macros. It also creates this entry in the Windows registry.

Were there any prosecutions?Within a week of the outbreak, New Jersey police and FBI agents trackedThen-U.S. Attorney General Janet Reno lent a quote to the press release;


                    CODE RED VIRUS


How and where did the virus originated?
The effect of this virus,  your computer will infinite sleep mode. this virus will self install to your computer and then make a 100 copy of itself but there is a bug of its code and it will create a thousands of copy of itself its like duplicating itself. the virus will check if the TCP port 80 is active if not the virus will send this kind of message:     Get /Defualt.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3#u0003%u8b00%u531b%u53ff%u0078%u0000%u00=aHTTP/1.The worm's payload is the string following the last 'N'. Due to a buffer overflow, a vulnerable host interprets this string as computer instructions, propagating the worm. Code Red Virus or Worm last july 13 2001 the virus was first noticed by the senior security engineer for the Chemical abstract services ken eichman the virus attacks almost 1000 websites in different computers, until the virus confirmed by Dshield.org and the next day the eEye digital discover the virus. between the 1st and 20th of each month the virus will rapidly spread including  20th and 28th of the month, the worm will send a junk data to port 80 of  192.137.240.91 then after 28th and it will send a lot of junk data.There is no exactly Information about who is the responsible of creating this virus, the eEye said that the virus was first originated in Makati City Philippines. the defaced web page  strongly suggest that the virus was from china. there is a rumors that the Wintermute of the virus coding group 29A is the responsibility of this virus. but Wintermute did code a virus RedCode, which is just a mistaken  for CodeRed. 

How did the virus work and what effects did have?

 At first the virus will scan the host port 80 if active then it will sends a specially Constructed HTTP get request to the victim attempting to exploit a buffer overflow problem in the indexing service, if the 2nd attempt of the virus will work the virus will automatically install to the system of the victim then the virus will send this message:

Were there any prosecutions?

 The Code Red Virus really affected millions of computer and websites including the Whitehouse.gov. to the creator of this virus creating this kind of virus that can destroy many computers and  trespass some websites specially the website of the government but somehow we still don't judge the creator of the virus we don't know he/she made this kind of virus. The Chinese people have a high IQ's when it come to technology the Chinese are advance they are really great but some Chinese use their skills in making some kind of things. so be careful of downloading and sharing files.

HACKERS



Rhaphael Gray

Teenage hacker Raphael Gray - who famously sent a shipment of Viagra Tablets to Microsoft founder Bill Gates after lifting his credit card details off the internet - has been sentenced to a probation programme of three years of community rehabilitation for his crimes
vGray was able to break into the secure systems using an £800 computer he bought in his home town ClynderwenPembrokeshireWales. After publishing the credit card info on his websites, Gray posted a personal message saying law enforcers would never find him "because they never catch anyone. The police can't hack their way out of a paper bag.“.He was dubbed the "Bill Gates Hacker" when he sent Viagra tablets to Gates' address and then published what he claimed to be the billionaire's own number.He was tracked down by ex-hacker Chris Davis who was insulted by Gray's "arrogance". It took Davis under a day to find Gray's information, which he then forwarded to the FBI. "The FBI was actually quite easy to deal with, although technically, they didn't really understand what it was I was explaining to them. The local police were also very polite, but they didn't understand it," said Davis. Gray was arrested when FBI agents and officers from the local Dyfed Powys Police turned up at the door of his home, which he shared with his mother, sister and brother in March 2000vA court heard that Gray, praised by one victim for making the Internet more secure , within 6 weeks Gray obtained access to over 23,000 different credit cards by hacking into web sites . Police on both sides of the Atlantic took a month to track down the hacker to his home, where he was arrested by FBI agents.vGray called himself "Curador", a Portuguese word from the Latin for curator, on his internet sites e-crackers.com and freecreditcards.com, where he published details of his target companies and own beliefs.
What was this case all about?v The case was all about t the computer systems were hacked by Raphael Gray for just six weeks and the multi-million pound credit card mission was putted up. He insulted the police in which they would never found him for the reason that they never caught everyone. In his task he was irritating to prove the fragile safety of credit cards in the increasing quantity of consumer websites. Unfortunately, because of his overconfidence and evil desire, he was chased down by hacker Chris Davis and sent to FBI. 


who are parties involved?vThere were no protagonists involved. He was just relying on his 800 computer he brought in his home. He broke the security systems of credit cards and published. The parties involved were the law enforcers which he insulted and then arrested him and his tracker Chris Davis.


Did any prosections result?vThere were no results done by prosecutors. Raphael Gray was arrested by FBI agents and the officers from the local Dyfed Powys Police. I think there would be a possibility that after he was arrested, he was sent to Chris Davis and talked.
Master Of DeceptionAcid Phreak Founded the Master Of Deception with scorpion and HAC. The name itself was, Among other things, a Mockery of LoD, as ‘M’ is one letter up in the alphabet from ’L’. Although the name originally was a flexible acronym that could be used to identity membership in situation where anonymity would be the best course of action. It could stand for “Millions of Dollars” just as easily as “Master Of Deception”It is also claimed that the mockery of the LOD name was a statement to the underground that LOD has lost its direction. Several LOD members were closed friends of MOD who has been raided and indicted by the government, causing the majority of those who remained to drop out of the underground for safety reasons. In their absence, LOD largely fell into disarray causing the disagreement and disillusionment that led Phiber Optik to align himself with Mod in an Effort to restore the direction of the spirit of underground hacking.


What was this case all about?A New York-based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution, as well as being the subject of the Master of Deception: The Gang That Ruled Cyberspace. Mod’s initial membership grew from meetings on Loop-Around Test Lines that led to legendary collaborations to hack RBOC phone switches and the various minicomputers and mainframes used to administer the telephone network. They successfully remained underground using alternative handles to hide even their true hacker identities.


Who are the parties involved?
The original Masters of Deception included: Mark Abene (“Phiber Optik”), Paul Stira (“Scorpion”), Eli Ladopoulos (“Acid Phreak”), HAC, John Lee (“Corrupt” a.k.a “Netm1z”) and Julio Fernandez (“Outlaw”)Additional members whose real names are unknown included: Supernigger (also of DPAK), Wing, Nynex Phreak, Billy_the_kid, Crazy Eddie, The Plague, ZOD, Seeker, Red Knight(who was also a member of Cult of the Dead Cow), Lord Micro, n00gie and peaboy (aka, MCI Sprinter).


Did any prosecution result?As a result of a major nationwide investigation by a joint FBI/Secret Service task force, five of MOD’s members were indicted in 1992 in federal court. Within the next six months (in 1993), all five pleaded guilty and were sentenced to either probation or prison.LEGION OF DOOM 


WHAT WAS THIS CASE ABOUT?      The legion of doom was A hacker group active from the 1980’s and early 2000. Their name appears to be A reference to the antagonists of challenge of the super friends. LOD was founded by the hacker Lex Luthor (Vincent Louis Gelormine), after a rift with his previous  group the knights of shadow.


WHO WERE THE PROTAGONIST AND PARTIES INVOLVED?

        At different points in the group’s history, LOD was split into LOD/LOH (LEGION OF HACKER) for the members that were more skilled at hacking than pure phreaking. The overall beliefs of LOD and MOD were different, but it can be difficult to untangle the action of the member since there was a cross-over between the two groups.At different points in the group’s history, LOD was split into LOD/LOH (LEGION OF HACKER) for the members that were more skilled at hacking than pure phreaking. The overall beliefs of LOD and MOD were different, but it can be difficult to untangle the action of the member since there was a cross-over between the two groups.
                       

DID ANY PROSECUTION RESULT? The Secret Service made some major breakthroughs in Hacking circles in 1989 as three members of the Legion of Doom were arrested (Franklin Darden, Adam Grant and Robert Riggs). They were charged with hacking into Bell South’s