A creative practical joke


To : All OFWEmpowerment blog readers

This is regarding  to our blog post titled “Job Opportunity“,  please be informed that the  two email addresses posted in that particular entry where you can send your resumes was hacked as reported by my friend Mr. Jun Saldo.

In view of this, please send your resumes or biodata’s  direct to the recruitment agency in Philippines. You can click this link:  http://www.medicalstaffing.com.ph/  and look for their email address.  This could prevent  the hacker from whatever he/she have in my mind or reason for hacking my friend’s email addresses.  I am so sorry for this inconvenience.

To the hackers,  may I remind you that hacking is punishable under  RA No. 8792 or the Philippine E-Commerce Law which penalizes hacking under Sec. 33 (a) which states:

 “Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document shall be punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.”

In Saudi Arabia  article 3 of the country’s “Anti-Cyber Crime Law, Royal Decree No. M/17 8 Rabi 1 1428 / 26 March 2007states: “Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding one year and a fine not exceeding hundred thousand riyals or to either punishment:”

1. Spying on, interception or reception of data transmitted through an information network or a computer without legitimate authorization.

2. Unlawful access to computers with the intention to threaten or blackmail any person to compel him to take or refrain from taking an action, be it lawful or unlawful.

3. Unlawful access to a web site, or hacking a web site with the intention to change its design, destroy or modify it, or occupy its URL.

4. Invasion of privacy through the misuse of camera-equipped mobile phones and the like.

5. Defamation and infliction of damage upon others through the use of various information technology devices.

To those “hackers” who stole my friend’s yahoo and hotmail account;  identity theft or larceny is punishable under above applicable laws by a number of different crimes, depending on the circumstances.

hackers-100013444-largeFurther, in U.S., the Defense Advanced Research Projects Agency (DARPA) created the Cyber Genome program to combat the growing threat of cyber attacks on US resources.  Cyber Genome, a project aimed at developing a “cyber equivalent of fingerprints or DNA”, so that the hacker can be conclusively identified. The project under the supervision of DARPA will strive to produce “revolutionary cyber defense and investigatory technologies for the collection, identification, characterization, and presentation of properties and relationships from collected digital artifacts of software, data, and/or users.

Maybe with the recent cyber developments in U.S., the “hackers” days are numbered but for the sake of our readers – the following steps may  safeguard your computer and prevent computer hacking (taken from WikiHow).

  1. Perform required software updates for your operating system and web browser.
  • Hackers attack where they see weakness. A system that hasn’t been updated recently has flaws in it that can be taken advantage of by hackers.
  • Go to the Microsoft Update website to download patches and secure the most recent version of your operating system. If you have a Mac, click on the apple in the top left of your screen and choose “Software Update.”
  • Type your browser plus “update” into a search engine to find the company’s site and download the newest version.

      2.   Install a firewall on your computer.

  • Firewalls forbid outside threats such as hackers and viruses from gaining access to your system.
  • Personalize your firewall settings during the setup process to reflect how much data you want to allow into your system from the Internet.
  • Update your firewall regularly.

     3.  Change your passwords every month.

  • Use multiple, intricate passwords for each website you log onto. Banking and other financial websites are especially important to maintain security.

     4.  Purchase or download anti-virus software.

  • Many computers come pre-installed with certain anti-virus software, but if not, or if you want more powerful software, research online to find what product suits you. Anti-virus software is crucial to keep your computer healthy. A “sick” computer, or one racked with viruses, is more susceptible to hacking.
  • Set your preferences so your anti-virus software updates automatically.

     5. Install anti-spyware/adware programs onto your system.

  • This type of intrusion is not as dangerous as a virus, but adware places advertisements onto your browser and incorporates pop-ups into your programs. This can slow down your computer, making you vulnerable to a hacker. Spyware can survey your Internet behavior and copy your passwords to use for illegitimate purposes.

     6.    Delete emails from unknown sources. Never click on an emailed link that looks questionable.

According to online article  “The Meaning of Hack“,  “hacking” might be characterized as ‘an appropriate application of ingenuity’. Whether the result is a quick-and-dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.  An important secondary meaning of hack is ‘a creative practical joke’.  This kind of hack is easier to explain to non-hackers than the programming kind.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s