Lead Image © aphaspirit and Brian Guest, 123RF.com

Lead Image © aphaspirit and Brian Guest, 123RF.com

Feeding Seagulls Is Wrong

Welcome

Article from ADMIN 40/2017
By
"Please do not feed the seagulls" is good advice, and I'm not really talking about seagulls.

"Please do not feed the seagulls" is good advice, and I'm not really talking about seagulls.

I've heard and read all sorts of reasons for not feeding seagulls. From spreading diseases to overpopulation to developing a dependence on humans for food – I've heard it all. To me, the most logical reason not to feed seagulls is that they don't stop at a simple snack; they come back for seconds, thirds, or even more. Once you reward a seagull for basically just being a seagull, you've started a chain reaction that now places the seagull into the awkward position of annoyingly begging you again for what you gave so freely at first. OK, so I'm not really talking about seagulls, here, nor am I talking about feeding them bits of bread or Cheetos. I'm referring to paying ransom to ransomware writers and perpetrators. Allow me to explain.

Ransomware is vile and disgusting. It is the lowest form of malware. Encrypting a victim's files and then demanding money to unencrypt them is just incomprehensible to me. To deny someone access to pictures of their children, even if there are pictures of those children feeding seagulls, is despicable. Furthermore, the blackmailers are too cowardly to accept payment in cash or in person. Instead, they demand their ransom to be paid in Bitcoin – the "currency" of illegal global trade.

I know several people who've paid ransom. I know others who've refused and just dealt with their losses. Still others have been patient and found solutions online that decrypt their files without paying one red cent or even one imaginary e-blip to a cyber blackmailer.

My advice is to not pay the ransom. By paying, you're rewarding these blackmailers for doing something evil, disgusting, and illegal, and it makes them come back for more. Plus, who's to say that once you go to the trouble of acquiring Bitcoin and paying the ransom you'll get the code to decrypt your file? A hosting company is South Korea recently

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Discover ransomware with PowerShell
    Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
  • Freeing your data from ransomware
    Cyber criminals don't need access to sensitive information to blackmail their victims. Simply encrypting everyday files can be enough to extort money from users, whose data is only unencrypted after they pay a ransom – and possibly not even then.
  • Halting the ransomware blackmail wave
    In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
  • Ransomware: Prepare for emergencies
    The danger of ransomware attacks calls for a robust backup and monitoring strategy.
  • Preparing for cyberattacks
    The possibility of a ransomware attack means it is essential to prepare for cyberattacks by putting defense mechanisms and contingency plans in place.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=