||Oracle Tips by Burleson
Chapter 5 -
All About Cybercrime
Threats over the Web
If a pattern develops, it may become possible to
recognize messages from the perpetrator without opening them. If the
person sending the messages is at all technically sophisticated,
they may attach scripts that will be executed when the message is
opened. These scripts can be written to reduce the usability of the
message as evidence in the event of an investigation. If the
recipient knows the message is from the person harassing them, they
should just leave it alone and pass it on directly to law
Another type of pesky troublemaker lurking about on the Internet
today is known as a troll. A troll sends obnoxious messages to a
large group of people, knowing that at least some of the recipients
will respond in kind; which as it turns out, is exactly what they
are hoping for.
A troll is looking for a fight, and anyone will
do. Deleting a message from a troll is exactly the right thing to
do. The problem is, just as before, it is hard for anyone to know
that they are dealing with a troll or something more dangerous. It
takes time for patterns to develop and clues to fill in the picture.
As an alternative to immediately deleting
suspected troll messages, save them in a special folder. Never
respond to them in any way, because this will only feed the fire.
If the situation develops into a legitimate threat, the early
messages will be there ready for law enforcement to use as
evidence. If the messages dwindle in number and eventually dry up
completely, it is likely that the perpetrator hailed from a lower
rung of the pest ladder and is now hurling insults at someone else.
Threats are undeniably a little unsettling for
most people, but often they are just that and nothing more. In the
next section, details will be presented on a group of Internet
criminals who engage in more damaging practices.
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA