Fifteen Minutes Of Fiction Writing Gallery

Battleground of the Computer - Introduction: Characters
Posted by Josiah T., Nov 20, 2008. 2321 views. ID = 2020

Battleground of the Computer - Introduction

Posted by Josiah T., Nov 20, 2008. 2321 views. ID = 2020
This post was written in 0 minutes.
DISCLAIMER - I do not own the rights to, nor am I trying to advocate, endorse, or otherwise promote any of the programs mentioned in this writing. The removal processes mentioned in this story should NOT be tried at home - they are only to be used by a professional. An inexperienced user can severely damage their computer by attempting the removal processes mentioned in this writing.

This is only an introduction to the story, introducing the characters. This should prove to be fun, I'm not sure exactly where it'll go, but I'm going to try and keep the story on the light side...
This post has been awarded 17 stars by 5 readers.
This post is Part 1 of a writing series titled Battleground of the Computer.

The Good Guys

Firewall - The first line of defense. Blocks some 90% of all threats
Anti-Virus (AV) - Second line of defense - attempts to block the other 10% of threats
Anti-Spyware (AS) - Paid subscriptions often try and block spyware, free programs usually just scan for and remove it.
- Malwarebytes Anti-Malware
- Spy-Bot Search and Destroy
- Ad-Aware
- SUPERAntiSpyware
Removal Tools - DOS based tools for removing spyware and cleaning the registry.
User - You. The person using the computer.
Tech - Me. The person fixing the computer.

The Bad Guys
Hackers - Try and hack into computer to steal personal data. Firewall attempts to block hacking attempts.
Virus - Infiltrates computer via web browsing, email, and any other route into the computer. Tends to be very destructive and replicative - it destroys files and replicates itself on the computer, and often emails itself to other users.
Spyware - Infiltrates computer mainly through web browsing and false advertising and false alerts. Tries to steal personal data (credit card numbers, passwords, etc.)
Malware - Can be either spyware or virus. Infiltrates computer by user visiting sites they shouldn't be going to. Once installed, it pops fake infection alerts, and brings more spyware and viruses in.
Trojan - Can fall under either spyware or virus. A Trojan Horse tries to attach itself to files that look legitimate, and then opens security holes for more bad stuff to come in.


Copyright 2008 Josiah T.. All rights reserved. FifteenMinutesOfFiction.com has been granted non-exclusive rights to display this work. For permission to reprint this item, please contact the author.
 


   
You must be logged in to comment on or rate this writing.

Click here to join the Fifteen Minutes Of Fiction Writing Community!

This post has been awarded 17 stars by 5 readers.
This post is Part 1 of a writing series titled Battleground of the Computer. The next part of this series can be found here: Battleground of the Computer Part 1 - Infection.
This post is part of a writing prompt: Short Story
This is a revised version of a post. Click here to view the original version

Comments


Douglas
Nov 23, 2008
Better hurry up - the month is almost over already!!! :)
   ~Posted by Douglas, Nov 23, 2008



Search for Great Fiction

Use the google search bar below to find writings exclusively on this site.

Custom Search



News!    Writing Prompt    My Assignment    FAQ    Contact    Privacy Policy    Search     Terms of Use     Login