My computer is possessed.
I’m nearly certain of it. I say nearly because this is strictly a gut instinct based on years of a Catholic upbringing, recalling bloodcurdling, spine-chilling words whispered by the nuns who taught our catechism classes and warned us of the imminent dangers when messing with the dark side. They listed all the classic signs of demonic domination:
Flickering lights? Check.
Erratic movement and activity—not by your hand? Check.
Bizarre and spasmodic sounds impossible to locate or predict? Check.
The ability to levitate of its own accord? … Not yet, but I’m totally prepared for this to happen and won’t be caught off guard when it does. Seeing that will explain absolutely everything else.
Most folk, in this modern day and age of tech talk, gadgetry and regularly giving birth to children who can reprogram satellites by the age of six, have grown accustomed to the idea that they either keep up or bite the dust. It’s like running alongside a train that’s picking up speed and every time you brush the fingers of the guy who’s reaching to pull you in, someone slams the door shut and slides open the entry to the box car in front of it. And instead of just somebody new reaching for you, they’re now also offering you a cool drink—which at this point you’re desperate for, but still can’t quite reach. And so it goes.
Somewhere within the time frame of barely grasping word processing (plus a couple of DOS code commands) and grappling with the concept that someplace in the air above me floats everything on my hard drive, smart phone and tablet, there is another sector of computer practice that befuddles me to the core. Other people are using it. Let me make this clearer:
Other people—people I don’t know, have never met, and haven’t given permission—are using my computer.
I first recall seeing “remote” usage of my computer when, years ago, after unsuccessfully thumbing through the eight manuals that accompanied that dinosaur and holding on the phone for approximately the same amount of time it takes to make cheese, a pricey technician was granted access to fix some niggling problem. Seeing the arrow my mouse used to have control over being manipulated by a faceless operator proved fascinating. Sadly, it always moved to quickly for me to register what to click or unclick should my problem reoccur.
Shortly thereafter, I remember thinking the world was full of hackers. The news raged over them, spy novels were rife with them, Hollywood made blockbusters about them and I sat staring at the index to my “help” files wondering how in the world folks could overcome the quirks of their own computers and then manage to have leftover time to mess about with somebody else’s.
The whole hacking culture is a bit of a head-scratcher to me, and what defines this group is heatedly debated. There are classifications and subgroups that depend upon the attitude, the aim and ambition of each individual. Do you hope to breach security, make money, send a message or befuddle the Luddites? Then you might be a white or a black hat, maybe a script kiddie, a neophyte or a hacktivist, or even simply a cracker. If you’re going to be one of these, you will need a cutting-edge education of computers and their networks. There is no technical help line that will walk you through the steps of ‘How to hack into Twitter accounts.’
In addition, there is another brand of hacker I came to admire simply from having enjoyed the college tour at MIT. Here, our guide told stories about the much loved school tradition of demonstrating technical prowess and jaw-dropping ingenuity in the form of institutional pranks. These are not your typical ‘Animal House’ fraternity shenanigans, but rather, “We’re going to need a crane and a squadron from the National Guard to fix this,” type of tomfoolery.
The one thing both of these groups have in common is what baffles me most.
Knowing how long it takes me to defrag my computer and run a simple disc cleanup, I’m wondering when these people have an opportunity to do laundry. It’s not surprising to find out that a sizeable chunk of these tech-savvy cool cats are young enough to still occupy a room down the hall from their parents—which explains my query regarding their dirty clothes.
Recently, I walked passed my daughter’s laptop and stopped to watch what I thought was a pretty nifty screensaver. When I asked her about it, she informed me that, no, this was not some downloaded piece of fluff, but that she had actually loaned her computer to science. Apparently, when she’s not using it herself, she lends her computing power—along with multitudes of others—to analyze data while it scours the universe for intelligent life. Hers is part of a virtual supercomputer for SETI@home. Those pretty squiggles were simply an indication that her laptop was actively reading radio bandwidth.
And now I look askew at my own PC, wondering if she has rigged my computer to service science, if a huckster has hacked my doohickey, or if indeed a demon has bedeviled my data processor.
I’m just waiting on the floating keyboard. Call it an old Catholic stirring, but I’m pretty sure a phantom has floored my firewall.
Don’t forget to check out what we’re cookin’ in the Scullery (here) and what we all talked about down in the pub (here). And to see more of Robin Gott’s humor–all from the only pen carved from a human funny bone–click here.
- Companies Attend International Conference For Computer Hackers (fox2now.com)
- 4 Reason’s Why Twitter is the Easiest Social Media System to Crack (moderndignity.com)
- Letting Companies Hack the Hackers: What Could Go Wrong? (businessweek.com)