1.Who is Mafiaboy? What crime did he commit?
Mafiaboy is otherwise called Michael Calce is an Canadian IT security expert. In mid 2000, aged of 15 and the alias of Mafiaboy, Calce shut down the Yahoo, the Web’s best internet searcher at the time, for just about an hour with a denial of service attack.He additionally cut down the sites of CNN, Amazon, eBay and Dell. He wrote about in his book “Mafiaboy: A Portrait of the Hacker as a Young Man.”

2. How did Mafiaboy performed the attack?
Mafiaboy was accused of conducting an attack against Cable News Network’s Web site. He is the first to face charges in the onslaught that hindered access to the World Wide Web si tesof Yahoo, eBay and E*Trade, among others, and forced hundreds of other big-name sites to shore up their defenses against an invisible and far-flung threat.
3. Who is Onel de Guzman? What crime did he commit?
One lde Guzman is a Filipino student from AMA who turned into a suspect for releasing the “I Love You Virus” because of a thesis proposal he had submitted to his college which was rejected because it was unethical. Onel admitted that he may have accidentally spread the infection
4. How did Iloveyou Virus spread throughout the world? How much was the damage?
On May 4 2000, an email bearing the title ”I LOVE YOU” started springing up in PCs in Asia. It spreadby email, touching base with the title “ILOVEYOU” and a connection,”LOVE-LETTER-FOR-YOU.txt.vbs”. In the event that the connection was opened, a Visual Basic content was executed, and the PC was tainted. Numerous beneficiaries were tricked in light of the fact that Microsoft Windows hid the expansion of the record, and it was mixed up as a basic content document. As indicated by a few gauges, the ILOVEYOU infection caused $10 billion in harms number of exploited people maybe doesn’t clarify all the harm the infection made. With such a significant number of unfortunate casualties hit, many mail frameworks around the globe totally over-burden, Menke caused, “enormous lump of the organizations and governments to completely pound down to a stop.
5.Who is the suspect behind hacking the COMELEC website in 2016?
The suspect of hacking the COMELEC is Paul Zulueta Biteng, He is 23 years old recently graduated in April 2016 from the Perpetual Help College of Manila. He is a Bachelor of Science in Information Technology degree holder and a worldwide network programmer who take part in virtual fighting in the web. He believed that he is a white hacker he breaks a system to test the website’s security and help to improve it.

6.What was the reason behind hacking?
According to him the reason behind why he hacked the COMELECT is to expose the vulnerability of Comelect’s website into public.
7.What are the possible and most dangerous effect of Computer Viruses

Some PC diseases are adjusted to hurt the PC by hurting programs, eradicating reports, or reformatting the hard drive. Others basically rehash themselves or surge a system with movement,making it difficult to play out any web action. Without a doubt, even less destructive PC contamination can in a general sense irritate your system’s execution, sapping PC memory and causing progressive PC crashes.
8.What is the differences between a hacker and a cracker?

A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data. While the cracker is someone who breaks into someone’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site’s security system.
https://searchenterprisedesktop.techtarget.com/tip/The-difference-between-hackers-and-crackers
9.Different computer virus from a worm.

The virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels. Viruses can range in severity from causing mildly annoying effects to damaging data or software and causing denial-of-service conditions. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.When the host code is executed, the viral code is executed as well. The worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them.
https://www.cisco.com/c/en/us/about/security-center/virus-differences.html
10. How can a system or website be protected against computer malware and hacking.
To protect your computer to computer malware and hacking, first is to Install a firewall, the purpose of firewall is to protect your computer from hackers and viruses. Second, is to install antivirus software, this software is used to detect and prevent dangerous viruses from interfering your computer by searching your computer for signs of virus activity. The third one is Install anti-spyware because spyware attempts to monitor your behavior so that it can collect the personal information, reconfigure your computer or force unwanted pop-ups and advertising. The last one, is Install a spam blocker or filter in your email accounts this is the easiest ways to idedentify thieves to trick you. Be careful about opening attachments and downloading files from emails, you can reduce your risk of becoming a spam victim.

http://www.identitytheftkiller.com/secure-computer.php


