Sidebar

The Scumware Conspiracy

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

I'm not a conspiracy theorist. It's true that, as a paranoid person, there's no doubt in my mind--no doubt whatsoever--that everyone, absolutely everyone is out to get me, but I think they're acting independently. Only a particularly diseased mind could believe that the whole world is conniving in concert as part of some grand conspiracy against me. Surprisingly, that's not something I believe. Then again, I may be wrong. Maybe the whole world is plotting against me and I'm the only one who doesn't know it. But no, that couldn't be it, could it?

While I'm not a conspiracy theorist myself, I offer this hypothesis for those among you who are, in case you're running out of theories of your own: Governments and PC makers are working in cahoots to create and infect our computers with spyware, adware, viruses, and other sorts of scumware. Spread the word. And remember, you read it here first.

This isn't something that popped into my mind fully formed. I heard it from a woman I met on the street. She was wearing a hat made of aluminum foil so that the government wouldn't be able to read the electromagnetic pulses generated by her brain and a lead suit to protect her from the gamma rays that our enemies are beaming at us around the clock in order to sterilize us. At least, those were her explanations for her rather bizarre getup. Based on her protective gear, I at first thought she was a woman I had dated for a while, but it turned out that I was wrong about that.

The whole time that I was with her, her eyes constantly shifted furtively from side to side as if she expected to catch somebody following her. In addition, she persistently bobbed and weaved precisely out of synch with the movement of her eyes, which, she explained, made her a more difficult target for the enemies arrayed against her, although it also made our conversation somewhat disconcerting for me. Being an obviously very nervous person, she probably wouldn't have talked to me--a total stranger--at all, but we neurotics have a natural affinity for each other. There was that and the fact that she was from out of town and desperately needed directions to the convention center.

Because she looked extremely weird even to me, I was ready to discount everything she said, but then she told me that she was an investigative journalist. An investigative journalist! How could I possibly doubt her story after learning her occupation? Working undercover, she had infiltrated Area 51, the top-secret military installation in Roswell, New Mexico, where the government is hiding the aliens who landed on our planet. She was in town to attend a UFO convention, where she was going to reveal her findings. I was still reluctant to believe her, but she showed me her press pass, so I knew she was legit. After relating all of this to me, she told me about the last story she worked on--the one in which she discovered the clandestine plot hatched by the government and the PC makers.

I'm no fool. I'm not going to fall for a fairy tale told by some nut on the street. If I wanted to do that, I'd just listen to the voices in my head. So I did my own in-depth analysis of the evidence. I'm now convinced that she's right.

How did I come to this conclusion? Let me start with the PC makers. How do they make their money? They make it by selling PCs. That's how. Anything that helps them sell more PCs makes them more money. Plain and simple.

What did I read in a July 17, 2005, New York Times article titled "Corrupted PC's Find New Home in the Dumpster?" Yes, that's right. People are junking their PCs rather than going through the aggravation of trying to sweep the adware, spyware, and viruses off of them. That seems a bit extreme to a skinflint like me, but there you have it. There's the clear motive for the PC makers to create and distribute the evil scumware that threatens our computers.

Do you want further evidence? What type of employees do PC makers have in abundance? Geeks, that's what type. Geeks are just as capable of writing malicious software as they are of writing the good kind. OK, now we've got the means and the motive. All we're missing is the opportunity.

Missing? Yeah, right. Even if your PC had been shipped to you clean (and tell me, exactly how would you know that there wasn't already any scumware on it when you got it?), what does every computer come with these days? Along with other suspicious electronics, they come with modems and network cards. In addition, laptops usually even have one or more varieties of wireless networking capabilities built in. You don't have a choice. It's just there. Why do the PC makers do it? Is it out of the goodness of their hearts? Not on your life! Thanks to this ploy, just about everyone's computer is now connected. And that provides the opportunity to distribute scumware. Motive, means, and opportunity--there isn't a jury in the world that would acquit them.

It all comes down to unbounded greed. The PC makers have been making good money over the years simply by relying on legitimate software vendors to continue to add more and more features that people don't really need. At the same time, the software vendors also spend a lot of their marketing dollars to convince people that they can't possibly live without these new features. The result is that no computer older than six months is able to run today's software. But I guess that replacement cycle wasn't short enough for the PC makers. Or maybe they didn't want to rely on someone else to do their dirty work for them any more. Whatever the reason, the case is clear: They wanted more. Greed. Greed. Greed. That's all it is.

OK, I've proven the PC makers' participation in the conspiracy beyond a shadow of a doubt, but what about governments? Where do they fit into this scheme? I'm glad you asked.

Over the past few months, I've been reading about more and more jurisdictions that have imposed or are considering imposing taxes on PCs to cover the cost of disposing of or recycling them. Sure, the tax may initially be set at or below the breakeven point, but how do you bring costs down? Volume, that's how. In order to achieve economies of scale and improve efficiency by learning from experience, governments need their citizens to discard lots and lots of PCs in the governments' disposal and recycling operations. It's the only way that they can make money on these new taxes.

Do governments have the means to develop scumware? Maybe not. If you believe the media, just about every IT project that governments undertake comes in way over budget and way behind schedule, if it's completed at all. If governments tried to write the scumware themselves, they would almost certainly end up losing money on the deal, assuming that they ever managed to finish the software in the first place. That's why they needed to involve the PC makers in their wicked conspiracy. It's an open and shut case.

I know what you're thinking: I've shown only the government's motive. How can I convict them of a conspiracy on such scant evidence? Well I ask you, who are you going to trust, me or the politicians? I rest my case.

So that's it. No rational human being can refute it. The government and the PC makers are participating in a massive conspiracy to inflict spyware, adware, and viruses upon us. Of course, I could be wrong. In which case, the conspiracy theorists can go back to investigating and propounding the fluoride in the water system, the Kennedy assassination, and the faking of the moon landing conspiracy theories.

Joel Klebanoff is a consultant, a writer, and president of Klebanoff Associates, Inc., a Toronto, Canada-based marketing communications firm. Joel has 25 years experience working in IT, first as a programmer/analyst and then as a marketer. He holds a Bachelor of Science in computer science and an MBA, both from the University of Toronto. Contact Joel at This email address is being protected from spambots. You need JavaScript enabled to view it.. He didn't get the number of the lady with the aluminum hat. If anyone has it, please pass it along. She kind of turned him on.

Joel Klebanoff

Joel Klebanoff is a consultant, writer, and formerly president of Klebanoff Associates, Inc., a Toronto-based marketing communications firm. He has 30 years' experience in various IT capacities and now specializes in writing articles, white papers, and case studies for IT vendors and publications across North America. Joel is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. He holds a BS in computer science and an MBA, both from the University of Toronto.


MC Press books written by Joel Klebanoff available now on the MC Press Bookstore.

BYTE-ing Satire BYTE-ing Satire
Find out the hilarious answer to the eternal question: "Is technology more hindrance than help?"
List Price $14.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.