Under The Wire
Firebase Dell, Connecticut. 2100 Hours. External conditions: Dark. Reported movement outside the wire. Central command is expecting enemy activity tonight. Assignment : check and stabilize cyber-firebase Dell. Prevent intrusions and viral infection.
It’s late and I sit down to walk the computer perimeter. As I scroll the endless sea of daily activity and peruse the America On Line notices, I notice a small gap. It appears someone has wandered into a protected area and erased their footprints. The enemy agent has been working on a less patrolled corner of the firebase trying to penetrate my protective defenses. I can almost see him, in his little black pajamas, a coy intruder using stealth and exploiting our generation gap. When I interrogate the suspect, he confesses that he was trying to get on Webkinz to feed his virtual animals. I am suspicious. Webkinz sounds like a foreign acronym for a deadly virus or worm. The next thing I know, I will be getting pop up emails from someone named Ivana suggesting that we meet at least once before moving ahead with the marriage. How we went from Webkinz to Russian mail order brides I will never know. The one thing I know for certain is once again, my computer will be compromised.
I have a constant battle with viruses on my PC. It got so bad two years ago that I had to swap out my hard drive. I would boot the computer and it would immediately tell me I have won the Ghana National Lottery and then whip me off to another website where I could buy copious amounts of Oxycontin, Viagra and Xanex. If a person actually consumed all of these potential purchases, they would probably try to seduce a silverback gorilla at the Bronx Zoo and then spontaneously combust, or perhaps just become a conservative radio talk show host. Point is, the gremlins had gotten under my meager defenses, penetrated my perimeter with virus after virus and completely ruined my hardware.
I decided to buy Norton Anti-virus to confound the virus gremlins. For good measure, I overlayed MacAfee Firewall on top of it. The result was the equivalent of fitting my computer with a protective chastity belt and then throwing the key into Long Island Sound. I could not even figure out how to get on to the Internet without going through more doors than Maxwell Smart. It felt like a maze of cyber metal detectors, frisking me before I even entered my own computer. The application window kept saying that the delay was due to the computer loading an approved list of sites. Yet, the approved sites slowly reduced to a Dell accessories store and Norton Update. I began to refer to this unholy offspring of MacAfee and Norton as MacNorton. MacNorton was so effective in controlling access that no one could use the computer. My days of being plagued by messages suggesting I buy Rolex watches or help wealthy
Africans who wanted to deposit $ 10,000,000 into my bank account because I was named in someone’s last will and testament – were all done. I could not get on to AOL. I finally found a way of accessing Internet Explorer by setting my computer back to an earlier date through System Restore, accessing AOL via the web and then retrieving my mail as a guest. I might as well have been in doing all of this from an internet café in Madagascar.
No good deed goes unpunished. Webkinz, YouTube, My Space, Itunes and a parade of other seemingly benign Trojan Horses all require some degree of permission. Hiding in these cyber facades are little Greek cookies and enemy tracking devices that will case my perimeter looking for a weak spot. “ Dad, if I don’t feed my Webkinz , he will die”. One of my kids complained. Hmmm. Perhaps this was a great opportunity to teach my kids about one of life’s great mysteries and inevitable passages and do it in a virtual manner. I wondered what would happen if we did not feed that virtual cat. Would the Webkin become ravenous. Would Webkinz animal control officers break into the cyber house to thwart the abuse ? Would the cat scratch the hell out of the furniture and foul the room before going to the great kitty litter box in the sky – – now that would be virtual reality !
I once again laid down the law that my office computer was off limits. They saw me for the paper tiger that I am and waited for me to go to work. They promised me to use the other computer that I had explicitly purchased for them to use to access the internet and play games. The problem with this fully loaded Dell wireless laptop – – with the chrome bumpers and the V10 engine, is it was now so riddled with viruses that it just laid on its side and as you walked by it would whisper , “ kill me, please, just kill me“. As we do not believe in computer euthanasia in my house, we just waited patiently for it to die.
I devised a plan. I must first purchase an iMac for the “power user” 14 year old who has been capable of hacking into the Kremlin for years and has probably been on the payroll of the CIA since middle school. The plain envelopes addressed to her from Langley, Virginia were a dead give away. If I could neutralize the power user, I could cut enemy activity by 33% – 45%. The black pajama crowd was more difficult to disable. Being young boys, they are predisposed to only hear 25% of what they are told and obey 50% of that. That is a 12.5 % compliance rate. As a male, I understand their compliance will never be more than 50% but such a low likelihood of success required drastic measures. I eliminated instant messaging. I deleted games and applications. I reinstalled Norton. I calibrated firewalls to their age group and entered a new password. It worked.
Nowadays, I come home and the computer boots up quickly. The website history is gloriously weak and showing signs of diminished interest in the internet. I am pleased. While I write my latest diatribe, I receive an email announced with a “ping”. I toggle to received messages. It’s a note from someone named Svetlana69 and she wants to know when I want to meet.