The internet seems to be all-powerful and indestructible - but in theory it can be destroyed in a number of outlandish ways. check out how could you do that ...




















1. We Have Liftoff!







10. Crawling Towards the Future
The Windows worm called Conficker could give a hacker unrestricted access to every infected machine on the planet. And the aggressive bug could be hiding on your PC at home right now, waiting to kick in.
For the hackers, it’s like having a virtual army at their fingertips.
The criminals behind it have the power to launch a tidal wave of junk emails, bringing computers grinding to a halt.
They could also plunder information, including your bank details.
But the truth is that the best techie brains in the business just don’t know exactly what the hackers have in mind.
Virus expert Mikko Hypponen, from the firm F-Secure, said: “It is scary thinking about how much control a hacker could have over all these computers. They would have access to millions of machines.”
Microsoft, who developed the Windows computer operating system, have slapped a £175,000 bounty on whoever is responsible, so far without success.
The sophisticated Conficker bug — also known as Downadup or Kido — targets systems via the web and can be spread on memory sticks.
More than nine million computers were infected at the bug’s peak last month.
And if Conficker is still on your system come Wednesday, you could be in trouble.
Once inside your PC, it sets up files and starts downloading information from a controlling “boss” server.
Finding that website and the mastermind behind it all is like looking for a needle in a haystack.
That is because the bug creates hundreds of bogus addresses every day to put investigators off the scent.
The infected PCs then form a network and “talk” to each other, updating and evolving.
The bug even attacks anti-virus software and other files on your computer to strengthen its position.
And it resets “restore” points, making recovery of your old system even harder.
The first of three Conficker strains was discovered in November last year.
A second, more aggressive strain followed in December and a third this month. This contains the all-important April 1 trigger.
Trigger :
The internet is filled with threats real and imagined, from malicious hackers to government censors.
1. Warrantless Government Monitoring : Following the Sept. 11 terror attacks, the practice of wiretapping all internet traffic began in the United States with the Bush administration, and is now being defended in court by the Obama administration. All of the nation's major internet service providers are accused of funneling Americans' online traffic to the National Security Agency without warrants.
2. Private Censorship : From the mundane to the frightening, the examples run rampant. Wikipedia, the world's most trafficked online reference tool, is subject to shameful spin from trusted names of news organizations to the not so trustworthy engines of commerce. Among the examples, The Boston Globe enhanced the biography of a columnist while deleting information about his alleged plagiarism. Diebold excised an entire section critical of the company's voting machines.
3. Government Censorship : Reporters Without Borders reported last week that 12 nations — China, Burma, North Korea, Vietnam, Egypt, Iran, Syria, Saudi Arabia, Turkmenistan, Uzbekistan, Cuba and Tunisia restrict internet access and often prosecute users for what they post online.
4. Deep Packet Inspection : Several U.S. internet service providers, including giants like Comcast and Cox Communications, have started inspecting the contents of internet packets, a practice (.pdf) allowing them to monitor, filter and ultimately control the traffic that passes through their pipes. In addition, online advertising services like NebuAd are paying ISPs to let it eavesdrop on web users via DPI.
5. ISP Tiered Pricing : Major ISPs, including AT&T, Time Warner and Comcast have moved or are gravitating toward pricing services based on the amount of bandwidth individuals use. Theoretically, the plans could unlock the internet door to low-income users. But we suspect the plans are designed to increase profits for ISPs as bandwidth use skyrockets — all of which may have a chilling effect on internet usage.
6. Recording Industry Association of America Proposes "Three-Strikes" Policy : The record labels are pushing for ISPs to ban service to customers the RIAA claims are file-sharing copyrighted music. Overseas, industry groups like the International Federation of the Phonographic Industry are pursuing similar efforts.
7. Digital Millennium Copyright Act Abuses : Unwarranted YouTube takedown notices by misguided copyright holders comes immediately to mind — including assertions by Universal Music that it need not consider whether a video, under the DMCA, makes a "fair use" of the copyrighted works in question. Google says 57 percent of takedown notices it received were sent by business targeting competitors and 37 percent were not valid copyright claims.