If stock photography has taught us one thing it's how to recognise a hacker! But how much do we really know about these shady characters, with their ill-fitting balaclavas and their Windows 7 laptops?
Here's my essential stock photography guide to #cybersecurity...
First things first, hacking has come on leaps and bounds in the last few years. Backing up your sensitive data on C60 cassette and labelling it "Flock of Seagulls Megamix' is no longer enough to keep your information safe!
And hackers are actually very hard to spot. That's because they dress head-to-toe in black (or very very very dark grey) since they live on the Dark Web and want to blend into the background.
What hackers want from you is personal information. No matter how trivial it still has value to them - and they'll go to extrodinarily lengths to get it!
There are many types of hacker. Some are 'crackers': experts at breaking into networks. Their 'tell' is their habit of saying "I'M IN" in a deep voice once they've got past the firewall. Watch out for anyone you don't know using that phrase.
'Keystroke hacking' involves a criminal examine your keyboard in minute detail, often with a magnifying glass, to see which keys have the most pizza grease stains on them. It's only a matter of minutes before they've deduced what your password is.
'Shoulder surfing' is another popular hacker trick to find out your password. The criminal pretends to be examining dandruff on your shoulder, but in reality he's watching you type! Always shield your pin, or wear a blouse with huge shoulder pads to obscure their view.
Sometimes a hacker doesn't even need to be in the same room as you to access your data. He can 'infect' your computer with a virus, from distances of up to 12 feet. Popular viruses include worms, Trojans and spywear. Always wipe your screen with disinfectant to protect yourself.
Ransomwear is also a frequent hacker tactic. Instead of stealing your data they lock your computer and charge you several 'bit coins' to unlock it. Fortunately bitcoin looks like chocolate money, so try paying them with that: it's probably worth more now.
I know, traditionally we used to protect our computers by leaving a padlock on the keyboard, telling the hacker that we're wise to their tricks. However modern cyber criminals can by special 'keys' from the internet to unlock these. Nowadays you have to be more vigilant.
So to be safe online:
- Never share your computer with your family.
- Don't open emails if they look interesting.
- Always forget your password.
- If in doubt for God's sake don't click anything!
Hackers normally celebrate their success by doing the 'Hacker Haka', a traditional dance involving stamping of the feet and partitioning of the C drive. So if you don't want to cause their next celebration you'd best heed my #CyberSecurity hints!
The internet is very complex and can easily trap the unwary. So if you're still worried about 'netting' try mastering teletext first, or typing numbers into a calculator: it's much safer than making a big mistake online.
Stay safe everyone...
• • •
Missing some Tweet in this thread? You can try to
force a refresh
He was the terror of London; a demonic figure with glowing eyes and fiery breath who could leap ten feet high. The penny dreadfuls of the time wrote up his exploits in lurid terms. But who was he really?
Today I look at one of the earliest pulp legends: Spring-Heeled Jack!
London has always attracted ghosts, and in the 19th Century they increasingly left their haunted houses and graveyards and began to wader the capital's streets.
But one apparition caught the Victorian public attention more than most...
In October 1837 a 'leaping character' with a look of the Devil began to prey on Londoners. Often he would leap high into the air and land in front of a carriage, causing it to crash. It would then flee with a high-pitched laugh.
Today in pulp I look back at New Zealand's home-grow microcomputer, the 1981 Poly-1!
Press any key to continue...
The Poly-1 was developed in 1980 by two electronics engineering teachers at Wellington Polytechnic, Neil Scott and Paul Bryant, who wanted to create a computer for use in New Zealand schools. Education Minister Merv Wellington liked the idea and gave it the green light.
Backed by government finances, and in partnership with Progeni Computers, Polycorp was formed in 1980 to began work on the prototype for the official Kiwi school computer.
It was the biggest manhunt in Britain: police, the press, aeroplanes, psychics all tried to solve the disappearance. In the end nobody really knew what happened. It was a mystery without a solution.
This is the story of Agatha Christie's 11 lost days...
By 1926 Agatha Christie's reputation as a writer was starting to grow. Her sixth novel - The Murder of Roger Ackroyd - had been well-received and she and her husband Archie had recently concluded a world tour. But all was not well with the marriage.
In April 1926 Agatha Christie’s mother died. Christie was very close to her: she had been home-schooled and believed her mother was clairvoyant. The shock of her sudden death hit the author hard.
Many readers have asked me over the years what my definition of pulp is. I've thought about it a lot, and the definition I keep coming back to... well it may surprise you.
Let me try and set it out.
There are lots of definitions of pulp out there: in books, in academic papers and on the web. And most circle back to the same three points: the medium, the story type and the method of writing.
Pulp is of course a type of cheap, coarse paper stock. Its use in magazine production from the 1890s onwards led to it becoming a shorthand term for the kind of fiction found in low cost story magazines.
let's take a look at the extraordinary work of Victorian illustrator and cat lover Louis Wain!
Louis Wain was born in London in 1860. Although he is best known for his drawings of cats he started out as a Victorian press illustrator. His work is highly collectable.
Wain had a very difficult life; born with a cleft lip he was not allowed to attend school. His freelance drawing work supported his mother and sisters after his father died. Aged 23 he married his sisters' governess, Emily Richardson, 10 years his senior.
Over the years a number of people have asked me if I have a favourite pulp film. Well I do. It's this one.
This is the story of Alphaville...
Alphaville: une étrange aventure de Lemmy Caution (1965) was Jean-Luc Godard’s ninth feature film. A heady mix of spy noir, science fiction and the Nouvelle Vague at its heart is a poetic conflict between a hard-boiled secret agent and a supercomputer’s brave new world.
British writer Peter Cheyney had created the fictitious American investigator Lemmy Caution in 1936. As well as appearing in 10 novels Caution featured in over a dozen post-war French films, mostly played by singer Eddie Constantine whom Godard was keen to work with.