Wednesday, October 14, 2009

Why Trojan?

"To betray, you must first belong."
-Harold Philby

The evolution of human communication has reached its triumphant stage wherein our world is now a chattering planet in the silence of space. Written messages tied on to birds have transformed into telegrams where messages were sent as dots and dashes. However, human’s search for knowledge did not stop there until the time when the postal mail was introduced. Still, the exploration for a more convenient means of expressing ones feelings or communication did not stop its journey until electronic mail has conquered every table of every computer in every corner of the world equipped with none other than, The Internet or the global system of interconnected networks.

What is Trojan then?

The Trojan Horse was the strategy used by the Greeks to enter Troy and end the conflict between them. History tells us how the Greeks lead by Achilles hid inside the wooden horse and pretended to be a gift to their god Athena and finally killed the men of the City of Troy and took the other as slaves. An excellent strategy isn’t it?

In modern times, the term Trojan is known to be a program that appears to be legitimate, but in fact does something malicious. . Quite often, that something malicious involves gaining remote, surreptitious access to a user's system. Unlike viruses, a Trojan does not replicate (i.e. infect other files), nor does it make copies of itself as worms do (John-answers.yahoo).

In the evolution of communication though the access in the internet, Greek’s Trojan horse and computer’s Trojan virus has now mutated into a uniquely human form. If there is only ONE Trojan Horse in our history, and Trojan viruses in computers do not replicate at all, Human Trojans seems like a unique creation of globalization because they are replicating and the moment that you are reading up to this point, there are already Human Trojans working around you and in other parts of this globe.

Which our site will tell you who these Human Trojans are. We have used the term Trojan to identify people who tend to use the internet regardless of the ethical consideration to the society. People who tend to abuse the exercise of our freedom of speech and of expression by merely violating the common good of the whole. People who tend to pretend like common users expressing their self yet deep inside, they are already on a plan to destroy the ethical world of the internet. We may say that the internet executes what we call, Egalitarianism or the equality in the sense that everybody has the right to gain access on the internet and adapt the changes and demands of the cyber world however, this doctrine has also been used to break down certain ethos that concern the exposure of other individual in the internet. Ethical considerations concerning the use of the internet most of the time are taken for granted.

Everybody has the right to express ones’ self or wants to be informed in more high-speed means. Internet has become a medium for that demand and everybody is a member of this virtual world but the problem is, there are others who tends to betray the ethical perspective of using it which may give us a conclusion that prolonged immersion on it may be damaging to some.

Is Harold Philby right indeed? Are the ones who tends to be unethical in using the internet are the ones who belong in this cyber community brought by globalization? Are those things that we once saw, heard, read and believed just a deception brought by unethical practices of others? Or are these Human Trojans the modern times turncoat or traitor of the world that we thought would bring interconnection for this ever changing planet.

“Good people do not need laws to tell them to act responsibly, while bad people will find a way around the laws.” - Plato

1 comment: