The Post-Truth Era

Introduction to Blockchain

Carmageddon Is Here

Mobile Payments and Deposits

Welcome to Surveillance Capitalism

Great Websites for Cheap Products

Honoring Fred Rosenberg

The Cyrptocurrency Craze

Voice-Controlled Assistants

Dealing with a Future Without Jobs

Why You Need a Virtual Private Network

How Do You Feel About Being a Cyborg?

Why Artificial Intelligence Is Scary

Google Lens, Amazon Echo, and More Toys

Algorithms Are Us

Best Ways to Spot Fake News

More Options for Cable Cutters

Artificial Intelligence & Neural Nets

Beware of Fake News

Amazon Echo Dot

Driverless Cars Coming Soon

Governments Approve Commercial Drones

The Sharing Economy in Southeastern Iowa

Ad Blocker for Your Web Browser

Virtual Assistants: Siri, Cortana, Alexa

Google Cardboard: Cheap Virtual Reality

Periscope Addiction

Pet, Kid, Keychain Traciers

Google Tips and Tricks

Use Price Alerts to Save Money

Best Gadgets of 2015

Apple TV, Streaming Video Devices

My Favorite Email Newsletters

Peer-to-Peer Lending

3-D Printing

Chromebook, a $150 Laptop

Periscope: Live Video from Around the World

Get Your Questions Answered on Quora

Sling TV — $20 per Month

The Drone Revolution

Bitcoin Mining Flop

Smart Light Bulbs

Revolutionary Apple Watch

Smart Home Gadgets

Buying a Bitcoin Miner

Traveling with Siri

The Sharing Economy: Uber, Airbnb

Storing Your Music in the Cloud

The Internet of Things

Life in Cloud Heaven

2013 Tablet Buyers Guide

What Marketers Know About You

Google Dashboard Knows About You

Stream Video with Google Chromecast

Big Data, NSA, and You

Google's Predictive Search

Bitcoin—Mint Your Own Money

Android Smart TV via $45 Mini PC

MOOCs: Quality Free Online Courses

Beware of Dynamic Pricing

Use Crowdfunding to Raise Money

Tablet Computer Buyer's Guide

Google's Self-Driving Car

Mobile Media/App Stores Compared

Google Nexus 7 vs iPad

Email Follies

Your Million-Dollar Smartphone

Google Drive: Free Cloud Storage

Free and Low-Cost Phone Calls

Google Glasses

Loving iCloud

iPad Wins, Other Tablets Lose

Siri is Revolutionary

Essentials of Computer Backup

Homage to Steve Jobs

Are Your Files Safe in the Cloud?

Amazing Uses of iPhone Camera

Use Carbonite Online Backup

Cloud Services Roundup

Tablet Computer Roundup

Project Watson Wins at Jeopardy

Stream Video by Connecting a Computer to Your TV

The Appeal of Apple TV

Roundup of Streaming TV Devices

Options for Streaming Video to a TV

Dealing with Cell Phone Radiation

Ebook Readers & Tablet Computers

Dreaming of 4G

Google TV

The iPad in Your Future

The Magic of Google Translate

iPhone: There's an App for That

3-D TV and Robots in Your Future

More Goodies from Google

Google Wave — Better than E-mail

Growing Up with the Internet

Bing: Better than Google

Google Voice — Great free service

The Twitter Revolution

Virtualization and You

Death of Newspapers

Netbook Computers

Great New Search Engines

Boxee — Free Online TV

Mozy — Free Offsite Backup

Amazon's Video-on-Demand

Wanting a Kindle

iPhone Love

Better than Google

Cloud Computing and MobileMe

Digg and Other Social Media Sites Free TV & Movies

Pandora: Best Source for Streaming Music

Cell Phones Changing

Intro to HDTV

Best Free Phone Resources

Free Online TV: Joost

Movies, TV Go Online

Scary Internet Stories


The YouTube Election

Google Street View

Twitter, Twittervsion, and Flickervision fun

E-mail Tricks for Addicts

Cool PDA Phones

Webtop: Free Online Software

Useful Google Tidbits

My Yahoo, RSS, and Blogs

Google Earth

Online Videos

Web 2.0


Virtual Worlds: Second Life

InTrade Predicts the Future

The MySpace Revolution

Wikipedia — A Free Encyclopedia

Wikipedia as Emergent Phenomenon

Wikipedia Lies

Free Calling with Skype

Intro to Podcasts

Intro to File Sharing: BitTorrent

Dangers of Wireless Hotspots

Google Maps

Free Online Credit Reports

Making Money with Your Web Site

Beware of Spoofing and Phishing

Free Virus and Spyware Protection

Virus, Spyware Protection -- Part 2

A Brief History of the Internet

The Gadget Goddess

Free Open Source Software

Keeping Your Mac Tuned Up

Starting a Weblog

Getting Started with RSS

Latest Google Features

Selling on eBay &

Safe Online Shopping

Health-Related Web Sites

Free Virus Protection

Google Culture

Online Photo Sharing

Intro to GPS

Intro to Weblogs

Avoiding Spyware

Loving Google News

Testing your Internet Literacy

Urban Legends and Hoaxes

Buying and Selling on

Personalizing Yahoo

Stopping Spam

Useful New Search Engines

Conspiracy Theories

Online Nature Guides

Intro to Wireless

Yahoo Groups Are Fun and Useful

The Joys of Broadband

Free Expert Help

Asking questions online

Finding the lowest price

Movie information

Online Reference


The Internet bazaar

MP3 music

Noah's Ark and the Internet

Link Rot

The Geek Report

About this site

Today's News and weather

Hot tips


This Is What Cyberwarfare Looks Like

October 2018

On the morning on June 27, 2017, trucks were arriving as usual at the shipping terminal in Elizabeth, New Jersey – a major port on Newark Bay. The scale is almost unimaginable: thousands of shipping containers were stacked there, waiting to be placed onto freighters by 200-foot-high cranes.

As many as 3,000 trucks arrive at the terminal each day. When they arrive, a scanner reads the barcodes on the containers. A gate clerk talks to the drivers, who are then given passes that tell them where to park their load so that it can be put onto a ship.

Of course, computer software controls everything. It knows what's on each truck, where the load is going, which freighter it should go on.

But what happens if the computer goes down? Now we know. On that June morning, all the computers in the network of A.P. Moller-Maersk, a Danish shipping company, suddenly went dark and restarted, with all the data scrambled.

Without the computer, the gate clerks were clueless. They had no idea what should go where. Soon hundreds of 18-wheeled trucks were lined up for miles, with an angry driver in every one. Police realized that something big had gone wrong and began telling the drivers to leave.

What do you do if you're a trucker and can't leave your container, especially since you're scheduled to pick up another one? Some of the trucks had items that needed refrigeration, so the load couldn't simply be put in storage someplace. Others had manufacturing parts headed overseas – parts that the manufacturers urgently needed in order to continue production.

This same situation played out at the 76 Maersk shipping terminals worldwide.

What happened? Russian military had attacked Ukraine with a computer virus. It brought down computer networks in hospitals, airports, over 20 banks, ATMs, and card payments systems, and many federal agencies. People weren't able to use their credit cards; paychecks and pensions were on hold; prescriptions went unfilled.

It was so virulent that it could spread around a worldwide network like Maersk's in less than a minute. It encrypted each computer's "master boot records," which tells a computer where to find its operating systems.

It ended up going far beyond the boarders of Ukraine. Not only did it infect Maersk, but also, according to an excellent and detailed article in the September issue of Wired magazine, it also affected FedEx's European subsidiary TNT Express, French construction company Saint-Gobain, food producer Mondel?z, and manufacturer Reckitt Benckiser.

The Russian hackers likely didn't intend the virus to go beyond Ukraine, especially since it eventually made its way back into Russia and infected Rosneft, the state oil company.

It ended up causing an estimated $10 billion in total damages.

What did Maersk do? They convened a 200-person task force of experts in England along with about 400 Maersk employees. They began collecting backups from the previous 3–7 days, with the intention of reconstructing their database. But no backups of a key controller could be found. Without it, they were toast. They called to all their offices around the world and found that a computer in a remote office in Ghana was down when the virus struck because of a power blackout. It contained the necessary controller for rebuilding their database.

What can we learn? First, be sure to always keep your operating system up to date. Microsoft had released an update for Windows months earlier that would have protected Maersk and everyone else from the virus.

But we also learn just how vulnerable the modern world is, now that everything is so interconnected. In a flash, the world's banking system could do dark, the power grid could be hacked so that there's no electricity, the GPS satellites that we are utterly dependent on for location and extremely precise time could go haywire, or, heaven forbid, the internet could stop working.

In July media outlets reported that Russian hackers had infiltrated the control rooms in U.S. power plants, which could possibly let them remotely control parts of the U.S. power grid – as they did in Ukraine in 2015 and 2016.

Fortunately, the Russian military hackers are being closely watched by the National Security Agency and other American intelligence services. We just have to hope that the guys on our side are more savvy than the ones on their side.

An extraordinary irony is that a main component of the virus that infected Maersk and other entities around the world was actually developed by the NSA. It was one of a number of hacking tools that a rogue individual within the NSA uploaded to the internet and made available to everyone for downloading.

Let's hope the world's leaders realize the very serious danger of cyberwarfare and move toward detente.

© 2018 by Jim Karpen, Ph.D.

E-mail Jim Karpen

In Association with


Learn More Click Here to Pay



Hosted by the webmasters at:

Start here to find it FAST!(TM)

PayPal Fraud, Part 1

Internet Fraud, Part 2

Internet Fraud, Part 3

Suing My Credit Card Company

Bored.Com is fun

Best source for news

Guinness World Records

Tellme voice portal

eHow.Com tells you how

Free graphics online

Low-cost movies, software

Cheap airfares

Simple, free money transfer

Government information