@thad, AC@20:25, @David
"If the security software, which I have purposely and consciously obtained and installed, warns me about a bot on my computer --- that's fine. That's what it's for"
Which suggests you are not a member of the group of people causing the problem this programme addresses.
This was a show for the people who don't have "Security" software on their PC, did'nt know they needed it and did not know what *can* happen if they don't have it.
"it's all rather reminiscent of the Brass Eye drugs episode"
Er,no. Brass Eye satirised the *media* obsession with this, not the problem itself.
Getting celebrities to voice over complete b*((*cks proving that they knew as little about the subject as some guy in the street was particularly amusing. IIRC Only Desmond Morris told them they were talking s*(t (Depressed elephant commits suicide by inserting trunk in rear and suffocating).
"Sure, there's all sorts of stuff that can go on with the telephone network, but even that can be managed in a better fashion than the pitfalls of Internet connectivity. "
2 words. Communication & evolution
A telephone is *only* useful in a network. From day 1 inter-operability had to happen. The GPO was formed to effectively nationalise competing but incompatible UK phone networks.
This need for absolute inter-connection from exchange to exchange anywhere on the globe was handled by global authorities setting global standards for all levels of the process with long pay back periods on plant (GPO was 40 years, not sure what it is now) and corrosponding rigerous change management on the software.
BTW Microsoft Exchange was originally named for the plan to use NT to drive company switchboards. 1 problem. Comms managers do not expect to re-boot their PBX. Ever. You don't hear much about this side of Microsoft's business these days.
the down side. Its a lowest common denominator network. Only speech is guaranteed to work everywhere end to end.
Computers of all sorts can (could) have useful lives with no connection to anywhere else. Talking to another site was rather avant garde to begin with. Before you could say supplier lock in all hardware at both ends of a line (any line) had to come from the same mfg.
These closed systems often only got opened through a lawsuit. The need to get these different servers to allow access to data from other servers and the resulting free market drove TCP/IP development.
"Why is it that computer systems are so readily exploitable? "
They're not provided you don't connect them to a network and don't transfer data to them with infect able media. You create work and print it off or transfer it to disposable, never re-connected media.
Like having a car without a license. You can drive it around your property but you cannot go anywhere.
But you want convenience as well. Then you need to carry out elementary precautions which have become easier over time, and in later versions are on by default.
But lets be honest some cars have way better crash safety and break in security than others.
Oh look, Windows is pre installed.
Nothing for me to worry about.
Bright shiny thing. Pretty.
Computers have quit substantial abilities. If you don't realise their power that's because someone has worked hard for you to harness it. It does not mean it cannot cause you harm.
"we already know that botnets exist and how they work"
You may. The large majority of the GBP do not. It never begins to cross their minds that at least some of the spam in their personal email in-box *might* have come from *their* own computer, and I dunno, maybe they're like, *responsible* for doing something about it.
Ignorance is curable. Stupidity is forever.