Illegal Animated Internet Maps

Internet Census 2012 Infected 420,000 Computers to Gauge Web Usage

If you're a Linux user, you may have been one of the 420,000 Internet users who unwittingly took part in 'Internet Census 2012.'

A perfect example of using hacking and computer virus technology for a surprising greater good, an anonymous individual working under the name Internet Census 2012 measured online usage from 420,000 Linux users, particularly to measure usage of IPv4 protocol users vs. the newer IPv6 users. In a nice touch to his (her?) worldwide infection, the virus only connected to computers that had enough RAM and processing power for the virus to run quietly in the background without interfering with computer usage and Internet connections. The anonymous Internet Census hacker even sent out emails to infected computers in case users had any questions about what they had just taken part of. The methods are highly illegal in many of the countries containing the infected computers, but the purpose seems to be a noble one.

A glance at the Internet Census 2012 website reveals some beautifully animated maps.
Trend Themes
1. Use of Hacking Technology for Data Collection - There is potential for using hacking and computer virus technology in a controlled and ethical manner to gather data for research purposes.
2. Measure of Ipv4 Vs Ipv6 Usage - There is a need for monitoring and understanding the usage of IPv4 and IPv6 protocols to inform network infrastructure development.
3. Ethical Hacking for Good - The incident showcases the potential for anonymous individuals to creatively use hacking techniques for benevolent purposes.
Industry Implications
1. Research and Data Analytics - The incident presents an opportunity for researchers and data analysts to explore innovative methods of gathering and analyzing large-scale internet usage data.
2. Network Infrastructure Development - There is a disruptive innovation opportunity in developing network infrastructure solutions that accommodate the transition from IPv4 to IPv6 protocols.
3. Cybersecurity and Ethical Hacking Services - The incident highlights the importance of cybersecurity and the potential demand for ethical hacking services to identify vulnerabilities and protect against malicious activities.

Related Ideas

Similar Ideas
VIEW FULL ARTICLE & IMAGES