(Clearwisdom.net) The Chinese Communist Party, in its last ditch struggle, has attempted to interfere with practitioners and their truth-clarification activities in all ways possible. It has, in very stealthy ways, also attempted to infiltrate practitioners' computers to interfere with their truth-clarification work. Recently, there have been several reports of personal computers or even servers hosting truth-clarification websites being compromised. The most recent and wide-known case was that of a Trojan virus being planted on FGMTV.org's pages.

Actually, computers that are connected to the Internet are in a very dangerous situation these days. Day after day, reports come out about new viruses, Trojans, worms, etc being released that spread from computer to computer. Previously, these programs would have obvious effects, such as erasing data and crashing the computer. Even though this was a big loss, it was at least visible.

Nowadays, computer attacks - and hackers who build them - have become stealthier and are using more dangerous tools. Instead of bringing down computers, they write programs that secretly install themselves on computers, especially those that are connected to the Internet, and monitor all the data that is being typed secretly. They may even send packets secretly to a master server computer somewhere that collects and reads this information.

In some cases, hackers have been able to install software on different computers that allow them to command and control what is known as a botnet - a collection of compromised machines that are running malware programs that could be used by the hacker for any purpose.

Further, if any of these hackers or tools are in hands of the Chinese Communist Party, they could be used for disrupting the normal functioning and operation of Dafa practitioners' clarifying the truth using computers, as well as for even worse operations to affect truth clarification efforts.

I hope that all fellow practitioners can pay heed to computer and network security.

These articles might be helpful for further reference:

http://en.wikipedia.org/wiki/Botnet

http://en.wikipedia.org/wiki/Denial_of_service

http://www.eweek.com/article2/0,1895,1947561,00.asp

http://www.baselinemag.com/article2/0,1540,1946399,00.asp