Skip to content

Ethics of writing useful software

Mohamed Hassan (JOHN) edited this page Sep 27, 2024 · 25 revisions

good_vs_evil_arcangel_san_miguel_by_monoguru_d219109-375w-2x

d9tje9q-4b84e8b5-5917-4f91-bea3-65598ca8a55f





Cybercrime-Illustration


A produced software should be useful to the society utilizing its given services to users regardless of their type.

Any software that is made for spying/hacking purposes whether on mobile or computer shall be vanished along with the terrorists (mercenaries) who are using them whether inside a governmental entities or economical entities or even for personal usage.

Any kind of illegal unauthorized unacceptable surveillance by the law. Old school always fucks down to the grave or even ashes is better 😉.


  • spying on mobiles to hear what goes around in a certain perimeter, if a strange pitch get your mobile number and wants to play a whores game.
  • download the records of calls in a certain mobile.
  • controlling the hacked mobile to the extent that let the corrupted employee be able to open/close the camera and bring personal photos for blackmailing purposes.
  • the mother fucker corrupted officer can hear what goes around the mobile within a certain perimeter.
  • ...

Simply those mother fuckers violates the privacy law of others which is considered a cybercrime.

giphy


FYA/FYI: There is no legal way to install such nasty software whether inside a governmental organization or an economical organization or for personal usage. This is called corruption that put the entire organization to justice upon identification and execution later.

Life wisdom: If you fuck, then fuck hard in a planned direct way till judgment day. Do not be as assholes who spies on others to share their personal information in a sneaky way for personal gains as discredit them.

For more information regarding automating paper-document-system AKA some of real life needs not SEX-SHOPS as the aforementioned stuff:

tmp_XlZPRL_e257de06af666fe3_Bretman_BrianZiff_Shot_01_0115_A-WM-1


ISIS the most dangerous tribes of terrorists on the planet installed surveillance systems via dark-magic within the #security_authorities to its agents (corrupted officers AKA mercenaries along with their families till the most degree) who are using it unofficially per each country globally for terrorism purposes and they get evaporated after that upon identification. Other hungry dogs can be business owners as well. On the move to execute those pitches till giving the green flag of removal of their shit 💩 completely to start doing good deeds on green stable ground 😇. Those corrupted officers should pay each salary they have given to the government because they do not have any honor due to their nasty doings. Execution or evaporation is not enough to them. They still insisting on classifying people based on their collected data AKA racism. So please be aware that your national-id card should hold ONLY [colored photo, full name, generated unique id] and this is considered enough to do any kind of paperwork within your country.

Manufacturing source: PRIVATE-SECTOR-OF-ISIS

Installation location per country: Military (Intelligence service division) || (الجيش (قطاع الاستخبارات الحربية

giphy (3)

giphy

FYA: if someone said that education and school is not necessary, then you can consider it as an ignorant terrorist who is living on fake money.



-1x-1

steal-computer-data-businessman-thief-the-data-from-laptop-cyber-crime-and-fraud-online-concept-illustration-vector

giphy (1)

giphy (2)

giphy

81zhDlqAbZS AC_SL1500

5765153896965273760

326399808-106aab45-cce1-4b40-b8d5-e90ee2e52b14

326399884-ba39f521-bc08-4a7e-89f1-ae0ceeb66ed3

326399929-c75dd076-c5a5-4c58-acf9-0496925e729e

GettyImages-1202504608

Crazy+Club+LOGO

MV5BMzA1MmI0OGItODU3NS00ZTA0LWI2OTMtYjMyZDVmNjI2YzdlXkEyXkFqcGdeQXVyMTA0MTM5NjI2 V1_FMjpg_UX1000

MV5BNmYwZjI5MzUtOGNlZS00NDhkLWI4MWEtZTJiZTQ2NmY1NmYwXkEyXkFqcGc@ V1

CARTOON-NETWORK_Totally-Spies_Key-Art-1_Sunset_Landscape_RGB

Spies+VHX+Thumb

wp5401247

Clone this wiki locally