Well would you like to hear that from the BBC and you go get a good antivirus and wow your computer speeds up.
quite the opposite; without the additional burden of Anti-virus software in the background everything is smooth sailing.
Additionally I have typically around 25 processes running at a time, which is far less then average, which from what I can tell seems to be about 40 to 50.
He may laugh out loud but i think the law can be be bent to help the people.
Once you add Context sensitive exceptions to a law you also add loopholes. Now a malicious person would simply need to prove that they meet those context sensitive changes to the law and fit through the loophole; which, considering they have full access to the object whose security was breached, they could easily touch logs and so forth to prove their case of "benign intrusion".
last i cheeked the BBC did not spam any one and after thy were done they then destroyed it. So you can laugh all you wont but how much did you know about bot nets before you saw the story.
a bot net is a group of zombie computers under the control of a single person or program. The "zombie" pcs generally receive their commands via IRC channels, typical uses for bot nets are for Distributed Denial of Service attacks, but others can try to reap profit by mining data from the PCs in question as well, since the IRC command set implemented by the program generally includes the ability to upload/download files to/from the zombie PC and execute those programs.
The fact is, regardless of
who did it, it was illegal- people had their PCs compromised and running software that they didn't know about, that collected data about them, perhaps private data, and sent it back to the BBC where it was supposedly destroyed after the experiment. Again- if we were to add a Context sensitive exception to the law like "oh, yeah but if it's D00ds that mean good then that's kewl" (obviously would require translation to lawyer speak), those with malicious intent can easily squeeze through the loophole.