-
Notifications
You must be signed in to change notification settings - Fork 0
Ethics of writing useful software
A produced software should be useful to the society utilizing its given services to users regardless of their type.
Any software that is made for spying/hacking purposes whether on mobile or computer shall be vanished along with the terrorists (mercenaries) who are using them whether inside a governmental entities or economical entities or even for personal usage.
Any kind of illegal unauthorized unacceptable surveillance by the law. Old school always fucks down to the grave or even ashes is better 😉.
-
spying on mobiles to hear what goes around in a certain perimeter, if a strange pitch get your mobile number and wants to play a whores game.
-
download the records of calls in a certain mobile.
-
controlling the hacked mobile to the extent that let the corrupted employee be able to open/close the camera and bring personal photos for blackmailing purposes.
-
the mother fucker corrupted officer can hear what goes around the mobile within a certain perimeter.
-
...
Simply those mother fuckers violates the privacy law of others which is considered a cybercrime.
FYA/FYI:
There is no legal way to install such nasty software whether inside a governmental organization or an economical organization or for personal usage. This is called corruption that put the entire organization to justice upon identification and execution later.
Life wisdom:
If you fuck, then fuck hard in a planned direct way till judgment day. Do not be as assholes who spies on others to share their personal information in a sneaky way for personal gains as discredit them.
For more information regarding automating paper-document-system AKA some of real life needs not SEX-SHOPS as the aforementioned stuff:
ISIS the most dangerous tribes of terrorists on the planet installed surveillance systems within the #security_authorities to its agents (corrupted officers AKA mercenaries along with their families till the most degree) who are using it unofficially per each country globally for terrorism purposes and they get evaporated after that upon identification. Other hungry dogs can be business owners as well. On the move to execute those pitches till giving the green flag of removal of their shit 💩 completely to start doing good deeds on green stable ground 😇. Those corrupted officers should pay each salary they have given to the government because they do not have any honor due to their nasty doings. Execution or evaporation is not enough to them. They still insisting on classifying people based on their collected data AKA racism. So please be aware that your national-id card should hold ONLY [colored photo, full name, generated unique id] and this is considered enough to do any kind of paperwork within your country.
Besides that, those corrupted officers can access the data of the citizens in an illegal manner as a service for his whores to do the same bullshit.
Manufacturing source:
PRIVATE-SECTOR-OF-ISIS
FYA:
if someone said that education and school is not necessary, then you can consider it as an ignorant terrorist who is living on fake money.
- Overview
- University Role
- Architectural Components
- Legal and Ethical Development Specialization
- System Administration
- Software Deployment
- Git Repositories | Access Control
- Testing notes - Tester [QA]
- Daily Standups
- Onboarding process upon hiring newcomers
- Tickets Flow AKA Industrial Software Manufacturing Process
- Sprint
- Legal and Ethical Aspects of Contracts
- Maintenance Deals: new contracts after delivery to avoid wasting the money of the clients and burning out the human resources
- Human Resources Planning to the Software-Development-Unit
- Possible future moves of Human resources
- Notes to Managerial Positions
- Notes for Self Study During the University Phase
- Screening Interviews
- Search keywords for recruiters
- Email-Writing
- Job advertising template for recruiters
- Ethics of writing useful software
- How to do a complaint against someone in a safe way