The criminals will most likely be using a compromised machine as an operations base from which they may launch a computer attack. This paper will highlight the IT Security problems resulting from the economic constraints on an ISP in a developing country and of their impact everywhere. I will use...