First use blog, write something (no substantive thing).

zhaozj2021-02-16  109

Hacker behavior may be just a game

Hacker, the most common term for the media in the late 21st century, let the technical supervisors and engineers wearing a suit, the neck is headache; let those who are tired of using the aliens as the first screen object, Jiang Gong's talent The director finally found the new popular perspective; this is a mysterious color in the eyes of ordinary people, with a shiny light word in the hearts of the youth, what is it?

Some people say they are online hero: they drive online express, even if the ordinary people can't shout out through several lines of code; some people say they are the dregs of society, because these milk bats are unsained, let the world I have said a lot of economic losses.

I believe that hackers are inevitable products in the development of computers and network technology, as I am personal, I am more willing to see hackers as a game. That's right, this is essentially a conceptual, dependent person's imagination and subjective system game.

Teenagers' worship of the whole hacker culture is from this society as a popular state of computers and network technology and our evaluation criteria for the characters like Robin; and correspond to the actions of hackers, since there are many people called well, there are It may be possible to get the actual interests, of course, people will do it. We are habit to explain this, but this is just some of the reasons.

A person always has a fear of things, just like our ancestors just learned upright, it is true that this perspective is full of mystery. Today, if everyone has a computer, everyone is using broadband network to refuse service daily is an attack. Who will care which is a hacker? Similarly, no one told the position of the upright walking, because it is already a matter of course. With the further popularization of computers and networks, the concept of hackers will be diluted, pay attention to it is not disappearing. People have to do it, I can't do it, I am doing the hero. "It is also one of the reasons why the primary school students want to try their skills today. It is a bit" Trojan River " "The taste of", I have been scan the IP address every day. It seems that everyone wants to become a person who is not that, everyone wants to express myself, this is one of the side effects of modern society's survival competition concept.

The above, it seems to explain many hackers and quasi-hackers, but a lot of living people have ignored: the root cause of hacking, or it is a game, although there is no rule on his surface, and neglect is The less the rules are better.

Looking back to see the hacking, obviously mentioned above, social factors to hacking silently afraid of hacker (attacking banks and stock trading systems) The economic interests can get one of the rewards of this game, with this game There is also a good side that is not allowed to be called, and the instinct of evolution is always exploring the new world and has fun, which is a major driving force for a hacker that is not fame and fortune. Fundamentally, like playing chess, there is a huge possibility and change that cannot be imagined, so there is endless, like the journey of the journey, this is the attractive charm of this game.

Once you have learned the thermal nuclear identification, you will find it actually, this game is part of nature evolution. I think that our society is ignored this, and I don't want to think about it. At the economic benefit, the legal (ethics) and "cultural" concepts explained the general explanation of the hacker culture network, so the wall is inevitable.

In fact, if it is like that, such intrusion can only be a kind of high idea can be crime. The hacker is neither a wide range of impacts today, forming a culture: because economic interests are specific to each action. The value of the calculation, the legal provisions are also clear, those who invade Britain and even a five-corner building try to steep the confidential or transfer account funds, and what kind of interest will be obtained and what punishment. In theory, this can explain all the hackers, just like the theory, there is a best solution: there is a way to choose the game to allow both parties to get out of the time than the actual choice. But in fact, no one knows that solution - When I think of the beginning, if two people can conceive all the possibilities in my mind, I can launch all the chess moves that can defeat the other party, and finally the calculation is the chess hand to master this. The theory, such as red characters, he knows that he will win, can announce the victory immediately, the other party gets green, immediately announced the admission - but Dear Ms., who has seen this chess? Do not! Those who have a man with a hacker attack in a hacker are just part of the hacker. More people are the mood of exploration, or more accurately, it is a kind of mood that I don't know what I have to do. . Like all games, this hacker game has its internal rules and rules:

Most hackers follow the "non-malicious destruction system" "Not will openly publicly attacked", is not purely giving moral dogma, but a long-term activity of the hacker's long-term activities and reliance. Basic rules of survival, because hackers are not playing this game in one time. Here I would like to use a case from the original group from Boy theory - "two difficulties of prisoners" to analyze.

This case is quite famous in the game theory. Two prisoners were all closed in a separate cell, and the police tried their two respectively, and told them that if one of them was betrayed, I didn't have any confessions. People, then he may get rewards for release or commutation; of course, if both people are recruiting, then they have to judge. These two prisoners now know that as long as they are kept silent, the police cannot convicted them, then the two can be released.

Want to do what they should do? In theory, the strategy of cooperation, two people maintain silence is the best way, but who can guarantee that another guy does not tell himself? A Venue: B is not a fool, he can think of himself, so if you betray it, it is likely to get freedom because of the silence of B. It is a step, even if B has I reported itself. At the time, everyone will learn together, at least not because of his stupid, bid to extra benefits.

If this game is only played once, most people choose the behavior of being sentenced carefully, just if each hacker only invades the system once, he is likely to put those so-called "hacker code". After that, I watched and steal the information, and the insider's addiction was announced. However, mathematicians repeat this time with more than ten program models with automatic learning functions on the computer, discovering that the programmed programs in these models will not be used to always be sentenced or cooperated, nor randomly After the choice, but after many times, establish a historical data of the other party and the "reputation" statistics, then take the relative strategy of tat, that is, the carrot increases the policy: never betray the other party, but in the next time according to the next time The other party's performance is "punishment" or "reward", which is what we have said, "the body of others will also treat it." This principle guarantees that we have to find a partner of cooperation in the absence of a proper defense mechanism, to achieve the purpose of common survival. Today, the principle of hacker identity is essentially because of this "two difficulties" games similar to "prisoners: if each hacker is embarrassed to destroy the system, public information, he does not need to study so much New technology, as long as one success can get the system to unprotectively, then spend the shadow of criminal recovery, he will lose hacker's exploration and freedom of life. Perhaps the ordinary people are difficult to understand why there is a company that has developed security software and the notorous hacker cooperation, but with this symbiosis's strategy, this is a natural thing - as long as hacks follow the default bottom line, The systems of each Shawu institution will not have devastating hits and his economic losses, so a lot of human material resources to defend and investigate it; for the security company, even pleasefully As their cheap security consultant, test the performance of new security software and research all new attack paths, collect the "protection fees" of each business customer, also appear to be screaming -, there is a new system vulnerability and attack method, you乖 地 地.

The hacker is once again proven, and everything is not isolated. It has a wide range of intrinsic links, and has its own structured rules. Every seemingly isolated incident will have a profound systematic impact on this society - - According to the corresponding, to solve the problem, it is not possible to use the break of the breakdown, and it is fundamentally started. In addition, a lot of things cannot be simply posted on black and white tags, living as a colorful chromatogram. Nature's biological evolution is affecting each other, interdependent, almost everything is possible, don't be more likely to break the underground conclusions, the answer is the result of the integrated role of the whole natural and society. Specific analysis, "It is the best attitude towards hackers."

- "China Hacker Inside" Democracy and Construction Press (2001)

转载请注明原文地址:https://www.9cbs.com/read-10952.html

New Post(0)