When high school, the teacher told us that Journey to the West is one of the four famous classics.
In addition to moving the plot, there is a deeper level.
Sun Wukong's behavior represents the resistance of the labor people on feudal rulers.
The Emperor Emperor means feudal rulers.
Tang Yan is the incarnation of feudalism.
......
Just like the hero of the water, he was recruited by the emperor, Sun Wukong finally changed evil, telling the people:
It is no result, just like Sun Dasheng, the majority of monkey heads, not exception, let alone small people call?
As so-called, the outer line is lively, and the inner walks.
Nowadays, I will look at the Westward Journey, and I am standing in this area, I think the behavior of Tang Yixian's day and hacker is not different. Why do you want to say this, listen to my thin way.
As a senior staff member (such as Luohan), Tang Yan has a high root authority (calling the wind, Teng Yun driving fog ...) because of the causes being opened (submerged). The account of Tang Yan was cleared (Tang Yan became a mortal), and he could no longer exercise his special rights. So Tang Yan is not willing to re-obtain root permissions. So he strives to learn computer knowledge (every day worshiping Buddha, finally learning, small and famous). An accidental opportunity, Tang Yan uses the scanning tool (Guanyin), to know the website's FTP port (Xi Tian) is still running, so Tang Yan began to act (Xi Tian took the scrub). But helpless network management (such as coming) is a very experienced network management, the security of the website is very good, the firewall is also set (9 9 difficult). But this is also difficult to pour Tang Yan, in addition to solid basic skills (经), Tang Yan knows the necessity of cooperation, so he finds some members of the former website (pig eightfits, sand monso) and hackers who have attacked the site (Sun Wukong A partner team was established. In addition, in order to enhance the speed of attack, Tang Yan also found a hacker tool (Bai Longma) similar to port scanner. And Sun Wukui also has a good tool, a bomb tool (gold hoop), has a high killing force. When attacking the site (big martyrdom), the tool is downloaded from www. Dragon Palace .com. Now the site is not available (no gold hoop, how to provide?) Although the speed is slow (a few years), Tang Yan has a hacker with patience, never give up attack. Although the firewall power is incomparable (the demon ghost is an endless), there are some weak websites to ask Comrade Tang Yi to be a network management (WWW. Daughter country .com). Of course, Tang Yan has helped some websites (such as www. 国. COM) solved some of the problems with some hacker attacks (net management permissions were sneaked - the king was changed) (he seems to forget that he is also a hacker) . In the end, Tang Yan got the root privilege of his dreams! How much is this behavior and hacker behavior, so I assert that the Westerly a hacker is a hacker, but I have to say that Tang Yan is the earliest hacker in history!
I rely on, the origin of hackers comes from Tang Yan!