These are our predecessors, as a programmer, they are excellent.

xiaoxiao2021-03-06  99

Domestic hacker elite! Yuan Ge@nsfocus.com http://yuange.yeah.net /; Yuan Ge, famous IIS vulnerability Unicode discovery, NSFOCUS.COM's main force. The master is a master, I don't dare to evaluate, I am DOW N to read N times, and he published the article "Overflow Program Writing Skills", etc., I know what is called gap. .

Warning3: warning3@nsfocus.com NSFOCUS Linux version of the ribbons, wrote a lot of famous SH * LL CODE, such as the Local_Root of Glibc_2.1-2.x in RedHat 6.2.

Adam: adam@nsfocus.com http://www.sometips.com /; NSFOCUS NT version of Mono, the analysis of NT security is relatively thorough, and many of the articles he wrote about NT security is very exciting, and can go to NT version. The essence is going to see. In addition, NSFOCUS's other spheres are masters, very good contact, and don't say much.

Oriental floating cloud: g3eek@hotmail.com http://www.safen.org (Has station) China's safe online webmaster, early freeness between major security BBS, his real age has always been unable to know . Technical excellent, proficient in Windows / Linux / UNIX security management and maintenance, write a lot of classic articles, such as "FreeBSD remote overflow tutorial"

SCZ: scz@nsfocus.com people said that Xiao Fauchi, I really don't understand why he wants to call "Xiao Fou", it is better to "Xiao Di" more intimate. SCZ is a programmer under a relatively colorful Linux, written some Exploit. He chain, "I am far away from the north and south of the river", there is a figure everywhere. He posted the post of the Baiyun Yellow Crane, which is the main source of many education network BBS safety.

LG_WU: lgwu2000@sina.com is not very familiar with him, but he knows that his level is not general.

Analysist: analyysist@263.net http://c4st.51.net http://c4st.51.net red warning webmaster, some people call him old A, and some people call him analyst. The proficiency program, the team has discovered many procedures vulnerabilities, and writing a lot of program vulnerabilities utilization, which is a domestic excellent procedure vulnerability analyst.

Xiao Yan: Dansnow@21cn.com http://www.netxeyes.com /; developers who are called Bangko, streamer, such as buddha. The software he developed is easy to use, but the power is extremely powerful. After a while, a small rookie can be easily black down. Many big websites. But what I want to say is that if you want to learn something real things, use his tools.

Lovehacker @263.net http://www.chinansl.com /; UNITA founder, CGihacker developer, as if the security industry has only one of him in Java as a software development tool, and he is on system vulnerability The exploration study of aspects is also very admiring.

Babo: suneagle@patching.net http://www.patching.net /; Talented company talent, Linux security master, written "RedHat7 local use ping Take root vulnerability details" article Everyone has seen it. And "NMAP Use Guide" and other articles very exciting, isn't it? Frankie: frankie@cnns.net/ttp://www.cnns.net /; Chen Guang Studio "http://my.szptt.net.cn/frankie"; founder, collecting vulnerabilities is relatively wide and practical. Jing Tong NT, organize some classic materials, such as "number about NT intrusion", etc.

TIANXING: TIANXING@163.net http://www.tianxing.org /; OICQ: The developer of a hacker tool such as a network assassin, adding cnns.net, there is no movement for more than a year, and recently preparing to launch NethacKeriii.

ISNO: isno@sina.com http://isno.yeah.net /; Scan Linux Vulnerability Tools Findoor developers, also compiled a lot of good articles. However, his person seems to be a bit inside. Although the level is high, there is no much influence.

ZER9: ZER9@21cn.com http:// ze.yeah.net / (already not there) Since the Northern Branch of the Green League, it seems that the early development of the WebScan CGI vulnerability scanner has an impact. There are also many classic articles such as "How to create a back door under Linux", as well as the "Progency Hunter Principle Analysis" is also written very exciting.

KCN: akcn@yeah.net http://kickme.to/kcn /; Shuimu Tsinghua's webmaster, modifying the BBS system of flamingo, is very research on Linux security. In Tsinghua's BBS and Green Corps's IRC, he often encounters him, and it is also very helpful.

Sinbad: microbin@263.net http://sinbad.dhs.org /; sailor SINBAD, the safety knowledge is very wide, and there are many good articles such as "detection after invading". The vulnerability of the BBS2www 1.33 leakage file and directory content was found.

Glacier: hunxin@21cn.com http://www.xfocus.org /; Tmailing Horse ice river is very familiar, very excellent programmer, recent X-Scan scanning software that has been introduced with Xfocus is very practical, it seems The name of the Ice River is no longer used on Trojan.

Xundi: Xundi@xfocus.org http://www.xfocus.org /; Security Http://focus.silversand.net initiator, organizing and writing a lot of / classic articles, such as NC usage skills, IIS Hack method finishing, etc.

QUACK: QUACK@ANTIONLINE.ORG http://www.xfocus.org /; translated a lot of good articles, still written a lot of good teaching articles, such as "trying to try IRIX".

Batman: It is said to be ADAM, anyway, he discusses the DNS (Bind) security discussion.

SZTCWW: (Alert7@xfocus.org) Auntsu? Rotten leaf, he can be the person we can take out in safety technology in our Chengdu, the program under Linux, written "DEV_ADD_PACK An example of the" core using DEV_ADD_PACK ". It seems that only the heavens can only look at his article, is he joined the day? Redp0wer: marui1@kali.com.cn http://www.red.sunsnet.com / (?) The author of the Unicode Vulnerability Tool RED is, more importantly, he disclosed the original code of the Red. I appreciate him this spirit, which makes our rookies to be bent less when writing such software.

Lee: zhssun@iped.xjtu.edu.cn, the webmaster of Xi'an Jiaotong University, specializing in the graduate student of the network, very proficient in network technology, is the most happy and helping people I have encountered, very well deedd.

Arthir: (email I didn't find, I will add) Arthur, Xi'an Jiaotong University BBS HACK board linen, masterpiece network technology, people are very enthusiastic, spend a lot of time to collect safety information in all parts, I used to post me At the time of the Internet, Jiaotong University BBS is where I have to go, because the information there is more timely.

Bati: Bati@sec-online.com.cn Lock, Sichuan Guan NO.1, good at hackers and programming technology, often in the Green Corps's IRC to meet him. Write some popular easy articles in bbs.scit.edu.cn, such as: "Buffer overflow Black Paper"

WHG: WHG0001@263.net http://pweb.scit.edu.cn/~whg; fig, Chuanxuan's virus master, I have written a lot of viruses, and I am really wanting to put him. Make a master. Friends who have interest in this area can find him to learn.

Rudey: yf@cdit.edu.cn http://octopus.cdit.edu.cn/~yf17; our spoken network system administrator, school Linux authority. Most of my Linux and network knowledge are learned from him.

Lonely swordsman, email: janker@371.net homepage: http://janker.126.com /; English name Janker, 26 years old, occupation is a network security consultant, university is mechanical design, English 6, graduated in the beginning Institute engaged in the development of MPU and PLC, familiar with the management and maintenance of NT, Linux, Solaris and other systems, and the system and network programming of ASM, C / C , now focus on network security research, securities, banks and telecommunications, etc. The industry has more than 2 years of security program design and project management experience. Personal works include: IP Hunter, IP Hacker, Chinaboy, etc.

Netfish@371.net English name netfish@371.net English name Netfish, 26 years old, occupation is a safety product developer, undergraduate is mathematics, graduate students are professional, English 6, familiar with the safety management and maintenance under Linux, NetWare platform, Familiar with the development of network programs and core-level procedures under C / C and UNIX / Linux systems, rich in firewall design and development experience.

转载请注明原文地址:https://www.9cbs.com/read-126749.html

New Post(0)