Chinese hacker super file (2)

zhaozj2021-02-16  50

Chapter 12: Impetuous Desire "2000-2003" has become the most brilliant year in China in China in 2000, and Internet cafes have also flocked all over the country. The people on the Internet have increased more than double. For a time, "Are you online?" Became a popular greeting. At the same time, China's hacker team is also rapidly expanding. Many hacking tools and software make the threshold that enters hackers greatly reduced, hackers are no longer the name of the network master, many hackers are likely to be a stick in a mouth. Sugar hand flips the children of primary school textbooks. It is precisely because of this situation, Chinese hackers begin to messy. At the beginning of 2000, the loss of the "Dong Shilang Nanjing Massacre" incident once again aroused some hacking nationalist emotions, and some domestic hackers launched an attack on Japanese websites and attacked some Taiwan websites. Because there is not much sensational force, there is no more influence, but it is worth noting that many domestic hackers have been born in the rain. In addition, in this year, a new concept "Blue Check" was also raised. At this time, domestic hackers are basically divided into three types, one is a hacker who is represented by China's Hongke, a hacker with political color and patriotism. Another is representative of Blue passengers, they are passionate about pure Internet security technology, and there is a technique for other issues. The last thing is to completely pursue the original spirit of hackers, do not care about politics, and sought after the technology is not crazy. Of course, in this year, the expansion of Chinese hacking groups has led to the emergence of many pseudo-hackers, and in these pseudo-blacks groups, the "hacker attack defense secret" incident is the most prominent incident. The high school student of China's security general plagiarized a large number of hackers and works in China, and then they were published by their own names. This wrong word is only an electronic publication (differently different) brochures in electronic publications (differently different), and the behavior of Chinese pseudo-hackers is pushed to the extreme. Thereafter, many pseudo-blackers who haven't plentiful in the technology have played a farce of a scene, but not only the spirit of Chinese hackers, but also become the most dirty corner of Chinese hacks. After entering the new century, Japan's emotional emotions are increasingly arrogant, Mitsubishi incidents, daily air incidents, textbook incidents and "Taiwan" have angered Chinese hackers. Through several domestic hackers, several large-scale hackers have been organized. Some fool-type hackers have also emerged, and the most famous "Chinese boys" of the most famous lonely swordsman. The reduction in technical thresholds has caused many teen hackers, ready-made tools, ready-made software armed for young people who don't know anything about network technology, but also causes the later young hackers' ignorance and despite. Since domestic hacking has reached the extent of white heat, various media and small newsmakes have greatly improved the degree of interested in hackers. The security company hopes to be able to seize this opportunity to speculate, Hisense's 8341 firewall challenge global hacker is the most busy play in the time, and took out 500,000 yuan of attractive numbers as an event. The bonus, all topics of all the safety circles are concentrated on the firewall of Hisense. When the hacker master is working hard to break through the firewall, the dramatic scene has occurred, and the website of Hisense is black. The hacker has been ridiculous to Hisense Company, and the test of Hisense has been questioned. But because the hacker attack is not the test website given by Hisense, the 500,000 yuan bonus can't take away, and I will be charged by Hisense. This unusually lively farce is also the pasture of the grass. On April 1, 2001, after the "Chinese and Croiser Incident" in my country, a "Chinese and Tropical Incident" has taken the first to launch a malicious attack in some websites of my country. Chinese and American hackers have produced some small friction. During the five-way holiday, many Chinese hackers took up the weapons in their hands, and the large-scale offense was launched to the US website and claimed to have "80,000 people". But afterwards prove that this is just a group of children's graffiti games, and staged a "patriotic show" in the media.

Most of the eight thousand people know nothing about the network knowledge, the way used is still a spam and ping a few years ago. In addition, many false information made by PDSHOP have also become this "patriotic show" "The biggest failure." However, due to the hyper action of the hacker, many media have a concern for Chinese hackers, so many people understand this special group on China's Internet. In the subsequent reflection, Chinese hackers have begun to gradually mature, and many hackers have returned to technology, and there is no hype enthusiary in the media. The discussion and extension of hacking morality and hacker culture also makes Chinese hackers return to natural states and is committed to research on network security technology. Compared with the current Chinese hacker status, Chinese hackers have not much behavior for commercial crimes, and there are some so-called commercial hacker criminals in newspapers and periodicals. In fact, physical means, rather than network means. Although Chinese hackers in the newspaper are reflected in some extent of patriotic vents, hackers are mostly personal behaviors. If they are not guided, there is a possibility of developing a computer network crime. But objectively, Chinese hackers have played an enlightenment in my country's network security. There is no hacker, there is no network security. At the same time, a group of hackers have changed to network security experts, they discover security vulnerabilities, develop many security technology and security software, and contribute to the development of my country's computer or network. Summary: 1. 1994-1996 The largest network user group is not Hui, but the educational network, the biggest and network-related events at the time is the 1996 marking of the fishing incident. Peking University Tsinghua students appointed the demonstration through the Internet, after being strongly boused by the school. Peking University BBS station leads that Shuimu Tsinghua is a long time, in fact, Shuimu Tsinghua has always been the highest in the domestic popular community for a long time. Many early users such as Caoz are beginning to start in the campus network (and fast, >> 9600bps, because the user is less), not dialing BBS. 2.2000-2000-2000 - 2002 Most memorable things is China security experts to release some system-level security vulnerabilities, not a blind follow-up, more than 100 security vulnerabilities published in 2000, there are 6 Zhonglian Green The League Yuan Ge (Yuan Renguang) found, more worthy of a large-scale red code, blue code, NIMDA virus spread, in fact, the root source is the use of IIS Unicode vulnerabilities found by Yuan Ge. At present, there is a considerable number of security vulnerabilities and problem reports such as CVE, Bugtraq, etc., and the official website of China has been able to experience NSFOCUS to the CVE official website. Discover system-level security vulnerabilities and writing Trojans, it is no longer a level, see the relevant hacker articles in the author column. 3. Can supplement some international background information, the Chinese creation and leadership of the security company in the world is leading, the first NetScreen in the global market is created by two Tsinghua Li'er graduate students, if * I have not remembered, Panda Technology, Trend Technology is also the helm of Chinese, and there is Wang Chi-Lian managed CA. At present, domestic security company is also in the internationalization, Qingling Star, Zhonglian Green Union, Sino-Science Internet, Marseille Networks, is working hard because of the technical backbone, it is already under the river, can only die in China, weak Central Plains. Animal Technology in the Western Western Region has some people in Java, Web CGI, but the comprehensive strength is unbalanced. As a whole, safety service providers are obviously not enough.

Chapter 13: China's "Network War" has entered my country since 1994, my country's netizens have grown sharply. In this group of young people chasing trendy, the hacker team has also rapidly growing, and the field of commitment is increasing Expanded, the crime is increasingly high. Naturally, there are many patriots in the middle, and from time to time use the Internet to express their patriotic enthusiasm and internationalist emotions, they have played a few beautiful "network guards" without smoke. Chinese hackers' first "online" war "happened in 1997. At that time, Indonesia had a series of exotic afternoon incidents due to the Southeast Asian financial crisis. Many Chinese merchants were killed by Indonesia, and the store was robbed. Some Chinese women were smashed by anti-China. In the face of Indonesian anti-China mob, some computer hackers in China have launched the Internet as a weapon and launched an attack to the website of Indonesian anti-China, causing a number of people in Indonesia. The hackers hang a five-star red flag of the People's Republic of the People's Republic on the invasive website, and wrote some warning words. Chinese hackers have taken place in May 1999. After the NATO's NATO, the Chinese Ambassador, I'm going to be angry in China, and the hackers naturally won't stand by, and they attacked the Internet site of the US Department of Energy, the Ministry of the Ministry of the Ministry of the Ministry of the United States, and A large-scale attack causes the White House World Wide Website to fail. Chinese hacker invasion incident became headlines of major newspapers at that time. The third "online" War of China "hacked Chinese hackers occurred in July 1999, Li Tenghui will immediately throw out" two countries ". Taiwan's "National Conference", "Executive Yuan", "Supervision Institute", "Taiwan News Department", "China Daily" and other military affairs department and media computer information network have been attacked by mainland hackers, web pages are tampered with Ten hundred. The most serious attacked is the website of the Taiwan "National Conference". It is not only posted on the five-star red flag, but the information inside the system is also removed. The computer host is once. The fourth "Network War" of Chinese hackers took place in early 2000. On January 23, Japan's right wing conducted a large-scale rally of the "Nanjing Massacre: The biggest lie" in Osaka International Peace Center, which is open to the Nanjing Massacre. While the Chinese government and Nanjing and other places are protested, Chinese hackers and overseas Chinese hackers have not been idle. They have repeatedly invaded the Japanese website to take the actual action to attack the uglift of the Japanese right wing. According to Japanese media reports, computer hackers left a large number of attacks and 谩 文 on the invasion of Japanese websites, the Japanese General Hall and the Science and Technology Department website forced to close. And when the prime minister Xiaoyuan, the three pairs of attacks indicated "regret", and the new round of attacks in Chinese hackers immediately came back. The fifth "online" War "of Chinese hackers happened in 2 and 3 this year. Due to the early days of the year, Japan's state state is constantly, Mitsubishi incident, GNA incident, Panasonic incident, textbook incident, "Taiwan" and so on, aroused the strong indignation of the Chinese people. This time, the hackers' attack targets are not limited to the Japanese right-wing reactionary website, but to expand to Japan's official website, enterprise network, campus network, hospital network. Painted "Black" webpage is full of "knocking down Japan imperialism", "extinction of Japanese devil", etc., bright five-star red flag hung up in the home page. A hacking organization named "Red Man League" proudly claimed that they were a group of bloody youths who were "the national sovereignty of the motherland, and combating all the anti-mechanical ideas of China". Chapter 14: China-US Hackers Wars April 01, 2001, an Navy EP-3 reconnaissance machine in the southeastern sea of ​​Hainan Island in China, two military aircraft tracking monitors. At 9:07 am Beijing time, when the medium plane is located in the southeast of Hainan Island, the US machine suddenly turned to the Chinese plane, and its head and left wing collided with the Chinese aircraft, causing China aircraft crash, pilot disappeared .

On April 1, Wang Wei, excellent pilot, Zhejiang Huzhou, defended the country's sovereignty and the dignity of the country, and wrote the loyalty of the motherland in the blue sky of the country. After the occurrence of China's hacker event, the network war happened between Chinese and American hacities has become more intensified. Since April 4, American hackers have organized Poizonbox to constantly attacked Chinese websites. In this regard, my country's network security personnel actively prevents the attack of the US hackers. Some hackers in China have started "hacker counterattack" during the "May 1" period! Since April 1st, many US government and commercial websites have been attacked by Chinese hackers. A post on the home page of the black website is written: "Black Pour America! For our pilots Wang Wei! For our China!". A famous network security company announced a survey data, saying that the hacker attack incident on the two countries has occurred from 40-50, before this, this number is only 1- before this. 2 start. In fact, the large-scale attack events between China and Japanese hackers can be traced back to May 1999, that is, after the US bombing the Chinese Embassy incident, China's Hongke attacked some government websites, including the energy department. The homepage of the Interior, the homepage of these websites floating five-star red flag. There is a large-scale attack, but also causing the website of the White House for three days. Chinese hacker attacks have become headlines of major newspapers at that time. On the day of April 27, China's CHINABYTE website specially published, reminding China's network administrators, recently developed American hackers organizes Poizonbox and single-gun PR0PHET, the former focuses on Windows, the latter mainly attacks the Lunix system, though they "It's just a little role, but I have to pay attention to it. Since March, Poizonbox has conducted 283 attacks on some websites ending with" .cn ", and PR0PHET has also reached nearly 30 Time. Most of them are carried out in the last two weeks. On May 3, the person in charge of China's National Computer Network and Information Security Management Office said in the interview with Xinhua News Agency reported that in mid-April, the attacking incident of China's network has occurred frequently. Chinese online operators should pay attention to prevent hackers attack. Ensure network security. And reminded that if the network attack event can be reported to report the relevant situation, the National Computer Network Emergency Processing Coordination Center can be reported. The negotiation of the hitting event is still continuing, but the online struggle is just hot. A hacking war in a larger, more involved in the broader, once again overcrowdous Pacific Ocean, starting on the network. A pre-prior public hacker event was as early as April 19th, the US Wired.com website mentioned in an analysis, there was news that China's hackers have planned to launch a seven-day battle during the "May 1" period. Attack the US website. A American hacker named in a phased page is followed by a post: "All American hackers join us! All the Chinese servers are all!" April 26, a "China Red Guest Alliance" organization Before the pre-war, the members of this network security organization are called "Hongke" rather than "hackers." The next day, the US Federal Bureau issued a reminder website to step up the defense document, China's CHINABYTE website issued a reminder that China netizens need to be a hacker. At 11:00 on April 29, in the public forum of a portal, the computer screen refreshed quickly. "The US Poizonbox Habit Organization is still actively planning to attack actions, the goal is China's major websites, they are still constantly implicating more hackers join the war group." 22-year-old Zhongguancun hacang Xiao Yang just seen from the US website Dynamically attached to the chat room.

"We have to show China's powerful power through the Internet, telling them that China is not bullying!" This slightly thin young voice is firm, he is a famous hacker's backbone, he said that this cyber attack will be May 4 On the day of the peak, it is just a young festival that day. On the evening of April 30, China's Hongke Alliance Site. The four-day statement attracted a netizen, "crowded" in the conference center, this is a pine-conscious habit of singing alone, and there are also newcomers who have just started, they all mobilize the meeting. of. The battle is listed as an American website that attacks the target, which is mainly government, military websites. In addition to the White House, including the US Federal Investigation (FBI), NASA, US Congress, "New York Times "," Los Angeles Times "and the website of the American Wired News Network (CNN). At the same time, there is also a hacking group that has the "Chinese Hacker Alliance" and "Chinese Eagle Distribution Alliance". In the chat room, the latest battle will be announced to the red guest on the screen. Some US websites have successfully tracked some hackers and mastered the evidence of this online battle. According to US cyber security experts, Chinese hackers have a wide expansion attack team, and provide a hacker tool called "killing the United States", including prefabricated charts, slogans, etc., but they just teach people how to change the page There is no damage to the website's DOS (send useless information, blocking the door of the other party). Network Security Consultant Jerry Frisse commented: "The taciting understanding between Chinese hackers is surprising, their organization is very orderly, which is quiz, and more strict than Western hackers." After a day, the attack, China's Hongke Alliance announced that 92 US sites, but disclosed according to netizens, and the black China site has exceeded 600 (including websites from Taiwan). Since the statistical error is considered, some of the Hongke's black sites can not be statistically, so the proportion of China and the United States is approximately three to one. Eight thousand red passengers rushing the White House website "May 1" war, the next morning, there is news from the United States. As China's "May 4th" Youth Day, Chinese hackers will reach the peak, Therefore, seven or eight American hackers form a "China Plan" alliance, preparing to fight against China hackers. There is a network security expert in the United States believes that on the "May 1" Chinese and American hacking war, the basic technique of the two sides is currently in addition to the other webpages, and there is no other high-stroke, and After May 4, this simple attack will decrease. In fact, they are wrong, because in the battle of May 4, Chinese hackers use the "Human Tactics" of the information war in the information war, staring at the American White House website, and the war has continued until May 8. US local time on May 4th, at 11:15 am, the US White House website was forced to turn off for more than two hours under the attack of human tactics. Jimmy, the head of the White House website, said: "The simultaneous inflow of a large amount of data, blocking the White House and its Internet Service Provider (ISP) connection channel." The White House website received a large number of requests for service, so that legal users cannot log in. The site. As of the early morning of May 8, the US white hustan officials said they were still unable to determine what hackers who were implemented on the US White House website for the implementation of "refusal service attack". At 23:50 on May 8, in a office building in Guangzhou Sports West Road, the reporter saw the "Chinese Eagle Alliance" person in charge of "Chinese Eagle" in the Chinese hacker's role.

When I was talking about the attack on May 4, he smiled and took a sentence: "There are so many people in China, people's tactics!" And on his desktop, there is a few days ago, it is printed. The big headline of a row: "China Eight million hackers rush the White House website." At zero, after seven days of counterattack, Chinese hackers announced to stop counterattack. Chinese and American hacker confrontation (April 27th - May 5th) April 27th worried that Chinese hackers launched a five-day attack US military highly guards a defense official official, in order to prevent hackers, US Pacific Command The level of the threat to the threat of the information system is generally improved to the level A, so that the relevant personnel will pay close attention to the operation of the website at any time. At the same time, the US military can also increase the above threat level from the A level to B or even C grade. Once the user will be limited, then the user will be restricted when the user logs in to all military websites. It means that the military network system does not keep online. The highest threat level is D-level, and the entire military system will close all the military system. On April 28, the US government "Preparing Chinese Hackers" documents Full text The National Infrastructure Protection Center (NIPC) under the US Federal Investigation Bureau (NIPC) published documents on the "China-American Hacker War" on the 26th local time (Beijing time). On April 29, the US Department of Labor and the Ministry of Health was attacked by Chinese hackers (FBI) just warned that Chinese hackers were likely to start attacking the US website, several websites operated by US government agencies The local time was attacked on April 28. On April 30, China's Hongke League will start "counterattack" at 9:00 tonight, "China's Hongke Alliance" homepage posted a notice, and his host Lion convened "Alliance" members of all members of April 30 : 00 Convene "Attack the US Network Mobilization Conference", discussing the plan to attack the US website during May 1. On May 1, the Chinese-American Hacker War and upgraded the official website of the White Palace was attacked by the security expert. The online war between the American hackers was more upgraded on April 30, where the official website of the American White House was email "bomb" "Attack, and several US and China website pages were all modified. There is also a website to attack the US, China hacker launches war. According to reports, the US Department of Energy in a subsidiary of New Mexico, on April 30th, April 30 (Beijing time on April 30th), several anti-American slogans Several other government websites, including the US Department of Labor, have also attacked. The hacker has left the "long-lived" of the great Chinese nation on the website of the US Department of Energy! "" The United States must pay full responsibility for the hitting incident "," protest the United States to sell weapons to Taiwan, destroy the world peace! "And other slogans. On May 2, the Chinese and American hackers were upgraded for two days, more than 700 websites were taken after a day and night's attack. Before the reporter was published in the Chinese Red American Site, "" The US site of the capture has reached 92, and the information from netizens, the black China site has exceeded 600 (including websites in Taiwan). According to analysis, because some Hongkes have not reported the black website in time, China and the United States are approximately around 1: 3. On May 3, I only changed the page without destroying the Chinese hacker. According to the US network security experts, Chinese hackers are widely expanded to attack the team, and provide a hacker tool called "killing the United States", but they are just teaching How people should be altered and do not destroy the site's DOS (Denial of Service). Chinese hacker: American hacker does not stop our counterattack will attack the Chinese website to attack the Chinese website, causing Guangdong hackers to participate in the "May Day Counterattack", for this attack, there is a hacker saying that the purpose is not just counterattack, more want to expose At present, serious security issues in China have attracted high concern.

On May 4th, China hackers arveted thousands of US websites in the United States website were black in these two days. The damaged main is the commercial website, which is a ".com". The government ".gov" and institutions ".org" relatively small, the education department ".edu" did not touch. "China Hongke" spontaneous counterattack today, "big charge" from the United States said that with the arrival of China's "May 4th" Youth Day, Chinese hackers will reach the peak. At the same time, American hackers threatened to counterattack, they are also organizing, seven or eight American hackers form a "China Plan" alliance. On May 5th, "The White House Website was attacked by the hacker to close the head of the two hours of the White House website. Jimmy said:" At the same time, the simultaneous influx of the data is blocked, and the connecting channel of the White House and its Internet Service Provider (ISP) is blocked. "The White House website received a large number of requests for the service, so that legitimate users were unable to log in to the site. Eight thousand Chinese red passengers launched the United States considered to improve the guardian" China Hongke "launched a big charge for the US website. 10 o'clock last night Around, the American White House website is attacked. A member of the "China Red Guest Alliance" told reporters that about 80,000 people participated in the Internet counterattack. Chapter 15: China Red Guest League HUC, also called China Red The guest alliance, led by the stationmaster Lion, formed in December 2000, more than 80,000 members in the Tingsheng period in the Chinese-American Hacker Wars, when we now re-antiche, we will inevitably sigh, It is such a hacker organization in 2001, the world's fifth hacker organization, and it has also been dramatic. About the Hongke Alliance has a variety of statements, we have no need to understand the reasons, but In any case, the outstanding performance of China's Hongke Alliance in China and American Hackers will always write into China's history.

Red guest alliance - forever! ============================================================================================================================================================================================================= ========= Lion gives everyone a letter: Learn all the friends who care about the Hongke League: Remember that when the school is very remote, we have not even connected to the Internet when we graduated. Ok, I didn't expect my own computer. At the fourth grade, I had a computer class. I suddenly said that I would be a hacker in the future. I don't know why I will say that I will say that I will say that I will say it. One sentence. I still remember the first time I was online, in 2000/3/8 in China Normal University. The school that did not have employment channels called us to find an internship, so I came to Guangzhou, that is, I started at that time. My online life. I still remember that day 2000/3/8. I still remember the first time I did a website, I did the first website, called a hacker. Stack. Not long ago Cool lion studio. I don't understand anything at the time, I will only use some poor Trojans and software. The field of hacking, no one can help you, everything can only rely on themselves. So I keep rich in my own website, in order to Let more like me to find a place to learn. I still remember the establishment of the Hui Guan Alliance. It is 2000/12/31. Without it, there is no today's Red League, there is no Today's Lion, there is no so much today. Support for our brunette alliance. I still remember the hacker war in 2001/5/1, let us be famous, and let us suffer from insulting ... That is an exciting and missed day. China's online history It will be recorded. I believe that the lapse of time will not let everyone forget the sacred days. It has been mixed for two years before and after. In fact, I am just a scripts kid, I never say that I am a master, what will be, very powerful Also from the so-called masters, it is alone, no matter whether the network is still living, I am lonely. Looking at the domestic network, I saw a child who is not sensible, pretending to be a red guest, Hacker, White, Blue, Gray ... What should I have to be famous? Be a master, hacker .... Everything is full, the host, QQ, Email ... Information. Announced everywhere the so-called original plagiarism code of the so-called domestic master .... We have no deep knowledge, I am just a poor four-year-old. We have no high technology We are only learning things before N years ago. But we have the belief that will never be defeated. Thanks to me with the same ideal BKBLL, thank youa, redtx, dieqi, chiny, still struggled with me. Thank you for supporting you. Considering it for a long time, you have to close the Red League website. Please Don't let us usually ask why, give us a little time. We will come back. September 2002 we have goodbye. Forever HUC, the Www.cnhonker.com forever www.cnhonker.net, forever www.cnhonker.net, Never give up! Lion 2002/3/13 ====================================== ================================

The core staff of China's Hongke Alliance: The founder of the WION, the Hongke Alliance, the founder of the Hongke Alliance, is now engaged in network security. BKBLL, the core member of the Red Guest Alliance, is mainly responsible for the daily work of the alliance, student. Yaya, the core member of the Red Guest Alliance, is mainly responsible for the daily work of the alliance, accounting and engaged in network management. RedFreedom, the core member of the Red Guest Alliance is mainly responsible for this attack, student, part-time technical supervisor this time. Nikinana, the core member of the Red Guest Alliance, is mainly responsible for the organization of alliance activities, students, and network administrators. The main members of the Red Alliance also have HD_Format, sweetheart, red moon, etc.

Chapter 16: China Eagle Distribution League, Pharmaceutical Stage: (June 1997-2000) 1, June 1997, the founder of the league foundings CHINAWILL (Dragon's heart) 2, September 1997 CHINAEAGLE from Guangzhou participated in the 60th anniversary of the Anti-Japanese War 3, 1998, the founder of the Alliance, China, China, China, China, "Green Corps" 4, 1998, the founder of the Alliance, China, China, China, China Riring activities 5, January 1999, the founder of the Alliance participated in the "Green Corps" Shanghai Annual Meeting 6, July 1999, the founder of the Alliance and the Shenzhen Chenguang Studio, Fujian Tianxing and other business cooperation (participating in China The hacker group transitions to the safety company, thus establishing a basic understanding of the characteristics of Chinese hacker culture, confirming the establishment of a road to establish Chinese characterful hackers) 7. In February 2000, the founder of the league participated in the right wing of Japan. Network Anti-Japanese War II, preparation stage (May 2000 to May 20, 2000, China Eagle Club was born in Sina's Ship Knowledge Forum, May 20-30, 2000, China Eagle Club launched online anti-** action 3, September 2000, the founder of the Alliance participated in China's first online security enthusiast conference, and delivered a speech at the meeting "to create a hacker culture with Chinese characteristics", initially established Direction and target 4, in October 2000, ChinaWill's new station was released, and the regional station and some provincial stations 5, December 2000, the founder of the Alliance participated in the "Patriotism Seminar" in the "Network Age" held in Nanjing. 6, January 2001, alliance members attacked **** Hong Kong, Switzerland, New Zealand and other reactionary sites, in February 2001, alliance members attacked the official website of the Philippines, supporting our government to defend Nansha sovereignty 8, March 2001, alliance Members attacked Japanese anti-China sites, protesting Japan discrimination Chinese 9, in May 2001, Eagle distribution members participated in China-and-American hacking war, attacking a large number of US sites, including the US Department of Labor, and published US President's open letter 10, 9:00 pm, on May 8, 2001, China Eagle Distribution held online establishment ceremony and press conference on IRC, officially announced the establishment of the three- and development phases (May 2001-2003 1, May 20, 2001, China Eagle Distribution Function Group 2, May 28-2, 2001, League person in charge of ChinaAeagle from Guangzhou, takes Beijing, Changchun, Shenyang, Dalian, Jinan worship The core member of the area, and interviewed by Hunan Satellite TV and CCTV. On June 4, 2001, the song of the Chinese Eagle Distributor Member was officially released 4, June 22, 2001, League person in charge ChinaEagle is unforgettable in Shanghai and History, but also on July 1, 2001, China Eagle Alliance Articles of Association and Management Rules issued 6. On July 5, 2001, the League person in charge of the League, member of Shandong Member in Jinan Preparation of Shang Shandong Mingdu Studio 7, July 7, 2001, China Eagle Distribution Awards released and trial operation 8, July 12, 2001, China Eagle Distributor Consignment host 9, July 2001 On the 16th, the League person in charge of ChinaAeagle meets 10, July 28, 2001, the League person in charge of ChinaAeagle and Sichuan Member Member 11, August 9, 2001,

The League person in charge of China's TV network interview 12, on August 15, 2001, China Eagle Alliance issued 815 income, announced that all network attacks 13, September 18, 2001, China Eagle Alliance joint history does not forget the site Waiting, "918 Global Chinese Website Tour Day" activities 14, September 18, 2001, China Eagle Distributor Alliance released the League theme song "The power of the night" 15, September 2001, in September 2001, September 2001 Research Center Channel 16, January 2002, China Eagle School's first annual meeting was held in Guangzhou, in March 2002, China Eagle School launched an event 18, in May 2002, under the advocacy of ChinaAgle, Chinese hackers stopped 19, in September 2002, September 2002, China Eagle Artifacts Criticism of Chen Shui-bian 913 speech 20, October 2002, the second patriotism seminar held in Nanjing, China Hawney main member Participate in 21, January 2003, the second annual meeting was held in Shanghai, the title of China's Eagle Division was changed to the Chinese Eagle Union 22, in February 2003, the Chinese Eagle Parties elected the main core members of the new alliance 23, 2003 In May, the Chinese Eagle Alliance opened the three channels of manpower, education, and technology ================================= ===================================== 第 17: China Eagle, China name: Eagle, ChinaEagle Real Name: Wan Tao: Men: 32 Marriage: Your Waiter: Guangzhou Nanyi Technology Position: Company Old, China Eagle Alliance League Qualifications: ICSA Training Certified Graduate School: Beijing North Jiaotong University Economics Management department accounting profession ============================================== ============= "Chinese Eagle" is only his name on the Internet, the university era, he prepared test virus has successfully bypassed a famous virus card known as detected unknown virus. As an early member of the "Green Corps", he witnessed the growth of Chinese hackers. He is the responsible person of the "Chinese Eagle Distributor", "Chinese Eagle League", "Chinese Eagle Lead", "Chinese Eagle League" Not a hacker, "Just learn the martial arts than one person, before you don't hit people, you can't say that he is a bad person.

If he is used to repeat, he is a man, if he is used to hob, then he is a stolen. "The Chinese Eagle School" is a "Chinese Eagle", which is the title of "hacking lead", is a CEO of IT, and graduated from the Economics Department of the North Jiaotong University in 1993. But his computer knowledge basics It is self-studying. "In the university, I am very fascinated by the computer, often go to the machine room. "That's that, he spoke somewhat self-study, and it is considered to be the most boring and tasteless and the most useful assembly language. Two years after the university, I basically didn't care about class, just at the end of the school or at the end of the classroom. "Although the Chinese Eagle is known that the computer will be his future choice, but it is purely that the virus hits it." There is no internet at the time, copy the disk in the room, often viral infection. "The Chinese Eagle Discovery, as long as the source code of the virus can be used to understand the compilation language, it is easy to understand the mechanism of viral spread, and find the way to get the way. In this way, his interest is transferred to the top of the study. He has written a lot of experimental test virus programs. One year holiday he returned to Nanchang, in the machine room of the mother unit, I saw a virus he wrote, "may be in the exchange of unintentional leaks in the public computer room. Cast. "When the third year, he has written a virus with a pop-up, called Formatvirus. When the user saves the file from the computer, if the time is more than two seconds, the computer will restart. In the school's computer room, whenever When he saw someone else, "how to do it again," also restarted ", and he was excited and tense, and it was also afraid. In 1992, a well-known anti-virus company in China launched a viral card, claims to prevent unknown viruses. There is a file protection switch. When the executable is overwritten, it will be considered a suspicious virus behavior and alarm. Chinese eagle faith feels very uncomfortable, "it is the most common thing to change the document, it is impossible to connect Rename is a virus! I want to prove that these cards are 'scrap card'. "He is on the machine with the viral card, first change some executable files to another special name, then virus infection, after the deposit, will change the name of the file again." It's so simple. Unfortunately, there is no Internet at that time, it is not necessary. "The company later changed to anti-virus software. Until now, he still maintains interest in viruses. Whenever there is a new virus, he will collect it. Give Bush's open letter in many people's impression, The people who are booked on the Internet are easy to work on the side, not to mention hackers. It is an unexpected thing that the Chinese eagle sent a Chinese eagle sent a 30-year-old birthday in China and American hackers. It feels more like a teacher. Some people say that Chinese hackers have too heavy, and the Chinese Eagle School does not say. He even puts forward, to create a hacker culture in China, inevitably need to absorb some non-technical factors, such as nationalism. As early as 1997, in the 60th anniversary of commemorating the anti-Japanese war broke out, he participated in the "bomb" action in China hackers to put "bomb" to the Japanese official site (such as Prime Minister). This is the earliest nationalism of Chinese hackers. Action. There are also in 1998 for Indonesia. In 1999, in the United States, Taiwan, in early 2000, it is aimed at Japan. After Chen Shui-bian issued "inward speck", the Chinese Eagle School organizes online comrades to launch "anti-**" battle. They found the picture directory of the "Lotus Club" website to be written, so they were posted on the five-star red flag at its home page "President". "Slim" people quickly discovered their homepage on the home page The five-star red flag, they immediately found a network engineer, but they were tossing for a long time, nor did they find the crux, had to recover things.

But soon, they found that Lu Xiulian dressed in the swimwear appeared on the cover of the "Flower Mon", "Lotus" finally closed the website. Established "Chinese Eagle Pave Alliance" is not his spontaneous. He often posts a post on the online military forum. Some netizens encourage him to establish a club, and the "alliance" has been prepared for more than a year, it was established on May 8 this year. On May 1st, he published a public letter from President Bush on the Internet. In this letter, the famous American state of the United States, the famous speech of Martin Ludder, "I have a dream", pointing out: China's next generation, many people are eating KFC, McDonald's, and watching the Middle Dwaken movie Big, just when the seniors were worried, they were aware of themselves. "I don't advocate the narrow, extreme nationalism, we pursue peace, harmony between the nation, but the premise should be based on each other, to ensure the interests of our own national itself." I am not a hacker " So I am not a hacker, because people have misunderstood hackers. Hackers have a good, conscience technology masters, and the difference between him with the hacker is after entering other people's computer, one is a kind reminder or quietly left, and another Then it is ruined. "" Haike is like a knight, he is destroying some order, but this anti-order is reasonable for order. "Chinese Eagle believes that hackers are important balanced power in the future information society. He believes that a healthy hacker culture should be advocated, and he is working hard to let hackers return to reality as constructor. Before and after the "May 1" festival, he made two lectures in Guangzhou, how to strengthen the public's network security awareness, as well as hacker culture. He is considering from the company from the company at an appropriate time, specializing in the "Chinese Eagle Distributor" such a non-profitable folk organization. ============================================================================================================================================================================================================= =================== Chinese hacker responded to Guangdong Governor: Wishing to have a national effectiveness since "Guangdong Governor Lu Ruihua: relevant departments can have a monthly salary of 10,000 hacker masters" After that, "hacker" in China has caused great repercussions. Not a few, the mailbox of the newspaper editorial department received an email from the "Chinese Eagle Disposal Alliance" from the Chinese Civil Safety Group. The reporter then interviewed the "Eagle" person in charge of the group of the group of the group and issued a letter, "Owl" said that it hopes that it can communicate with the society from China's "hacker" world and represent the meaning of the meaning - we Willing to serve China's network security! After receiving the letter from the Chinese Eagle, the reporter immediately found the leader of the league, "Eagle". "Eagle" is a celebrity in China's "hacker". He joined the early network security enthusiast group "Green Corps" known as "China Network Security Folk 'Whampo Military Academy" in 1998. In May 2000, he founded the "Chinese Eagle Alliance" with several like-minded people. In May last year, the "Chinese Eagle Distributor" has played a lightweight role in the "Chinese Hawkwell Alliance" in the "Chinese Hawk" in China.

Let the civil security groups go to "legalization" is the goal of "Owl", but the current status of these security groups has always witnessed what opinions and suggestions for "eagle" in China's "hackers" development history? The reporter took various questions, and he had a dialogue with the "Eagle" online in the middle of the night. The number of civil security organizations has a number of reporters: What is the current number of civil security groups in China? Can you introduce their situation? Eagle: The "hacker" group on the Internet has a lot of people, but there are not many organizers and substantive content. It mainly has the "Chinese Eagle Distribution League", "Safety Focus" and the "Sino-American Hacker Wars" last year. "China Red Guest Alliance", etc. The Chinese Eagle Alliance is the only group that was born in Guangdong and persisted in Guangdong. In fact, the birthplace of the "Red Guest Alliance" is also in Guangzhou, but later, as the webmaster Lion is moved to Beijing. Guangdong has given a lot of famous "hackers", such as the famous Trojan "Ice" manufacturer's ice river, Lion et al., But now, in addition to the development of a small number, most of them have arrived in Beijing and other places. "China Eagle Distributor Alliance" has only been developed by 7,000 registered members this year, with a total number of memberships of 27,000. The average age of these members is 20-27 years old and the smallest is 12 years old. They have an immersed, ideal, bigger, and students are mostly, from junior high school, there are doctors. But there are about 30 people in the truly core-coated technicians. I lack time energy and resources to assess, this figure is based on my personal opinion. This also shows a problem: the potential of civil security power is very large, but the lack of environmental improvement. If Lu Governor needs safety talents, the technical force we have now fully forms a consultant group. Civil security talents lost a serious reporter: In your letter, it is specially mentioned that there is a serious loss of civil security power in Guangdong. How is this situation caused? Is it impact on the government's e-government and business development? Eagle: This has a cost and social reasons. Beijing security company, high salaries, technical atmosphere, Guangdong is relatively weak, industry attention is not enough, technical personnel exchange opportunities, and the application level is not high. Moreover, the number and scale of local network security companies are weak. The loss of civil security and the loss of government support is great. Guangzhou has too little opportunities, more pragmatic, but the security industry is going to prepare. Now Wuhan and Sichuan are striving for information security industry bases. And some famous "hackers" from Guangzhou to Beijing now have participated in the construction of national security projects. In fact, network security is closely related to the e-government relationship promoted by the country. Most of the security products used by e-government in Guangdong come from the north, but the province has only a few companies. Guangdong's loose and free environment can brew talents, but it is almost difficult to keep them, because of lack of development space. The hacking force can be used by the government: Please introduce the famous "hackers" foreign "hackers" is now engaged in network security, and assess China's current network security technology level. Eagle: A lot, like the most famous "hacker" Kevin Mitnick in the world, now engage in network security education, and founders of ISS companies (American Internet Security Systems) ... In fact, most of China's safe hobbies If you don't "black", they have patriotic enthusiasm, and "hackers" in real sense abroad are not concerned about politics.

China's security technology is theoretically in theory, but it is actually different. I have a point of view "Unreasonable", China If you want to build your own information security system based on existing information, it is important to "break". The hacker is not necessarily the first, but the imagination is absolutely first, because they study the weaknesses. Organizing it, conducting safety vulnerabilities, as developing atomic bullets when our country is still very poor, can contain the US Soviet. Breakthrough in information attack technology, which can also achieve time for China's informationization. If there is no truly attack practice, what is it to prove that our shield is hard? Therefore, we hope to build a bridge in the government and the private manner: because the network security needs interest and free atmosphere, it is the cradle of safe talents. But the government is unlikely to directly involve relevant planning, and the healthy development of civil security groups can play a role in guiding and recommendation. Phabiting to fail to communicate with the government: Where is the main obstacle you communicated with the government? Eagle: I passed with them, such as the ** department. We are very satisfied with the status quo. ** (net police) is not easy, doing technology, very hard, difficult, responsible, but too little income, too little. After your report, our members were excited to post this news, only I jumped out of the cold water. Because the leadership speech only said that his attitude is very open, not equivalent policies and decisions, this and the actual operation there is a big distance. Chapter 18: Hackers' Paradise Network World and Reality World Differences, in our opinion, more like people in the day and night - weak, night in the night. The world that does not have to face is a stage that everyone is fully demonstrating their own. At the moment of this day, the foundation supported by this world is the only one of the world that can be shared by civilians and popularization. It is such a world that creates an alternative of new human beings - we: Sound and power from the night. After a long 10-year-old window, we finally discovered that he could have arrived in the night of the night. Hacker, for us, just a random guest from the night, just guests, only do not need to knock, will be free at any time. For a long time, everyone has a hacker, the hacker has the so-called red guest's understanding, and there is actually a little going to enter, and even sometimes misunderstand. Some people say good hackers (special refers to the patriotic nationalism, showing it from time to time) is a red guest The bad hacker is a hacker. Will only use some hacker software, people who know the system for the system is a peek (the evil player). But now, now the world called hacker, people think - if a person wants to be a hacker, first of all, the first is to have a love and interest from the heart, must have quite Network technology levels and experiences have a certain person who has certain understanding of the network architecture and all kinds of underlying agreements. He or you can make tools yourself, or familiar with the analysis of system vulnerability and familiarize with its use. But they are never maliciously attacking, they have fun for discovering vulnerabilities, and persistently pursue a technological world in the dark night, this kind of talent can be called a hacker. The hacker is only proposed from the technical point of view, belonging to a special group of professional fields: such as rock in music, its performance behavior and method (but how many people like listening to rock style can not accept rock people life the way?). The hacker can not be seen from the traditional morality, so when a person has certain security technology, he may have the ability to become a hacker, but it is not equal to he can become a hacker.

There is no hacking ideology or culture (of course, there are many gents, huh, huh, can not be the molecule of this heterogeneous group - there is no common language. As for people's traditional potion, there is a role in heroism or other various spiritual factors - so, there is a red guest and hackers: In fact, hacker is a hacker, black is black (black night black, not toxic Black black), this is not! People in the day of the world must always practice difficult to change, must divide us, like the so-called famous names in the martial arts world, and evil. Do you have a novel that Jin Yong is not white? For example, some people must think that hackers or "Hongke" is the so-called justice, and the hacker is evil, dangerous. In fact, we are not unfamiliar with the control of the virtual world of the web (for those network management that may abuse the power, isn't we balanced?). How many of the WIN98, WIN2000, and various tools and entertainment games do you use? Many of these are not from our work? Why do everyone enjoy the cheap and convenience of us bringing, but they also have the exclusion and refutation of sound. Without our constant blow, Microsoft, IBM and other giant, I have long been a river! In the dark, we have no regrets in the ideal beliefs in the spiritual world, but no regrets, no return. Look at the history of hackers and computers, there is no such spirit in the night, there is no personal computer's birth, even there is no world of free internet networks! In the night, bring colored eyes, will only become a blind. Still use your own black eyes, clear this loneliness world - more exciting than dreaming! However, whether it is hacker or a hacker, itself is from a technical perspective. And non-human subjective thinks, not to rely on what traditional moral standards (unless it is rebuilt! Ha ha) [This is no need to morality, this is the morality of different worlds!] This is their own way of life, it is their own that power. But no matter what, no one can change. . . . . . Some people must call "anti-hackers", blood is boiling for a hacker. Some hypocritical so-called security experts, one side hopes "only a fear of the world," mentality and expectations - they care about the purse, there is a so-called business opportunity! The scenery of the guardian of the Guardian has become a modest gentleman (Yue Yue's stream). I think everyone should understand that sometimes the irony and hit of something is precisely for fear and escape. This weakness from the inner heart is due to ubiquitous pressure. When a person encounters hackers online, or in his weakness or progress in his thinking. I think hackers can bring shameful destructions to bring fresh courage. And our most need is a thought - this thought of hanging on the bayonet. China has China's national conditions, so there is a hacker with Chinese characteristics. In the unfunctional network, we are not isolated independently. We don't want to make a lotus lotus, but willing to be a mud in the bottom of the pool. The hacking spirit is a kind of freedom and sharing, which is a precipitation from the historical culture. It is a hacker spirit that is evolved from the survival situation, contradiction conflict, subjective awareness of reality. It is a religion that transcends a realistic and is a sound of sublimation.

转载请注明原文地址:https://www.9cbs.com/read-15478.html

New Post(0)