[Security infered] Chinese hacker looks video

xiaoxiao2021-03-06  20

Such as the abyss, such as a thin ice - heavy white hat, he should count a senior hacker, from playing Ham, go to Fido, to the foreign security article translated by Haiwei, at least the qualifications is not short. But I heard that I have to interview, he has become very cautious. Suddenly there is a call to play, and it is probably to participate in a network security situation in the Public Security Department. I have to interrupted the interview. I know that he is very busy. He used to State-owned enterprises made Project Manager, then safety is completely amateur hobby, but now he is already a safe company's technical backbone, and holds the company's shares. Finally, my interview became an afternoon interview. There are a few people in the company, "more than a dozen people" "What is your main development in online security?" "Mainly or IDS" "Do you also participate in other security business?", Mainly the security consultant, Safety detection "" Comments I once said that the current safety company is a network of black society, first scan, and then notice, simply like protection fee "" We have strictly regulated about scan testing, not allowed to authorize and detect without users. Scan any node "" Where is the security consultant is mainly difficult? "Well, mainly, the customer's safety awareness and current situation, if the customer does not cooperate, the work is difficult to do, some customers have already formed, and there is no safety specification, but it is impossible to ask them to overthrow the previous software. Rather, such as a large ICP, you find that CGI writes all messages, but you can't ask customers to rewrite it over again in accordance with the safety specification, of course, to serve such a customer, it will feel more effort. And once you have problems, the responsibility is difficult to define ... "" "" Then do you worry about the challenge of an attacker? " "How is it, just like a friend who said 'as a security worker, an attacker brings us more challenges to bring us more mission and happiness, truly give us a pressure about customers, investors and official "When I contacted some security workers, I found that they like to quote others. It seems that this will be more cautious and don't make mistakes. Of course, this sentence is deeply curious, he finally promised to tell him the name and Contact, the original person is actually very familiar with me, but he didn't expect that he always said that he would say such a deep language. But when I ask the words of this sentence, he laughed, as if he laughed He didn't say this, and later I knew that he said that another sentence, it was more wide, it was a qualified professional security worker, it should be "like the abyss, such as a thin ice" they belong to China's earliest hacker, regardless of China There is no real hacker, at least their own group is the most qualified to be a hacker. But they are no longer a hacker, they already put on professional jackets, gain income or pioneer due to their safety skills Once you enter professionalism and commercialization, it is just a hacker, a more precise word in the circle, called a white hat. The Chinese hacking file written by Li Xueling. Those people, such as Yuan Ge, Frankie, and the missing little banyan, root, sunx, etc., our field of view is all endless. But after completing this shift, we did not read the feeling of being blocked from them, we Feeling is a deeper understanding of responsibility, even carrying a heavy weight. Maybe this is their professional characteristics, maybe this is their understanding of responsibility, perhaps, there is a deeper thing.

I don't know how to taste. The author of the well-known remote control tool "The Internet Intisper" seems to be a typical representative: "I am" vegetable ", born in 1981, male, high school education, Beijing people, is a VC / MFC programmer. Now A software company in Beijing Zhongguancun is engaged in software development, is a professional programmer. "This is the self-introduction of him staying on the web." The Internet Hirgin has a relatively early exploration of the bag rebound technology. This method can effectively confirm the port limit of the firewall, but this is not the reason why the network is famous for one night, and the real reason is that some people use the Internet to steal, from Jinshan Company. Jinshan's wage list, Jinshan drug tyrant sales and confidential contracts such as virus sample trading. Let Jinshan have lost adults, so the online god sneaks the world. The post of these two netizens has appeared at the same time on the author's home page, one is "Through the Internet, stealing Jinshan Confidential Document" is "Jinshan drug tyrants are non-divided, excellent remote control tools, network hob, Insurance check, "these two posts are put together, no matter some difficult feeling. Perhaps the two generations of hackers have indeed very different, although their age gap is only for a few years, the first generation of hackers also write remote control tools, such as glaciers, etc., but have not heard who sells money with remote control tools, and network The thief has begun to make special editions, collecting 48 yuan registration fee, and another file bundle is also charged 35 yuan registration fee, and the file bundle has been treated by most anti-virus companies as Trojans. The first generation of hackers have also written the procedure for destroying the hard disk, such as Tao Chen's Jiangmin Bomb Simulator, but that is a pure research, just to explain the mechanism of KV300 L logic bombs, and some author reminds, there is unlocking documents , Including the author's contact address and pages, XX is also recoverable. The HDBREAKER of vegetables is used in the method of destroying CIH, which cannot be repaired at all. I considered Mail Interview with the young head of this vegetable studio. But I don't know why, I gave up. "The people who have been born in the 1980s and very different", a "old programmer" that has been 30 years old, "Old Practitioner (Feng Zhihong) is hunting, the software is free, and vegetables have been IP search passengers, using the pursued data, but to be registered. " A two generations of old daises have been turned out again. I am in the home page of the vegetable studio, I came to download the online hobburned page, and suddenly my anti-virus firewall began alarm, "Exploit.iframe.fileDownload", is this MIME redirect vulnerability of Nimda? It turns out that IP IP, I will run a rundll.exe, what is the specific, of course, I can't analyze this kind of rookie, after all, I am just a freelance writer. Perhaps it is a common thing, they are Chinese hackers' new generation, they have all earlier contacts, they have more ideals, they are more impulsive, more confident, our new generation hackers, grab your gray cloak.

Everyone said that I am a national hero - unveiling of the red cover. "One person said that I am a national hero, I don't believe that everyone said that I am a national hero, I believe that this sentence is said to be a red guest leader. When I was interviewed by a reporter, I became a laughter in the safety circle in Beijing. When I dinner, there will be two programmers to hit each other. "One person said that you are a rice bucket, I don't believe, everyone said that you are a rice bucket, I believe that" I have always felt that even the small hackers who are willing to put on the red head have been trying very hard. But all their high postures can only be for the media. On the one hand, they were sought after by the media and the public, but they did not be recognized by the mainstream security circle. Some senior hackers are very strict on this criticism, such as "mob rule is destroying the legal system", and a red man said this criticism "and even make us feel awkward and painful." "They are too naive", a system analyst from the Shangdi Safety Company said, "There are several websites of the black people, what is the meaning, what is patriotism? I see when the programmer is written, and the network management is a good network. It is patriotism. "A little red man asked a senior security worker." Do you participate in the Chinese and American hackers? "This shook his head by him a predecessor, Xiao Hongke said a fascinating saying:" We Very patriotism, we also want to be famous, money and status you have, of course, don't participate, we have not presented, so we must act. " This professional security engineer said, "I didn't say anything at the time. I only had a sigh in my heart." I don't know if I have a new batch of security workers who are growing. He has no sense of heaven and earth, and the feelings of the earth. There is a first-generation hacker in the white hat, this experience makes them a lot of security technology, becoming a leader; under the gray hood, there is a new generation hacker, this arrogance, although it is somewhere However, after all, there is also a premature technology as the heritage; but the red cover is below, more may be just a young impulse, and there is a little impetuous and vanity.

Falling dust - silver handcuffs When an extreme example walks into my vision, I feel sad, and many people are sad. In order to avoid greater pressure to his family, I will not question his name. No one denied that he was a senior programmer, no one denied that he is a flattery of an excellent assembly technology website, nor anyone denied that he is a enthusiastic netizen. But it is also him, attacking the telecom server, deleting billing data. Inducing this, just a normal hopping style. According to the insider, he was originally a programmer of China Telecom, and the job hoved to China Unicom. When he still hoped to return to telecommunications, he was rejected by telecommunications ... The author's home page is hanging there, it is 9 months There is no update, next to several computer virus source analysis of the author, there is such a word: "This topic is some computer virus analysis and anti-virus technology, I will do specific analysis of some viruses, but pay attention to The spirit of this topic is not to preach how to develop computer viruses, which let you know how computer viruses spread, eliminate some misunderstandings of computer virus, so this topic will not provide the source code of the entire virus, and only analyze some Special places in viruses and some traps in the virus, and where to pay attention to this virus, programming technology is like other science and technology, it is also a double-sided edge, just see where you use it, if you use these code Doing programming and all places outside of virus prevention and control, please bear all the responsibility. "He has been considered to be German Shuangxin in the circle, and there is a principle. But no one wants to be so mottled in the dark side of the month. There is a saying in "Zhongnanhai Bodyguard", "I can die, but not wrong", professional security workers as social information security bodyguards are also good, hackers are the edge of society, they have technology, there is energy, so Their mistakes are more likely to bring an unaprotiable impact, the big paralysis brought by the Morris worm is not the author intentional to create a malignant event, just a Joke program to take a random probability. And the kind of gray black flash is more likely to be related to the order of the online world, and the real world. For them, the success or failure is about a line, and it is not only a thought. In addition to the public and media, I listen to their voice, give some rationality and care, including good guidance and criticism. I also look forward to them to adhere to the network line and do everything better. ---------- "Tell us to do the meaning of the network management .. (chnechen)

转载请注明原文地址:https://www.9cbs.com/read-56562.html

New Post(0)