Monday, February 28, 2011

Without the bombardment of the war (1)

 Famous people are afraid, pigs afraid of strong .

    Underground circles in the mix, big name is desirable, but without strong technical backing, what is no good. Brain of a dynamic, Yang quickly to the "Great Wall" to the highest degree of security.

    Yang web sites through the virtual IP connection, so you can better hidden. He has more than ten foreign super chicken , if someone wants to trace his real IP or against him, to capture the chicken in his hand. "Great Wall" firewall and it connected more than ten chickens, while monitoring with them, open the counter-attack if the procedure is equivalent to more than ten large servers at the same time counter-offensive, the procedures are often proud of the local Yang.

    This guy is powerful enough, just forged through their own IP, guess what the "left" in their life this ID, appears to be a senior fields and then ah!

    "What advice?" Yang back on the words.

    The other did not return messages, Yang wondered, in the twinkling of an eye looked at the firewall completely normal. Is probably the calm before the storm. . Xiangba, ready to regain the initiative, to a raid.

    "Advice not when, but suddenly surprised you visit!" The other side suddenly back information.

    Yang stop action, to give up his attack, then I thought, lion? Lions? See each other's ID, like a little impression on the heart, but can not remember.

    HK Union chief called Tiger, where the lion came out of.

    "You are my one track of 25 people, nearly two years, I finally caught it!" Yang read this information back to each other, and my heart is blindness.

    FBI? Or the Security Council? Could they have been eyeing? "Shit!" Curse loudly. Shook his head and dismissed out of this idea, this is not reality, its always been very cautious, they can not be locked in without any action.

    "Where to the lions?" Yang asked the information given.

    "Anyway, not sneaking out of the zoo, of course, is not what you think of lions." The person to return information.

    Wrinkled insignificant, Yang Cang force quickly stamped a few words: "self-reported family name, or let go!"

Send a message, he has started preparing to open several windows, bring up the scan, decryption, intrusion and other tools.

    HK on the network and because in the forum, look at each other unhappy, and that only one word! Black! Black to your crash.

    A swordsman what is most important, of course, the sword; then a hacker attack, then if that is the most

important tool. Do a quick operation and high precision tools and because, often a sharp sword.

    "Fine! Morning news name but not its people, can not read over the pages of today!" Each other down the

gauntlet.

    Come master master, tend to make the other side there is a strange excitement. Yang is no exception, since we know each other is only the old bird, the heart can not neglect the next, found each other through the Forum ID IP address, of course, he knew it was the other side of the virtual IP, this old bird population is generally good.

    When he was holding the mouse, open ZT scanner when the heart an emission complex feeling. Nearly two years

did not engage in these things, and worth mentioning! Lion, waiting for the system to crash it!

    Pull the other side of the virtual IP scanner, the moment a lot of camouflage IP address resolution, which is chicken. Brace has slowly become shorter, IP addresses are still increasing significantly, less than a minute to analyze each other with more than 10,000 virtual IP.

Sunday, February 27, 2011

Master everywhere (4)

 White passengers, who called security, with a number of unusual words of the original hackers to positive, and they enter the major technology companies dedicated protection network security.

    Grey-off, also hackers, also known as spoilers, they are red, white, hackers eyes of saboteurs deliberately damage the system, so a series of malicious destruction of means of attack.

    The construction of hackers, hackers are destroyed.

    HK Union Forum was always so busy at night, used to be and now is.

    Yang smiled, he had been here, but also more than once, enter the ID and password subconscious, into a look, came into view around the nest illustrious words, then suddenly cocked brow.

    Hey! So many people leave a message. Thought, or to withdraw from some relatively safe, but also registered a file called 'left-root' of the ID.

    There is no absolute security, there is only absolute insecurity; there is no absolute security of firewall, even if the density in the thick of the firewall can not guarantee absolute safety. Firewall programs are compiled, as long as there is a procedural loophole.

    This is Yang's experience over the years. His own confidence in the technology and firewall, but it does not represent his arrogant, careful and detailed basic principles hackers do, or only one result, to be black!

    Enter the forum, see a forum very hot, they would follow the points inside.

    "Fuck! So late, there are thirty thousand people at the same time online! Underground workers is different!" Yang glance at the same time, the heart is also a little curious.

    So many people are doing? AC? Learn from? Or attack each other! Become more than a year did not come to it! Powerful enough pace.

    Aim in the forum for a long time, I feel are some boring topics, not talking about this virus is a study of the server, he tried to exit the left, but found a text message.

    "Brother or around the nest and the same year came and went without a trace."

    "Shit!" Read the text messages Yang accused a low hoarseness, illegal channels, master everywhere.

Saturday, February 26, 2011

first volume ,Walking on the edge of hackers,chapter 2, Master everywhere (3)

 Yang words they realized after listening to the other tools that reason. Was left by the original period of their source code, but also tan year that war, laugh loudly, said: "Which guy's such a great pass to me quite similar with the" then, mouth exposed natural evil smile, grin , said: "I had so many black circle believers ah?" thought, the heart can not help but proud one.

    Ah, that people who spread rumors holding me so high, when the time old, led a group of believers to open a church is

not bad. Ah, or the Jesus guy and smarter, have to learn to learn.

    I am afraid that war then he clearly than anyone else, he took part in the right, but not control tens of millions of

servers, not to mention do not have this capability, even with that much youth to complete such a large project. He then control a large number of chickens, a different type of DDOS attack using only once, then see the withdrawal of U.S. hacking, and using buffer overflow attacks, from beginning to end he only attacked twice.

    But he was sure there are other mysterious figure in the middle, at least no less than 10 people. That the presence of

other masters, he quickly disappeared, only the fear of being caught a careless, he is the most taboo National Security

Agency those people.

    If they have been eyeing the country, then it is equivalent to loss of freedom, the state will be forced to keep

yourself, your work on its behalf, although not a jail, but it is almost the same.

    Xiangba, Yang give the machine cut off the network. Go to a Huangshen black machine that configuration before the

ultra.

    Since the period of open source code has been taken up by it to strike.

    Crackling Jianpanshangqiao on a web site is HK Union Forum. Forum brought just listen to each other, and he wanted to

go up.

    HK Union is the number one earlier in the HK site, its owners tiger is the first generation of hackers. HK China

Alliance as well as a few large sites, such as cutting edge group, even the war, First Army, free bases, etc., which are

open points in the 90's, but with the United States two years ago, a hacker war , the domestic setting off a burst of

hacker trends, trend-like moment as the wind rushing the entire city.

    Both to the present trend is still continuing with this, the major HK sites have also evolved, Evolution to the

present, hackers have lost their original meaning.

    Some people say that hacking is an American creation, as they create the same pair of jeans.

    Today's hacker is not the 90's hacker, has now been divided, red-off, off white, gray passengers.

    Red off the disdain of some excellent technology but the company of those vandals who called Honker.

Friday, February 25, 2011

first volume ,Walking on the edge of hackers,chapter 2, Master everywhere (2)

    "Brother! Well, not ah! On this 'around the nest' optimized version of the invasion of tools really good! I have used

it several machines into it!"

    His words, Yang Meng whole body vibration look, fingers caught in the moment of falling under the slightest of

cigarette ash, and his heart was trembling slightly as he heard the word - around the nest.

    Is his nickname around the nest, it is a hacker community close to God. Word around the nest has been lost in the

hacker community nearly a year.

    He has been awhile this ID, even if the old bird did not know much, he will know how this rookie? He did not release

any intrusion tools on the Internet, how? Could someone fake?

    Hackers afraid of? Fear of losing freedom! And Yang is with a black hat hacker, and now to hear such news, so that he

could not anxious.

    Audio, thought of the rough voice.

    "That, of course, does not think about who made it? Can not severe it?"

    At this time, Yang also quite expect him to name it!

    "Who? So powerful?" The other a girl asked.

    "My idol! Around the nest," Although the sound is coming from the audio, but can still hear his voice filled with

respect and longing.

    Sure enough, someone named after my nickname! Who is so shameful.

    "But this tool is not made around the nest, but called 'killers' release, and you did not see a word written on the

bottom of this tool it?"

    "I murderers around the nest of special worship, the core of this tool is used entirely to leave the nest around the

source code, I on the basis of the source code has added a number of injection procedures and analytical procedures, so

the software named: Wai nest optimized version of the invasion tool "at the bottom of the software identified the girl,

and read it.

    "I left the source code? How could that be?" Yang have in mind the slightest doubt, but also secretly guess the truth

of that sentence.

    "Brother! Around the nest is? So much!"

    "Around the nest!" Voice paused, then came again: "around the nest is a God, is a mysterious presence, I also saw in

HK Union Forum, and is said around the nest is very mysterious"

    "Two years ago during World War II American hacker, hacking our country and the United States war for three days,

called in when a mysterious person appeared around the nest, to single-handedly control the tens of millions of servers at

the same time, has the most common The DDOS attack, which was then a lot of saturation attacks (denial of service attack),

seeing a large number of hackers pulled the United States, but around the nest did not spare them, directly through the

other side of the system buffer overflow attacks, and finally thrown into a file called 'speed stream 'of the Trojan

horse, guess how the final? "

    "Finally, how the? Dead brother! Come say!"

    "Last I heard the United States has also paralyzed most of the computer system, including a large number of government

servers, and we also have one-third of the country's system can not function properly, there have been half a month can

not connect to the network, that can be said to suffer, Meanwhile, around the nest suddenly disappeared, leaving only a

source code, followed by domestic hackers have traced his whereabouts, but not find any trace of frustration. "

Thursday, February 24, 2011

first volume ,Walking on the edge of hackers,chapter 2, Master everywhere (1)

"Great Wall" firewall with anti-detection program, but the Yang of this rookie class is not interested in people,

casually pointing out two other machine's port, light laugh: "good sense of the port, the machine is also good, but with

the machine's were not very good! "

    Successful connection.

    Yang open a remote terminal, select the camera and voice to execute two procedures.

    No other camera, access to voice devices.

    "Brother! Let me see you in a while thing!!" The other's voice from the audio, the spread.

    Woman? Yang hear sound mind a bit of shock, did not think I actually caught a mermaid fishing, cross the sound smile:

"shit! Really Moral Degeneration ah! Woman to have with black hat!" Then, lit a cigarette, relaxing smokes, while ears and

listened carefully to the heart rather curious, brother? Are there people around her?

    Sure enough, the stereo came the sound of a rough.

    "Small quiet, how can you read this novel, then downloaded to the machine depends on the look, you do ... ... if found

to be broken!"

    "Well, no other movement for so long, he could not!! Brother! You how such a wuss, actually in front of me the nerve

to call themselves a hacker! Humph!"

    "Small quiet, this is not the timid are not timid, I give you leave a back door on the machine, we first downloaded

the novel, after his machine can often control it!"

    "Really? That line, you come!"

    Yang slender eyebrows gently on the pick, he cracked a curse: "Fuck! Left the back door on my machine? Also often came

to patronize the future?" He thought of these to find it ridiculous, then shook his head sighing, said: "hey, young

people, ah! groundbreaking dare head of the emperor! "Yanba, interesting to see how the other side to stay back door.

    "How? Brother, well, no!"

    "Strange! How no way to get their permission to do!" The other voice of the man given doubts.

    Yang is what people? Let the machine in his yard a turn on the good, want to leave the back door on the machine? That

is simply nonsense. He had the user rights and encryption to hide, if you want, right! As long as you have the ability to

find and crack open his encryption program.

Wednesday, February 23, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(6)

At this time, the mouse on the screen has started moving. It seems that he had entered, and Yang said to himself: "Oh be careful, I have mine yard machine!"

    Sure enough, the other came in the system directly to each plate against, for a point to open the file, one would then point to open that application, the last to open a TXT document, the mouse stops moving.

    "Hey! Told you mine, you are chosen to point!" Yang laugh loudly, and then stared at the blank up TXT documents.

    This is your own downloadable fantasy novel, this guy that will not be ... ...

    Wait three or four minutes, but he did not move the mouse.

    "I rely on! This guy is reading a novel that does not it?" A little scared Yang E, muttered to himself.

    Waited for a while, still not seen any other movement, which under his heart is amazing.

    "Hey! It seems that he has spotted hidden! I'd like to see which way the god of courage actually so big, is simply blasphemy to me!" Said, Jianpanshangqiao play several, then the screen display in a Command Prompt window, and then they had prepared to open the remote mines.

    Remote mines, is a trojan file. This is Yang Tianli with "rebound port the original" series out. If the intruder click on the file, then the other party once the machine is infected, then automatically create a hidden back door.

    And Yang remote control through the back door of his machine, if the other party has a camera, you can see each other if the other party has a headset, you can hear each other talk.

    Yang then the machine is connected each other.

Tuesday, February 22, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(5)

 Reason he did not mind, because he personally tested before the density of their own firewall, there is no way in a short time found the real IP, the security team in the Star people are not professional hackers do not attack how powerful.

    "30 seconds of non stop, the consequences, like a year ago!"

    He seems to be taboo in other words, the rapid reply: Do not! Well, do not force you! Monster! Thank you for this!

    "Fuck!" Yang grin of a curse, brought off the table a cigarette lit, he tried to suck on one, but heard the table next to that brand of send bit sound.

    Meng Yang twist, slide the brand of former boss chair, squinting one aim, said: "Hey! Today is which of the fish hooked so early!"

    Screen in the show firewall asking for information: illegal intruders, or stop by.

    This machine is completely Yang to entertain themselves, and computer equipment is win2000 system, without any IP conversion and meat machine springboard, only a firewall.

    Yang firewall is time-consuming preparation of nearly two years out, the firewall contains numerous blood and sweat he almost used up all his technology, which contains many thousands of operations and prevent the procedures, time and again after the test, a optimization improved again, and finally completed and named: the Great Wall.

    Security and high density can be like repeat itself, like the Great Wall through the firewall must be as experienced as thousands across the obstruction.

    "Great Wall" by Yang installed in their own work on that computer, which sets the brand machines are installed to streamline like "Great Wall", and its safety and capacity, although can not be shipped to the original "Great Wall" par, but no ordinary rookie through the.

    Boring programming language, monotonic 26 letters, even if Yang is probably at this level sometimes can not stand, so he chose those who entertain themselves.

    Squinting smile, click-through. Look at other people from accessing their systems, he seemed very happy, maybe too miss the time to do their own rookie.

    When he clicks through, the firewall is completely hit the green light, there is no block of the invaders.

    Yang smoking a cigarette, squinting and staring at the monitor, his eyes full of smile, open the firewall log to look, grinned: "Hey, he knows how to springboard! Only three meat machine, far too few! then the less I have to dare to get on the invasion of hundreds of people! "(usually hackers, we have been under control of the machine is called a chicken, chicken to go through this invasion of Taiwan, the other server, called a springboard for continuous cycle!)

Monday, February 21, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(4)

"There are viruses, please killing!!" Anti-virus software, audio, ring tone.

    Yang hear the sound, the mouth slanting tilt, he smiled! Laughter is very evil, very treacherous.

    "Worthwhile results of their labor for a week, this can continue for some time!" He is shaking his head again sighed, paused, then said: "life, or ah!!"

    India Lama, is a type of worm infection, specifically in the infected system exe, pif and other documents, but also the process to terminate a large number of anti-virus software, and will be automatically deleted within the system gho file (backup file), which was All files will be infected with the Mo Yang Lama as an Indian.

    "Presumably they can not wait!" Yang horizon humming a tune, while open E-mail, then the source code of India Lama sent a security team Star.

    Less than a moment, the other to immediately reply: It was great! Now more than 23:00, we are still working overtime, if not you, I am afraid we have two days to decipher! I then again, the Star really need you this talent, I hope you will consider.

    Yang laugh cry, and he knew who the letter is the Star Security Group Technical Director, has played many dealings with him, claim to be a commune.

    "I remember playing the emoluments of my card!" Yang marked with the words quickly. His card is in the Swiss banks for the VIP customers, and are not afraid of each other to investigate their own through a bank card, not to mention his other identity cards is to use the application, while the Swiss banks to maintain the confidentiality of VIP customers.

    E-mail each other again: I do not understand you, your such a strong programming skills, and computing are particularly fine, if you like, I can let you take my seat!

    "Squeak! Squeak! -" Yang twinkling of an eye look, the firewall is sending bursts of warning, a hum softly, said: "rely on, every time I want to check the real IP, if not your money, long bombing you! "Then, the alert regardless of the firewall, fast marked with the words to your partner. It looks as if it is their firewall assured.

Saturday, February 19, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(3)

  That sets the black market is definitely not buy the computer, which is Yang made specifically for manufacturers, and its operation speed is very fast, which makes him almost one hundred thousand yuan was spent to purchase, regardless of the motherboard, hard drive, CPU and so are his carefully selected, the display is remarkable, from the brightness, response time, color accuracy and so much higher than usual number of machines.

    "Smack!" Yang lit a cigarette at the window, to the mouth drawn on one, then spit it out slowly, waving open the windows, looked at the following bit of squinting ***. At this time is at night, when this time, he will look at the night view of Shanghai, he rented a house not far from the school, is the second unit of the sixth floor residential area, and sometimes he has doubts that he is not in love with the Shanghai noisy night.

    After about half an hour, smoked two cigarettes, sit, turn and bosses chair and shoved it in a circle. Suddenly, a black chair with people slide into the front of the computer, move the click of the mouse, point to open an anti-virus software, smiled, and said: "India Lama has been spread for two days I do not know Star's security team to find a solution with no !, "said a folder from the virus transfer to want to test the implementation of the file.

    Star company is more well-known software development company, its products have anti-virus software, Star, Star assistant and so on. India Lama virus is compiled Yang spent a week out of his success spread to the network two days ago.

    Two years out from time to time he would be prepared to the network is still a virus, its purpose is to make money. Star Company by the users feedback, if there is no way to get rid of within a short time, then it's software in the industry will be a great loss of reputation. But this time, Yang will send an anonymous message to Star Ferry Company, is his message in the source code of the virus spreading.

    Star by the security team to decipher the source code is for an immediate analysis, and finally increase the patch, and Yang will get a small remuneration than not, the past two years he is to make money in this way. Each time the virus attacks the network, Star will be the fastest software update allows users to quickly patch a complete anti-virus, which also makes the company Star has a good reputation in the industry, but they do not know is that the source code for them The anonymous man is the maker of the virus.

    Yang is like a vampire-like every time God will suck a little blood, Star, this is no exception. Open Star antivirus software companies want to test.

Friday, February 18, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(2)

1840 Opium Conflict, Cina was little by little decreased with a semi-colonial, semi-feudal modern society, folks of most imperialism and also feudalism endured this twice oppression and also exploitation. Stress this brilliant folks of most ethnicities challenge next to imperialism and also feudalism, this Far east individuals unity throughout forging in advance and also produce a new section within the record: throughout 1851, this episode of the Taiping Heavenly Kingdom throughout Guangxi radical action, Zhuang, Yao, Hui, Miao, Mongolian, Yi, Bai, Dai, Hani, Lisu as well as other ethnic minority folks and also Han folks within the challenge jointly. Many of these famous people are ethnic minorities, including the Upper Wei Changhui Wang, Wang Xiao Chaogui To the west and the renowned generals Linfeng Xiang, Li Kaifang and so on. are Zhuang. Following a Opium Conflict, Italy occupying my own Heilongjiang, north distance of the Ussuri Lake and also distance with Sea Balkhash throughout Xinjiang, a colossal place southern region of the Indian and also People from france have been occupied Tibet and also Southwest WHEN I, epidermis folks climb upward turned on challenge. Daur, Oroqen, Hezhen, Ewenki and the Northwest, Southwest and also positively plan folks of most ethnic conflict, this brave fight this invaders. The fantastic challenge next to imperialism and also feudalism, to ensure that most of ethnic organizations within the different beautiful ailments, to obtain a different unity and also reunification.

Thursday, February 17, 2011

first volume ,Walking on the edge of hackers,chapter 1, evil hackers Yang(1)

Gary, London, in 2003, the U.S. government FBI arrested. Had frequented the world powerful technology and telecommunications companies - Nokia, Fujitsu, Motorola, and so the computer system, and the illegal invasion has more than 90 U.S. military computer systems, in mid 2003, he hacked Citibank and stole 10 million, money in the account then transferred to the United Kingdom, the Netherlands, Germany, Ireland, the FBI will soon be captured.

    - Gary was sentenced to five years on parole from prison at the end of 2008.

    Yang squinting stare at the United States FBI official home page, and a moment later Nuenue mouth, murmured: "This guy is about to come out, do not know it is there after the glory year, the U.S. government also cruel, after his release still prohibit him from access to computers for two years, "said, they come forward and stood up, paused, then said:" Gray, the myth of London, came out, or God? "laugh loudly, walked to the window.

    He now just turned 20 years old, studied at the Shanghai University of FD, though already a sophomore student, but the absolute number of times he went to school no more than 10 times, can be said that in addition to two of the whole school knew he was there, other people probably see all have not seen him.

    Not to mention his handsome appearance, also handsome fills up, a little thin body with a little white face, apparently caused by malnutrition, should not there a broken flowing hair, makes it is suspected that he was from the northwest to the refugees.

    Placed in the bedroom is very monotonous, a Simmons bed space to occupy most of the bed to the left of a row of shelves above them the number of function theory, British Journal of Mathematical tutorials and books, but no one on the computer books, but in bed placed the right of two computers, that Taiwan is his black "work" used in small high-quality energy chassis, with 26-inch LCD monitor, it looks quite gorgeous and extraordinary; and white that Taiwan is his "fishing fish "are used, only one brand of extraordinary ordinary type.

Wednesday, February 16, 2011

Hackers fingers

book content
Black is you, do not doubt; no other, the specter of a family of direct bombers killat night, fingers of war.
This class can not go beyond the classic, ah, few years later, I came back re-read it again. That passion people deep.